Uncategorized

David Loshin 0
What is reference data harmonization?

A few weeks back I noted that one of the objectives on an inventory process for reference data was data harmonization, which meant determining when two reference sets refer to the same conceptual domain and harmonizing the contents into a conformed standard domain. Conceptually it sounds relatively straightforward, but as

Alyssa Farrell 0
Reaching the new energy consumer

Whether it’s to reduce churn in competitive markets or to elevate customer satisfaction rankings in regulated markets, customer analytics is hot right now in utilities. However, the complexity that utilities have built into their processes and technologies over the past decades makes customer analytics a more challenging issue to tackle

Mark Torr 0
How Hadoop emerged and why it gained mainstream traction

In the world of IT, very few new technologies emerge that are not built on what came before, combined with a new, emerging need or idea. The history of Hadoop is no exception. To understand how Hadoop came to be, we therefore need to understand what went before Hadoop that led to its creation. To understand

Rick Wicklin 0
Create discrete heat maps in SAS/IML

In a previous article I introduced the HEATMAPCONT subroutine in SAS/IML 13.1, which makes it easy to visualize matrices by using heat maps with continuous color ramps. This article introduces a companion subroutine. The HEATMAPDISC subroutine, which also requires SAS/IML 13.1, is designed to visualize matrices that have a small

Rick Wicklin 0
The frequency of bigrams in an English corpus

In last week's article about the distribution of letters in an English corpus, I presented research results by Peter Norvig who used Google's digitized library and tabulated the frequency of each letter. Norvig also tabulated the frequency of bigrams, which are pairs of letters that appear consecutively within a word.

Brad Sitler 0
EHR systems should enable the triple aim, not prevent it

A recent news headline read, “Bipartisan committee wants government-subsidized electronic records systems scrutinized for ‘information blocking.’” * The question before the US Senate Appropriations Committee is whether taxpayer-funded EHR software solutions are now preventing the unrestricted exchange of medical records between health care organizations. If this is in fact the case,

Analytics
0
The New Normal is Strange

The first time I used the Internet it blew my mind. As a diplomat brat, at any point in time everyone I knew was everywhere but where I was. Thanks the miracles of Gopher, Veronica, IRC and email, the tyranny of distance didn’t seem so oppressive any more. When I

Rick Wicklin 0
Designing a quantile bin plot

While at JSM 2014 in Boston, a statistician asked me whether it was possible to create a "customized bin plot" in SAS. When I asked for more information, she told me that she has a large data set. She wants to visualize the data, but a scatter plot is not

Risk Management
Larry Roadcap 0
Five Keys to Successful Stress Testing

Stress testing is not new to the risk world but has been a major focus since the GFC (Global Financial Crisis). For a number of years now, stress testing has helped analytical specialists quantify various aspects of potential loss. What is new is the introduction of regulatory stress tests which

Lisa Dodson 0
Asurewin Casino Review

Asurewin Casino Review TheAsurewin Casino offers several bonuses for new customers. Its largest campaign is TheAsurewin Welcome Bonus, which adds 50% of the first and second deposits to players' balances. This bonus has a cap of $2,000 and is available six times per week. In order to qualify for the

Rick Wicklin 0
Skew this

The skewness of a distribution indicates whether a distribution is symmetric or not. A distribution that is symmetric about its mean has zero skewness. In contrast, if the right tail of a unimodal distribution has more mass than the left tail, then the distribution is said to be "right skewed"

Rick Wicklin 0
The frequency of letters in an English corpus

It's time for another blog post about ciphers. As I indicated in my previous blog post about substitution ciphers, the classical substitution cipher is no longer used to encrypt ultra-secret messages because the enciphered text is prone to a type of statistical attack known as frequency analysis. At the root

1 189 190 191 192 193 256