English

SAS Administrators
Stuart Rogers 0
SAS and Hadoop—living in the same house

So, with the simple introduction in Understanding Hadoop security, configuring Kerberos with Hadoop alone looks relatively straightforward. Your Hadoop environment sits in isolation within a separate, independent Kerberos realm with its own Kerberos Key Distribution Center. End users can happily type commands as they log into a machine hosting the

Advanced Analytics | Analytics | Customer Intelligence | Data Management
Alan Lipson 0
Get your house in order to cash in on retail’s omnichannel promise

Would you build a house without a proper foundation? Most of us wouldn’t dare, but that’s exactly what many retail businesses are doing today. When building a house, if you don’t get the foundation right, paint, wallpaper and fixtures won’t matter much. It’s no different in the retail industry. Success

Rick Wicklin 0
Create discrete heat maps in SAS/IML

In a previous article I introduced the HEATMAPCONT subroutine in SAS/IML 13.1, which makes it easy to visualize matrices by using heat maps with continuous color ramps. This article introduces a companion subroutine. The HEATMAPDISC subroutine, which also requires SAS/IML 13.1, is designed to visualize matrices that have a small

Data Visualization
Sanjay Matange 0
CandleStick Chart

A HighLow plot is very popular in the financial industry, often used to track the periodic movement of a stock or some instrument or commodity.  The CandleStick Chart is one specific type of high low plot, purportedly originating in Japan for tracking of financial instruments in the rice trade. Creating a

Rick Wicklin 0
The frequency of bigrams in an English corpus

In last week's article about the distribution of letters in an English corpus, I presented research results by Peter Norvig who used Google's digitized library and tabulated the frequency of each letter. Norvig also tabulated the frequency of bigrams, which are pairs of letters that appear consecutively within a word.

Analytics
0
The New Normal is Strange

The first time I used the Internet it blew my mind. As a diplomat brat, at any point in time everyone I knew was everywhere but where I was. Thanks the miracles of Gopher, Veronica, IRC and email, the tyranny of distance didn’t seem so oppressive any more. When I

Rick Wicklin 0
Designing a quantile bin plot

While at JSM 2014 in Boston, a statistician asked me whether it was possible to create a "customized bin plot" in SAS. When I asked for more information, she told me that she has a large data set. She wants to visualize the data, but a scatter plot is not

SAS Events
Vince DelGobbo 0
Hey, who you callin' a WUSS?

Let's get one thing straight: I'm no wuss. Well, at least *I* don't think so. But on September 3-5, 2014, I gladly joined ranks with over 400 WUSSes descending on the Fairmont Hotel in downtown San Jose for the Western Users of SAS Software (WUSS) Educational Forum and Conference. It

Rick Wicklin 0
Skew this

The skewness of a distribution indicates whether a distribution is symmetric or not. A distribution that is symmetric about its mean has zero skewness. In contrast, if the right tail of a unimodal distribution has more mass than the left tail, then the distribution is said to be "right skewed"

Data Visualization
Sanjay Matange 0
Splines

Many users of SGPLOT and GTL know how to mix and match various plot statements to create graphs, sometimes in ways not originally intended.  You are also aware that you can go a step beyond, and use these systems to create completely non-standard graphs such as the Spiral Plot, the Polar

Kenneth Sanford 0
Econometric modeling: your questions answered

Several weeks ago, I led a SAS Talks webinar on SAS/ETS emphasizing the many recent changes to the software. SAS/ETS, for those unfamiliar with the product, is SAS’s suite of econometrics, time series and forecasting tools and algorithms. While we covered a substantial amount of material in the talk, there

Rick Wicklin 0
The frequency of letters in an English corpus

It's time for another blog post about ciphers. As I indicated in my previous blog post about substitution ciphers, the classical substitution cipher is no longer used to encrypt ultra-secret messages because the enciphered text is prone to a type of statistical attack known as frequency analysis. At the root

1 240 241 242 243 244 320