Tag: Cloud BI / Analytics

Setting up an Oracle Analytics Cloud (OAC) instance can be a little tricky. Learn the ins and outs of this fairly new Oracle offering in this session. Topics covered will be OAC parts and pieces, how to navigate in the Cloud environment, creating the database and OAC instance, building out an application and analysis and…

Setting up an Oracle Analytics Cloud (OAC) instance can be a little tricky. Learn the ins and outs of this fairly new Oracle offering in this session. Topics covered will be OAC parts and pieces, how to navigate in the Cloud environment, creating the database and OAC instance, building out an application and analysis and…

This presentation discusses the developer tools (and effort) used to create Graph theoritic model of an Oracle equipment datawarehouse. A graph has nodes and edges and their ranking (based on # of adjecent nodes) was critical in the final decision making. The uniqueness of this approach is to take generic Relational tables and look at…

This presentation discusses the developer tools (and effort) used to create Graph theoritic model of an Oracle equipment datawarehouse. A graph has nodes and edges and their ranking (based on # of adjecent nodes) was critical in the final decision making. The uniqueness of this approach is to take generic Relational tables and look at…

Imagine a world that anticipates your every move.  Datafication, smart phones, Twitter, Facebook, GPS and IoT, produce a digital exhaust that tracks your every movement, relationships and activities.  Now, companies know everything about you and can anticipate your future.  Peter Tucker, author of “The Naked Future” paints a vivid picture of a present and “very…

Imagine a world that anticipates your every move.  Datafication, smart phones, Twitter, Facebook, GPS and IoT, produce a digital exhaust that tracks your every movement, relationships and activities.  Now, companies know everything about you and can anticipate your future.  Peter Tucker, author of “The Naked Future” paints a vivid picture of a present and “very…

Most data science projects begin with data, “tools” and scripts but fail to get beyond the data scientist. They hit a wall when attempting to “operationalize” the models.  Netflix never implemented the algorithm that won the Netflix $1 Million Challenge.  This dichotomy between enterprise and algorithms is eliminated when algorithms are built into the data…

Most data science projects begin with data, “tools” and scripts but fail to get beyond the data scientist. They hit a wall when attempting to “operationalize” the models.  Netflix never implemented the algorithm that won the Netflix $1 Million Challenge.  This dichotomy between enterprise and algorithms is eliminated when algorithms are built into the data…

Most data science projects begin with data, “tools” and scripts but fail to get beyond the data scientist. They hit a wall when attempting to “operationalize” the models.  Netflix never implemented the algorithm that won the Netflix $1 Million Challenge.  This dichotomy between enterprise and algorithms is eliminated when algorithms are built into the data…

As IT infrastructure expands to new IaaS, PaaS, and SaaS platforms from multiple vendors, the surface area of risk and threats also increases. Meanwhile, security teams have to contend with silos of visibility and weak monitoring across distributed cloud assets. Unified security monitoring is critical to detecting modern threats that are rapidly evolving to exploit…