Category: Applied data mining

Equifax Workforce Solutions
Equifax Workforce Solutions, formerly known as TALX (pronounced "talks"), is a wholly owned subsidiary of Equifax. It is based in St. Louis, Missouri. The company was originally founded in 1972 under
Stellar Wind
"Stellar Wind" (or "Stellarwind") was the code name of a warrantless surveillance program begun under the George W. Bush administration's President's Surveillance Program (PSP). The National Security
Daisy Intelligence
Daisy Intelligence is a Canadian Artificial Intelligence (AI) company that provides data analysis services to help retailers, mainly grocers and supermarkets, to determine optimal pricing and promotio
Data mining in agriculture
Data mining in agriculture is a recent research topic, consisting of the application of data mining techniques to agriculture. Recent technologies are able to provide extensive information on agricult
Open-source intelligence
Open-source intelligence (OSINT) is the collection and analysis of data gathered from open sources (covert and publicly available sources) to produce actionable intelligence. OSINT is primarily used i
SEMMA
SEMMA is an acronym that stands for Sample, Explore, Modify, Model, and Assess. It is a list of sequential steps developed by SAS Institute, one of the largest producers of statistics and business int
Game analytics
Game analytics is the form of behavioral analytics that deals with video games. Game analytics involve using quantitative measures, metrics, and tools that can be used to track events that occur over
Inference attack
An Inference Attack is a data mining technique performed by analyzing data in order to illegitimately gain knowledge about a subject or database. A subject's sensitive information can be considered as
Data thinking
Recent years have seen the integration of computer science, mathematics and statistics, together with real-world domain knowledge, into a new research and applications field: data science. Just as dat
Able Danger
Able Danger was a classified military planning effort led by the U.S. Special Operations Command (SOCOM) and the Defense Intelligence Agency (DIA). It was created as a result of a directive from the J
Customer analytics
Customer analytics is a process by which data from customer behavior is used to help make key business decisions via market segmentation and predictive analytics. This information is used by businesse
Examples of data mining
Data mining, the process of discovering patterns in large data sets, has been used in many applications.
Text mining
Text mining, also referred to as text data mining, similar to text analytics, is the process of deriving high-quality information from text. It involves "the discovery by computer of new, previously u
Business analytics
Business analytics (BA) refers to the skills, technologies, and practices for continuous iterative exploration and investigation of past business performance to gain insight and drive business plannin
Data Applied
Data Applied is a software vendor headquartered in Washington. Founded by a group of former Microsoft employees, the company specializes in data mining, data visualization, and business intelligence e
Java Data Mining
Java Data Mining (JDM) is a standard Java API for developing data mining applications and tools. JDM defines an object model and Java API for data mining objects and processes. JDM enables application
Behavioral analytics
Behavioral analytics is a recent advancement in business analytics that reveals new insights into the behavior of consumers on eCommerce platforms, online games, web and mobile applications, and IoT.
CORE (research service)
CORE (Connecting Repositories) is a service provided by the based at The Open University, United Kingdom. The goal of the project is to aggregate all open access content distributed across different s
Anomaly Detection at Multiple Scales
Anomaly Detection at Multiple Scales, or ADAMS, was a $35 million DARPA project designed to identify patterns and anomalies in very large data sets. It is under DARPA's Information Innovation office a
PRODIGAL (computer system)
PRODIGAL (proactive discovery of insider threats using graph analysis and learning) is a computer system for predicting anomalous behavior among humans, by data mining network traffic such as emails,
Automatic number-plate recognition in the United Kingdom
Automatic number plate recognition (ANPR) is a technology for automatically reading vehicle number plates. The Home Office states ANPR is used by law enforcement agencies in the United Kingdom to help
Educational data mining
Educational data mining (EDM) is a research field concerned with the application of data mining, machine learning and statistics to information generated from educational settings (e.g., universities
Path analysis (computing)
Path analysis, is the analysis of a path, which is a portrayal of a chain of consecutive events that a given user or cohort performs during a set period of time while using a website, online game, or
Zapaday
Zapaday is a global news calendar. The website publishes upcoming news headlines per day and per topic as a resource for journalists, bloggers, political analysts, marketers, event organisers, public
Document processing
Document processing is a field of research and a set of production processes aimed at making an analog document digital. Document processing does not simply aim to photograph or scan a document to obt
Cross-industry standard process for data mining
Cross-industry standard process for data mining, known as CRISP-DM, is an open standard process model that describes common approaches used by data mining experts. It is the most widely-used analytics