ⓘ Free online encyclopedia. Did you know? page 833

Critical path drag

Critical path drag is a project management metric developed by Stephen Devaux as part of the Total Project Control approach to schedule analysis and compression in the critical path method of scheduling. Critical path drag is the amount of time t ...

Customer dynamics

Customer dynamics is an emerging theory on customer-business relationships that describes the ongoing interchange of information and transactions between customers and organizations. These exchanges occur over a wide range of communication channe ...

Data stream

In connection-oriented communication, a data stream is a sequence of digitally encoded coherent signals used to transmit or receive information that is in the process of being transmitted. A data stream is a set of extracted information from a da ...

Decision Model and Notation

Decision Model and Notation is a standard published by the Object Management Group. It is a standard approach for describing and modeling repeatable decisions within organizations to ensure that decision models are interchangeable across organiza ...

Domain engineering

Domain engineering, also called product line engineering, is the entire process of reusing domain knowledge in the production of new software systems. It is a key concept in systematic software reuse. A key idea in systematic software reuse is th ...

Drag cost

Drag cost is a project management metric developed by Stephen Devaux as part of the Total Project Control approach to project schedule and cost analysis. It is the amount by which a project’s expected return on investment is reduced due to the cr ...

Global Simplicity Index

The Global Simplicity Index 2011 is the first ever study to calculate the cost of complexity in the worlds largest organisations. The research was conducted jointly by management consultancy, Simplicity, and Warwick Business School. The Global Si ...

Industry average

Industry averages are generally using as benchmarks or tools which helps business to make comparisons that helps to determine its position within the industry and evaluate financial performance of the business. Its a useful tool for business mana ...

International Institute of Business Analysis

The International Institute of Business Analysis is a non-profit professional association formed in October 2003 with the purpose of supporting and promoting the discipline of business analysis. IIBA helps business analysts develop their skills a ...

July Systems

July Systems is a Burlingame, California based software provider founded in 2001. The company offers cloud-based SaaS platform, called Proximity MX, that provides location analytics and deliver contextually relevant communication to visitors in a ...

Lambert Review

The Lambert Review of Business-University Collaboration was a report by Richard Lambert published by Her Majestys Treasury in the United Kingdom in 2003, which made "a series of recommendations aimed at smoothing out the path between Britain’s st ...

List of statistical tools used in project management

Earned value management is a project management technique for measuring project performance and progress in terms of deducing earned value of a project from planned value and the actual costs. Critical path drag is a project management metric use ...

Neglected firm effect

The Neglected firm effect is the phenomenon of lesser-known firms producing abnormally high returns on their stocks. The companies that are followed by fewer analysts will earn higher returns on average than companies that are followed by many an ...

Requirements analysis

In systems engineering and software engineering, requirements analysis focuses on the tasks that determine the needs or conditions to meet the new or altered product or project, taking account of the possibly conflicting requirements of the vario ...

Sailing ship effect

The sailing ship effect is a phenomenon by which the introduction of a new technology to a market accelerates the innovation of an incumbent technology. Despite the fact that the term was coined by W.H. Ward in 1967 the concept was made clear muc ...

Specification by example

Specification by example is a collaborative approach to defining requirements and business-oriented functional tests for software products based on capturing and illustrating requirements using realistic examples instead of abstract statements. I ...

Value Delivery Modelling Language

Value Delivery Modeling Language is a standard modeling language for analysis and design of the operation of an enterprise with particular focus on the creation and exchange of value. In 2009, the Object Management Group OMG launched a Request fo ...

VPEC-T

VPEC-T analysis is a thinking framework comprising a collection of mental filters or guides. It provides a "simplified language for preventing loss in translation from business needs to IT solutions" and is used when analyzing the expectations of ...

Workplace strategy

The role of the person charged with developing the strategy, the workplace strategist, is to understand the organisations requirements and recommend a workplace solution that will help them meet their current and future needs. The workplace strat ...

Analytica (company)

Analytica is a consulting and information technology firm serving US public and private sector enterprises focused on national security, law enforcement, health care and financial services. The company specializes in implementing on-premises and ...

Attention marketing

Attention marketing is the term, coined by internet entrepreneur Steve Jelley to describe a particular business model that has evolved around the growth of social media on the internet. It was popularized by the book Purple Cow: Transform Your Bu ...

CBIG Consulting

CBIG Consulting is a consulting group that specializes in business intelligence, big data analytics, data warehouse and cloud computing analytics. CBIG Consulting was acquired by Trianz in January 2018.

Currency analytics

Companies that do business in more than one currency are exposed to exchange rate risk – that is, changes in the value of one currency versus another. Exchange rate risk is especially high in periods of high currency volatility. Currency analytic ...

DataOps

DataOps is an automated, process-oriented methodology, used by analytic and data teams, to improve the quality and reduce the cycle time of data analytics. While DataOps began as a set of best practices, it has now matured to become a new and ind ...

Flutura Decision Sciences and Analytics

Flutura Decision Sciences and Analytics is an Industrial Internet of things company that focuses on machine to machine and big data analytics serving clients from manufacturing, energy and engineering industries. Its main offices are located in P ...

IT operations analytics

In the fields of information technology and systems management, IT operations analytics is an approach or method to retrieve, analyze, and report data for IT operations. ITOA may apply big data analytics to large datasets to produce business insi ...

Makridakis Competitions

The Makridakis Competitions are a series of open competitions organized by teams led by forecasting researcher Spyros Makridakis and intended to evaluate and compare the accuracy of different forecasting methods.

Mobile location analytics

Mobile location analytics is a type of customer intelligence and refers to technology for retailers, including developing aggregate reports used to reduce waiting times at checkouts, improving store layouts, and understanding consumer shopping pa ...

Mu Sigma

Mu Sigma is an Indian management consulting firm that primarily offers data analytics services. The firms name is derived from the statistical terms "Mu and "Sigma which symbolize the mean and the standard deviation, respectively, of a probabilit ...

ORCA (computer system)

ORCA was a mobile-optimized web application used as a component of the "get out the vote" efforts for Mitt Romneys 2012 presidential campaign. It was intended to enable volunteers in polling stations around the country to report which voters had ...

Project Houdini

Project Houdini is a computer program used by the 2008 U.S. presidential campaign of Barack Obama. Although it originally had missteps, it has been credited with helping increase Democratic Party turnout over the 2004 election. It has been compar ...

Project Narwhal

Project Narwhal is the name of a computer program used by the 2012 campaign by Barack Obama. It was contrasted in the Mitt Romney presidential campaign by Project Orca, so named because the orca is one of the few predators of the narwhal.

Serpstat

Serpstat is a software as a service company based in Odessa, Ukraine. It was founded by Oleg Salamaha in 2013 as an internal service for the digital marketing agency Netpeak, which became its main investor. In March 2015 Serpstat became an indepe ...

Examples of data mining

Since the early 1960s, with the availability of oracles for certain combinatorial games, also called tablebases e.g. for 3x3-chess with any beginning configuration, small-board dots-and-boxes, small-board-hex, and certain endgames in chess, dots- ...

Able Danger

Able Danger was a classified military planning effort led by the U.S. Special Operations Command and the Defense Intelligence Agency. It was created as a result of a directive from the Joint Chiefs of Staff in early October 1999 by Chairman of th ...

Anomaly Detection at Multiple Scales

Anomaly Detection at Multiple Scales, or ADAMS, is a million DARPA project designed to identify patterns and anomalies in very large data sets. It is under DARPAs Information Innovation office and began in 2011. The project is intended to detect ...

COnnecting REpositories

CORE is a service provided by the Knowledge Media Institute, based at The Open University, United Kingdom. The goal of the project is to aggregate all open access content distributed across different systems, such as repositories and open access ...

Cross-industry standard process for data mining

Cross-industry standard process for data mining, known as CRISP-DM, is an open standard process model that describes common approaches used by data mining experts. It is the most widely-used analytics model. In 2015, IBM released a new methodolog ...

Data Applied

Data Applied is a software vendor headquartered in Washington. Founded by a group of former Microsoft employees, the company specializes in data mining, data visualization, and business intelligence environments.

Data mining in agriculture

Data mining in agriculture is a very recent research topic. It consists in the application of data mining techniques to agriculture. Recent technologies are nowadays able to provide a lot of information on agricultural-related activities, which c ...

Equifax Workforce Solutions

Equifax Workforce Solutions, formerly known as TALX, is a wholly owned subsidiary of Equifax. It is based in St. Louis, Missouri. The company was originally founded in 1972 under the name Interface Technology Inc. The company maintains a database ...

Human genetic clustering

Human genetic clustering is the degree to which human genetic variation can be partitioned into a small number of groups or clusters. A leading method of analysis uses mathematical cluster analysis of the degree of similarity of genetic data betw ...

Inference attack

An Inference Attack is a data mining technique performed by analyzing data in order to illegitimately gain knowledge about a subject or database. A subjects sensitive information can be considered as leaked if an adversary can infer its real valu ...

Java Data Mining

Java Data Mining is a standard Java API for developing data mining applications and tools. JDM defines an object model and Java API for data mining objects and processes. JDM enables applications to integrate data mining technology for developing ...

Open-source intelligence

Open-source intelligence is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term "open" refers to overt, publicly available sources. It is not related to open-source softwar ...

Automatic number plate recognition in the United Kingdom

Automatic number plate recognition is a technology for automatically reading vehicle number plates. The Home Office states ANPR is used by law enforcement agencies in the United Kingdom to help detect, deter and disrupt criminality including tack ...

PRODIGAL (computer system)

PRODIGAL is a computer system for predicting anomalous behavior among humans, by data mining network traffic such as emails, text messages and server log entries. It is part of DARPAs Anomaly Detection at Multiple Scales project. The initial sche ...

SEMMA

SEMMA is an acronym that stands for Sample, Explore, Modify, Model, and Assess. It is a list of sequential steps developed by SAS Institute, one of the largest producers of statistics and business intelligence software. It guides the implementati ...

Stellar Wind

Stellar Wind was the code name of a warrantless surveillance program begun under the George W. Bush administrations Presidents Surveillance Program. The National Security Agency program was approved by President Bush shortly after the September 1 ...

Text mining

According to Hotho et al. we can differ three different perspectives of text mining, namely text mining as information extraction, text mining as text data mining, and text mining as KDD process. Text mining is "the discovery by computer of new, ...