The Way from Data to Information

Data Mining

Subscribe to Data Mining: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Data Mining: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

With the standardization of the Java Data Mining (JDM) API, Enterprise Java applications have been given predictive technologies. Data mining is a widely accepted technology used for extracting hidden patterns from data. It is used to solve many business problems like identifying cross-sell or up-sell opportunities for specific customers based on customer profiles and purchase patterns, predicting which customers are likely to churn, creating effective product campaigns, detecting fraud, and finding natural segments. More and more data mining algorithms are being embedded in databases. Advanced analytics, like data mining, is now widely integrated with applications. The objective of this article is to introduce Java developers to data mining and explain how the JDM standard can be used to integrate this technology with enterprise applications. Data Mining Functions... (more)

JCP Approves Oracle-Led Data Mining Specification, JSR-73

"JSR 73 is an important step in enabling production data mining," said Oracle's VP Jacek Myczkowski yesterday. Myczkowski, who is Oracle's vice president of Data Mining Technologies and Life Sciences, was speaking on the occasion of the unanimous approval, by the Executive Committee of the Java Community Process, of Java Specification Request (JSR) 73, the industry's first Java Data Mining specification designed specifically to incorporate data mining into any application that requires advanced analytics. "Widespread adoption of Java Data Mining will bring data mining to the masses because developers can learn one API and embed analytics in any application, regardless of vendor," Myczkowski added. In addition to enabling developers to reduce the time and cost of development, the new Java API and Web services standard allows developers to leverage other data mining st... (more)

Bit.ly, Twitter, Security & You

..or, what I did on my twitter vacation the other day.  This brief break from 26 Short Topics about Security is brought to you by bit.ly, twitter, security and You.  I’ve been using bit.ly for a little while both to shorten links and be able to track clicks placed on twitter (and other social sites) – as many of you do.  When the twitter outage hit last week, and many folks found themselves ‘lost’ without it, I decided to review my stats on the bit.ly links I’ve sent and found something interesting; or frightening.  :-)  (Incidentally, there was a another DDoS attack yesterday that took twitter down for about 20 minutes) To set this up: as you might know, I cover Security within the Technical Marketing Team (Lori, Alan & Ken round out the TMM group – and we’re all interested in Security) at F5 and usually find 1 or 2 interesting ‘security’ stories that I actually t... (more)

Lori MacVittie Interview at Cloud Connect

I got a chance to sit down with another member of the Technical Marketing Team at F5, Lori MacVittie at the Cloud Connect conference in Santa Clara this week.  We chat about Web 2.0, Infrastructure 2.0, dynamic networks, cloud interoperability standards, what 3.0 looks like and a few other things.  Thanks Lori! ... (more)

SAP and Big Data

SAP customers are confused about the positioning between SAP Sybase IQ and SAP Hana as it applies to data warehousing. Go figure, so is SAP. You want to learn about their data warehousing offering, and all you hear is “Hana this” and “Hana that”. It reminds me of the time after I left Teradata when the BI appliances came on the scene. First Netezza, then Greenplum, then Vertica and Aster Data, then ParAccel. Everyone was confused about what the BI appliance was in relation to the EDW. Do I need an EDW, a BI appliance, an EDW + BI appliance? With SAP, Sybase IQ is supposed to be the data warehouse and Hana is the BI or analytic appliance that sits off to its side. Okay. SAP has a few customers on Sybase IQ, but are they the larger well-known brands? Let's face it….since its acquisition of Sybase in 2010, SAP has struggled with positioning it against incumbents like ... (more)

It's All Fun and Games (and Data Mining) at JAMDAT Mobile

Anticipation is a key factor in figuring out what will happen in the wireless industry over the next couple of years. As entertainment migrates to the handset, it's predicted that revenues from games on mobile phones will reach $6 billion by 2005. How? Many questions remain, but there are some strong players joining in to find the answers. Do you remember Carnac the Magnificent? One of the most enduring segments of the pre-Leno Tonight Show was arguably host Johnny Carson's portrayal of the mystical Carnac. His turban and cloak-wearing character could divine the answers to yet-to-be-asked questions that were "hermetically sealed" in envelopes, and presented to him by sidekick Ed McMahon. These "answers" ended up being little more than seemingly unrelated words, statements, or names. To great comedic effect in many cases, Carson's Carnac character would tear open ea... (more)

Big Data in Telecom: The Need for Analytics

Networks have become a strategic asset, the life blood of organizations. Once considered a "techy thing," networks are now mission-critical for every member of the organization - from the IT manager to the marketing VP to the CEO. An increasing number of companies now recognize the impact network quality has on the customer experience and, in turn, on the bottom line. Providing a great customer experience, every time, is vital for limiting churn and building loyalty. This has led many organizations to adopt a strong quality assurance program to test and monitor all contact center services. This is particularly important in environments that must support multi-channel and multi-service applications. The complex configurations needed to enable voice, video and data to share network resources puts a tremendous strain on bandwidth and creates problems that can be very ... (more)

Algorithms of the Intelligent Web

I have recently finished writing the "Algorithms of the Intelligent Web" and it should hit the bookshelves in a few weeks. I would like to tell you what the book is about and why I wrote it -- to save some typing, hereafter, I will refer to the book as "AIW", "the AIW book", etc. The code for the book is hosted on Google Code here. The AIW book includes topics from the areas of machine learning, data mining, statistics, and discovery in knowledge bases. The literature on these topics is vast but it is, almost exclusively, academic and heavy in mathematical jargon. Nevertheless, the main ideas of the algorithms can be grasped and used by nearly every software engineer with a minimum of mathematical formalism and a little bit of effort. In fact, one of the goals that I set for the book was to describe every algorithm without writing a single mathematical equation; a ... (more)

The Threat Behind the Firewall

I had a different name for this blog entry but just ‘Jump Drive’ is an awful blog title.  They go by many names; jump drive, USB drive, flash drive, memory stick and a few others, but removable media is a serious threat to IT organizations.  Graduating from floppy disks, as early as 2003 articles were warning against the possible threats introduced with these devices – 256Mb for $160 back then – and yet we still see some sort of incident reported almost once a week!  From consultants, to government employees, to Mortgage lenders, to the International Space Station, what used to be a giveaway staple at trade shows, these tiny less-than-two-inch drives can hit and hurt you in a multitude of ways. They can infect your Network. Just last week, the London Council’s systems were infested with Conficker-D due to an employee sticking an infected USB drive into a work compu... (more)

Data Mining

You may think you're using your data warehouse to its fullest extent. After all, you've amassed a great deal of data about customers or inventory that you can look up at will. But if you're not using the proper business intelligence (BI) tools, your data warehouse is no better than a hunk of coal. BI tools such as data mining can turn the coal into a diamond that can propel your business to the top. Data mining can help you do more than you ever imagined with your data warehouse. Some call data mining data discovery or data knowledge, but whatever you call it, data mining allows you to take your data warehouse, dissect it piece by piece, and summarize it into useful information. Data mining isn't just a fancy term for OLAP (Online Analytical Processing), which tells you what happened in the past. Data mining helps users predict the future through the discovery of tr... (more)

Oracle Data Guard Sync Over the WAN with F5 BIG-IP

While at Interop 2010 this week, we shot some videos and in this one, learn how F5's WAN Optimization can enhance Oracle's Data Guard solution. I talk with Chris Akker, Solution Engineer, about the challenges of real-time database sync and Zero Data Loss over a Wide Area Network. Watch how F5's WAN Optimization can reduce latency, extend the distance required between data-centers and enable an enhanced disaster recovery solution. ps ... (more)