SlideShare uma empresa Scribd logo
1 de 62
Baixar para ler offline
Modern Data Science
Alejandro Correa Bahnsen
June 2016
@albahnsen
1
Who am I?
Data Scientist
PhD in Machine Learning
Interested in Big Data Engineering
Passionate about open-source
Scikit-Learn contributor :)
Organizer of the Bogota Big Data Science Meetup
2
Who I've worked with
3
Where I work
Lead Data Scientist working on applying
Machine Learning for Security Informatics
4
Aims of this talk
Discuss what a Modern Data Scientist is
(And what is not)
5
6
It's 2016 and there is still no
unique definition of Data
Science
7
8
“ A data scientist is a statistician
who lives in San Fransisco.
“ Data Science is statistics on a
Mac.
9
Data Science is like teenage sex:
everyone talks about it,
nobody really knows how to do it,
everyone thinks everyone else is doing it,
so everyone claims they are doing it...
10
Even worse, people use
several words interchangeable
11
12
13
14
15
Lets focus only on modern
data science
16
So what is Data
Science?
17
Data Science
18
Data Science is the intersection of
Hacking Skills, Math & Statistics
Knowledge and Substantive Expertise
Those are the pillars of data science: computing,
statistics, mathematics and quantitative disciplines
combined to analyze data for better decision making
19
Hacking Skills
Ability to build things and find clever solutions to
problems.
Programming/Coding: Python and R (and others)
Databases: MySQL, PostgreSQL, Cassandra,
MongoDB and CouchDB.
Visualization: D3, Tableau, Qlikview and Markdown.
Big Data: Hadoop, MapReduce and Spark.
20
Hacking Skills
21
Hacking Skills
http://www.kdnuggets.com/2016/06/r-python-top-
analytics-data-mining-data-science-software.html
22
Hacking Skills
http://www.kdnuggets.com/2016/06/r-python-top-
analytics-data-mining-data-science-software.html
23
Math & Statistics
Being able understand the right solution to each
problem
Linear algebra: Matrix manipulation
Machine Learning: Random Forests, SVM, Boosting
Descriptive statistics: Describe, Cluster
Statistical inference: Generate new knowledge .
24
Math & Statistics
25
Substantive Expertise
Ability to ask good questions requires domain
understanding, that’s why a data scientist can’t create
data based solutions without a good industry knowledge
Is this A or B or C? (classification)
Is this weird? (anomaly detection).
How much/how many? (regression).
How is it organized? (clustering).
What should I do next? (reinforcement learning)
26
How did we get here
27
Data Science
Examples
28
Netflix Price
29
Goolge flu trends
30
Creating a rembrandt
31
Obama campaign
32
Moneyball
33
AlphaGo
34
My recent
experience
35
Phishing Detection
36
Malware Identification
37
Man-in-the-Browser Attacks
38
Intrusion Detection
39
Fraud Detection
40
Fraud Detection
Estimate the probability of a transaction being fraud
based on customer patterns and recent fraudulent
behavior
Issues when constructing a fraud detection system:
Class Imbalance
Cost-sensitivity
Short time response of the system
Dimensionality of the search space
Feature preprocessing
Model selection
41
Fraud Detection
42
Class Imbalance
Fraudulent transactions represents between 0.01% to
0.5% of the transactions
Create a balanced dataset using:
Under sampling
Over sampling
TomekLinks sampling
Condensed Nearest Neighbor
NearMiss
Synthetic Majority Over Sampling
43
Class Imbalance
Synthetic Majority Over Sampling Technique
SMOTE
44
Cost-Sensitivity
Typical evaluation of a classification model:
Actual Fraud Actual Legitimate
Predicted Fraud True Positives (TP) False Positives (FP)
Predicted Legitimate False Negatives (FN) True Negatives (FN)
Accuracy = TP+FP+TN+FN
TP+TN
F Score =1 TP+FN+FP
TP
45
Cost-Sensitivity
Assumes the same financial cost of false positives and
false negatives!
Not the case in fraud detection:
False positives: When predicting a transaction as
fraudulent, when in fact it is not a fraud, there is an
administrative cost
False negatives: Failing to detect a fraud, the amount
of that transaction is lost.
46
Cost-Sensitivity
Cost Matrix
Actual Fraud Actual Legitimate
Predicted Fraud
Predicted Legitimate
Cost(f(S)) = y (1 − c )AMT + c C∑i=1
N
i i i i a
c = CTP a c = CFP a
c = AMTFN i c = 0TN
47
Feature Engineering
Raw Features
48
Feature Engineering
Transaction aggregated features
49
Feature Engineering
Periodic Features
50
Feature Engineering
Social Networks Analysis
51
Finally - Some Models
Data
Large European Card Processing company
2012 & 2013 card present transactions
20 Million transactions
40,000 frauds
2 Million Euros in losses in the test set
52
Finally - Some Models
Algorithms
Fuzzy Rules
Neural Networks
Naive Bayes
Random Forests
Random Forests with Cost-Proportonate Sampling
Cost-Sensitive Random Patches Decision Trees
53
Finally - Some Models
54
Takeaways
55
How could you learn more?
56
How could you learn more?
57
How could you learn more?
58
Embrace open-source
59
Support open-source
60
Modern
Data
Scientist
The sexiest job of
the 21th century
61
Thank You!
@albahnsen
albahnsen.com
62

Mais conteúdo relacionado

Mais procurados

Transforming the industry that transformed the world
Transforming the industry that transformed the worldTransforming the industry that transformed the world
Transforming the industry that transformed the worldaccenture
 
Technology Vision 2022: Communications Industry | Accenture
Technology Vision 2022: Communications Industry | AccentureTechnology Vision 2022: Communications Industry | Accenture
Technology Vision 2022: Communications Industry | Accentureaccenture
 
[Accenture] Digital Business 2017
[Accenture] Digital Business 2017[Accenture] Digital Business 2017
[Accenture] Digital Business 2017Duy, Vo Hoang
 
Leading in the New
Leading in the New Leading in the New
Leading in the New accenture
 
Effectively talking to kids about engineering
Effectively talking to kids about engineeringEffectively talking to kids about engineering
Effectively talking to kids about engineeringDiscoverE
 
eGov initiatives in Nepal (with focus on local governments)
eGov initiatives in Nepal (with focus on local governments)eGov initiatives in Nepal (with focus on local governments)
eGov initiatives in Nepal (with focus on local governments)Ekendra Lamsal
 
Digital grid: Disruptive digital technologies
Digital grid: Disruptive digital technologiesDigital grid: Disruptive digital technologies
Digital grid: Disruptive digital technologiesAccenture the Netherlands
 
The State of Small Business Cash Flow
The State of Small Business Cash FlowThe State of Small Business Cash Flow
The State of Small Business Cash FlowIntuit Inc.
 
The Future of Technology in 2023 A.D.
The Future of Technology in 2023 A.D.The Future of Technology in 2023 A.D.
The Future of Technology in 2023 A.D.emlabarb
 
Digital transformation: Managing the change
Digital transformation: Managing the changeDigital transformation: Managing the change
Digital transformation: Managing the changePatrizia Bertini
 
Digital transformation
Digital transformationDigital transformation
Digital transformationshivani12380
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technologyAtifa Aqueel
 
DAMA Webinar - Big and Little Data Quality
DAMA Webinar - Big and Little Data QualityDAMA Webinar - Big and Little Data Quality
DAMA Webinar - Big and Little Data QualityDATAVERSITY
 
Careers In Engineering
Careers In EngineeringCareers In Engineering
Careers In Engineeringfbernaljr
 
The Roadmap to Your Digital Transformation
The Roadmap to Your Digital TransformationThe Roadmap to Your Digital Transformation
The Roadmap to Your Digital TransformationAdVictoriam
 
Digital Transformation Strategy PowerPoint Presentation Slides
Digital Transformation Strategy PowerPoint Presentation Slides Digital Transformation Strategy PowerPoint Presentation Slides
Digital Transformation Strategy PowerPoint Presentation Slides SlideTeam
 
Future & Technology - What's Next?
Future & Technology - What's Next? Future & Technology - What's Next?
Future & Technology - What's Next? Massive Media
 

Mais procurados (20)

Transforming the industry that transformed the world
Transforming the industry that transformed the worldTransforming the industry that transformed the world
Transforming the industry that transformed the world
 
Technology Vision 2022: Communications Industry | Accenture
Technology Vision 2022: Communications Industry | AccentureTechnology Vision 2022: Communications Industry | Accenture
Technology Vision 2022: Communications Industry | Accenture
 
[Accenture] Digital Business 2017
[Accenture] Digital Business 2017[Accenture] Digital Business 2017
[Accenture] Digital Business 2017
 
Leading in the New
Leading in the New Leading in the New
Leading in the New
 
Effectively talking to kids about engineering
Effectively talking to kids about engineeringEffectively talking to kids about engineering
Effectively talking to kids about engineering
 
eGov initiatives in Nepal (with focus on local governments)
eGov initiatives in Nepal (with focus on local governments)eGov initiatives in Nepal (with focus on local governments)
eGov initiatives in Nepal (with focus on local governments)
 
Digital grid: Disruptive digital technologies
Digital grid: Disruptive digital technologiesDigital grid: Disruptive digital technologies
Digital grid: Disruptive digital technologies
 
The State of Small Business Cash Flow
The State of Small Business Cash FlowThe State of Small Business Cash Flow
The State of Small Business Cash Flow
 
The evolution of technology
The evolution of technologyThe evolution of technology
The evolution of technology
 
The Future of Technology in 2023 A.D.
The Future of Technology in 2023 A.D.The Future of Technology in 2023 A.D.
The Future of Technology in 2023 A.D.
 
Digital transformation: Managing the change
Digital transformation: Managing the changeDigital transformation: Managing the change
Digital transformation: Managing the change
 
Digital transformation
Digital transformationDigital transformation
Digital transformation
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 
DAMA Webinar - Big and Little Data Quality
DAMA Webinar - Big and Little Data QualityDAMA Webinar - Big and Little Data Quality
DAMA Webinar - Big and Little Data Quality
 
Practo presentation
Practo presentationPracto presentation
Practo presentation
 
Careers In Engineering
Careers In EngineeringCareers In Engineering
Careers In Engineering
 
The Roadmap to Your Digital Transformation
The Roadmap to Your Digital TransformationThe Roadmap to Your Digital Transformation
The Roadmap to Your Digital Transformation
 
Digital Transformation Strategy PowerPoint Presentation Slides
Digital Transformation Strategy PowerPoint Presentation Slides Digital Transformation Strategy PowerPoint Presentation Slides
Digital Transformation Strategy PowerPoint Presentation Slides
 
Future & Technology - What's Next?
Future & Technology - What's Next? Future & Technology - What's Next?
Future & Technology - What's Next?
 
Teknoloji Yol Haritası
Teknoloji Yol HaritasıTeknoloji Yol Haritası
Teknoloji Yol Haritası
 

Destaque

Maximizing a churn campaign’s profitability with cost sensitive predictive an...
Maximizing a churn campaign’s profitability with cost sensitive predictive an...Maximizing a churn campaign’s profitability with cost sensitive predictive an...
Maximizing a churn campaign’s profitability with cost sensitive predictive an...Alejandro Correa Bahnsen, PhD
 
Maximizing a churn campaigns profitability with cost sensitive machine learning
Maximizing a churn campaigns profitability with cost sensitive machine learningMaximizing a churn campaigns profitability with cost sensitive machine learning
Maximizing a churn campaigns profitability with cost sensitive machine learningAlejandro Correa Bahnsen, PhD
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsAlejandro Correa Bahnsen, PhD
 
PhD Defense - Example-Dependent Cost-Sensitive Classification
PhD Defense - Example-Dependent Cost-Sensitive ClassificationPhD Defense - Example-Dependent Cost-Sensitive Classification
PhD Defense - Example-Dependent Cost-Sensitive ClassificationAlejandro Correa Bahnsen, PhD
 
Example-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud DetectionExample-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud DetectionAlejandro Correa Bahnsen, PhD
 
2013 credit card fraud detection why theory dosent adjust to practice
2013 credit card fraud detection why theory dosent adjust to practice2013 credit card fraud detection why theory dosent adjust to practice
2013 credit card fraud detection why theory dosent adjust to practiceAlejandro Correa Bahnsen, PhD
 
Classifying Phishing URLs Using Recurrent Neural Networks
Classifying Phishing URLs Using Recurrent Neural NetworksClassifying Phishing URLs Using Recurrent Neural Networks
Classifying Phishing URLs Using Recurrent Neural NetworksAlejandro Correa Bahnsen, PhD
 
Fraud analytics detección y prevención de fraudes en la era del big data sl...
Fraud analytics detección y prevención de fraudes en la era del big data   sl...Fraud analytics detección y prevención de fraudes en la era del big data   sl...
Fraud analytics detección y prevención de fraudes en la era del big data sl...Alejandro Correa Bahnsen, PhD
 
Ensembles of example dependent cost-sensitive decision trees slides
Ensembles of example dependent cost-sensitive decision trees slidesEnsembles of example dependent cost-sensitive decision trees slides
Ensembles of example dependent cost-sensitive decision trees slidesAlejandro Correa Bahnsen, PhD
 

Destaque (13)

Maximizing a churn campaign’s profitability with cost sensitive predictive an...
Maximizing a churn campaign’s profitability with cost sensitive predictive an...Maximizing a churn campaign’s profitability with cost sensitive predictive an...
Maximizing a churn campaign’s profitability with cost sensitive predictive an...
 
2011 advanced analytics through the credit cycle
2011 advanced analytics through the credit cycle2011 advanced analytics through the credit cycle
2011 advanced analytics through the credit cycle
 
Maximizing a churn campaigns profitability with cost sensitive machine learning
Maximizing a churn campaigns profitability with cost sensitive machine learningMaximizing a churn campaigns profitability with cost sensitive machine learning
Maximizing a churn campaigns profitability with cost sensitive machine learning
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive Analytics
 
PhD Defense - Example-Dependent Cost-Sensitive Classification
PhD Defense - Example-Dependent Cost-Sensitive ClassificationPhD Defense - Example-Dependent Cost-Sensitive Classification
PhD Defense - Example-Dependent Cost-Sensitive Classification
 
Analytics - compitiendo en la era de la informacion
Analytics - compitiendo en la era de la informacionAnalytics - compitiendo en la era de la informacion
Analytics - compitiendo en la era de la informacion
 
Example-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud DetectionExample-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud Detection
 
1609 Fraud Data Science
1609 Fraud Data Science1609 Fraud Data Science
1609 Fraud Data Science
 
2013 credit card fraud detection why theory dosent adjust to practice
2013 credit card fraud detection why theory dosent adjust to practice2013 credit card fraud detection why theory dosent adjust to practice
2013 credit card fraud detection why theory dosent adjust to practice
 
Classifying Phishing URLs Using Recurrent Neural Networks
Classifying Phishing URLs Using Recurrent Neural NetworksClassifying Phishing URLs Using Recurrent Neural Networks
Classifying Phishing URLs Using Recurrent Neural Networks
 
Fraud analytics detección y prevención de fraudes en la era del big data sl...
Fraud analytics detección y prevención de fraudes en la era del big data   sl...Fraud analytics detección y prevención de fraudes en la era del big data   sl...
Fraud analytics detección y prevención de fraudes en la era del big data sl...
 
Demystifying machine learning using lime
Demystifying machine learning using limeDemystifying machine learning using lime
Demystifying machine learning using lime
 
Ensembles of example dependent cost-sensitive decision trees slides
Ensembles of example dependent cost-sensitive decision trees slidesEnsembles of example dependent cost-sensitive decision trees slides
Ensembles of example dependent cost-sensitive decision trees slides
 

Semelhante a Modern Data Science

JanData-mining-to-knowledge-discovery.ppt
JanData-mining-to-knowledge-discovery.pptJanData-mining-to-knowledge-discovery.ppt
JanData-mining-to-knowledge-discovery.pptgeorgejustymirobi1
 
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech oneHeavy, Messy, Misleading: why Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech onePulsar
 
Everything You Always Wanted to Know About Synthetic Data
Everything You Always Wanted to Know About Synthetic DataEverything You Always Wanted to Know About Synthetic Data
Everything You Always Wanted to Know About Synthetic DataMOSTLY AI
 
Hello Criminals! Meet Big Data: Preventing Crime in San Francisco by Predicti...
Hello Criminals! Meet Big Data: Preventing Crime in San Francisco by Predicti...Hello Criminals! Meet Big Data: Preventing Crime in San Francisco by Predicti...
Hello Criminals! Meet Big Data: Preventing Crime in San Francisco by Predicti...Tarun Amarnath
 
Chicago crime conference
Chicago crime conferenceChicago crime conference
Chicago crime conferenceMichael Jackson
 
Webinar: Everyone cares about sample quality but not everyone values it!
Webinar: Everyone cares about sample quality but not everyone values it!Webinar: Everyone cares about sample quality but not everyone values it!
Webinar: Everyone cares about sample quality but not everyone values it!Matt Dusig
 
Webinar: Everyone cares about sample quality but not everyone values it!
Webinar: Everyone cares about sample quality but not everyone values it!Webinar: Everyone cares about sample quality but not everyone values it!
Webinar: Everyone cares about sample quality but not everyone values it!Matt Dusig
 
Big data 4 4 the art of the possible 4-en-web
Big data 4 4 the art of the possible 4-en-webBig data 4 4 the art of the possible 4-en-web
Big data 4 4 the art of the possible 4-en-webRick Bouter
 
Big Data evento I ENAA (I Encontro Nacional de Anunciantes e Agencias 2014
Big Data evento I ENAA (I Encontro Nacional de Anunciantes e Agencias 2014Big Data evento I ENAA (I Encontro Nacional de Anunciantes e Agencias 2014
Big Data evento I ENAA (I Encontro Nacional de Anunciantes e Agencias 2014Cezar Taurion
 
Criminal network investigation: Processes, tools, and techniques
Criminal network investigation: Processes, tools, and techniquesCriminal network investigation: Processes, tools, and techniques
Criminal network investigation: Processes, tools, and techniquesRasmus Petersen
 
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Interset
 
Heavy, Messy, Misleading: How Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: How Big Data is a human problem, not a tech oneHeavy, Messy, Misleading: How Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: How Big Data is a human problem, not a tech onePulsar Platform
 
Black Box Learning Analytics? Beyond Algorithmic Transparency
Black Box Learning Analytics? Beyond Algorithmic TransparencyBlack Box Learning Analytics? Beyond Algorithmic Transparency
Black Box Learning Analytics? Beyond Algorithmic TransparencySimon Buckingham Shum
 
Heavy, messy, misleading. Why Big Data is a human problem, not a technology one.
Heavy, messy, misleading. Why Big Data is a human problem, not a technology one.Heavy, messy, misleading. Why Big Data is a human problem, not a technology one.
Heavy, messy, misleading. Why Big Data is a human problem, not a technology one.Francesco D'Orazio
 
20130618 presentation big data in financial services English
20130618 presentation big data in financial services English20130618 presentation big data in financial services English
20130618 presentation big data in financial services EnglishPascal Spelier
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...IJARIIT
 
Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)Paolo Missier
 
The Future Of Threat Intelligence Platforms
The Future Of Threat Intelligence PlatformsThe Future Of Threat Intelligence Platforms
The Future Of Threat Intelligence PlatformsDr. Paolo Di Prodi
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced AnalyticsHaystax Technology
 

Semelhante a Modern Data Science (20)

JanData-mining-to-knowledge-discovery.ppt
JanData-mining-to-knowledge-discovery.pptJanData-mining-to-knowledge-discovery.ppt
JanData-mining-to-knowledge-discovery.ppt
 
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech oneHeavy, Messy, Misleading: why Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech one
 
Everything You Always Wanted to Know About Synthetic Data
Everything You Always Wanted to Know About Synthetic DataEverything You Always Wanted to Know About Synthetic Data
Everything You Always Wanted to Know About Synthetic Data
 
Hello Criminals! Meet Big Data: Preventing Crime in San Francisco by Predicti...
Hello Criminals! Meet Big Data: Preventing Crime in San Francisco by Predicti...Hello Criminals! Meet Big Data: Preventing Crime in San Francisco by Predicti...
Hello Criminals! Meet Big Data: Preventing Crime in San Francisco by Predicti...
 
Chicago crime conference
Chicago crime conferenceChicago crime conference
Chicago crime conference
 
Webinar: Everyone cares about sample quality but not everyone values it!
Webinar: Everyone cares about sample quality but not everyone values it!Webinar: Everyone cares about sample quality but not everyone values it!
Webinar: Everyone cares about sample quality but not everyone values it!
 
Webinar: Everyone cares about sample quality but not everyone values it!
Webinar: Everyone cares about sample quality but not everyone values it!Webinar: Everyone cares about sample quality but not everyone values it!
Webinar: Everyone cares about sample quality but not everyone values it!
 
Big data 4 4 the art of the possible 4-en-web
Big data 4 4 the art of the possible 4-en-webBig data 4 4 the art of the possible 4-en-web
Big data 4 4 the art of the possible 4-en-web
 
Big Data evento I ENAA (I Encontro Nacional de Anunciantes e Agencias 2014
Big Data evento I ENAA (I Encontro Nacional de Anunciantes e Agencias 2014Big Data evento I ENAA (I Encontro Nacional de Anunciantes e Agencias 2014
Big Data evento I ENAA (I Encontro Nacional de Anunciantes e Agencias 2014
 
Criminal network investigation: Processes, tools, and techniques
Criminal network investigation: Processes, tools, and techniquesCriminal network investigation: Processes, tools, and techniques
Criminal network investigation: Processes, tools, and techniques
 
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
 
Heavy, Messy, Misleading: How Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: How Big Data is a human problem, not a tech oneHeavy, Messy, Misleading: How Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: How Big Data is a human problem, not a tech one
 
Black Box Learning Analytics? Beyond Algorithmic Transparency
Black Box Learning Analytics? Beyond Algorithmic TransparencyBlack Box Learning Analytics? Beyond Algorithmic Transparency
Black Box Learning Analytics? Beyond Algorithmic Transparency
 
Heavy, messy, misleading. Why Big Data is a human problem, not a technology one.
Heavy, messy, misleading. Why Big Data is a human problem, not a technology one.Heavy, messy, misleading. Why Big Data is a human problem, not a technology one.
Heavy, messy, misleading. Why Big Data is a human problem, not a technology one.
 
20130618 presentation big data in financial services English
20130618 presentation big data in financial services English20130618 presentation big data in financial services English
20130618 presentation big data in financial services English
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
Why Data Science is a Science
Why Data Science is a ScienceWhy Data Science is a Science
Why Data Science is a Science
 
Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)
 
The Future Of Threat Intelligence Platforms
The Future Of Threat Intelligence PlatformsThe Future Of Threat Intelligence Platforms
The Future Of Threat Intelligence Platforms
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
 

Mais de Alejandro Correa Bahnsen, PhD

Mais de Alejandro Correa Bahnsen, PhD (6)

black hat deephish
black hat deephishblack hat deephish
black hat deephish
 
DeepPhish: Simulating malicious AI
DeepPhish: Simulating malicious AIDeepPhish: Simulating malicious AI
DeepPhish: Simulating malicious AI
 
AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?
AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?
AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?
 
How I Learned to Stop Worrying and Love Building Data Products
How I Learned to Stop Worrying and Love Building Data ProductsHow I Learned to Stop Worrying and Love Building Data Products
How I Learned to Stop Worrying and Love Building Data Products
 
Fraud Detection by Stacking Cost-Sensitive Decision Trees
Fraud Detection by Stacking Cost-Sensitive Decision TreesFraud Detection by Stacking Cost-Sensitive Decision Trees
Fraud Detection by Stacking Cost-Sensitive Decision Trees
 
2012 predictive clusters
2012 predictive clusters2012 predictive clusters
2012 predictive clusters
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Modern Data Science