Analytics as a career

At Business Analytics Summit hosted by WeekendR,

I presented at the Delhi School of Economics Economics Department placement workshop a small presentation on careers in analytics

I basically talked of my 12 years of adventures in consulting, writing and teaching around data science and analytics

 

13914172_1363844703645649_4806824798457040891_o

 

 

Some thoughts on the Revolution Sellout

The revolution will not be televised, brother –Gil Scott-Heron

 

Veteran R Community members must recall R founder’s Ross Ihaka ‘s warning against Revolution Analytics not being truly open source,

and the sale to Microsoft will be keeping Revolution R open source in the time being ,

it did proved Ross Ihaka was right.

How do you help create an open source revolution in statistics by selling a company to Microsoft beats me.

And how do you just take 6000 packages for free from open source community, add 6-9 packages of your own and then repackage the bundle as a new innovation?

Even though Revolution analytics created 3 CEO JOBs,including SPSS founder Norman Nie, and 1 name change  (from computing to analytics) and  1 mass firing ( with a 50% layoff they wont be winning the best employer award),  in the end what drives software is lots of sales and not lots of blogs

(quoting Larry Ellison‘s purchase of Sun ).

In addition

love for computing and not hypocrisy on love for money should drive science.

A potato is a potato.

In Australia or Seattle or San Fransisco

SAS and Jupyter work well together now

 

While  R community continues to move ahead with  RStudio (open source still),  and other interfaces,

SAS is moving forward to embrace Jupyter in it’s free University Edition. The word Jupyter itself is made from Julia, Python and R. Note whether you are a R fan or Py fan or a SAS fan, you should compare and contrast the quality of blogs, the documentation and the interface on your own. As a blogger and data scientist (?) I actually love all science

Screenshot from 2016-08-12 19-24-19

Using Jupyter and SAS together with SAS University Edition

A few months ago I shared the news about Jupyter notebook support for SAS. If you have SAS for Linux, you can install a free open-source project called sas-kernel and begin running SAS code within your Jupyter notebooks. In my post, I hinted that support for this might be coming in the SAS University Edition. I’m pleased to say that this is one time where my crystal ball actually worked — Jupyter support has arrived!

(Need to learn more about SAS and Jupyter? Watch this 7-minute video from SAS Global Forum.)

https://support.sas.com/software/products/university-edition/faq/jn_runvirtualbox.htm

 

How do I run Jupyter Notebook in SAS University Edition using VirtualBox?

In order to run Jupyter Notebook in SAS University Edition, you must first add the SAS University Edition vApp to VirtualBox. When you specify the URL to run Jupyter Notebook, you must specify the port number for Jupyter Notebook.

  1. Follow the steps to add the SAS University Edition vApp to VirtualBox.
    Note If you want to access files from or save files to your local computer from Jupyter Notebook in SAS University Edition, you must also set up a shared folder. For more information, see the following topics:

  2. If you downloaded a new version in July 2016, the additional port is automatically added for you. Skip this step and proceed to step 3.

A Healthy Routine for Hackers and Tech Workers

  • Meet people for dinner
  • Sleep
  • Do until

 

Heuristics and Occam’s razor for Counter Terrorism

When overworked analysts use shortcuts to search huge noisy dirty databases, they create trails which can be mined for actual heuristics

Heuristics –

A heuristic technique (/hjᵿˈrɪstk/; Ancient Greek: εὑρίσκω, “find” or “discover”), often called simply a heuristic, is any approach to problem solving, learning, or discovery that employs a practical method not guaranteed to be optimal or perfect, but sufficient for the immediate goals. Where finding an optimal solution is impossible or impractical, heuristic methods can be used to speed up the process of finding a satisfactory solution

 

 

Example- A Police chief in Chicago may adopt different heuristics than in New York than in New Orleans for allocating human resources

Solution- Make a database of heuristics as actually in practice for that particular domain

Additional Solution- Search Companies to partner not just in giving data but also training and in some case search algorithms for database analysis and database design reviews of Homeland Security

Occam’s Razor-

Occam’s razor (also written as Ockham’s razor, and lex parsimoniae in Latin, which means law of parsimony) is a problem-solving principle attributed to William of Ockham (c. 1287–1347), who was an English Franciscan friar, scholastic philosopher and theologian. The principle can be interpreted as stating Among competing hypotheses, the one with the fewest assumptions should be selected.

https://en.wikipedia.org/wiki/Occam%27s_razor

https://en.wikipedia.org/wiki/Heuristic

Related – How to amplify noise in social media using other algorithms

https://decisionstats.com/2010/01/19/a-noisy-algorithm/

https://decisionstats.com/2015/04/14/random-thoughts-on-cryptography/

https://decisionstats.com/2013/12/14/play-color-cipher-and-visual-cryptography/

 

https://decisionstats.com/2010/11/25/increasing-views-to-youtube-videos/

Click to access shmat_oak09.pdf

De-anonymizing Social Networks
Arvind Narayanan and Vitaly Shmatikov
The University of Texas at Austin
Abstract
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers,
and data-mining researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc.
We present a framework for analyzing privacy and anonymity in social networks and develop a new re-identification algorithm targeting anonymized social- network graphs. To demonstrate its effectiveness on real-
world networks, we show that a third of the users who can be verified to have accounts on both Twitter, a popular microblogging service, and Flickr, an online photo-sharing site, can be re-identified in the anonymous Twitter graph with only a 12% error rate.

 

 

 

 

Movie Review- Suicide Squad

Ok Rotten Tomatoes, lets call you Rotten Potatoes from now on.

I am serious here. The movie is not avant garde Golden age of Comics noire. It is okay. But it does a good job of balancing Cara Delivigne’s acting with budgetary constraints in putting Wild Wild West Smith in the movie.  Yes the casting, the plot, the soundtrack and the pop art imagery is okay. Its not worthy of a Weinstein Oscar. But its not worthy of a Razzie.  The soundtrack is from the 80’s when the music was cool and the planet was cool too thanks to lack of climate warming

But enough politics in my review. Why did terrorism crop up in this movie. The best stories are ones that are credible as they borrow from reality. That is something you will see you will see on your own.

Its not a time pass movie as we say in India. Paisa wasool (or you got your money worth back)

Big Will Smith is the divorced man with a paternity case. Harley Quinn is awwwesome with Margot Robbie. I really think the Joker had potential but they must be saving it for Joker vs Batman next movie. Dang- I am addicted to these movies now. These Americans just want us to make money and spend it on popcorn and cola. No wonder China wont allow this movie. The rest of the cast is nice. I like Katana the best.

Nowwww I understand why Microsoft OS has so many sequels

harley

 

Battleground states prime point of digital attacks to delay election results

In a normal election cycle, battleground states are prime areas to win or lose an election. Yet as election campaigning, electoral fund raising, and even voting itself has gone digital, the ease by which people can use has not been matched by security.

This is due to systematic denial of funds by CTOs and CIOs to digital security for both campaigns as well as Federal and local digital cyber agencies. Can the USA prevent cyber attack interference in key battleground states in this election cycle.

Just as 3D printing has evolved to make guns and will evolve further, electronic manipulation of voting machines has evolved further- but security budgets and priorities have not. What about Postal ballots? Can they be tampered or intercepted with.

Who benefits when doubt is sown in the minds of voters? As Al Gore. He invented the internet.

Who benefits when a few districts in Ohio show electronic tampering?

Quo Vadis? (Where are you going?) Quis custodiet ipsos custodes? (Who guards the guardians)

Rumours on rigging would just use the algorithm (dīvide et īmpera) and if backed even by a few slivers of actual cyber attacks and tampering would undermine it even more. Yes there is no way to protect ALL the voting systems so its cyber football game of interception – and the current lack of big time offensive weapons  as rebuttal in cyber attacks makes remote attacks on election systems both possible and plausible.

there are 9,000 jurisdictions in the United States that have a hand in carrying out the balloting, many of them with different ways of collecting, tallying and reporting votes.

(sighs and goes back to watching the Olympics)