SAS Institute Financials 2011

SAS Institute has release it’s financials for 2011 at http://www.sas.com/news/preleases/2011financials.html,

Revenue surged across all solution and industry categories. Software to detect fraud saw a triple-digit jump. Revenue from on-demand solutions grew almost 50 percent. Growth from analytics and information management solutions were double digit, as were gains from customer intelligence, retail, risk and supply chain solutions

AJAY- and as a private company it is quite nice that they are willing to share so much information every year.

The graphics are nice ( and the colors much better than in 2010) , but pie-charts- seriously dude there is no way to compare how much SAS revenue is shifting across geographies or even across industries. So my two cents is – lose the pie charts, and stick to line graphs please for the share of revenue by country /industry.

In 2011, SAS grew staff 9.2 percent and reinvested 24 percent of revenue into research and development

AJAY- So that means 654 million dollars spent in Research and Development.  I wonder if SAS has considered investing in much smaller startups (than it’s traditional strategy of doing all research in-house and completely acquiring a smaller company)

Even a small investment of say 5-10 million USD in open source , or even Phd level research projects could greatly increase the ROI on that.

That means

Analyzing a private company’s financials are much more fun than a public company, and I remember the words of my finance professor ( “dig , dig”) to compare 2011 results with 2010 results.

http://www.sas.com/news/preleases/2010financials.html

The percentage invested in R and D is exactly the same (24%) and the percentages of revenue earned from each geography is exactly the same . So even though revenue growth increased from 5.2 % to 9% in 2011, both the geographic spread of revenues and share  R&D costs remained EXACTLY the same.

The Americas accounted for 46 percent of total revenue; Europe, Middle East and Africa (EMEA) 42 percent; and Asia Pacific 12 percent.

Overall, I think SAS remains a 35% market share (despite all that noise from IBM, SAS clones, open source) because they are good at providing solutions customized for industries (instead of just software products), the market for analytics is not saturated (it seems to be growing faster than 12% or is it) , and its ability to attract and retain the best analytical talent (which in a non -American tradition for a software company means no stock options, job security, and great benefits- SAS remains almost Japanese in HR practices).

In 2010, SAS grew staff by 2.4 percent, in 2011 SAS grew staff by 9 percent.

But I liked the directional statement made here-and I think that design interfaces, algorithmic and computational efficiencies should increase analytical time, time to think on business and reduce data management time further!

“What would you do with the extra time if your code ran in two minutes instead of five hours?” Goodnight challenged.

Who made Libre Office

From

 

http://www.libreoffice.org/about-us/credits/

 

Credits

513 individuals contributed to OpenOffice.org (and whose contributions were imported into LibreOffice) or LibreOffice until 2011-11-11 09:02:38.

Developers committing code since 2010-09-28

Ruediger Timm
Commits: 89832
Joined: 2000-10-10
Kurt Zenker
Commits: 32763
Joined: 2000-09-25
Oliver Bolte
Commits: 31795
Joined: 2000-09-19
Vladimir Glazunov
Commits: 30289
Joined: 2000-12-04
Jens-Heiner Rechtien [hr]
Commits: 29314
Joined: 2000-09-18
Ivo Hinkelmann
Commits: 10228
Joined: 2002-09-09
Caolán McNamara
Commits: 5952
Joined: 2000-10-10
Frank Schoenheit [fs]
Commits: 5019
Joined: 2000-09-19
Hans-Joachim Lankenau
Commits: 3077
Joined: 2000-09-19
Ocke Janssen [oj]
Commits: 2861
Joined: 2000-09-20
Mathias Bauer
Commits: 2606
Joined: 2000-09-20
Oliver Specht
Commits: 2458
Joined: 2000-09-21
Philipp Lohmann [pl]
Commits: 2132
Joined: 2000-09-21
Tor Lillqvist
Commits: 2035
Joined: 2010-03-23
Stephan Bergmann
Commits: 1993
Joined: 2000-10-04
Christian Lippka ORACLE
Commits: 1811
Joined: 2000-09-25

We do not distinguish between commits that were imported from the OOo code base and those that went directly into the LibreOffice code base as:
a) it is technically not possible to distinguish between commits that go directly into the LibreOffice code base and commits that were merged in from the OpenOffice.org code base, and
b) contributers to the OOo code base should also be credited for the excellent work they do.

Do note that LibreOffice is divided into 20 git repositories. Pushing a change into all repositories will be counted as 20 commits as there is no way to distinguish this from 20 separate commits.

Total contributions to the TDF Wiki

1223 individuals contributed:

Opera Unite- the future of cloud computing browsers

The boys (and ladies) at opera have been busy writing code , while the rest of the coders on the cloud were issuing press releases, attending meetings or just sky diving from the cloud. Judging by the language of apps and extensions, it seems that the  engineers de Vikings et Slavs were busy coding while the Anglo Saxons were busy preparing for IPOs.

I really like the complete anonymity offered by Opera and especially Opera Unite

1) The Adblock option blocks all ads (same as other extensions)

2) The lovely Opera Unite has incredible apps for peer to peer sharing. You can create your own spotify, host your own chat application, transfer files, remote manage your computer. C’est magnifique!

Some really awesome apps on Opera Unite

All these apps can make your own desktop into a remotely managed website- so SOPA is irrelevant even if passed without any protest or non violent protests

(SOPA- an acronym for STOP OBAMA or STOP A (?) , since OBAMA is the one the internet really supports , and he is dependent on that goodwill for fundraising or A is the acronym of a legendary media myth of an imaginary web based organization (imaginary as in iota)

QUOTE

I think it would be a good idea.

 Mahatma Gandhiwhen asked what he thought of Western civilization

Analytics Conferences for 2012

NOTE: Early Bird registration for PAW and TAW San Francisco is January 20th – $400 lower than Onsite Price.

CONFERENCE: Predictive Analytics World – San Francisco
March 4-10, 2012 in San Francisco, CA
http://predictiveanalyticsworld.com/sanfrancisco/2012
Discount Code : AJBP12

CONFERENCE: Text Analytics World – San Francisco
March 6-7, 2012 in San Francisco, CA
http://textanalyticsworld.com/sanfrancisco/2012
Discount Code :AJBP12

VARIOUS ANALYTICS WORKSHOPS:
A plethora of 1-day workshops are held alongside PAW and TAW
For details see: http://pawcon.com/sanfrancisco/2012/analytics_workshops.php

SEMINAR: Predictive Analytics for Business, Marketing & Web
March 22-23, 2012 in New York City, NY
July 26-27, 2012 in São Paulo, Brazil
A concentrated training program lead by Eric Siegel.
http://businessprediction.com

CONFERENCE: Predictive Analytics World – Toronto
April 26-27, 2012 in Toronto, Ontario
http://predictiveanalyticsworld.com/toronto/2012
Discount Code :AJBP12

CONFERENCE: Predictive Analytics World – Chicago
June 25-26, 2012 in Chicago, IL
http://www.predictiveanalyticsworld.com/chicago/2012/
Discount Code :AJBP12

MORE ANALYTICS EVENTS:
PAW Düsseldorf: November 6-7, 2012 – http://www.predictiveanalyticsworld.de
PAW London: November 27-28, 2012 – http://www.pawcon.com
PAW Videos: Available on-demand – http://www.pawcon.com/video

Christmas Gift- Discounts for Readers to Conferences in 2012

Here are some conferences you can attend in 2012 , and get a straight 15% off –

Just see this-

the 2012 events, please use the following code for your readers to get 15% off of the 2 Day and Combo passes:   AJAYBP12

http://www.textanalyticsworld.com/sanfrancisco/2012 for Text Analytics World San Francisco
http://www.predictiveanalyticsworld.com/sanfrancisco/2012 for Predictive Analytics World SF
http://www.predictiveanalyticsworld.com/toronto/2012 for Predictive Analytics World Toronto
http://www.predictiveanalyticsworld.com/chicago/2012 for Predictive Analytics World Chicago

use the following code for your readers to get 15% off of the 2 Day and Combo passes: AJAYBP12use the following code for your readers to get 15% off of the 2 Day and Combo passes: AJAYBP12use the following code for your readers to get 15% off of the 2 Day and Combo passes: AJAYBP12use the following code for your readers to get 15% off of the 2 Day and Combo passes: AJAYBP12

Secure Browsing from Mobile and PC ( Tor ,PeerNet, WasteAgain)

While Tor remains the tool of choice with pseudo-techie hacker wannabes , there is enough juice and smoke and mirrors on the market to confuse your average Joe.

For a secure browsing experience on Mobile – do NOT use either Apple or Windows OS

Use Android  and this app called Orbot in particular

Installing Tor with a QR code

Orbot is easy to install by simply scanning the following QR code with your Android Barcode scanner.

Android QR code

Installing Tor from the Android Market

Orbot is available in the Android Market.

ENTER PEERNET

If you have a Dell PC, well just use PeerNet to configure and set up your own network around the neighbourhood. This is particularly applicable if you are in country that is both repressive and not so technologically advanced. Wont work in China or USA.

http://support.dell.com/support/edocs/network/p70008/EN/vista_7/peernet.htm

What is a peer network?

A peer network is a network in which one computer can connect directly to another computer. This capability is accomplished by enabling access point (AP) functionality on one of the computers. Other computers can then connect to this computer in the same way that they would connect to a physical AP. If Internet Connection Sharing is enabled on the computer that has the AP functionality, computers that connect to that computer have Internet connectivity as well.

A basic peer network, which requires no networking knowledge or experience to set up, should meet the needs of most home users and small businesses. By default, a basic peer network is configured with the strongest available security (see How do I set up a basic peer network?).

For users who are familiar with wireless networking technology, advanced configuration features are available to do the following:

Change security settings (see How do I configure my peer network?)
Choose which method (push button or PIN) computers with Wi-Fi Protected Setup™ capability can join your peer network (see How do I allow peer devices to join my peer network using Wi-Fi Protected Setup technology?)
Change the DHCP Server IP address (see How do I configure my peer network?).
Change the channel on which to operate your peer network (see How do I configure my peer network?)

 If you are really really in a need for secure browsing (like you are maybe a big hot shot in the tech world), I suggest go over to VMWare

http://www.vmware.com/products/player/

create a seperate Linux (Ubuntu for ease) virtual disc, then download the Tor Browser Bundle from

https://www.torproject.org/projects/torbrowser.html.en for surfing and a Peernet (above) or  a prepaid one time use disposable mobile pre-paid wireless card. It is also quite easy to delete your virtual disc in times of emergencies (but it is best to use encryption even when in Ubuntu https://help.ubuntu.com/community/EncryptedHome)

IRC chat is less secure than you think it is thanks to BOT  Trawlers- so I am hoping someone in the open source community updates Waste Again for encrypted chats http://wasteagain.sourceforge.net/

What is “WASTE again”?

“WASTE again” enables you to create a decentralized and secure private mesh network using an unsecure network, such as the internet. Once the public encryption keys are exchanged, sending messages, creating groupchats and transferring files is easy and secure.

Creating a mesh

To create a mesh you need at least two computers with “WASTE again” installed. During installation, a unique pair of public and private keys for each computer is being generated. Before the first connection can be established, you need to exchange these public keys. These keys enable “WASTE again” to authenticate every connection to other “WASTE again” clients.

After exchanging the keys, you simply type in the computers IP address to connect to. If that computer is located behind a firewall or a NAT-router, you have to create a portmap first to enable incoming connections.

At least one computer in your mesh has to be able to accept incoming connections, making it a “public node”. If no direct connection between two firewalled computers can be made, “WASTE again” automatically routes your traffic through one or more of the available public nodes.

Every new node simply has to exchange keys with one of the connected nodes and then connect to it. All the other nodes will exchange their keys automatically over the mesh.

A Brief Overview of Open vs Closed in Computing

1984 – IBM   (Big Brother) vs Apple  (Computing opened for individuals)

1988- Apple (Closed Hardware and Software) vs Microsoft (  Licensed to all software)

1998- Microsoft (Source code is closed but licenses to all) vs Linux (Open Source Code)

2008- Apple (Closed Hardware and Software) vs Google (Android/Linux) -(Free and Open Source)

2010 – Google (Web open to search) vs Facebook (Closed to search)

2018 (?)-Google (Code is open for all non revenue generating software, but search engine algorithm is closed) VS       TBD