TITLE

Striking Gold with Data Mining, Analysis Software

AUTHOR(S)
Freschi, Cynthia
PUB. DATE
November 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Nov2006, Vol. 43 Issue 11, p54
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the concept of data mining and analysis software in the U.S. Data mining allows ease in accessibility of the date retrieved through data storage and warehousing. It allows security professionals to establish pro-active security-centric business intelligence systems. Data mining has been used in some business transactions in the retail industry to create marketing promotions and for identification of new business trends.
ACCESSION #
23152526

 

Related Articles

  • Is it DSS or OLTP: automatically identifying DBMS workloads. Elnaffar, Said; Martin, Pat; Schiefer, Berni; Lightstone, Sam // Journal of Intelligent Information Systems;Jun2008, Vol. 30 Issue 3, p249 

    The type of the workload on a database management system (DBMS) is a key consideration in tuning the system. Allocations for resources such as main memory can be very different depending on whether the workload type is Online Transaction Processing (OLTP) or Decision Support System (DSS). A DBMS...

  • Two conjectures of data mining. Bing-ru Yang // Journal of Communication & Computer;Apr2007, Vol. 4 Issue 4, preceding p1 

    Aiming at the opportunities and challenges faced by data mining research, ‘reverse problem conjecture’ and ‘magnet effect conjecture’ are proposed. These two correlated conjectures constitute a unified organism. And the essence of the conjectures is to solve the problem...

  • Arithmetic Research on Data Mining Technology and Associative Rules Mining. ZHU Jian-Xin // Applied Mechanics & Materials;2014, Issue 556-562, p3949 

    Data mining is a technique that aims to analyze and understand large source data reveal knowledge hidden in the data. It has been viewed as an important evolution in information processing. Why there have been more attentions to it from researchers or businessmen is due to the wide availability...

  • A Model of National Minority Fabric Patterns of China to enable Data Mining. Wei Li; Regen Te; Xiongfei Li // International Journal of Digital Content Technology & its Applic;Dec2011, Vol. 5 Issue 12, p298 

    The fabric patterns of national minority of China contain rich cultural information. This paper discussed the gene theory of minority fabric patterns and analyzed 5 gene composition modes. Then proposed tow models named MFGSM and MFPSM for describe the minority fabric pattern genes and the...

  • Real-Time Decision Support Systems? Inmon, Bill // DM Review;Aug2006, Vol. 16 Issue 8, p14 

    The article discusses the nature of real time decision support system (DSS) processing. Unlike online transactional processing (OTLP), the DSS has no real time processing for several reasons. For one thing, the requirements for processing and the queries in the DSS are not predetermined. The DSS...

  • AGGREGATION SOFTWARE SPEEDS ACCESS TO LARGE DATA VOLUMES.  // Online Product News;Feb2004, pN.PAG 

    Provides information on HyperRoll 3.0 software introduced by HyperRoll, a provider of data aggregation software for business intelligence applications. Impact on users of Online Analytical Processing or OLAP solutions; Benefits of HyperRoll 3.0; Features of HyperRoll 3.0.

  • The Enterprise Competitive Intelligence System Based on Data Mining. Xiaoguang Li; Zhanjun Gao // Applied Mechanics & Materials;2014, Issue 543-547, p4553 

    In knowledge economy era, data and information become important economy resources. Drawing valuable information quickly from great amount of datum and reacting immediately, will become the key of corporation success. The paper introduces Competitive Intelligence and Corporation Competitive...

  • Personalization in Geographic information systems: A survey. Aissi, Saida; Gouider, Mohamed Salah // International Journal of Computer Science Issues (IJCSI);Jul2012, Vol. 9 Issue 4, p291 

    Geographic Information Systems (GIS) are widely used in different domains of applications, such as maritime navigation, museums visits and route planning, as well as ecological, demographical and economical applications. Nowadays, organizations need sophisticated and adapted GIS-based Decision...

  • Autonomous Security Decision Management Based on Multilayer Agent. Zhonghua Li; Wei Zhang; Juling Ding // Proceedings of the International Workshop on Information Securit;2009, p541 

    With the complicated development of security incidents, the defense effect of traditional singleness defense components is more and more insufficiency, requiring multi-components of security defense together. Highefficiency of Attack tools also facilitates the autonomous response requirements of...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics