19,754 research outputs found

    Shadow Analytics

    Get PDF
    Gartner predicts that analytics will revolutionize how we conduct business. By 2019 worldwide analytics implementation are estimated to reach $187 billion (Olavsrud 2016). Unfortunately, many internal IT departments lack the business acumen, financial resources and data science expertise to initiate analytics initiatives (Goldberg 2012). This leads functional departments, armed with use cases, trying to launch their own analytic program. We call this shadow analytics. To add insight to this shadow analytics phenomenon, this paper uses an in-depth longitudinal case study of one department’s shadow analytics initiative. Using technology affordances and constraints theory, we investigate what enables and constrains a shadow analytics initiative. This study offers practical insights to others trying to launch an analytics program and shows a shift in client vendor outsourcing projects towards, agile delivery, experimentation and failure acceptance

    Finding Light in Arbitration\u27s Dark Shadow

    Full text link
    This short essay in response to “Arbitration’s Dark Shadow” examines the light visible at the borders of mandatory arbitration’s shadow in one industry Professor Edwards highlights – securities disputes between an investor customer and a broker-dealer. Though Edwards is correct that mandatory arbitration is often a black box emmeshed in shadow, the few instances where light exists in the form of public data should be highlighted, examined, and studied. We should not close our eyes in the dark. Instead, we should adjust to lessened light and determine what we can learn from the information we can see

    Overcoming Barriers in Supply Chain Analytics—Investigating Measures in LSCM Organizations

    Get PDF
    While supply chain analytics shows promise regarding value, benefits, and increase in performance for logistics and supply chain management (LSCM) organizations, those organizations are often either reluctant to invest or unable to achieve the returns they aspire to. This article systematically explores the barriers LSCM organizations experience in employing supply chain analytics that contribute to such reluctance and unachieved returns and measures to overcome these barriers. This article therefore aims to systemize the barriers and measures and allocate measures to barriers in order to provide organizations with directions on how to cope with their individual barriers. By using Grounded Theory through 12 in-depth interviews and Q-Methodology to synthesize the intended results, this article derives core categories for the barriers and measures, and their impacts and relationships are mapped based on empirical evidence from various actors along the supply chain. Resultingly, the article presents the core categories of barriers and measures, including their effect on different phases of the analytics solutions life cycle, the explanation of these effects, and accompanying examples. Finally, to address the intended aim of providing directions to organizations, the article provides recommendations for overcoming the identified barriers in organizations

    TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone

    Full text link
    The rapid evolution of Internet-of-Things (IoT) technologies has led to an emerging need to make it smarter. A variety of applications now run simultaneously on an ARM-based processor. For example, devices on the edge of the Internet are provided with higher horsepower to be entrusted with storing, processing and analyzing data collected from IoT devices. This significantly improves efficiency and reduces the amount of data that needs to be transported to the cloud for data processing, analysis and storage. However, commodity OSes are prone to compromise. Once they are exploited, attackers can access the data on these devices. Since the data stored and processed on the devices can be sensitive, left untackled, this is particularly disconcerting. In this paper, we propose a new system, TrustShadow that shields legacy applications from untrusted OSes. TrustShadow takes advantage of ARM TrustZone technology and partitions resources into the secure and normal worlds. In the secure world, TrustShadow constructs a trusted execution environment for security-critical applications. This trusted environment is maintained by a lightweight runtime system that coordinates the communication between applications and the ordinary OS running in the normal world. The runtime system does not provide system services itself. Rather, it forwards requests for system services to the ordinary OS, and verifies the correctness of the responses. To demonstrate the efficiency of this design, we prototyped TrustShadow on a real chip board with ARM TrustZone support, and evaluated its performance using both microbenchmarks and real-world applications. We showed TrustShadow introduces only negligible overhead to real-world applications.Comment: MobiSys 201

    Out of the shadows: projected levels for future REO inventory

    Get PDF
    Nearly one homeowner in ten is more than 90 days delinquent on his mortgage payment. Most of the homes under these mortgages are likely to be repossessed by lenders and resold, which has led some to call them a shadow inventory. How much these homes will affect the broader housing market depends on when they actually become available for sale and how long they remain on the market. Some analysts are concerned that a surge in the availability of repossessed or real-estate owned (REO) properties, or a persistently high level of them, could put downward pressure on prices. This could, in turn, induce additional foreclosures. This Commentary presents three possible scenarios for future REO inventory levels.Mortgage loans ; Foreclosure ; Housing - Finance

    Robust Subspace Learning: Robust PCA, Robust Subspace Tracking, and Robust Subspace Recovery

    Full text link
    PCA is one of the most widely used dimension reduction techniques. A related easier problem is "subspace learning" or "subspace estimation". Given relatively clean data, both are easily solved via singular value decomposition (SVD). The problem of subspace learning or PCA in the presence of outliers is called robust subspace learning or robust PCA (RPCA). For long data sequences, if one tries to use a single lower dimensional subspace to represent the data, the required subspace dimension may end up being quite large. For such data, a better model is to assume that it lies in a low-dimensional subspace that can change over time, albeit gradually. The problem of tracking such data (and the subspaces) while being robust to outliers is called robust subspace tracking (RST). This article provides a magazine-style overview of the entire field of robust subspace learning and tracking. In particular solutions for three problems are discussed in detail: RPCA via sparse+low-rank matrix decomposition (S+LR), RST via S+LR, and "robust subspace recovery (RSR)". RSR assumes that an entire data vector is either an outlier or an inlier. The S+LR formulation instead assumes that outliers occur on only a few data vector indices and hence are well modeled as sparse corruptions.Comment: To appear, IEEE Signal Processing Magazine, July 201
    • …
    corecore