Submit Search
Upload
Idiro Analytics - Identifying Families using Social Network Analysis and Big Data Analytics
•
Download as PPT, PDF
•
1 like
•
1,657 views
Idiro Analytics
Follow
Idiro Analytics - Identifying Families using Social Network Analysis and Big Data Analytics
Read less
Read more
Data & Analytics
Report
Share
Report
Share
1 of 8
Download now
Recommended
Idiro Analytics - Social Network Analysis for Online Gaming
Idiro Analytics - Social Network Analysis for Online Gaming
Idiro Analytics
Idiro Analytics - Social Network Analysis
Idiro Analytics - Social Network Analysis
Idiro Analytics
GDPR: Threat or Opportunity?
GDPR: Threat or Opportunity?
Samuel Pouyt
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
Sridhar Karnam
Network Security and Big Data Analytics
Network Security and Big Data Analytics
Allot Communications
IBM Big Data Platform Nov 2012
IBM Big Data Platform Nov 2012
Swiss Big Data User Group
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
MapR Technologies
Applications and approaches_to_object_or
Applications and approaches_to_object_or
Salim Uçar
Recommended
Idiro Analytics - Social Network Analysis for Online Gaming
Idiro Analytics - Social Network Analysis for Online Gaming
Idiro Analytics
Idiro Analytics - Social Network Analysis
Idiro Analytics - Social Network Analysis
Idiro Analytics
GDPR: Threat or Opportunity?
GDPR: Threat or Opportunity?
Samuel Pouyt
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
Sridhar Karnam
Network Security and Big Data Analytics
Network Security and Big Data Analytics
Allot Communications
IBM Big Data Platform Nov 2012
IBM Big Data Platform Nov 2012
Swiss Big Data User Group
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
MapR Technologies
Applications and approaches_to_object_or
Applications and approaches_to_object_or
Salim Uçar
IoT Big Data Analytics Insights from Patents
IoT Big Data Analytics Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
HP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
HP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
Pronq by HP
Iot cyber security
Iot cyber security
sajid mehmood
Graph Intelligence: The Essentials for Cybersecurity
Graph Intelligence: The Essentials for Cybersecurity
Neo4j
The Secure Business in the Digital Age - 27th September 2017
The Secure Business in the Digital Age - 27th September 2017
Exponential_e
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
Internet World
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
Priyanka Aash
Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?
LiveAction Next Generation Network Management Software
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
Peter Wood
InterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
InterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
IBM Events
Internet of Things (IoT) Strategic Patent Development and Monetization 1Q 2016
Internet of Things (IoT) Strategic Patent Development and Monetization 1Q 2016
Alex G. Lee, Ph.D. Esq. CLP
GDPR Benhmark: 70% of companies failing on their own GDPR compliance claims
GDPR Benhmark: 70% of companies failing on their own GDPR compliance claims
Jean-Michel Franco
Real Life Examples of Cybersecurity with Neo4j
Real Life Examples of Cybersecurity with Neo4j
Neo4j
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
CODE BLUE
Delivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data Lake
Jean-Michel Franco
Art of the Possible with Splunk Analytics
Art of the Possible with Splunk Analytics
Splunk
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
Data IQ Argentina
Cloud-enabled analytics
Cloud-enabled analytics
Nagarro
IBM Software Day 2013. Smarter analytics and big data. building the next gene...
IBM Software Day 2013. Smarter analytics and big data. building the next gene...
IBM (Middle East and Africa)
Deriving economic value for CSPs with Big Data [read-only]
Deriving economic value for CSPs with Big Data [read-only]
Flytxt
Churn Analysis in Telecom Industry
Churn Analysis in Telecom Industry
Satyam Barsaiyan
More Related Content
What's hot
IoT Big Data Analytics Insights from Patents
IoT Big Data Analytics Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
HP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
HP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
Pronq by HP
Iot cyber security
Iot cyber security
sajid mehmood
Graph Intelligence: The Essentials for Cybersecurity
Graph Intelligence: The Essentials for Cybersecurity
Neo4j
The Secure Business in the Digital Age - 27th September 2017
The Secure Business in the Digital Age - 27th September 2017
Exponential_e
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
Internet World
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
Priyanka Aash
Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?
LiveAction Next Generation Network Management Software
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
Peter Wood
InterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
InterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
IBM Events
Internet of Things (IoT) Strategic Patent Development and Monetization 1Q 2016
Internet of Things (IoT) Strategic Patent Development and Monetization 1Q 2016
Alex G. Lee, Ph.D. Esq. CLP
GDPR Benhmark: 70% of companies failing on their own GDPR compliance claims
GDPR Benhmark: 70% of companies failing on their own GDPR compliance claims
Jean-Michel Franco
Real Life Examples of Cybersecurity with Neo4j
Real Life Examples of Cybersecurity with Neo4j
Neo4j
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
CODE BLUE
Delivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data Lake
Jean-Michel Franco
Art of the Possible with Splunk Analytics
Art of the Possible with Splunk Analytics
Splunk
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
Data IQ Argentina
Cloud-enabled analytics
Cloud-enabled analytics
Nagarro
IBM Software Day 2013. Smarter analytics and big data. building the next gene...
IBM Software Day 2013. Smarter analytics and big data. building the next gene...
IBM (Middle East and Africa)
What's hot
(20)
IoT Big Data Analytics Insights from Patents
IoT Big Data Analytics Insights from Patents
HP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
HP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
Iot cyber security
Iot cyber security
Graph Intelligence: The Essentials for Cybersecurity
Graph Intelligence: The Essentials for Cybersecurity
The Secure Business in the Digital Age - 27th September 2017
The Secure Business in the Digital Age - 27th September 2017
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
InterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
InterConnect 2013 Big Data & Analytics Keynote: Mychelle Mollot
Internet of Things (IoT) Strategic Patent Development and Monetization 1Q 2016
Internet of Things (IoT) Strategic Patent Development and Monetization 1Q 2016
GDPR Benhmark: 70% of companies failing on their own GDPR compliance claims
GDPR Benhmark: 70% of companies failing on their own GDPR compliance claims
Real Life Examples of Cybersecurity with Neo4j
Real Life Examples of Cybersecurity with Neo4j
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
Delivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data Lake
Art of the Possible with Splunk Analytics
Art of the Possible with Splunk Analytics
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
Cloud-enabled analytics
Cloud-enabled analytics
IBM Software Day 2013. Smarter analytics and big data. building the next gene...
IBM Software Day 2013. Smarter analytics and big data. building the next gene...
Viewers also liked
Deriving economic value for CSPs with Big Data [read-only]
Deriving economic value for CSPs with Big Data [read-only]
Flytxt
Churn Analysis in Telecom Industry
Churn Analysis in Telecom Industry
Satyam Barsaiyan
Idiro Analytics - What is Rotational Churn and how can we tackle it?
Idiro Analytics - What is Rotational Churn and how can we tackle it?
Idiro Analytics
Idiro Analytics - Analytics & Big Data
Idiro Analytics - Analytics & Big Data
Idiro Analytics
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
BAINIDA
Big Telco - Yousun Jeong
Big Telco - Yousun Jeong
Spark Summit
Churn modelling
Churn modelling
Yogesh Khandelwal
Telco Churn Roi V3
Telco Churn Roi V3
hkaul
Social Network Analysis for Telecoms
Social Network Analysis for Telecoms
Dataspora
Predicting churn in telco industry: machine learning approach - Marko Mitić
Predicting churn in telco industry: machine learning approach - Marko Mitić
Institute of Contemporary Sciences
Leveraging Kafka for Big Data in Real Time Bidding, Analytics, ML & Campaign ...
Leveraging Kafka for Big Data in Real Time Bidding, Analytics, ML & Campaign ...
Helena Edelson
Decide on technology stack & data architecture
Decide on technology stack & data architecture
SV.CO
How to use your CRM for upselling and cross-selling
How to use your CRM for upselling and cross-selling
Redspire Ltd
Big Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network Approach
Andry Alamsyah
Big Data: Social Network Analysis
Big Data: Social Network Analysis
Michel Bruley
Viewers also liked
(15)
Deriving economic value for CSPs with Big Data [read-only]
Deriving economic value for CSPs with Big Data [read-only]
Churn Analysis in Telecom Industry
Churn Analysis in Telecom Industry
Idiro Analytics - What is Rotational Churn and how can we tackle it?
Idiro Analytics - What is Rotational Churn and how can we tackle it?
Idiro Analytics - Analytics & Big Data
Idiro Analytics - Analytics & Big Data
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Big Telco - Yousun Jeong
Big Telco - Yousun Jeong
Churn modelling
Churn modelling
Telco Churn Roi V3
Telco Churn Roi V3
Social Network Analysis for Telecoms
Social Network Analysis for Telecoms
Predicting churn in telco industry: machine learning approach - Marko Mitić
Predicting churn in telco industry: machine learning approach - Marko Mitić
Leveraging Kafka for Big Data in Real Time Bidding, Analytics, ML & Campaign ...
Leveraging Kafka for Big Data in Real Time Bidding, Analytics, ML & Campaign ...
Decide on technology stack & data architecture
Decide on technology stack & data architecture
How to use your CRM for upselling and cross-selling
How to use your CRM for upselling and cross-selling
Big Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network Approach
Big Data: Social Network Analysis
Big Data: Social Network Analysis
Similar to Idiro Analytics - Identifying Families using Social Network Analysis and Big Data Analytics
Smart Homes, Smarter Insurance Revolutionizing Home Insurance with IoT Soluti...
Smart Homes, Smarter Insurance Revolutionizing Home Insurance with IoT Soluti...
AeoLogic Technologies
WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014
Charith Perera
Enigma's Architecture
Enigma's Architecture
Enigma Digital Enterprises
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays
Superfast Business - Technology Trends for Business
Superfast Business - Technology Trends for Business
Superfast Business
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 edition
Stephen Cobb
GDPR- The Buck Stops Here
GDPR- The Buck Stops Here
Kellyn Pot'Vin-Gorman
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
Capgemini
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibility
dianadvo
Big data
Big data
Bhuvana Patt
CambridgeIP: Marketing Your Technology in the Credit Crunch
CambridgeIP: Marketing Your Technology in the Credit Crunch
CambridgeIP Ltd
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Denim Group
Business models for IoT and Wearables
Business models for IoT and Wearables
Joseph Wei
Ted talk April 20
Ted talk April 20
Bala Iyer
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
Matt Stubbs
Digital strategy overview
Digital strategy overview
Ashish Bhasin
Big data Analytics
Big data Analytics
ShivanandaVSeeri
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
Ulf Mattsson
Ravi i ot-security
Ravi i ot-security
skumartarget
social-media-monitoring
social-media-monitoring
Sokho TRINH
Similar to Idiro Analytics - Identifying Families using Social Network Analysis and Big Data Analytics
(20)
Smart Homes, Smarter Insurance Revolutionizing Home Insurance with IoT Soluti...
Smart Homes, Smarter Insurance Revolutionizing Home Insurance with IoT Soluti...
WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014
Enigma's Architecture
Enigma's Architecture
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
Superfast Business - Technology Trends for Business
Superfast Business - Technology Trends for Business
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 edition
GDPR- The Buck Stops Here
GDPR- The Buck Stops Here
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibility
Big data
Big data
CambridgeIP: Marketing Your Technology in the Credit Crunch
CambridgeIP: Marketing Your Technology in the Credit Crunch
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Business models for IoT and Wearables
Business models for IoT and Wearables
Ted talk April 20
Ted talk April 20
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
Digital strategy overview
Digital strategy overview
Big data Analytics
Big data Analytics
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
Ravi i ot-security
Ravi i ot-security
social-media-monitoring
social-media-monitoring
Recently uploaded
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Jack DiGiovanna
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts Service
Sapana Sha
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
Colleen Farrelly
How we prevented account sharing with MFA
How we prevented account sharing with MFA
Andrei Kaleshka
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Sapana Sha
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
Human37
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis Project
Boston Institute of Analytics
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
Sonatrach
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
Boston Institute of Analytics
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
Sapana Sha
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
jennyeacort
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
jennyeacort
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
soniya singh
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
Jeremy Anderson
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population Mean
MYRABACSAFRA2
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
limedy534
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
dataanalyticsqueen03
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
jennyeacort
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
208367051
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
yuu sss
Recently uploaded
(20)
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts Service
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
How we prevented account sharing with MFA
How we prevented account sharing with MFA
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis Project
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population Mean
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
Idiro Analytics - Identifying Families using Social Network Analysis and Big Data Analytics
1.
Confidential. Copyright ©
Idiro Analytics, all rights reserved. 1 Identifying family groups through Big Data analytics
2.
Confidential. Copyright ©
Idiro Analytics, all rights reserved. 2 Social Network Analysis – and Idiro • Idiro Analytics: specialists in advanced analytics for telcos – Based in Dublin, with customers worldwide – Leaders in Social Network Analysis for marketing & CRM • The power of Social Network Analysis (SNA) for marketing – We all influence each other’s decisions – SNA is the science of groups, relationships and influence – Idiro applies the principles of SNA to mobile CDRs - to build social maps of customer communities – Benefits: predict churn, drive P2P campaigns, increase acquisition, & cross-sell, etc. – Advanced SNA algorithms used to identify families Churn Pressure Churner Churner Churner
3.
Confidential. Copyright ©
Idiro Analytics, all rights reserved. 3 Identifying families: Behaviour-based Discovery 1. Idiro receives anonymised CDRs and subscriber data 2. The telco provides a sample of known families 3. Idiro builds a model to predict which subscribers share a family link 4. Idiro applies the model to all the links between every on-net & offnet MSISDN 5. Finally we use a clustering algorithm to detect the families based on groups of subscribers interconnected by strong family links 6. Feedback from early campaigns is used to refine the outputs
4.
Confidential. Copyright ©
Idiro Analytics, all rights reserved. 4 Families Case Study – Mobile operator in S-E Europe • Mobile operator exploring family identification for future products • Operator’s family identification to date based on limited demographic & location data • Idiro project to improve family identification • Results: Idiro model shows significantly higher family identification than Operator’s own efforts
5.
Confidential. Copyright ©
Idiro Analytics, all rights reserved. 5 Families Case Study – Mobile operator in N-W Europe • Mobile operator launching 2 family products – Family tariff – Hardware product for larger households • Family targeting based to date on demographic data • Idiro project to identify families & households for both products – Used all available data: CDRs, demographic data, subscriber parameters, etc. – Sample of known families provided • Results: strong performance in both campaigns – First results shown below – Initial campaign results used to refine family model outputs
6.
Confidential. Copyright ©
Idiro Analytics, all rights reserved. 6 Steps to family identification using Idiro SNA 1. Agree scope of project with Idiro – objective, family definition, timescales, etc. 2. Complete paperwork 3. Provide anonymised data to Idiro: – Sample of known families, CDRs, subscriber data 1. Idiro modelling – Can be carried out in Dublin or on telco premises 1. Family ID delivery and first campaign 2. Refine model outputs based on campaign results / product uptake 3. Deliver ongoing refreshes / new target lists as required
7.
Confidential. Copyright ©
Idiro Analytics, all rights reserved. 7 Considerations for Family Identification Using SNA • Every country is different – e.g. Irish family units are different to German or Brazilian families • Definition of family must be based on the specific product / market opportunity – Idiro will workshop with the telco • The model requires the following anonymised data: – CDRs and subscriber records – Some known families to learn from • Initial uptake of family propositions is used to refine the model & improve the targeting for later deliveries
8.
Confidential. Copyright ©
Idiro Analytics, all rights reserved. 8 Sounds interesting? Contact Idiro info@idiro.com www.idiro.com
Download now