article thumbnail

Leveraging user-generated social media content with text-mining examples

IBM Big Data Hub

One of the best ways to take advantage of social media data is to implement text-mining programs that streamline the process. What is text mining? When used strategically, text-mining tools can transform raw data into real business intelligence , giving companies a competitive edge. How does text mining work?

Mining 56
article thumbnail

How process mining improves IT service management to save your business time and money

IBM Big Data Hub

For example, if a user’s email is down, they submit a ticket to IT. Auto-discovery tools like process mining — a tool gaining popularity with organizations — does just that. Continuous process optimization and technological breakthroughs in process mining are now competitive differentiators.

Mining 73
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 new steps in the data mining process to ensure trustworthy AI

IBM Big Data Hub

To help data scientists reflect and identify possible ethical concerns the standard process for data mining should include 3 additional steps: data risk assessment, model risk assessment and production monitoring. For example, we still observe that men are accepted on managerial position more frequently than women.

Mining 62
article thumbnail

Process Excellence: A transformational lever to extreme automation

IBM Big Data Hub

All are transforming their procurement operations by leveraging state-of-the-art process mining and intelligent automation technology. A Process Mining exercise drawing data from enterprise SAP has helped measure KPI performance and define the transformation roadmap. dollars annually in direct or indirect procurement.

Mining 69
article thumbnail

Power & Light: Russell Lee’s Coal Survey Exhibit

Unwritten Record

To read more about the survey and Russell Lee, check out this newly posted blog by National Archives Historian Jessie Kratz. Inland Steel Company, Wheelwright #1 & 2 Mines, Wheelwright, Floyd County, Kentucky, September 22, 1946. Koppers Coal Division, Federal #1 Mine, Grant Town, Marion County, West Virginia. June 13, 1946.

Mining 42
article thumbnail

GUEST ESSAY: Tapping Bitcoin’s security — to put a stop to ‘51% attacks’ of cryptocurrency exchanges

The Last Watchdog

In Bitcoin, for example, a process known as “Proof-of-Work” (“PoW”) involves miners solving a difficult mathematical problem with powerful computers. The presence of hashrate rental marketplaces like NiceHash make acquiring the required mining power easy; an attacker could rewrite an entire day of Bitcoin SV’s blockchain for less than $150k.

article thumbnail

Android Debugging Tools Also Useful for Compromising Devices, Mining Cryptocurrency

Security Affairs

As an example, a specific Android TV device was also found to ship in this condition.” ” The binary establishes a connection to the C&C server, then scans processes running on the compromised device and attempts to kill any that are running the CoinHive script that could be mining Monero. Pierluigi Paganini.

Mining 50