Impacting Business Objetives

Our methodology and results P(x) aims to empirically align candidate criterion (CC) with the critical mass (CM) of the system e.g. the organization.

 

P(x) ! = IA(CM) + A(CC)I2
= IA(CM)I2 + IA(CC)I2 + A(CM)A∝(CC) + A∝(CM)A(CC)
= P(CM) + P (CC) + 2 Re {A(CM)A2(CC)}

 

Our Big Data is Obtained From:

Social network profiles
Tapping user profiles from Facebook, LinkedIn, Yahoo, Google, and specific interest social or professional sites, to filter individuals’ profiles and demographic information.
Social influencers
Editor, analyst and subject matter expert blog comments, user forums, Twitter & Facebook “likes,” Yelp ¬ style catalog and review sites, and other review centric sites like Apple’s App Store, Amazon and ZDNet.
Activity generated data
Computer and mobile device log files, aka “The Internet of Things.” This includes web site tracking information, application logs, and sensor data – such as check¬ins and other location tracking – among other machine generated content. But consider also the data generated by the processors found within vehicles, video games, cable boxes and household appliances.
Public
Microsoft azure MarketPlace / DataMarket, The World Bank, SEC/Edgar, Wikipedia, IMDb, etc. – data that is publicly available on the Web which may enhance the types of analysis able to be performed.
Academic Publishing houses
Filter relative disciplines and academic contributions; Wiley-vch, Elsevier, Springer, Oxford University Press, Academic Press, Institute of Physics.

 

2/5