Home

Copyright 2023 Ephyra Networks Inc ©, All Rights Reserved

  Ephyra Networks Inc.
北京易法瑞咨询有限责任公司

The amount of raw data stored in corporate databases is exploding. Raw data by itself, however, does not provide much information. Data Mining (DM), or knowledge discovery, is the computer-assisted process of analyzing this stored data.  For example retailers such as Wal-Mart use this innovation to analyze their point of sale (POS) on a weekly basis allowing Wal-Mart to deliver what it’s customers want - the right item at the right store at the right time and at the right price. DM extracts relationships in the data from the trillions of POS transactions, credit card purchases, phone calls dialed, web sites browsed.   

 

In today's fiercely competitive business environment, companies need significant insights into the future trends and behavior of their customers and markets allowing businesses to make proactive, knowledge-driven decisions.  In effect, data mining has transformed business data into business information and knowledge. Telecom service providers analyze calling records and web browsing habits and when this superimposed on the location data (GIS) derived from the networks, service providers are able to provide much more precise location based services and advertizing.  

 

Security is a major issue for many companies adopting Data Mining technology.  To enable an analyst or developer to create and test data mining models, the owner of the data warehouse must give that analyst or developer administrative permissions on the database. As a consequence, the DM analyst or developer can potentially create or delete other objects that are not related to data mining, including data mining objects that were created and are being used by other analysts or developers, or modify the Online Analytical Processing (OLAP) objects that are not included in the data mining solution.  Additionally, data mining models often reference data sources that contain sensitive information. If the mining structure and mining model has been configured to allow external vendors or users to drill through from the model to the data in the structure, precautions must be to mask sensitive information, or to limit access to the underlying data.

 

The knowledge and expertise of our staff in Information security and network security means protecting information and information systems within networks from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction during mining. We conduct stringent testing of networks for security flaws for clients - vendors of equipment, data warehouses, corporate networks and networks interconnecting diplomatic missions and embassies around the world.  

 

How can we help you?

 

 

 

Security & Data Mining         

 

Telecom  Infrastructure

 

Biotechnology

 

Security & Data Mining

 

Oil & Gas

中文

Information Security

Data Mining