Celebrating 25 Years with the SESUG Conference!

by Tricia Aanderud  |  Posted on 11/16/2017

Many SAS users attend SAS Global Forum but never consider the value that the regional conferences provide. The Zencos Data Science team attended the 25th Southeast SAS User’s conference in Cary, NC. The event was held on the beautiful SAS Campus at the first of November. Our team presented topics ranging from Star Wars text analysis to hands on workshop showing how to use PROC DS2.

Understanding Drivers of Customer Risk Using Machine Learning

by Leigh Ann Herhold  |  Posted on 10/30/2017

In the financial world of Anti-Money Laundering (AML) monitoring, Customer Due Diligence is a key requirement detailed under the Bank Secrecy Act to detect and prevent money laundering. This oftentimes requires financial institutions to establish an operationalized and defendable way to identify customers with a high opportunity to launder money through a risk ranking process. In addition, investigators are required to further review customers that are determined to be at higher risk through an Enhanced Due Diligence review. You can read more about Customer Due Diligence (CDD) and Enhanced Due Diligence (EDD) 

7 Useful Things a SAS Administrator Can Learn Using SAS Environment Manager

by Sandy Gibbs  |  Posted on 10/17/2017

SAS Environment Manager is a web-based administration tool used to monitor and manage your SAS installation. It’s a product so extensive, working with it, you will learn something new every day. SAS Environment Manager was introduced in SAS 9.4 and becomes even more powerful with each release.

Zencos Team Presents Papers at the 2017 SESUG Conference

by Ben Zenick  |  Posted on 09/29/2017

The Zencos team is going to the SouthEastern SAS User's Group (SESUG) in November. The papers submitted this year are focused around using SAS Viya machine learning and data visualization techniques. 

Using Customer Segmentation in AML Transaction Monitoring

by Leigh Ann Herhold  |  Posted on 09/27/2017

After data has been refined and the top-down methodology has been applied, the next step is to apply a bottom-up, data-driven methodology. There are two main categories of data-driven machine learning techniques: Unsupervised and Supervised modeling. AML Transaction Monitoring is a preventative monitoring process used to identify potentially suspicious activity without knowing if the activity is confirmed to be fraudulent. Unlike supervised modeling, unsupervised modeling is a machine learning method used with unlabeled data to identify patterns or groups within the data.

Zencos Data Science Team Heads to Analytics Experience

by David Septoff  |  Posted on 08/30/2017

Zencos is a proud sponsor of Analytics Experience 2017. Our Data Science team will be in attendance, September 18-20 in Washington, DC and we are excited! 

Using Network Analysis to Look at the College Football Teams

by Reid Baughman  |  Posted on 08/24/2017

College football season is here! Whether you’re a fan of football or not, sports generate a lot of data that when analyzed the right way, can yield important insights into players or teams. Here at Zencos, we are passionate about leveraging a wide variety of analytical techniques to disrupt the status quo and give companies the competitive edge. Let's use some network analysis to look at the college teams.

Using Data Science to Fight Financial Crime

by Leigh Ann Herhold  |  Posted on 08/08/2017

If you have been following the new Netflix crime show Ozarks, then you witnessed how difficult it was for Marty Byrde (Jason Bateman) to launder $8 million dirty dollars from a dangerous drug cartel. The gritty crime thriller depicts the intensity and difficulty of the task in a dramatic and satisfying way. Money laundering is a very real and constant threat to both small and large financial institutions and casinos around the world. Applying data science and business logic with consistent model testing and validation is key to detecting anomalies.

Tame your Big Data with SAS Coding Efficiencies

by Ryan Kumpfmiller  |  Posted on 07/31/2017

Many of us have experienced code execution taking forever to run. In most cases, we set those jobs to run at night so as not to waste a day of work. But, what if we could optimize performance and run the said jobs in a time period that’s more conducive to a day’s work? This topic explains some general coding efficiencies, explains how SAS stores data, and a technique for working with the database.

Hold your breath as We Dive into Visualizing Shark Attacks in The Bahamas

by Jaime D'Agord  |  Posted on 07/13/2017

Sharks are an intriguing species because they aren't animals we encounter every day. Using SAS Visual Analytics 8.1, shark attacks in The Bahamas were graphed to determine which activities and which islands experienced greater number of shark attacks.

Page 1 of 12 pages