by Tricia Aanderud | Posted on 11/16/2017
Many SAS users attend SAS Global Forum but never consider the value that the regional conferences provide. The Zencos Data Science team attended the 25th Southeast SAS User’s conference in Cary, NC. The event was held on the beautiful SAS Campus at the first of November. Our team presented topics ranging from Star Wars text analysis to hands on workshop showing how to use PROC DS2.
by Leigh Ann Herhold | Posted on 10/30/2017
In the financial world of Anti-Money Laundering (AML) monitoring, Customer Due Diligence is a key requirement detailed under the Bank Secrecy Act to detect and prevent money laundering. This oftentimes requires financial institutions to establish an operationalized and defendable way to identify customers with a high opportunity to launder money through a risk ranking process. In addition, investigators are required to further review customers that are determined to be at higher risk through an Enhanced Due Diligence review. You can read more about Customer Due Diligence (CDD) and Enhanced Due Diligence (EDD)
by Sandy Gibbs | Posted on 10/17/2017 SAS Environment Manager is a web-based administration tool used to monitor and manage your SAS installation. It’s a product so extensive, working with it, you will learn something new every day. SAS Environment Manager was introduced in SAS 9.4 and becomes even more powerful with each release.
by Sandy Gibbs | Posted on 10/17/2017
SAS Environment Manager is a web-based administration tool used to monitor and manage your SAS installation. It’s a product so extensive, working with it, you will learn something new every day. SAS Environment Manager was introduced in SAS 9.4 and becomes even more powerful with each release.
by Ben Zenick | Posted on 09/29/2017
The Zencos team is going to the SouthEastern SAS User's Group (SESUG) in November. The papers submitted this year are focused around using SAS Viya machine learning and data visualization techniques.
by Leigh Ann Herhold | Posted on 09/27/2017
After data has been refined and the top-down methodology has been applied, the next step is to apply a bottom-up, data-driven methodology. There are two main categories of data-driven machine learning techniques: Unsupervised and Supervised modeling. AML Transaction Monitoring is a preventative monitoring process used to identify potentially suspicious activity without knowing if the activity is confirmed to be fraudulent. Unlike supervised modeling, unsupervised modeling is a machine learning method used with unlabeled data to identify patterns or groups within the data.
by David Septoff | Posted on 08/30/2017
Zencos is a proud sponsor of Analytics Experience 2017. Our Data Science team will be in attendance, September 18-20 in Washington, DC and we are excited!
by Reid Baughman | Posted on 08/24/2017
College football season is here! Whether you’re a fan of football or not, sports generate a lot of data that when analyzed the right way, can yield important insights into players or teams. Here at Zencos, we are passionate about leveraging a wide variety of analytical techniques to disrupt the status quo and give companies the competitive edge. Let's use some network analysis to look at the college teams.
by Leigh Ann Herhold | Posted on 08/08/2017
If you have been following the new Netflix crime show Ozarks, then you witnessed how difficult it was for Marty Byrde (Jason Bateman) to launder $8 million dirty dollars from a dangerous drug cartel. The gritty crime thriller depicts the intensity and difficulty of the task in a dramatic and satisfying way. Money laundering is a very real and constant threat to both small and large financial institutions and casinos around the world. Applying data science and business logic with consistent model testing and validation is key to detecting anomalies.
by Ryan Kumpfmiller | Posted on 07/31/2017
Many of us have experienced code execution taking forever to run. In most cases, we set those jobs to run at night so as not to waste a day of work. But, what if we could optimize performance and run the said jobs in a time period that’s more conducive to a day’s work? This topic explains some general coding efficiencies, explains how SAS stores data, and a technique for working with the database.
by Jaime D'Agord | Posted on 07/13/2017
Sharks are an intriguing species because they aren't animals we encounter every day. Using SAS Visual Analytics 8.1, shark attacks in The Bahamas were graphed to determine which activities and which islands experienced greater number of shark attacks.
Page 1 of 12 pages
- Celebrating 25 Years with the SESUG Conference!
- Understanding Drivers of Customer Risk Using Machine Learning
- 7 Useful Things a SAS Administrator Can Learn Using SAS Environment Manager
- Zencos Team Presents Papers at the 2017 SESUG Conference
- Using Customer Segmentation in AML Transaction Monitoring
- Zencos Data Science Team Heads to Analytics Experience
- Using Network Analysis to Look at the College Football Teams