Bizit-Synergynest

12345678910111213141516171819202122232425262728293031
Across
  1. 3. ________is an open source software framework for fast batch data processing across parallel servers.
  2. 6. Analytics 1.0 is the era of ____________. (Note: use the 5th letter to open the first password protected file).
  3. 11. __________Analytics is one of the approach used to filter the outlying information and analyze only the required data.
  4. 12. Analytics 2.0 is the era of _____.
  5. 16. By employing the mobile phone data a good dataset would contain “ _______rates” and “recording periods” that can be used for estimating the origin-destination matrix. .( Note: use the 2nd letter to open the first password protected file).
  6. 18. What type of problem does sports team encounter mostly?
  7. 20. The demand for the travel can be estimated using ______________data.
  8. 21. In this article which is the technology that is compared to make analytics accessible?
  9. 22. What is the important use of this analytics in terms of reducing costs?(Note: use the 6th letter to open the first password protected file).
  10. 24. Analytics 2.0 is the era of __________
  11. 27. Analytics 3.0 is the era of _____________ offerings.
  12. 28. ____________ Analysis combines the quantitative and qualitative matrix to aid the decision-making process.
  13. 29. ____________ signal can serve as an early warning system for budding problems. However, they are indicative, not confirmatory.
  14. 30. Intelligent Transportation Systems enables the connection among people, vehicles,______________, and services.
  15. 31. The next-generation quantitative analysts were called __________, as they possessed both computational and analytical skills. (Note: use the 6th letter to open the first password protected file).
Down
  1. 1. _________ Methods were used to rapidly generate models from the fast-moving data.(Note: use the 7th letter to open the first password protected file).
  2. 2. Technology and -------------- are the important helps organizations to use data and analytics to the core.(Note: use the 6th letter to open the first password protected file).
  3. 4. What is the most effective thing in making a common language?
  4. 5. Who are exposed to the lab work to work along with bio mechanists to solve problem?
  5. 7. ______________Data is the one that possess challenges in data collection and cleaning due to its vast information.
  6. 8. If the source is a Surveillance video which is the analytical approach that is used to estimate the traffic count and violation.
  7. 9. ___________Information are collected from the social signals that are generated by the public transportation systems. (Note: use the 14th letter to open the first password protected file).
  8. 10. Apart from managers and sports scientists who is important in learning a common language?
  9. 13. What was mainly monitored by the Kraft group to engage customers?( Note: use the 6th letter to open the first password protected file).
  10. 14. Data management have expanded considerably, and almost every organization will end up with a _____________ environment .
  11. 15. To deal with relatively unstructured data, companies turned to a new class of databases known as__________ . (Note: use the 1st letter to open the first password protected file).
  12. 17. How many variety of questions are put forth by Gelman to drive decisions?(Note: use the 4th letter to open the first password protected file).
  13. 19. _________Is an instance of crowd sourcing mechanism that eliminates the need for paid individuals for collecting the geographic information .
  14. 23. _________ was the era of the enterprise data warehouse, used to capture information, and of business intelligence software, used to query and report it.
  15. 25. ________________ Information are extracted from social networking sites using NLP . (Note: use the 6th letter to open the first password protected file).
  16. 26. To improve the prediction accuracy _______________ approach is used to combine all the social transportation data.( Note: use the 10th letter to open the first password protected file).