How Personal Data is Being Used
The topic of personal data is discussed in this article, particularly new ways of collection and usage.
The topic of personal data is discussed in this article, particularly new ways of collection and usage.
While traditionally considered a relatively safe investment, recent municipal bankruptcies and defaults have resulted in restructurings of bond obligations.
This article introduces readers to Eagle Alpha’s powerful analytical tool that enables clients to query the entire Twitter archive. The Twitter Search tool can be used to identify trends and spikes in activity about any topic.
his article highlights some of the most actionable research reports that Eagle Alpha published in 2015.
On the 20th of July 2015, we published a research note, Denim Revival Threatening Athleisure, where we showed evidence that the athleisure market could be peaking. The figure below shows that the shift from jeans to yoga pants was leveling off.
On the 4th of November, we published a report on Skullcandy where we expressed concern over the high estimated sales growth in the second half of the year.
On the 21st of October 2015, we published a research report on GoPro in advance of their Q3 numbers. Our analysis, based on online data, highlighted the following potential implications: “Our analysis suggests weak underlying demand for GoPro products, particularly the Session.
On the 14th of July, we published a report titled ‘Discounting and Weak Residual Values in China Pose Threat to Premium Carmakers’.
Randy Bean, CEO and managing partner of NewVantage Partners, published an article in HBR citing his company’s Big Data executive survey.
Robert Maxwell, finINTEL Solutions CEO, recently published a report (attached) highlighting the way datafication is aiding oil & gas analysts.
This asset manager was introduced in our recent article. It is actively applying alternative data analysis techniques within its investment management process.
This document highlights issues such as copyright infringement, breach of contract, the Computer Fraud and Abuse Act, trespass to chattels, and ‘Hot news’ misappropriation have to be considered when undertaking data crawling operations.