User accessibility to data analytics
First Claim
1. A computer implemented method of performing an appropriate type of data analysis for a user having limited access to data analytics, the computer implemented method comprising:
- a processor creating a user profile for a user;
the processor receiving, from the user, a preliminary request for a data analysis, wherein the preliminary request fails to identify an appropriate data source for the data analysis, and wherein the preliminary request fails to identify an appropriate type of data analysis;
the processor creating a customized request from the preliminary request based on the user profile, wherein the customized request is specific for the user, and wherein the customized request identifies the appropriate data source for analysis;
the processor mapping, based on the user profile, the customized request to a specific data constrained analytic algorithm that performs the appropriate type of data analysis;
the processor utilizing the specific data constrained analytic algorithm to perform the appropriate type of data analysis on the appropriate data source in order to generate an analytic result; and
the processor transmitting the analytic result to the user.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer implemented method, system, and/or computer program product performs an appropriate type of data analysis for a user. A preliminary request for a data analysis is received from a user having a user profile. The preliminary request fails to identify an appropriate data source for the data analysis, and fails to identify an appropriate type of data analysis. Thus, a customized request, that identifies the appropriate data source for analysis, is created from the preliminary request based on the user'"'"'s profile. The customized request is mapped, based on the user'"'"'s profile, to a specific data constrained analytic algorithm that performs the appropriate type of data analysis. This specific data constrained analytic algorithm performs the appropriate type of data analysis on the appropriate data source in order to generate an analytic result, which is transmitted to the user.
-
Citations
20 Claims
-
1. A computer implemented method of performing an appropriate type of data analysis for a user having limited access to data analytics, the computer implemented method comprising:
-
a processor creating a user profile for a user; the processor receiving, from the user, a preliminary request for a data analysis, wherein the preliminary request fails to identify an appropriate data source for the data analysis, and wherein the preliminary request fails to identify an appropriate type of data analysis; the processor creating a customized request from the preliminary request based on the user profile, wherein the customized request is specific for the user, and wherein the customized request identifies the appropriate data source for analysis; the processor mapping, based on the user profile, the customized request to a specific data constrained analytic algorithm that performs the appropriate type of data analysis; the processor utilizing the specific data constrained analytic algorithm to perform the appropriate type of data analysis on the appropriate data source in order to generate an analytic result; and the processor transmitting the analytic result to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product for performing an appropriate type of data analysis for a user, the computer program product comprising:
-
a computer readable storage media; first program instructions to create a user profile for a user; second program instructions to receive, from the user, a preliminary request for a data analysis, wherein the preliminary request fails to identify an appropriate data source for the data analysis, and wherein the preliminary request fails to identify an appropriate type of data analysis; third program instructions to create a customized request from the preliminary request based on the user profile, wherein the customized request is specific for the user, and wherein the customized request identifies the appropriate data source for analysis; fourth program instructions to map, based on the user profile, the customized request to a specific data constrained analytic algorithm that performs the appropriate type of data analysis; fifth program instructions to utilize the specific data constrained analytic algorithm to perform the appropriate type of data analysis on the appropriate data source in order to generate an analytic result; and sixth program instructions to transmit the analytic result to the user; and
wherein the first, second, third, fourth, fifth, and sixth program instructions are stored on the computer readable storage media. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer system comprising:
-
a central processing unit (CPU), a computer readable memory, and a computer readable storage media; first program instructions to create a user profile for a user; second program instructions to receive, from the user, a preliminary request for a data analysis, wherein the preliminary request fails to identify an appropriate data source for the data analysis, and wherein the preliminary request fails to identify an appropriate type of data analysis; third program instructions to create a customized request from the preliminary request based on the user profile, wherein the customized request is specific for the user, and wherein the customized request identifies the appropriate data source for analysis; fourth program instructions to map, based on the user profile, the customized request to a specific data constrained analytic algorithm that performs the appropriate type of data analysis; fifth program instructions to utilize the specific data constrained analytic algorithm to perform the appropriate type of data analysis on the appropriate data source in order to generate an analytic result; and sixth program instructions to transmit the analytic result to the user; and
wherein the first, second, third, fourth, fifth, and sixth program instructions are stored on the computer readable storage media for execution by the CPU via the computer readable memory. - View Dependent Claims (17, 18, 19, 20)
-
Specification