Information Matrix

Filter Information matrix

Posts feed
Publication date

Special assignment

We talked previously about the use of user-defined validation rules to clean up specific data artefacts you sometimes find in portfolio data. One question came up recently about modelling bespoke benefit bands, and this can also benefit from user-defined rules.
Written by: Gavin RitchieTags: Filter information matrix by tag: technology, Filter information matrix by tag: data validation, Filter information matrix by tag: deduplication

Keep taking the tablets

Earlier Gavin wrote about a number of mobile devices from which you could run Longevitas software services, including a Nokia telephone and an iPod Touch.  This is not a result of specifically designing for these devices, but it is a handy benefit from following the open, published standards for web development.
Written by: Helena BuckmayerTags: Filter information matrix by tag: technology, Filter information matrix by tag: mobile access, Filter information matrix by tag: BlackBerry, Filter information matrix by tag: iPad

Rewriting the rulebook

It is an unfortunate fact of life that through time every portfolio will acquire data artefacts that make risk analysis trickier. Policyholder duplication is one example of this and archival of claims breaking the time-series is another.
Written by: Gavin RitchieTags: Filter information matrix by tag: technology, Filter information matrix by tag: data validation

Upwardly mobile

We recently discussed the ways server-based modelling software facilitates collaboration across boundaries. Another important boundary is the office wall, although what was once considered an impermeable divide between work and the rest of our lives, is nowadays all-too porous.
Written by: Gavin RitchieTags: Filter information matrix by tag: technology, Filter information matrix by tag: collaboration, Filter information matrix by tag: mobile access

A problem shared

Creating a good model from your experience data is not always straightforward.
Written by: Gavin RitchieTags: Filter information matrix by tag: technology, Filter information matrix by tag: collaboration

Personal standards

Love them or loathe them, actuaries cannot get by without standard tables in some shape or form. Even when performing analysis of your own experience data to avoid basis risk, standard tables are often used as a kind of lingua franca between parties, a convenient way to express approximate results in a way everyone can understand.
Written by: Gavin RitchieTags: Filter information matrix by tag: technology, Filter information matrix by tag: standard table

Open verdict

If any doubt about Linux and Open Source technologies existed in Enterprise IT departments it must surely have been erased by last week's news: The London Stock Exchange, one of the engines that propelled the UK to the top of the World Economic Forum rankings, has invested in a Linux trading platform.
Written by: Gavin RitchieTags: Filter information matrix by tag: open source, Filter information matrix by tag: technology

Transforming the user experience

We were asked recently whether the rating reports from  mortalityrating.com could be extracted into a Microsoft Office format to use in an automated document production process. As the actual reports are in Adobe PDF format, tackling this question head-on wouldn't necessarily be easy.
Written by: Gavin RitchieTags: Filter information matrix by tag: XML, Filter information matrix by tag: XSL, Filter information matrix by tag: CSV, Filter information matrix by tag: technology, Filter information matrix by tag: productivity

Parallel processing

A colleague of mine once described parallel processing as the "work of the devil". I don't know if I'd go quite this far — this statement was made in the early nineties, when technology was that little bit less advanced than it is today.
Written by: Gavin RitchieTags: Filter information matrix by tag: parallel processing, Filter information matrix by tag: technology

This message will self-destruct...

Not all security strategies need be as dramatic as those proposed by Mission Impossible, but anyone offering SaaS needs to ensure data is accessible by only authorised users.
Written by: Gavin RitchieTags: Filter information matrix by tag: security, Filter information matrix by tag: encryption, Filter information matrix by tag: technology