# Pareto principle

The Pareto principle (also known as the 80–20 rule, the law of the vital few, and the principle of factor sparsity) states that, for many events, roughly 80% of the effects come from 20% of the causes.[1] Management consultant Joseph M. Juran suggested the principle and named it after Italian economist Vilfredo Pareto, who, while at the University of Lausanne in 1896, published his first paper "Cours d'économie politique." Essentially, Pareto showed that approximately 80% of the land in Italy was owned by 20% of the population; Pareto developed the principle by observing that 20% of the pea pods in his garden contained 80% of the peas[citation needed]. It is a common rule of thumb in business; e.g., "80% of your sales come from 20% of your clients." The Pareto principle is only tangentially related to Pareto efficiency. Pareto developed both concepts in the context of the distribution of income and wealth among the population. In economics In business In software

Related:  andredavshaneimmBlēņas

NTFS Misreports Free Space? - Ntdebugging Blog I have recently seen a number of issues where customers called in to report a significant difference between the “Size on disk” for the root of a volume, and the reported amount of “Used space” in the volume properties. While considering this, I noticed that my own C: drive had a mysterious 20GB difference. Below is the story of how I found the answer. Before we begin, there are two methods used for calculating disk usage…

Fault tree analysis Fault tree analysis (FTA) is a top down, deductive failure analysis in which an undesired state of a system is analyzed using Boolean logic to combine a series of lower-level events. This analysis method is mainly used in the fields of safety engineering and reliability engineering to understand how systems can fail, to identify the best ways to reduce risk or to determine (or get a feeling for) event rates of a safety accident or a particular system level (functional) failure. FTA is used in the aerospace, nuclear power, chemical and process,[1][2][3] pharmaceutical, petrochemical and other high-hazard industries; but is also used in fields as diverse as risk factor identification relating to social service system failure.[4] In aerospace, the more general term "system Failure Condition" is used for the "undesired state" / Top event of the fault tree. These conditions are classified by the severity of their effects. FTA can be used to:

How to Create a Line Design: 9 steps (with pictures) Edit Article Edited by Mimi, Krystle, Sondra C, Elyne and 30 others We all know that a line segment, or a line, is straight, right? What if somebody told you that you could make curves entirely out of straight lines? With line design (also known as "string art" and "curve stitching") you can arrange a series of straight lines in a systematic way so that they create the appearance of a smooth curve, forming what is called an "envelope" in mathematics. These curves are based on mathematical formulas and can result in many complex and intriguing curves.

Amos Storkey - Research - Belief Networks Belief Networks and Probabilistic Graphical Models Belief networks (Bayes Nets, Bayesian Networks) are a vital tool in probabilistic modelling and Bayesian methods. They are one class of probabilistic graphical model. In other words they are a marriage between two important fields: probability theory and graph theory. It is this combination which makes them a powerful methodology within machine learning and statistics. Use of belief networks has become widespread partly because of their intuitive appeal.

Sunday Night Futures by Bill McBride on 9/22/2013 09:59:00 PM From Jon Hilsenrath at the WSJ: Yellen Would Bring Tougher Tone to Fed Janet Yellen, the lead candidate to succeed Federal Reserve Chairman Ben Bernanke, brings a demanding and harder-driving leadership style to the central bank, in contrast to Mr. Bernanke's low-key and often understated approach.Ms. Yellen, the Fed vice chairwoman, is highly regarded by many central bank staff members, who call her an effective leader with a sharp mind. NodeSchool Functional Javascript Learn fundamental functional programming features of JavaScript in vanilla ES5. npm install -g functional-javascript-workshop Level Me Up Scotty! Learn to use leveldb, a simple key/value store with a vibrant package. npm install -g levelmeup

Ishikawa diagram Ishikawa diagrams (also called fishbone diagrams, herringbone diagrams, cause-and-effect diagrams, or Fishikawa) are causal diagrams created by Kaoru Ishikawa (1968) that show the causes of a specific event.[1][2] Common uses of the Ishikawa diagram are product design and quality defect prevention, to identify potential factors causing an overall effect. Each cause or reason for imperfection is a source of variation. Causes are usually grouped into major categories to identify these sources of variation. The categories typically include: Overview Ishikawa diagram, in fishbone shape, showing factors of Equipment, Process, People, Materials, Environment and Management, all affecting the overall problem.

Etiquette in Japan The code of etiquette in Japan governs the expectations of social behavior in the country and is considered very important. Like many social cultures, etiquette varies greatly depending on one's status relative to the person in question. Many books instruct readers on its minutiae. John Lafferty My research is in machine learning and statistics, with basic research on theory, methods, and algorithms. Areas of focus include nonparametric methods, sparsity, the analysis of high-dimensional data, graphical models, information theory, and applications in language processing, computer vision, and information retrieval. Perspectives on several research topics in statistical machine learning appeared in this Statistica Sinica commentary.

How to disable SSL 2.0 and force SSL 3.0 and TLS 1.0 in IIS I lot of places want to disable weaker encryption levels and require more secure encryption levels. There isn’t a lot of clear procedures out there that explain how this is done. So for the greater good, I’m posting it here. Follow these steps to make the change manually: Back up your registry (outside link) Disable SSL 2.0: Browse to the “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0″ key.

Related:  UN2.1.3 THEORY