Post on Medial

Considering to create a platform that enables users to generate their own data points, establish custom logics, and devise unique formulas. For instance, it could facilitate the creation of Comparative Market Analysis (CMA) reports.

Anonymous

Anonymous 4

Stealth • 9m

Generate data points from what? If the information is public knowledge won't an excel sheet deliver similar results?

1 replies1 like
Replies (1)

More like this

Recommendations from Medial

Akshat Khandelwal

Stealth • 4d

Hey medial family!! "Looking for an Excel wizard to streamline your data management? I specialize in data analysis, organization, and reporting to help your business thrive. From dynamic dashboards to error-free spreadsheets, I can deliver tailored

See More
0 replies4 likes
Image Description
Image Description

Somnath Dey

Stealth • 9m

Considering to create a platform that enables users to generate their own data points, establish custom logics, and devise unique formulas. For instance, it could facilitate the creation of Comparative Market Analysis (CMA) reports.

5 replies15 likes
Image Description
Image Description

Shraddha Saraswat

Stealth • 4m

Hi everyone! 👋 Introduction: I'm Shraddha Saraswat, a dedicated Data Analyst with a strong background in data collection, cleaning, analysis, and visualization. I am currently exploring new opportunities to leverage my skills and expertise. 📊 Pro

See More
3 replies5 likes

Inactive

Stealth • 3m

🚨 BREAKING NEWS: OpenAI Unveils SearchGPT - The Future of Search is Here! How would you like to have all the world's information at your fingertips, organized and explained with AI Excited to share OpenAI's latest innovation that's set to transfor

See More
0 replies5 likes

sujit singh

 • 

Dual Infotech Group • 1m

A Blockchain-Based Data Security System for Android and iOS devices ensures the highest level of data protection by leveraging blockchain technology. This system allows users to track their mobile data in real-time, providing alerts if any data is st

See More
0 replies2 likes

Inactive

Stealth • 1m

What is Insider Trading ? Insider trading occurs when someone with access to confidential information about a company uses that knowledge to trade its stock. This information could include: • Earnings reports not yet released to the public. • Deta

See More
0 replies4 likes
Image Description
Image Description

Mayank Kumar

Stealth • 4m

How D2C brand use data to build deeper customer connections and skyrocket sales! Audience identification and segmentation enable tailored marketing, personalized experiences, and better customer retention. D2C brands like Glossier, Dollar Shave Club

See More
3 replies6 likes
3
Image Description

Inactive

Stealth • 5m

BREAKING NEWS: world's most valuable public company. Nvidia has leapfrogged Microsoft to become the world's most valuable public company, boasting a staggering market cap of $3.33 trillion. Who saw that coming? Oh wait, everyone did. Key points: -

See More
1 replies15 likes
1
Image Description

Akhil Kumar

Stealth • 3m

I am interested in becoming a data scientist, but my background is in Political Science, not in fields like engineering or computer science. I'm concerned about whether there's a future for me in this field, especially since I don't have an IIT or si

See More
1 replies3 likes
Image Description

Payal Manghnani

Stealth • 3d

Here are 30 cybersecurity search engines: 1. Dehashed—View leaked credentials. 2. SecurityTrails—Extensive DNS data. 3. DorkSearch—Really fast Google dorking. 4. ExploitDB—Archive of various exploits. 5. ZoomEye—Gather information about targets. 6.

See More
1 replies4 likes
3

Download the medial app to read full posts, comements and news.