Method and system for applying a predictive model to generate a watchlist

ABSTRACT

A computer-implemented method comprises using at least one hardware processor to: receive a plurality of data related to one or more entities from a plurality of data sources; apply a predictive model to the plurality of data to predict a value of a critical indicator of performance for each of the one or more entities; generate a graphical user interface comprising a watchlist, wherein the watchlist comprises, for each of the one or more entities, an identifier of the entity, an identifier of the critical indicator predicted for the entity, a value associated with the critical indicator predicted for the entity, and a recommendation based on the value associated with the critical indicator predicted for the entity; and provide the graphical user interface to at least one user.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation application of U.S. patentapplication Ser. No. 17/315,122, filed on May 7, 2021, which claimspriority under 35 USC § 119(e) to U.S. Provisional Application Nos.63/021,550 and 63/171,967, filed on May 7, 2020 and Apr. 7, 2021,respectively, the contents of which are incorporated herein by referencein their entireties.

BACKGROUND Field

The present disclosure relates to systems and methods for providingsupport for a user to make a decision based on a single user action, andmore specifically, to providing a system, method and user experienceassociated with a user making a decision, based on a push notificationprovided in response to a data condition and a user profile.

Related Art

In related art systems, data analysts typically study and analyze trendsin economic data manually. For example, these analysts may study data inorder to determine when to buy or sell a stock manually, or what theunemployment rate looks like at any given period.

However, the data used to determine these metrics may be unreliable dueto the lack of availability of such proprietary information. Forexample, data which should not necessarily be correlated with aparticular economic metric may not have been filtered out when analyzingthe data, thereby introducing inaccuracies within the analysis.

Further, in the related art, a user may not be able to receive a pushnotification to make a decision with a single user action. Related artapproaches may provide, by email or other means, information associatedwith an ambient condition, such as a stock price or overall marketperformance. However, the related art approaches do not take intoaccount multiple data streams and as explained above, they also do notremove inaccuracies from the data. Thus, any information that the userreceives is based on data is that may contain inaccuracies. Further,when provided with this information, the user cannot make a decisionsimply by providing a single user action. For example but not by way oflimitation, a user must provide a service provider with detailedinstructions, including but not limited to a stock to be purchasedincluding the company name, a number of shares, a timing of thepurchase, single versus multiple orders, etc. Such requirements causeinconvenience to a user, such that the user with limited time may not beable to engage in a desired number of transactions, and further, due totime limitations may miss the opportunity to make the transactionscomplete before the data condition changes, such as a rapid change inthe stock price.

Thus, there is a need for reliable data, and reliable methods foranalyzing the data to determine present and future trends in this data.Further, there is an unmet need for a user to be able to make, with asingle action, and instruction or order to make a purchase.

SUMMARY OF THE DISCLOSURE

Aspects may include a method comprising using at least one hardwareprocessor to: receive a plurality of data related to one or moreentities from a plurality of data sources; apply a predictive model tothe plurality of data to predict a value of a critical indicator ofperformance for each of the one or more entities; generate a graphicaluser interface comprising a watchlist, wherein the watchlist comprises,for each of the one or more entities, an identifier of the entity, anidentifier of the critical indicator predicted for the entity, a valueassociated with the critical indicator predicted for the entity, and arecommendation based on the value associated with the critical indicatorpredicted for the entity; and provide the graphical user interface to atleast one user.

According to another aspect, the machine-learning model comprises aplurality of algorithms, wherein each of the plurality of algorithms isassociated with one of a plurality of different revenue structures, andwherein applying the machine-learning model comprises, for each of theone or more entities, applying one of the plurality of algorithms thatis associated with a revenue structure of the entity.

According to still another aspect, the one or more entities are aplurality of entities, including a first entity and a second entity, andwherein the predictive model predicts a value of a first criticalindicator, from among a plurality of critical indicators, for the firstentity and a value of a second critical indicator, from among theplurality of critical indicators, for the second entity, wherein thefirst critical indicator is different from the second criticalindicator.

According to a yet further aspect, the plurality of critical indicatorscomprises revenue.

According to still another aspect, the plurality of critical indicatorscomprises a number of subscribed users.

According to an additional aspect, the plurality of critical indicatorscomprises a number of store visits.

According to a further aspect, the plurality of critical indicatorscomprises a time spent on an online app or platform.

Yet another aspect may include using the at least one hardware processorto, for each of the one or more entities, select the critical indicatorto be predicted by the predictive model for the entity based on a typeof the entity.

Still another aspect may include using the at least one hardwareprocessor to, for at least one of the one or more entities, change thecritical indicator to be predicted by the predictive model for theentity based on changes in the plurality of data related to the at leastone entity.

According to another aspect, the value associated with the criticalindicator comprises a predicted change in value of the criticalindicator.

According to a further aspect, the plurality of data is received in realtime.

According to still another aspect, receiving the plurality of datacomprises, by a scheduling service, fetching data from an externalsystem, and storing the data in a cloud storage container.

According to yet another aspect, receiving the plurality of data furthercomprises extracting, transforming, and loading the plurality of datafrom the stored data in batches based on predefined input parameters.

According to a further aspect, for each of the one or more entities, therecommendation comprises a single word indicating whether the entity isoverperforming, neutral, or underperforming, based on the valueassociated with the critical indicator predicted for the entity.

According to another aspect, for each of the one or more entities, therecommendation comprises a numerical score based on the value associatedwith the critical indicator predicted for the entity.

According to yet a further aspect, for each of the one or more entities,the numerical score is further based on a size of the entity.

According to another aspect, the plurality of data comprises one or moreof financial data of the one or more entities, public-facingannouncements by the one or more entities, social media posts by the oneor more entities, public presentations by the one or more entities, orpublic information posted by leaders of the one or more entities.

According to a still further aspect, the application of the predictivemodel to the plurality of data is performed by at least one graphicsprocessing unit (GPU).

Another aspect may include a system comprising: at least one hardwareprocessor; and one or more software modules comprisingcomputer-executable instructions configured to, when executed by the atleast one hardware processor, receive a plurality of data related to oneor more entities from a plurality of data sources, apply a predictivemodel to the plurality of data to predict a value of a criticalindicator of performance for each of the one or more entities, generatea graphical user interface comprising a watchlist, wherein the watchlistcomprises, for each of the one or more entities, an identifier of theentity, an identifier of the critical indicator predicted for theentity, a value associated with the critical indicator predicted for theentity, and a recommendation based on the value associated with thecritical indicator predicted for the entity, and provide the graphicaluser interface to at least one user.

Still another aspect may include a non-transitory computer-readablemedium having instructions stored thereon, wherein the instructions,when executed by a processor, cause the processor to: receive aplurality of data related to one or more entities from a plurality ofdata sources; apply a predictive model to the plurality of data topredict a value of a critical indicator of performance for each of theone or more entities; generate a graphical user interface comprising awatchlist, wherein the watchlist comprises, for each of the one or moreentities, an identifier of the entity, an identifier of the criticalindicator predicted for the entity, a value associated with the criticalindicator predicted for the entity, and a recommendation based on thevalue associated with the critical indicator predicted for the entity;and provide the graphical user interface to at least one user.

BRIEF DESCRIPTION OF THE DRAWINGS

Exemplary implementation(s) of the present invention will be describedin detail based on the following figures, wherein:

FIG. 1 illustrates functions of an architecture according to an exampleimplementation of the present application.

FIG. 2 illustrates a structure of an architecture according to anexample implementation of the present application.

FIG. 3 illustrates a process associated with an architecture accordingto an example implementation of the present application.

FIG. 4 illustrates example alternative data types according to anexample implementation of the present application.

FIG. 5 illustrates example alternative dataset processing according toan example implementation of the present application.

FIG. 6 illustrates example automatic tagging according to an exampleimplementation of the present application.

FIG. 7 illustrates user experiences according to an exampleimplementation of the present application for a watchlist.

FIG. 8 illustrates processes associated with generation of the userexperiences according to an example implementation of the presentapplication for the watchlist.

FIG. 9 illustrates user experiences according to an exampleimplementation of the present application for a forecast analysis.

FIG. 10 illustrates processes associated with generation of the userexperiences according to an example implementation of the presentapplication for the forecast analysis.

FIG. 11 illustrates user experiences according to an exampleimplementation of the present application for the forecast analysis.

FIG. 12 illustrates user experiences according to an exampleimplementation of the present application for an alert chain.

FIG. 13 illustrates processes associated with generation of the userexperiences according to an example implementation of the presentapplication for the alert chain.

FIG. 14 illustrates processes associated with generation of the userexperiences according to an example implementation of the presentapplication for automated trading.

FIGS. 15-16 illustrates processes associated with generation of themobile user experiences according to an example implementation of thepresent application for automated trading.

FIGS. 17-21 illustrate various example implementations.

FIGS. 22A-22B illustrate various example implementations.

FIGS. 23-24 illustrate various example implementations.

FIG. 25 illustrates an example environment according to an exampleimplementation of the present application.

FIG. 26 illustrates an example computing environment with an examplecomputer device suitable for use in some example implementations.

FIG. 27 illustrates processes associated with execution of an orderbased on a single user action instruction and user settings, in responseto a data notification provided according to an example implementationof the present application.

FIGS. 28 and 29 illustrate example user experiences associated with theexample implementations disclosed herein.

DETAILED DESCRIPTION

The following detailed description provides further details of thefigures and example implementations of the present application.Reference numerals and descriptions of redundant elements betweenfigures are omitted for clarity. Terms used throughout the descriptionare provided as examples and are not intended to be limiting. Forexample, the use of the term “automatic” may involve fully automatic orsemi-automatic implementations involving user or operator control overcertain aspects of the implementation, depending on the desiredimplementation of one of ordinary skill in the art practicingimplementations of the present application.

With a more complex and dynamic economy, there is a need for accuratedata reflecting exactly what is going on in the economy at any givenpoint in time. More specifically, in order to accurately determine thecurrent state of the economy, and to then be able to determine presentand future trends in the economy, accurate data is required so that therecommendation itself is accurate.

For example, when considering purchasing a particular stock, a purchasersuch as a trader may consider corporate information related to thecompany associated with the stock. This corporate information mayinclude, at a very high level, how much revenue a company is taking in,how much money the company lost for a particular period of time (e.g.,quarter, month, year).

However, this general, broad data is often not an accurate depiction ofhow a company is actually behaving. For example, revenue for a clothingcompany may appear to be high overall, but when the data is broken down,the revenue may be coming from online sales primarily. Typically, storeswith higher revenue from online sales end up closing several brick andmortar stores, because those stores are no longer profitable. Thus, atrader who is considering to buy that clothing company's stock may notwant to purchase that stock if they know that those stores will likelyclose at a future point in time.

Unfortunately, without accurate data, a trader has little way of knowinghow a particular trend will look in the future. Therefore, by collectingdata and cleaning and normalizing that data, this cleaned, normalizeddata may be compared to historical data to determine how a particulartrend will look in the future. Similarly, a trader may also not be ableto assess present information, to make a decision or recommendation.According to the present example implementations, the cleaned,normalized data may be present data that is compared to historical data,to provide an analysis of current trends.

While the above example implementation describes determining trendsrelated to the stock market, other metrics may be determined (e.g.,obtained deterministically), including a regional, national, oruniversal unemployment rate, public and not public company revenues andmarket shares, consumer behavior across several companies, a basket ofstocks (e.g., more than one particular stock such as an entire stockportfolio), electronic indices, restaurant indices, how particularsectors in the workforce are performing, inflation, and trends formutual funds. In particular, any data or information which may have aneconomic impact may be measured.

Aspects of the example implementation are directed to apparatuses,methods and systems for receiving a plurality of data inputs fromdifferent data providers having different types of data. The differenttypes of data are received in a big data system, which standardizes thedata by performing normalization, de-duplication, and classification,and optionally other processes.

The standardized data is provided to a multi panel generator that buildsa panel, builds a forecast, and generates a forecast. The forecast isoutput to an access point, where a user may access the forecast. Theuser experience may involve receiving the result of the forecast as arecommendation on a watchlist showing multiple entities, a detailedperformance and recommendation report for one of the multiple entities,and/or an alert chain that provides the user with an alert that may betriggered by one or more conditions.

In the foregoing example implementation, the data is processedcontinuously and in real time, such that the user is automaticallyprovided with real-time updates to the recommendations, watchlist and/oralert chain. The user may have the opportunity to execute a transaction,either manually or automatically, as well as to provide real-timefeedback on the system.

To implement the foregoing example implementations, an architecture isprovided, as explained in greater detail below. Further, the userexperience associated with the architecture is also described in greaterdetail.

Architecture

As shown in FIGS. 1-3, for example implementations described hereinrelate to an architecture, including system elements and associatedfunctions, as well as operations.

FIG. 1 illustrates a schematic description of the architecture accordingto an example implementation. At 101, data is received from a pluralityof alternate data providers. The details of the plurality of alternatedata providers will be described below in greater detail. For example,but not by way of limitation, some of the data providers may includefinancial transaction information providers, location information suchas GPS data, consumer behavior information such as social media oronline publication information, or other data.

At 103, an automated tagging system is provided that receives the datafrom the plurality of data providers, and performs tagging, or labelingof the data. More specifically, the data may be standardized across thedifferent types of data that were received from the different dataproviders. The standardization processes may include, but are notlimited to, filtering, de-duplication, normalization, and classificationor labeling. Further details of the automated tagging system areprovided.

At 105, and updating and feedback process is provided. Morespecifically, manual or automatic processes may be provided for theautomatic tagging system to be updated, and for checking and auditing ofthe process. Optionally, the input to the updating and supervisingprocess may be provided to a manual source, such as a data miner or ananalyst. Alternatively, in some example implementations an artificialintelligence system that employs machine learning, such as neuralnetworks, may use back propagation techniques for periodic updates tothe training phase.

At 107, financial data associated with a company is provided. Morespecifically, published information such as annual reports, pressreleases, information from the social media of spokespersons orexecutives, published pricing information, and other information aswould be understood by those skilled in the art is provided.

At 109, the standardized data of the automated tagging system 103 andthe company financial data 107 are provided to a modeling system 109.The modeling system 109 includes one or more handle generators andforecast builders, which are applied to a model. The model may include,but is not limited to an artificial intelligence-based system thatapplies machine learning, in the form of neural networks, to receive thestandardized data of the automated tagging system 103 and the companyfinancial data 107, apply them to the neural network, and generate, asan output, a forecast.

And as noted at 111, an input to the modeling system may include, but isnot limited to, proprietary data associated with the merger andacquisition information of the company, and the fiscal quarters calendarof the company.

At 113, an output of the forecast is provided as one or more revenuepredictions. As explained above, the company financial data that isbased on the standardized data, as well as the proprietary data, is fedinto the machine learning model to generate the revenue predictions.

At 115, a final output is provided in the form of a recommendation. Forexample, but not by way of limitation, the final output may be arecommendation to buy, hold or sell, as a transaction. Alternatively thefinal output may be a score. Still alternatively, the final output maybe the execution of the transaction itself, without involving the user.Optionally, a rule-based or other deterministic approach may beemployed, in combination with the probabilistic approach of the machinelearning, as disclosed above.

FIG. 2 illustrates an architecture 200 according to the exampleimplementations. Inputs 201 include data providers 201-207 provided to abig data system 211, which is in turn associated with an access point213.

More specifically, as shown in 200, data is received as inputs 201 froma plurality of N data providers 203-207. Where the term “data source” isused herein, the data is acquired from one or more data provider, suchas N data providers 203-209, as well as any other data providers aswould be understood by those skilled in the art.

In the big data system 209, for each of the data providers 203-209, Ncorresponding adapters 215-221 are is provided. The adapters 215-221 maynormalize 223, deduplicate 225 and classify 227 the data, as describedherein.

As explained above, data is provided by the data providers 203-209, andprocessed by the data adapters 215-221. The output of the data adapters215-221 is provided to an automatic tagging system, such that resultingoutput data has been normalized, de-duplicated and classified, asdisclosed above. These aspects of the example implementations areautomated; however, data miners and analysts may optionally supervisethe process, and continue to update the process. The resulting outputdata may be combined with company financial data, such as financialreports or other publicly available information associated withcharacteristics of the company, either historical or present.

An output of the automatic tagging system and the company financial datais provided to a modeling system. The modeling system may include pluralmulti-panel generators 229, 231, 233, multi-forecast builders 235, 237,239, and forecast modules 241, 243, 245. The modeling system generates,as its output forecast, a revenue prediction, based on financial data,proprietary data and machine learning. More specifically, the financialdata and proprietary data includes the above described inputs of theautomated tagging system and the company financial data. For example butnot by way of limitation, the data may include financial reports, mergerand acquisition information, and quarterly fiscal performance.

The output is the forecast, which may be provided in the format of afile, an API, a console or a custom format to the output. Accordingly,the output is provided to a user at the user access point. Example userexperiences associated with the access point are described in greaterdetail herein.

FIG. 3 illustrates a process 300 associated with the foregoingstructures and functions according to the example implementations. Morespecifically, the process is divided into a first phase 301 associatedwith data processing, a second phase 303 associated with development ofthe panel and calibration, and a third phase 305, associated withcreating and applying a prediction model, and generating a forecast.

With respect to the first phase 301, at 307 input data is received. Asnoted above, and as explained herein, the input data is from a pluralityof sources of different types. For example but not by way of limitation,the input data may include timeseries data from multiple vendors, suchas credit card transactions, debit card transactions or other electronicpurchase transactions.

At 309, the data is normalized. More specifically, the input data ofoperation 307 is mapped from the organic vendor data format in which itwas received, to an internal data format that provides consistencyacross vendors. For example but not by way of limitation, thenormalization involves accounting for the differences in the differentalternate data sets, and standardizing that data to a common standard.Additional aspects may include the duplication or other processes tostandardize the data.

At 311, brands associated with purchases are tagged. The tagging mayinvolve the application of tagging rules on the normalized data. Therules may include, but are not limited to, rules that are specific to acredit card or debit card, geo-fencing rules for GPS data, rulesassociated with browser history or online application usage, or otherrules as would be understood by those skilled in the art. For example,but not by way of limitation, for a series of financial transactions,each of the financial transactions may be labeled, or tagged. To performthe tagging, one or more tagging rules 313 may be applied. The taggingrules may be considered to be an inclusive filter, or an exclusivefilter. Further, in addition to a rule-based approach such as a filter,a natural language processing approach may be taken that incorporatesartificial intelligence, such as machine learning models that involveneural networks.

Once the input data has been normalized and tagged, at the second phase303, a panelization operation 315 is performed. According to the exampleimplementations, a sample of users is established as a panel. The usersare chosen to match criteria associated with the panel. For example, butnot by way of limitation, the panel may be created in a manner that isassociated with the input data churn rate. Other examples ofchannelization rules are shown at 317, and those rules may be based onuser transaction patterns, census data balancing, or other rules thatassociate a characteristic of user transaction behavior with atransaction.

Once the panels have been generated at 315, a grouping process isperformed at 319. More specifically, the panels are grouped by symbol.Brands associated with the data in the tagging process are assigned tosymbols associated with a company. It is noted that this data may changeover time, due to mergers, acquisitions, spinoffs, bankruptcies,rebranding, listing, delisting or other financial events. Thus, theevents are assigned in real time to be included at the time of assigningthe brand to the symbol at 319. The symbol may be chosen from adatabase, such as those shown at 321.

At 323, one or more corrections are applied to the grouped. For examplebut not by way of limitation, as shown in 325, patterns that arespecifically associated with a financial institution are applied tocalibrate the grouping. Examples of such patterns may include weekendpostings of information, posting delays typically associated with afinancial institution, as well as pending but not yet postedtransactions. Additionally, as shown at 327, anomalies are removed.Examples of anomalies that are removed may include, but are not limitedto anomalous transactions or anomalous users.

Once the panels have been fully generated in the second phase 303, theprocess proceeds to the third phase 305 as follows. At 329 a predictionmodel is generated. For example but not by way of limitation, in thetraining phase, historical data associated with a company, such as thefundamentals of the company and the stock price, as well as historicalmeasurements that may have been previously were historically provided bythe example implementations, are used as training data. Accordingly, theprediction model is trained based on this training data, as shown at331.

At 333, a forecast is generated. Using the prediction model generated at329, features associated with the open quarter 335 are applied, toderive a prediction of future stock price for future company fundamentalmetric. While the features are disclosed as being directed to an openquarter, example implement patients are not limited thereto, and otheropen periods may be substituted therefor.

The foregoing example implementations of the architecture may be run onthe hardware as explained below with respect to FIGS. 26 and 27.Further, the hardware provides for continuous large-scale data inputs,such that the model is continuously receiving data and be updatedautomatically and in real-time. Thus, the processing capability of thehardware must be sufficient to permit such processing. For example butnot by way of limitation, a GPU may be used for the artificialintelligence processing. Alternatively, or in combination with the GPU(graphical processing unit), an NPU (neural processing unit) may beused. One or both of these units may be used in a processor that islocated remotely, such as a distributed server system, for a cloudcomputing system.

For example, but not by way of limitation, external data fetchingaccording to the example implementations described herein may beperformed by copying data from an external third party (e.g., vendor),and storing the data in a cloud storage container. The data fetchingprocess may be managed by a scheduling server, and/or a serverlesscompute service that executes operations to manage the external datastorage and the associated compute resources.

Further, the extraction, transformation and loading of data as describedherein may be executed by a batch management processor or service. Batchcomputing is the execution of a series of executable instructions(“jobs”) on one or more processors without manual intervention by auser, e.g., automatically. Input parameters maybe pre-defined throughscripts, command-line arguments, control files, or job control language.A batch job may be associated with completion of preceding jobs, or theavailability of certain inputs. Thus, the sequencing and scheduling ofmultiple jobs is critical. Optionally, batch processing may not beperformed with interactive processing. For example, the batch managementprocessor or service may permits a user to create a job queue and jobdefinition, and then to execute the job definition and review theresults. According to an example implementation a batch cluster includes256 CPUs, and an ETL-dedicated server having 64 cores and 312 GB of RAM.The number of running instances may be 1. The foregoing ETLinfrastructure may also be applied to the process of insight extraction.

Further, an API is provided for data access. For example but not by wayof limitation, the REST API, which conforms to a REST style architectureand allows for interaction with RESTful resources, may be executed on aservice. The service may include, but is not limited to, hardware suchas 1 vCPU, 2 GB RAM, 10 GB SSD disk, and a minimum of two runninginstances. The API may be exposed to the Internet via an onlineapplication load balancer, which is elastic and permits configurationand routing of an incoming end-user to online applications based in thecloud, optionally pushing traffic across multiple targets in multipleavailability zones. The caching layer may be provided by a fast contentdelivery network (CDN) service, which may securely deliver the datadescribed herein with low latency and high transfer speeds. According tothe example implementations, containers may be run without having tomanage servers or clusters of instances, such that there is no need toprovision, configure, or scale clusters on virtual machines to executeoperations associated with containers.

Alternative Datasets

As explained above, the architecture is configured to receive aplurality of alternative data sets. As shown in FIG. 4, examples of thealternative data inputs 400, may include, but are not limited to, creditcard transactions and debit card transactions for one, mobile deviceusage information 403, geolocation data 405, social data and sentimentdata 407, and web traffic and Internet data 409.

The above-disclosed hardware implementations may be used to process thealternative datasets of FIG. 4, as would be understood by those skilledin the art. More specifically, For example, but not by way oflimitation, external data fetching according to the exampleimplementations described herein may be performed by copying data froman external third party (e.g., vendor), and storing the data in a cloudstorage container. The data fetching process may be managed by ascheduling server, and/or a serverless compute service that executesoperations to manage the external data storage and the associatedcompute resources. Further, the extraction, transformation and loadingof data as described herein may be executed by a batch managementprocessor or service. Batch computing is the execution of a series ofexecutable instructions (“jobs”) on one or more processors withoutmanual intervention by a user, e.g., automatically. Input parametersmaybe pre-defined through scripts, command-line arguments, controlfiles, or job control language. A batch job may be associated withcompletion of preceding jobs, or the availability of certain inputs.Thus, the sequencing and scheduling of multiple jobs is critical.Optionally, batch processing may not be performed with interactiveprocessing. For example, the batch management processor or service maypermits a user to create a job queue and job definition, and then toexecute the job definition and review the results. According to anexample implementation a batch cluster includes 256 CPUs, and anETL-dedicated server having 64 cores and 312 GB of RAM. The number ofrunning instances may be 1. The foregoing ETL infrastructure may also beapplied to the process of insight extraction. Further, an API isprovided for data access. For example but not by way of limitation, theREST API, which conforms to a REST style architecture and allows forinteraction with RESTful resources, may be executed on a service. Theservice may include, but is not limited to, hardware such as 1 vCPU, 2GB RAM, 10 GB SSD disk, and a minimum of two running instances. The APImay be exposed to the Internet via an online application load balancer,which is elastic and permits configuration and routing of an incomingend-user to online applications based in the cloud, optionally pushingtraffic across multiple targets in multiple availability zones. Thecaching layer may be provided by a fast content delivery network (CDN)service, which may securely deliver the data described herein with lowlatency and high transfer speeds. According to the exampleimplementations, containers may be run without having to manage serversor clusters of instances, such that there is no need to provision,configure, or scale clusters on virtual machines to execute operationsassociated with containers.

FIG. 5 illustrates the processing of the alternative data sets accordingto the example implementations. More specifically, at 500, the receivingand processing of the alternative data sets is disclosed. Thealternative data sets 501, may include, but are not limited to, datahaving alternative types. For example but not by way of limitation, GPSdata 503, data associated with financial transactions 505, vaccinationdata 507, satellite image data 509, app usage data 511, and browsinghistory information 513 are all types of data that might be a part ofthe alternative data sets 501. However, the alternative data sets 501are not limited to the foregoing example patients, and other data setsmay also be included as would be understood by those skilled in the art.

At 515, the multiple sources of data have an ETL (extract, transformload) operation performed, to extract, transform and load the data.Accordingly, the features associated with the data types one through mat 515 are extracted into corresponding features one through m as shownat 517.

At 519, the process is subjected to a modeling operation. The modelingoperation includes, as shown at 521, selection of the model, selectionof the features, performing the training phase on the model, andperforming model testing. The modeling operation 519 may be performed onan artificial intelligence system that uses neural networks and machinelearning.

At 523, a validation step is performed, also known as backtesting. Forexample, the historical data associated with stock prices, companyfundamentals, and historical decision or events, as disclosed at 525,are applied to the model that was generated. A determination is made,based on the validation of 523, whether the application of thehistorical information successfully validates the model. If the modelwas not successfully validated, or in other words the backtestingresults were not found to be acceptable, the process returns to 519, andthe modeling is again performed.

On the other hand, if the validation at operation 523 was successful,the operation proceeds. More specifically the operation proceeds to themodeling operation 527 and the forecasting operation 529, as discussedabove.

The above-disclosed hardware implementations may be used to process thealternative datasets of FIG. 5, as would be understood by those skilledin the art. More specifically, For example, but not by way oflimitation, external data fetching according to the exampleimplementations described herein may be performed by copying data froman external third party (e.g., vendor), and storing the data in a cloudstorage container. The data fetching process may be managed by ascheduling server, and/or a serverless compute service that executesoperations to manage the external data storage and the associatedcompute resources. Further, the extraction, transformation and loadingof data as described herein may be executed by a batch managementprocessor or service. Batch computing is the execution of a series ofexecutable instructions (“jobs”) on one or more processors withoutmanual intervention by a user, e.g., automatically. Input parametersmaybe pre-defined through scripts, command-line arguments, controlfiles, or job control language. A batch job may be associated withcompletion of preceding jobs, or the availability of certain inputs.Thus, the sequencing and scheduling of multiple jobs is critical.Optionally, batch processing may not be performed with interactiveprocessing. For example, the batch management processor or service maypermits a user to create a job queue and job definition, and then toexecute the job definition and review the results. According to anexample implementation a batch cluster includes 256 CPUs, and anETL-dedicated server having 64 cores and 312 GB of RAM. The number ofrunning instances may be 1. The foregoing ETL infrastructure may also beapplied to the process of insight extraction. Further, an API isprovided for data access. For example but not by way of limitation, theREST API, which conforms to a REST style architecture and allows forinteraction with RESTful resources, may be executed on a service. Theservice may include, but is not limited to, hardware such as 1 vCPU, 2GB RAM, 10 GB SSD disk, and a minimum of two running instances. The APImay be exposed to the Internet via an online application load balancer,which is elastic and permits configuration and routing of an incomingend-user to online applications based in the cloud, optionally pushingtraffic across multiple targets in multiple availability zones. Thecaching layer may be provided by a fast content delivery network (CDN)service, which may securely deliver the data described herein with lowlatency and high transfer speeds. According to the exampleimplementations, containers may be run without having to manage serversor clusters of instances, such that there is no need to provision,configure, or scale clusters on virtual machines to execute operationsassociated with containers.

Automatic Tagging

As the alternative data sets have been processed as explained above, andwith respect to operation 101, automatic tagging 101 is performed on thedata. FIG. 6 illustrates automatic tagging 600 in accordance with theexample implementations.

At 601, the transactions are received and the alternate data sets areprocessed as explained above. At 603, normalization is performed. Morespecifically, features are extracted from the transactions that arerelevant for the brand classifier.

At 605, brand classification is performed. More specifically, theextracted features of the normalization 603 are applied to aclassification layered model. More specifically, a rule-based approachis applied that performs the extraction in a deterministic manner, andthe rule based approach is mixed with an artificial intelligenceapproach, such as machine learning based on neural networks, that isprobabilistic in nature. Accordingly, the brand classification 605 isperformed in a mixed deterministic and probabilistic model.

At 607 a verification step is performed to verify that the classifier isaccurate. More specifically, a sample of the classified data isverified, to confirm that the labeling was correctly applied withrespect to the brand. If necessary, the classifier is retrained.Optionally, this verification and retraining operation at 607 may beperformed iteratively, until the brand classification has been verifiedto a threshold confidence level.

At 609, the brands are classified with respect to companies. Forexample, the companies may be private companies, publicly, or othertraded companies organizations having similar features to public orprivate companies. In a manner that is similar to operation 605 and 607above, a mixture of rule-based, deterministic operations andprobabilistic, artificial intelligence operations such as machinelearning and neural networks, are employed so that the brands areclassified to companies. Also similar to operation 607, at 611, thecompany classifier is verified to ensure that sampled data has beenaccurately labeled with respect to the classification of the company. Ifnecessary retraining, and optionally iterative free training, may beperformed until the company classification has been verified to athreshold confidence level.

At 613, once the brand classification 605 and the company classification609 have been verified, the tagged transaction is considered to havebeen generated at 613. For example but not by way of limitation, thelabeling is performed in a manner such that the data has beenautomatically labeled. An output of this process may be used in thepanel generation, forecast building, and forecast.

The example implementations may have various advantages and benefitsover the related art approaches. For example, but not by way oflimitation, the related art approaches may suffer from problems ordisadvantages, such as incorrect tagging of names that are common (e.g.,DENNYS or SPRINT), names that are short (e.g., AMC or BOOT), names thatare specific (e.g., TACO or TARGET), and names that are similar (e.g.,FIVE BELOW or BIG FIVE). Further, entities may be omitted if they do notfollow a clear standard. Examples of the lack of use of a clear standardresulting in company omissions includes the use of abbreviations insteadof the full name, a change in the name over time, slight difference innames due a difference of timing of the acquisition of the store, ortypographical errors in the name of the store. Other examples of relatedart errors include the assignment of the transactions to the wrongticker (company indicia), even if the transactions clearly areassociated with a different company.

The above-disclosed hardware implementations may be used to process theautomatic tagging of FIG. 6, as would be understood by those skilled inthe art. More specifically, For example, but not by way of limitation,external data fetching according to the example implementationsdescribed herein may be performed by copying data from an external thirdparty (e.g., vendor), and storing the data in a cloud storage container.The data fetching process may be managed by a scheduling server, and/ora serverless compute service that executes operations to manage theexternal data storage and the associated compute resources. Further, theextraction, transformation and loading of data as described herein maybe executed by a batch management processor or service. Batch computingis the execution of a series of executable instructions (“jobs”) on oneor more processors without manual intervention by a user, e.g.,automatically. Input parameters maybe pre-defined through scripts,command-line arguments, control files, or job control language. A batchjob may be associated with completion of preceding jobs, or theavailability of certain inputs. Thus, the sequencing and scheduling ofmultiple jobs is critical. Optionally, batch processing may not beperformed with interactive processing. For example, the batch managementprocessor or service may permits a user to create a job queue and jobdefinition, and then to execute the job definition and review theresults. According to an example implementation a batch cluster includes256 CPUs, and an ETL-dedicated server having 64 cores and 312 GB of RAM.The number of running instances may be 1. The foregoing ETLinfrastructure may also be applied to the process of insight extraction.Further, an API is provided for data access. For example but not by wayof limitation, the REST API, which conforms to a REST style architectureand allows for interaction with RESTful resources, may be executed on aservice. The service may include, but is not limited to, hardware suchas 1 vCPU, 2 GB RAM, 10 GB SSD disk, and a minimum of two runninginstances. The API may be exposed to the Internet via an onlineapplication load balancer, which is elastic and permits configurationand routing of an incoming end-user to online applications based in thecloud, optionally pushing traffic across multiple targets in multipleavailability zones. The caching layer may be provided by a fast contentdelivery network (CDN) service, which may securely deliver the datadescribed herein with low latency and high transfer speeds. According tothe example implementations, containers may be run without having tomanage servers or clusters of instances, such that there is no need toprovision, configure, or scale clusters on virtual machines to executeoperations associated with containers.

User Experience

The outputs of the example implementations described herein may beprovided in a user experience, in a manner that provides for the user tovisualize information generated by the architecture. While the foregoingexample implementations may be executed in the cloud as explained above,the user may be provided with an online application that permits theuser to access a user interface associated with an output of theforegoing example implementations. That user interface may be, but isnot limited to, an online application on a mobile device, an applicationon a laptop, and interactive application on a home device such as AmazonAlexa, and application in a mobile setting such as an automobile that isexecuted by the processor of the automobile, or other manner orstructure of executing computer readable instructions for providing theuser experiences described herein.

For example but not by way of limitation, a user may be provided with awatchlist that is generated to provide the user with decision-supportinformation associated with the outputs of the architecture, such as aprediction, forecast, recommendation or the like. Additionally, detailedanalysis of an entry on the watchlist may be provided, along with aspecific recommendation, and detailed metrics regarding the basis of therecommendation, and optionally compared with a recommendation providedby an external benchmark. Further, the example implementations describedherein may be used to provide a chain of alerts, or optionally, adecision support or automated decision tool, which combines adeterministic rules-based approach with the above described aspects,including but not limited to the art of artificial intelligenceapproaches.

Data processing associated with user experiences may be processed usingthe hardware disclosed herein. More specifically, For example, but notby way of limitation, external data fetching according to the exampleimplementations described herein may be performed by copying data froman external third party (e.g., vendor), and storing the data in a cloudstorage container. The data fetching process may be managed by ascheduling server, and/or a serverless compute service that executesoperations to manage the external data storage and the associatedcompute resources. Further, the extraction, transformation and loadingof data as described herein may be executed by a batch managementprocessor or service. Batch computing is the execution of a series ofexecutable instructions (“jobs”) on one or more processors withoutmanual intervention by a user, e.g., automatically. Input parametersmaybe pre-defined through scripts, command-line arguments, controlfiles, or job control language. A batch job may be associated withcompletion of preceding jobs, or the availability of certain inputs.Thus, the sequencing and scheduling of multiple jobs is critical.Optionally, batch processing may not be performed with interactiveprocessing. For example, the batch management processor or service maypermits a user to create a job queue and job definition, and then toexecute the job definition and review the results. According to anexample implementation a batch cluster includes 256 CPUs, and anETL-dedicated server having 64 cores and 312 GB of RAM. The number ofrunning instances may be 1. The foregoing ETL infrastructure may also beapplied to the process of insight extraction. Further, an API isprovided for data access. For example but not by way of limitation, theREST API, which conforms to a REST style architecture and allows forinteraction with RESTful resources, may be executed on a service. Theservice may include, but is not limited to, hardware such as 1 vCPU, 2GB RAM, 10 GB SSD disk, and a minimum of two running instances. The APImay be exposed to the Internet via an online application load balancer,which is elastic and permits configuration and routing of an incomingend-user to online applications based in the cloud, optionally pushingtraffic across multiple targets in multiple availability zones. Thecaching layer may be provided by a fast content delivery network (CDN)service, which may securely deliver the data described herein with lowlatency and high transfer speeds. According to the exampleimplementations, containers may be run without having to manage serversor clusters of instances, such that there is no need to provision,configure, or scale clusters on virtual machines to execute operationsassociated with containers.

Watchlist

FIG. 7 illustrates a user experience associated with the exampleimplementations. As shown at 700 the user experience provides awatchlist of companies, which may be selected by a user, for example, orsuggested to the user based on preferences associated with the user. Forexample, but not by way of limitation, the watch list includes in afirst column 701 a name of the company, including the company name andtrading symbol. In another column 703, a stock price is provided, alongwith information on the performance, such as change in share price astotal amount and percentage.

In yet another column 705, a type of critical data associated with theperformance that is being used as an input in the exampleimplementations is identified. As shown in FIG. 7, the first row isassociated with a first company, which may be a large retail companyhaving physical and online presence for retail sales, for which therevenues is a critical indicator of performance. For the second row,which is an online subscription company, a number of other usersassociated with the product is a critical indicator of performance. Fora third row, which is a retail restaurant that users may visit,same-store visits is provided as a critical indicator of performance.For a fourth row, which is a large automotive manufacturer, withinternational presence, US revenues is provided as a critical indicatorof performance. For the fifth row, which is a social media companyengagement of users (e.g., time spent on the platform) is provided as acritical indicator of performance.

In still another column 707, a performance associated with the criticalindicator of performance is shown. As shown in FIG. 7, for the first rowthe critical indicator of revenues are showing a performance increase of0.4%; for the second row the number of users is showing an increase of3%; for the third row, same-store sales is showing a decrease of 10%; orthe fourth column, the US revenues are showing an increase of 6.2%; andfor the last row, user engagement is showing an increase of 3%.Accordingly, the example user experience provides a user withinformation on a critical indicator of performance, as well as theactual performance based on the input data as explained above.

According to the present example implementations, based on the criticalindicator and the performance, the system generates a score in yetanother column 709. The score provides an indication for the user of theperformance of the company, which the user can apply as a form of arecommendation. For example, but not by way of limitation, in the caseof the first row in FIG. 7, a growth of 0.4% revenue is associated witha score of neutral, whereas in the second row, an increase in the numberof users of 3% is associated with over performing. In the third row, a10% decrease in same store sales is associated with an underperformingscore. In the fourth row, an increase of 6.2% in US revenues isassociated with an over performing score. In the last row, an increaseof 3% engagement is associated with an over performing score.

Accordingly, the user experience according to the exampleimplementations provides the user with information on the criticalindicator of performance, which is determined by the system based on thetype of company and the available data among the plurality of the datastreams. Further, the actual performance of the critical indicator foreach of the companies is provided, along with a determination of thescore. For example, but not by way of limitation, the information of thefirst row, such as revenue information may be generated based on theinput credit card information that is received as a data source, asexplained elsewhere in this disclosure. That information may be used todetermine a revenue associated with the company, and may be used tocalculate the performance.

While the score shown in the drawings is a single word, such as neutral,over performing or underperforming, other scores may be substitutedwithout departing from the inventive scope. For example, but not by wayof limitation, a numerical score, such as a performance rating from 1 to10, may be provided. This information and score is generated based onthe input data that is provided, as well as observations of what ischaracterized as an appropriate score relative to that company. Thus,each company may have a different score determination based on companyattributes such as industry or company size, to determine the amount ofvariation in performance that is necessary to provide the score.

The example implementations described herein provide a method ofdetermining a critical indicator, as shown in the watchlist. Forexample, but not by way of limitation, historical data may be applied inan artificial intelligence machine learning model in order to determinethe criteria having the highest correlation with respect to a change inthe stock price. For example, but not by way of limitation, some relatedart approaches may attempt to directly measure a grossed number of usersin order to determine revenue. However, such related our approaches canbe accurate, because a doubling of the number of users does notnecessarily correlate to a doubling of the amount of revenue. The reasonthis may be true is because the new users may not have the samerepresentation, use pattern or consumer preferences as the initial orearlier users.

Similarly, the geographical location of use, users or other informationis crucial to determining whether the data is representative of theusers, and can correctly determine the critical indicator. As explainedabove with respect to the example implementations, GPS data is receivedas an input, and is also stabilized in the automated tagging system, sothat the data can be representative. As another example, the data mustbe stabilized not just to show the overall number of users, but to showthe amount of time that a user spends in an online app, because if thenew user spends more time or less time in the app than the currentusers, this may be reflective of a different user behavior with respectto revenue, purchase, advertisements or the like, and can make the datamore accurate.

In a similar manner, when a company acquires a target, the number ofusers may increase, although those new users may not be representativeof the earlier users. During the time between the announcement of themerger and the completion of the merger process, several months or yearsmay pass, during which publicly available information may beincorporated into these example implementations and thus adjust thecritical indicator, performance indications, and or recommendations tocalibrate for such information. Legal or regulatory blockages, such asantitrust or export control, may stall or block the merger, such thatthe presence of certain terms in publicly available informationassociated with the merger can be used to adjust the forecasting andrecommendation. Further, the predictive aspect of the tool may provide aforecast for performance after the merger, based on similar patternsthat were used to train the model as to how to characterize, process andgenerate an output prediction for such models.

As another example, for a stock associated with the restaurant, thechange in pandemic status of the coronavirus from a more severesituation to a less severe situation may influence consumer preferenceto return to in person dining. The inclusion of such information may bemore sensitive for certain industries or companies. In the case ofcoronavirus, the industries of travel, leisure, dining or others may bemore sensitive as compared with other industries; the present exampleimplementations are capable of performing data stabilization to accountfor such changes. Without the foregoing approaches of the exampleimplementation which performed normalization, the duplication,classification and data stabilization, the data lacks the necessaryaccuracy to determine the critical indicator with a sufficiently highdegree of confidence (e.g., clustering to better represent the userpopulation).

FIG. 8 illustrates a process for generating and updating information tothe watch list, in accordance with the example implementations. As itrelates to the user experience described above, the type of criticalindicator as well as the score are continuously updated based on datainputs, on a real-time basis. For example, in the first row revenue islisted as a critical indicator type. However, if there are changes inthe incoming data associated with the company, the exampleimplementations may change the type of critical indicator from revenueto another critical indicator, such as same-store sales, customer base,or other critical indicator.

More specifically, as shown at 800, inputs are provided into thearchitecture described herein. For example, but not by way oflimitation, there is a separate pipeline for each type of signalassociated with a critical indicator, for each company. Thus, in theabove described example, for the first company, there may be multiplepipelines for each of the candidate critical indicators. One pipelinemay be associated with the signal for the revenues, and another may beassociated with consumer spending, or indicators of company performance.

More specifically, at 801 real-time data events from alternative datasources, as explained above are provided. Each of the pipelines istriggered by receiving new data that is relevant to the model. The inputof new data from alternate data sources is described as explained above.These real-time data events are processed according to the exampleimplementations with respect to the architecture to generate a signalbased on the current data. Thus, an updated signal is provided at 803.More specifically, the new data that was received at 801 is provided tothe model of the example implementations. Accordingly, a prediction isgenerated as described above, and is provided as an output signal.

At 805, a strength of the updated signal is evaluated. For example butnot by way of limitation, the output signal, which may be a predictionof the potential critical indicator, is compared with benchmarkconsensus signals. According to one example implementation, the updatedsignal may be a predicted revenue for a company, which is compared witha prediction generated by one or more analysts, or an analyst consensus,from available information. Based on the comparison between the updatedsignal and the benchmark signal, a signal strength vector is generated,which is indicative of a relative degree of closeness between theupdated signal and the benchmark signal.

At 807, the strength of the updated signal is classified. Morespecifically, the signal strength vector generated at 805 is classifiedinto a recommendation. For example but not by way of limitation, therecommendation may be a one-dimensional actionable recommendation, suchas hold, buy or sell.

At 809, the classification associated with the strength of signal isused to generate any updates, which are subsequently provided anddisplayed to the user in the user experience. More specifically, theuser interface, such as the web interface, a mobile interface, or apushed alert may be updated with the results of the signal strengthclassification, as well as the watchlist update. Thus, according to anexample implementation, the user may be provided with a change in thecritical indicator type, as well as a change in the recommendation,depending on which of the pipelines has the strongest vector.Optionally, plural pipelines may be blended or weighted based on thesignal strength, to provide the blended result, with the criticalindicator being listed as the most heavily weighted indicator. Accordingto another example implementation, plural indicators may all be listed,along with plural outputs of the results, followed by a recommendationbased on a matrix operation or multiplexing of the strength vector,weighted or unweighted, associated with each of the pipelines for eachof the signals for each of the companies.

According to this example implementation, the user may be provided withreal-time changes in critical indicator, performance and recommendationthat are actionable. As explained below, the recommendations may also beprovided in the detailed analysis of a company, or a chain of alerts andmay be used for the recommendation or actual action automatically beingtaken.

The above-disclosed hardware implementations may be used to process thewatchlist of FIGS. 7-8, as would be understood by those skilled in theart. More specifically, For example, but not by way of limitation,external data fetching according to the example implementationsdescribed herein may be performed by copying data from an external thirdparty (e.g., vendor), and storing the data in a cloud storage container.The data fetching process may be managed by a scheduling server, and/ora serverless compute service that executes operations to manage theexternal data storage and the associated compute resources. Further, theextraction, transformation and loading of data as described herein maybe executed by a batch management processor or service. Batch computingis the execution of a series of executable instructions (“jobs”) on oneor more processors without manual intervention by a user, e.g.,automatically. Input parameters maybe pre-defined through scripts,command-line arguments, control files, or job control language. A batchjob may be associated with completion of preceding jobs, or theavailability of certain inputs. Thus, the sequencing and scheduling ofmultiple jobs is critical. Optionally, batch processing may not beperformed with interactive processing. For example, the batch managementprocessor or service may permits a user to create a job queue and jobdefinition, and then to execute the job definition and review theresults. According to an example implementation a batch cluster includes256 CPUs, and an ETL-dedicated server having 64 cores and 312 GB of RAM.The number of running instances may be 1. The foregoing ETLinfrastructure may also be applied to the process of insight extraction.Further, an API is provided for data access. For example but not by wayof limitation, the REST API, which conforms to a REST style architectureand allows for interaction with RESTful resources, may be executed on aservice. The service may include, but is not limited to, hardware suchas 1 vCPU, 2 GB RAM, 10 GB SSD disk, and a minimum of two runninginstances. The API may be exposed to the Internet via an onlineapplication load balancer, which is elastic and permits configurationand routing of an incoming end-user to online applications based in thecloud, optionally pushing traffic across multiple targets in multipleavailability zones. The caching layer may be provided by a fast contentdelivery network (CDN) service, which may securely deliver the datadescribed herein with low latency and high transfer speeds. According tothe example implementations, containers may be run without having tomanage servers or clusters of instances, such that there is no need toprovision, configure, or scale clusters on virtual machines to executeoperations associated with containers.

Performance and Recommendation

As shown in FIG. 9, according to another example user experience 900,any of the companies shown in the foregoing user experience of FIG. 7may be selected for providing a further summary. Here, the fourth row isselected, and further information associated with the forecast isprovided. A recommendation 905 is provided, in this case “strong buy”based on a decrease in the revenue.

Further details 903 are provided to the user, such as the relativeimpact of revenue on the stock price (e.g., correlation between revenueand stock price), and the prediction accuracy for the stock associatedwith the example implementations. Information on the forecast based onthe analyst expectation is provided, in comparison to the forecast basedon the real data measurement, as well as the score associated with theperformance that is based on the real data measurement. Charts 907 areprovided showing a comparison of the revenue based on real datameasurement, as compared with the expected revenues, which may be basedon published information that was provided by the company. Additionally,information of the stock prices also provided.

FIG. 10 illustrates a process 1000 for generating an output thatvisualizes a difference between expected values and actual valuesaccording to the example implementations.

At 1001, measured sales are provided. First applicable not by way oflimitation, as disclosed above, the measure sale may include companysale that are calculated, such as in the second phase 303 as shown inFIG. 3, and disclosed above.

At 1003, expected sales are provided. The expected sales may be based onanalyst prediction, analyst consensus, industry publication, or otheravailable information associated with the providing of expected salesinformation, as opposed to actual sales information.

At 1005, for the measured sales obtained at 1001, and aggregationoperation is performed. More specifically, the measured sales areaggregated based on time series into intervals that are comparable withinterval associated with the expected sales signal. For example but notby way of limitation, if the expected sales signal has a known timeinterval such as daily, weekly, hourly, quarterly, etc., the measuredsales are aggregated into comparable time periods.

At 1007, a scaling operation is performed. More specifically, becausethe measured sales provide information from a sample of the population,the measured sales need to be scaled. For example but not by way oflimit deletion, the scaling may involve extrapolating a samplerepresentative population associated with the sample, and similarly toextrapolation of the aggregated sales of that population of the sampleto the representative population.

At 1009, the periods associated with the scaled, aggregated informationof measured sales from 1001, 1005 and 1007 are aligned with the periodof the expected sales of 1003. Accordingly, the aggregated, scalemeasured sales are joined with the expected sales, by time interval.

At 1011, a visualization operation is performed. Accordingly, an outputmay be provided to a user in the form of a bar plot 1013, a line plot1015 or any other visualization technique 1017th as would be understoodby those skilled in the art. Visualization techniques are not limited toa single approach, and different visualization techniques may becombined, appended, mixed or blended. Further, instead a graphicvisualization approach, a text output may be provided in the form of anarrative chart that simply displays the result.

FIG. 11 illustrates an example graphical visualization associated withthe example implantations described above. More specifically, at 1100, achart is provided that displays sales revenue on a weekly basis over a12 week period. At 1101, the aggregated information of the measuredsales, which has been aligned to a weekly period, is displayed.Additionally, at 1103, the expected sales, provided on a weeklyinterval, is displayed. Accordingly, a user may be provided with adisplay that illustrates a difference between the measured sales asassociated with the example implementations herein, and the expectedsales, as provided by analysts, analyst consensus, etc.

Returning to FIG. 9, the charts 907 include a revenue comparison. Thus,the user can visualize, and understand by looking at the detailinformation and 903, that the measured revenue is about 6.2% higher thanthe forecast based on the expectation by the analysts. Thus, the exampleimplementations provide a determination that the entity is overperforming as compared with the analyst expectation. As a result, theexample implementations generate a recommendation of “strong buy” at905, in the manner explained above.

The above-disclosed hardware implementations may be used to process theevaluation and recommendation operations associated with FIGS. 9-10, aswould be understood by those skilled in the art. More specifically, Forexample, but not by way of limitation, external data fetching accordingto the example implementations described herein may be performed bycopying data from an external third party (e.g., vendor), and storingthe data in a cloud storage container. The data fetching process may bemanaged by a scheduling server, and/or a serverless compute service thatexecutes operations to manage the external data storage and theassociated compute resources. Further, the extraction, transformationand loading of data as described herein may be executed by a batchmanagement processor or service. Batch computing is the execution of aseries of executable instructions (“jobs”) on one or more processorswithout manual intervention by a user, e.g., automatically. Inputparameters maybe pre-defined through scripts, command-line arguments,control files, or job control language. A batch job may be associatedwith completion of preceding jobs, or the availability of certaininputs. Thus, the sequencing and scheduling of multiple jobs iscritical. Optionally, batch processing may not be performed withinteractive processing. For example, the batch management processor orservice may permits a user to create a job queue and job definition, andthen to execute the job definition and review the results. According toan example implementation a batch cluster includes 256 CPUs, and anETL-dedicated server having 64 cores and 312 GB of RAM. The number ofrunning instances may be 1. The foregoing ETL infrastructure may also beapplied to the process of insight extraction. Further, an API isprovided for data access. For example but not by way of limitation, theREST API, which conforms to a REST style architecture and allows forinteraction with RESTful resources, may be executed on a service. Theservice may include, but is not limited to, hardware such as 1 vCPU, 2GB RAM, 10 GB SSD disk, and a minimum of two running instances. The APImay be exposed to the Internet via an online application load balancer,which is elastic and permits configuration and routing of an incomingend-user to online applications based in the cloud, optionally pushingtraffic across multiple targets in multiple availability zones. Thecaching layer may be provided by a fast content delivery network (CDN)service, which may securely deliver the data described herein with lowlatency and high transfer speeds. According to the exampleimplementations, containers may be run without having to manage serversor clusters of instances, such that there is no need to provision,configure, or scale clusters on virtual machines to execute operationsassociated with containers.

Alert Chain

As shown in FIG. 12, according to yet another user experience associated1200 with the example implementation, alerts are provided to the user.The selected alerts are listed in rows, divided into the alerts specificto the user 1201 and an aggregated list of the most popular alerts 1213across all of the users. As previously disclosed, a column is providedfor the name and stock symbol of the company, as well as the type 1203of information that is the basis for the alert, the condition 1205 thattriggers the alert, and the frequency 1207 of the alert to be provided.The user is provided with a tool 1209 to set the alert to active orinactive, to a tool 1211 to edit the alert, and to delete the alert.

For example but not by way of limitation, as shown in the first row, thealert may be based on the performance being greater than 5%. As shown inthe second row, plural alerts are provided to be associated with asingle company, in this case the price moving above 5% and the scorehaving a value of “over performing”. Similarly, a time-based alert maybe provided, such as the user being provided at an alert 10 days beforean earning call, as shown with respect to the third row. Accordingly,the user is provided with a chain of alerts that may be triggered by oneor more conditions associated with a company.

As also shown in FIG. 12, users may be able to view the most popularalerts 1213 that are being generated across the user base, as well asthe number of users 1215 that are generating and using those alerts.Detailed information such as type, condition and frequency each of thosepopular alerts is provided. The user is provided with an option to addthose alerts to their own user alert chain as shown by the “+” symbol1217.

FIG. 13 illustrates operations 1300 associated with the processing ofthe chain of alerts. For example, as explained above, a type, condition,performance, price and score can be processed as data, to determinewhether to provide the user with an alert. Further, the user may viewand consider the alerts being used by the overall community of users, tobenefit from alerts generated by others. According to the exampleimplementations, the user may subscribe to such a rule, and thus bealerted in response to changes in the signals described above.

At 1301, a signal update is performed. More specifically, as explainedabove with respect to FIG. 8 at 803, signal updating is performed. Forexample but not by way of limitation, and output of the watchlist may beprovided, including but not limited to the signal strength vector andthe signal strength classification.

At 1303, the output of 1301, such as the absolute values of the signal,or relative values of a signal as compared with the previous signalupdate are applied to the deterministic rules. For example but not byway of limitation, if a revenue has increased by 2% as compared with theprevious signal update, and the user set a rule to provide an alert whenthe revenue has increased by 2% or more for a given company, the rulemay be triggered. Similar or other deterministic rules, as disclosedabove with respect to FIG. 12, are processed in real time as the updatedinformation of 1301 is provided. Accordingly, the probabilistic outputof the watchlist is applied to the deterministic rule base of the user,and an alert is either triggered or not triggered with each real-timeupdate.

At 1305, a notification generation operations performed. Morespecifically, based on the user rule-based, a custom notificationpayload is generated for the user. For example but not by way oflimitation, if a user has determined that for a revenue that hasincreased by 2% or more compared to the previous signal update, the usershould receive an alert to sell a stock cut, such a notification payloadis generated.

At 1307, the notification is distributed to the user. The distributionchannel may be set to one or more modes, including but not limited tomobile application notification, email, simplified messaging service, orother communications means. Accordingly, a notification is pushed to auser in the desired manner of the user, containing the recommendationassociated with the rule, which is triggered based on the real-timesignal update provided to the rule-base.

While some example implementations may provide a recommendation, in realtime, based on the real-time measurement of data collection, pricechecking and calculation, to provide the addition, the exampleimplementations are not limited to recommendations. The foregoingexample implementations may be integrated with approaches that providefor automatic trading, such that the user need not provided input forand execution of a decision.

FIG. 14 illustrates a process 1400 associated with decision executionaccording to the example implementations. More specifically, instead ofthe user receiving and reviewing the signal classification and signalstrength vector to receive an alert, an automatic system is providedthat applies artificial intelligence techniques such as machine learningin a neural network to convert the signal classification and signalstrength vector into a decision signal that can be submitted forexecution of the decision. For example but not by way of limitation, thesignal may be converted to a trading order for a brokerage service.

At 1401, in accordance with the foregoing example implementations,measured data is received from a plurality of alternate data sources,and processed on a real-time, automatic basis to provide real-timeupdates for the critical indicators.

At 1403, the updates are input into a trading model equal but not by wayof limitation, the trading model may include an artificial intelligenceapproach such as machine learning in a neural network to provide tradingdecision-making. According to an example implementation, the tradingmodel may be a neural network that is trained on historical stock pricesand a history of signal updates associated with the measured signalaccording to the example Tatian. The input to the trading model is thesignal data, and the current state of the user account. For example, ifthe user has open or pending orders associated with a purchase or sale,the model takes this information into consideration. As an output, thetrading model 1403 provides a decision or an action, instead of an alertor a recommendation as is done in other example implementations.

At 1405, an order is created. For example, the order may be created bysubmitting an automated request to a seller, including but not limitedto a brokerage service, and optionally confirming the order with theuser. For the user confirmation, this may optionally be provided by anotification distribution channel, as explained above with respect toFIG. 13.

At 1407, the system performs an operation to determine whether userreview is required. If no user review is required, the order is executedat 1409. For example, the order created at 1405 may be executed with aseller, such as a brokerage service.

Alternatively, if at 1407 it is determined that user review is requiredbuyer, the confirmation request is sent at 1411, as explained abovethrough a notification distribution channel. If the user confirms theorder at 1411, the order is executed at 1409. If the user does notconfirm the order of 1411, the order is considered to be rejected, andcancel at 1413.

More specifically, the user may be provided with a regular notification,such as a push notification. The regular notification may be periodic,such as every day, or every morning of every day at the same time. Thepush notification may include, but is not limited to informationassociated with a data condition. For example but not by way oflimitation, if, based on the foregoing example implementations, it isdetermined that the company in question is forecast to not meet anexpected condition, such as missing an earnings call, based on theforecast associated with the signal, the user may be informed of thatdata condition. Further, the user may be provided with an indication ofthe degree of confidence. In one example implementation, the user may beprovided with a confidence score in terms of percentage.

Additionally, according to the example implementations, the pushnotification may include a selectable option that only requires a singleuser action to make a decision based on the information provided in thepush notification. For example but not by way of limitation, the usermay be provided with the question of “do you wish to invest?” followedby a selectable option of “yes” or “no”.

If the user selects the option of “yes”, a purchase order is executedbased on predefined user settings, such as the user preferences.According to one example implementation, if the user has included, inhis or her user settings associated with the online application, adefault setting to immediately execute the order, then the order will besubmitted as soon as the user has made the selection without delay.According to another example implementation, the order may be executedacross a time period, such as the business day. According to one exampleimplementation, a user may include in his or her user preferences, adefault setting to make a purchase for a prescribed amount, such as $1million, at even intervals over the course of the day.

Optionally, the default setting may allow the user to adjust theproportion of orders over the course of the day to be at unevenintervals, such as closely bunched at 20 minute intervals during acertain part of the day, and spread out over longer intervals of one ortwo hours during another part of the day. Also optionally, the defaultsetting may allow the user to adjust the amount of each order to also beeven over the course of a day, such that the amount of investment isfrontloaded towards the beginning of the day and gradually decreasingover the course of the day, backloaded to the end of the day andgradually increasing over the course of the day, matching to a profilecurve defined by the user, matching to a prediction of an increase ordecrease in the stock price at the next interval, based on an output ofthe recommendation in the foregoing example implementations that providethe forecast, or other user determined default setting.

Similarly, the user settings may provide the a limit order in thedefault, such that if the price exceeds a limit price, the order is nolonger executed for the rest of the day. Thus, according to one exampleimplementation, if a user selects “yes” to purchase $1000 of a stockdivided evenly over five hours, with a $200 order being placed everyhour, and the stock price than exceeds the limit price during the thirdhour, then the fourth hour order of $200 will not be executed if thestock price continues to exceed the limit price. Similarly, at the fifthhour, if the stock price exceeds the limit price, that fifth hour orderwill not be placed.

With respect to the execution of the order, the user may provide, in thedefault settings, one or more default service providers, such as abroker. Further, the user may provide one or more stock exchanges uponwhich to execute the order. The user may specify a percentage of anoverall order to be placed with each of the brokers that is even,uneven, or proportionally divided automatically based on pastperformance relative to past recommendation.

As for the order size, the user default setting may provide for apredetermined order size, such as 100 shares, or a predetermined amount,such as $1000 worth of shares. Thus, the user need not decide the numberof shares, the amount of the shares, which broker or brokers or stockexchanges to contact, the timing of the order placement and execution,the proportionality or evenness of the timing or amounts over a time,because those parameters are already determined based on the previouslyprovided user settings. Accordingly, the user only need select “yes” or“no”, to execute the order according to the default user settingsdetermined by the user.

While the foregoing example implementation refers to a single stock anda single user action associated with making a purchase of that singlestock, the example implementations are not limited thereto. For examplebut not by way of limitation, the user may receive multiple pushnotifications, either time simultaneously or spread out over time basedon a desired user preference, each associated with a different company.The companies to the provided in the push notification to the user maybe determined based on the user preferences, such as those with aconfidence score above a certain percentage, those on a list ofinterested or tracked companies by the user as shown in the foregoinguser experience implementations, or those having a difference betweenthe forecast value as determined by the example implementations ascompared with the expected earnings call that has been published by aprescribed threshold.

In addition to a one to one relationship between the user action and thetrade execution, the user may be provided with an option to execute allof the multiple push notifications that are provided together, with asingle decision, by selecting an option such as “yes to all”. If such anoption is selected, then all of the orders will be executed according tothe predefined user preferences as explained above.

The foregoing example implementations may provide a push notification bymodes known to those skilled in the art. For example but not by way oflimitation, the push notification may be provided by email, text messageor SMS (short message service), chat via online social networkingservice, or the like. Further, the push notification may be provided notjust in a visual presentation, but alternatively or conjunctively as anaudio message, such as by a speaker in a home device, such as AmazonAlexa or the like.

Further, the foregoing example implementations may provide the optionduring transport, such as to a driver receiving the signals, such as viaa telecommunications network including but not limited to a 5G network.Thus, the driver, by audio communication with a speaker and microphoneor other input/output devices would be understood by those skilled inthe art, may execute, by a single voice command, the instruction toexecute the order as explained above. Similarly, a passenger may alsouse the system. Thus, the example implementations may provide forhands-free placing of an order.

Additionally, while the example implementations may be implemented on amobile communication device such as a smart phone, the exampleimplementations are not limited thereto. For example but not by way oflimitation, the user settings may provide the user with control over thesingle action purchase modes, so as to require the user to join from anauthenticated device, such as by requiring two factor authenticationprior to accessing the recommendations, or the push notifications, or toprovide a privacy preserving aspect, such that other form ofauthentication, such as login, biometric, second factor or other aspectis required to receive the push notification. Similarly, in place of theuser providing an audio response or selecting a specific option on ascreen, the user may instead use gestures, signals or other biometricsto indicate a decision.

For example but not way of limitation, the user may determine that, inthe user settings, if the first finger is placed on a fingerprintdetector, then the user is indicating that the order should be executed,whereas if a finger other than the first finger is placed on afingerprint detector, then the user is indicating that the order shouldnot be executed. Such an example implementation would allow the user tomake his or her decision in the presence of other individuals who,although they may be able to hear or see the user interface, cannotunderstand whether the single action of the user is a decision toexecute the order not to execute the order. While the foregoing examplerefers to a fingerprint, other gesture or user signal as defined in theuser settings may be employed. Similarly a voice command other than“yes” or “no” may also be used, so as to prevent a third party fromknowing what the user has decided to do simply based on hearing theaudio response of the user. Thus, the privacy of the user is protectedin circumstances where the user interface can be seen or heard byothers.

In terms of hardware, the foregoing example implementations may beimplemented in a client device such as a smart phone, laptop or thelike. Further, and as also explained herein, the foregoing exampleimplementations may be integrated with other devices, such as a device,a processor and memory of an automobile or other vehicle, or otherdevice as would be understood by those skilled in the art. The foregoinguser experiences may be provided by the user in a “user setting” aspectof an online application as parameters that are input by text entry,radio button, checkbox, slider or other visual manner of user input anduser output as would be understood by those skilled in the art.

The example implementations described herein may be executed in the formof machine readable executable instructions stored in a memory, whichare configured to access the predefined user settings, which may bestored, such as in a database, either locally or remotely in the cloudfor example, such that the user settings may be accessed by one or moredevices as are authorized by the user to execute the instructions.Instructions may also be provided in the form of an online userapplication.

Before the foregoing example implementations are executed to provide thepush notification, the user must enter the default user settings. Whenthe online application is installed, a default series of settings may beprovided based on a profile of information associated with the user. Forexample but not by way of limitation, if the user self identifies theirrisk level as high, medium or low, then a default setting may beselected from a corresponding set of predefined profiles, based onaggregated information of other users in association with their riskprofiles, to match the default setting of the user with an averagedefault setting for other users having a similar risk profile. Factorsother than the risk may be used to determine the default settings.

Additionally, the user may have multiple default settings, and differentdefault settings may be applied depending on different user situationsthat may be automatically accessed by the online application. Forexample but not by way of limitation, if the online application it isaware that the available cash funds of a user in their bank accountsexceeds a prescribed level, the default settings may be set to one ofthe default settings in which the amounts, frequency, price limit orother aspect of the user settings are adjusted to account for anincreased availability of investment funds, or an increased riskprofile.

Optionally, a user may adjust the settings depending on a date for time,such as before or after earnings announcements, start/end of fiscalyear, or other critical timing as would be understood by those skilledin the art. Similarly, the timing may be based on a condition of theuser, such as after employer payday, after monthly debt payment such asmortgage, credit card, etc., or the like. Similarly, the onlineapplication may prompt the user to select a change among the defaultsettings based on a change in the user's financial situation, such asnew job, layoff, major purchase such as home or vehicle, vacation, orother financial event. Thus, the user's selection of a default settingmay be partially or completed supported or automated. Alternatively,instead of inputting one or more user settings, the user may generate arule base that is applied to the user settings, or that is applieddirectly to the “yes” decision on a push notification.

FIG. 27 illustrates an example process 2700 associated with theforegoing example implementations. More specifically, the exampleprocess 2700 is directed to execution of an order based on a single useraction, wherein the order is executed based on a user condition, and inresponse to a push notification to a user that includes a data conditionat a prompt for a single user action.

At 2701, once an online application has been installed, information thatis associated with a user is received as user setting information. Forexample but not by way of limitation, as explained above, informationassociated with a user's profile, such as risk information, financialinformation, demographic information or other information that isassociated with the user is received by the online application.

At 2703, the user setting is determined. More specifically, the usersetting information received from the user at 2701 is assembled andstored, such as in a database, as a series of preferences, thresholds,parameters or the like. Further, and as explained above, additionalsupport tools or automated processes for determining a user setting,such as current time of a time period, such as end of quarter, end ofyear, payday, before or after major purchase event, or the like, may betaken into account. As an outcome of operation 2703, the user setting isstored in a machine readable form such that it can be accessed andapplied to an order, so as to provide the necessary instructions orexecution of the order without requiring any user input.

At 2705, the example implementations perform processing of the data todetermine a data condition. More specifically, as explained above, aplurality of alternate data inputs of different types are processed andnormalized, and applied to a series of operations in order to generate aforecast or an expected value, or a recommendation. Further, therecommendation, forecast or expected value may also have an associateddegree of confidence. Thus, the data condition is generated, includingthe forecast, expected value or recommendation, as compared withpredicted information, such as expected quarterly earnings, and a degreeof confidence associated with the recommendation, forecast or expectedvalue.

At 2707, the data condition is provided to the user in the form of apush notification, such as SMS, email or the like, as explained above.Further, the user is prompted for a single user action, such as “yes” or“no”. The user must determine only whether to execute an order based onthe provided data condition. The information at 2707 is provided to theuser via a user interface, which as explained above may include but isnot limited to visual and audio inputs.

As 2709, a single user instruction is received. The single-userinstruction is based on a single user action. For example but not by wayof limitation the single-user action is the user selecting “yes” or“no”. This may be done, as explained above by visual or audio input tothe client device, which may include a mobile phone or a laptop, as alsoexplained above.

At 2711, a determination is made as to the instruction associated withthe single-user action. For example but not by way of limitation, it isdetermined whether the single user action is to execute the order or notexecute the order. If the operation at 2711 determines that the singleuser action is an instruction to not execute the order the processterminates.

On the other hand, if the single user action is determined to be aninstruction to execute the order, then at 2713, the order is executedbased on the user setting that was determined at 2703. Morespecifically, the user setting provides information that is includingbut not limited to whether the order is executed immediately or at alater time, whether the order is executed as a single transaction or aplurality of transactions, whether, if a plurality of transactions isrequested, whether the timing and amount are evenly or unevenlydistributed over the course of a day or other time period, and whetherthere are any price limits or other limits, or patterns in the case ofan uneven distribution over the course of the day or other time period,and identity of one or more brokers or markets that constitute serviceproviders, or other user settings as explained above. Thus, the order isexecuted based on a single user action, in association with the usersettings.

At 1415, an operation is performed to update the user portfolio, so asto indicate that the order has been executed. Optionally, the user maybe provided with a report via the communication or distribution channelsexplained above, to confirm that the order was executed, to provide anupdate of the portfolio, and/or to remind the user of any pending oropen orders.

The above-disclosed hardware implementations may be used to process thealert chain disclosed in FIGS. 12-14, as would be understood by thoseskilled in the art. More specifically, For example, but not by way oflimitation, external data fetching according to the exampleimplementations described herein may be performed by copying data froman external third party (e.g., vendor), and storing the data in a cloudstorage container. The data fetching process may be managed by ascheduling server, and/or a serverless compute service that executesoperations to manage the external data storage and the associatedcompute resources. Further, the extraction, transformation and loadingof data as described herein may be executed by a batch managementprocessor or service. Batch computing is the execution of a series ofexecutable instructions (“jobs”) on one or more processors withoutmanual intervention by a user, e.g., automatically. Input parametersmaybe pre-defined through scripts, command-line arguments, controlfiles, or job control language. A batch job may be associated withcompletion of preceding jobs, or the availability of certain inputs.Thus, the sequencing and scheduling of multiple jobs is critical.Optionally, batch processing may not be performed with interactiveprocessing. For example, the batch management processor or service maypermits a user to create a job queue and job definition, and then toexecute the job definition and review the results. According to anexample implementation a batch cluster includes 256 CPUs, and anETL-dedicated server having 64 cores and 312 GB of RAM. The number ofrunning instances may be 1. The foregoing ETL infrastructure may also beapplied to the process of insight extraction. Further, an API isprovided for data access. For example but not by way of limitation, theREST API, which conforms to a REST style architecture and allows forinteraction with RESTful resources, may be executed on a service. Theservice may include, but is not limited to, hardware such as 1 vCPU, 2GB RAM, 10 GB SSD disk, and a minimum of two running instances. The APImay be exposed to the Internet via an online application load balancer,which is elastic and permits configuration and routing of an incomingend-user to online applications based in the cloud, optionally pushingtraffic across multiple targets in multiple availability zones. Thecaching layer may be provided by a fast content delivery network (CDN)service, which may securely deliver the data described herein with lowlatency and high transfer speeds. According to the exampleimplementations, containers may be run without having to manage serversor clusters of instances, such that there is no need to provision,configure, or scale clusters on virtual machines to execute operationsassociated with containers.

The foregoing example implementation of the automatic trading aspects isperformed continuously and in real time. Thus, plural orders may besimultaneously executed, or may be in different stages of execution. Tothe extent that confirmation by the user is requested, the user maydecide to execute some orders, reject other orders, and to not make itmake patient keep still other orders pending. To the extent thatconfirmation is not required by the user, automatic execution maycontinue without providing the user with any review prior to the executeacute the notification of pending order or current portfolio immediatelyafter the execution. Implementation, when review is not required by theuser, another subject that is not military. A require, a change inavailability on, that is the identity for justice, or that of entityside of order exceeds a prescribed on individual or periodic purchaseamount.

The foregoing example implementations automatically perform adetermination of the critical indicator type, provide a calculation ofperformance, and generate a score, for each of the listed companies. Forthe foregoing example implementation of the user experience,determination of the leading indicator, and comparison of performance isprovided on a real-time basis. As explained above, a mixture ofrule-based, deterministic approach is blended with a probabilisticapproach, such as the artificial intelligence neural network approachesdescribed herein. The architecture may be executed on a big data server,such as in a server farm or in the cloud. Accordingly, the signals areprocessed as they are received, in real-time, in contrast to related artapproaches, which perform batch processing. Further, cloud computing mayalso be used. To the extent that the necessary processing power isavailable, the signal processing associated with the exampleimplementations may be performed on a standalone machine. Due to thepresent example implementations being able to provide real-timeinformation, a user may be able to receive the recommendation andexecute a decision in a timely manner that provides for a significantimpact on the return on investment. In contrast, related art approachesdo not take into consideration the processing of the real-time measureddata, instead only use expected data information.

While the foregoing example implementations are shown on a screen of adisplay such as a laptop or desktop computer, the exampleimplementations are not limited to the or two in terms of the userexperience. For example but not by way of limitation, a user experienceassociated with a mobile device may be substituted for or used incombination with the foregoing example user experiences. FIGS. 15-16illustrate such example implementations associated with a mobile device.

Additionally, FIGS. 28 and 29 illustrate additional user experiencesassociated with the example implementations. For example, FIG. 28illustrates interfaces 2800. More specifically, at 2801, a comparisonbetween company performance and industry performance is shown. Morespecifically, a P/L comparison is generated based on the output providedby the foregoing example implementations, based on the alternate datasources as processed by the architecture and operations described hereinto generate the expected P/L value based on the signals. As can be seen,the company is shown to be performing well above the industry level. At2803, a P/L comparison for an industry section that provides the analystcomparison (e.g., overperforming, underperforming, neutral) as comparedwith the expected P/L value generated by the signals according to theexample implementations.

FIG. 29 provides a user interface associated with a comparison 2900 ofthe companies on the watchlist as disclosed herein. More specifically,the result per stock is shown over a prescribed time period, e.g., mostrecent quarter. As can be seen, each of the companies is shown, alongwith the metric that forms the basis of the evaluation, the strategyselection, and the P/L result over the period. The comparative resultsare graphically illustrated. Thus, a plurality of companies may becompared using data that has been processed and normalized as explainedabove, while retaining the ability to evaluate each company based on itsmost critical and/or sensitive parameter with respect to companyfinancial performance, as also explained above.

The foregoing example implementations may also be used to provide userswith a discount for goods and or services associated with a company. Thediscount may take the form of a rebate, a reward, a price reduction orother form of benefit or compensation to a user. For example but not byway of limitation, the discount may be provided to a user based on theamount for number of transactions by the user on the account of thecompany shown in the example user experience, for which the exampleimplementations are performing the foregoing operations on the foregoingstructures.

Optionally, according to the example implementations, a feedback loopmay be provided. More specifically, a user may provide input on theoutcomes and recommendations of the model, which may be used tocalibrate the model. For example, but not by way of limitation, if,based on the critical parameter or indicator, combined with aperformance, a recommendation has been set with which the userdisagrees, the user may provide a suggestion for feedback into thesystem. The user may suggest that the critical indicator is notappropriate, and instead suggest another critical indicator, as well asbeing able to suggest that the recommendation is not a desirablerecommendation. According to one example implementation, a user mayindicate that an appropriate critical indicator of social media or anonline service may not be user engagement or number of users alone, butmay instead be related to online advertising, clicks or some otherparameter. This feedback may be used by the system to retrain orrecalibrate the forecasting tools, so as to adjust according to consumerpreferences and demands.

Optionally, an automated trading tool may be provided that implementscertain recommendations under certain circumstances. For example, butnot by way of limitation, for items on the watchlist that are also onthe alert chain, the instruction from the user in the user preferencesmay indicate that a particular stock should be bought or sold when oneor more of the conditions in the alert chain have been met. Optionally,the user may create a completely different and separate alert chain forautomatically trading, as well as for providing alerts. Thus, sales andpurchases may be executed by the user automatically, thus avoiding anydelay, and immediately providing such instruction. Such a system may bevaluable during certain use cases. For example, but not by way oflimitation, the automated trading tool could be valuable when the useris traveling or on vacation, during peak periods of activity or intensefinancial news, such that the user cannot quickly or in a timely manneract on alerts or recommendations, or simply for user convenience.

According to the example implementations, the automated trading tool mayinclude receiving, by an online application associated with a userdevice, user preference information; based on the received userpreference information, determining one or more user settings, whereinthe one or more user settings is assembled and stored in a database, asa series of preferences, thresholds, or parameters, and in a machinereadable form such that it can be accessed and applied to the automateduser request, so that the automated user request is executed withoutuser input of the user preferences at a time of the automated userrequest; processing data to determine a data condition, wherein, todetermine the data condition, a plurality of alternate data inputs ofdifferent types are processed and normalized, and applied to a series ofoperations in order to generate a forecast or an expected value or arecommendation having a degree of confidence, and the data condition iscompared with third party information; generating an electronicnotification indicative of the data condition, wherein the electronicnotification includes the data condition compared with the third partyinformation, a confidence indicator associated with the data condition,and a query to perform a single action; in response to an automateddetermination to perform the single action, the user device generatingan automated instruction to execute the automated user request; andbased on the automated instruction, executing the automated user requestbased on the determined one or more user settings that includeinformation on whether the order is executed immediately or at a latertime, whether the order is executed as a single transaction or aplurality of transactions, whether, if a plurality of transactions isrequested, whether the timing and amount are evenly or unevenlydistributed over the course of a time period, whether there are anyprice limits, or patterns in the case of an uneven distribution of theamount over the course of the time period, and an identity of the one ormore brokers or the one or more markets.

Also optionally, in addition to the company financial data being used asexplained above, other publicly available data associated with a companymay also be used. For example, but not by way of limitation, the publicfacing announcements, social media posts, public presentations, or otherinformation may be sensed or detected for leaders of a companyassociated with one or more social media accounts, industry events, newsreleases or publications, or other information. This information may incombined into the sentiment analysis.

The foregoing example implementations may have various advantages and/orbenefits. For example, but not by way of limitation, the exampleimplementations may provide a way of determining performanceautomatically and in real time. Related art approaches may conductmanual research and generate performance indication manually over aperiod of many hours in many days, and an investment advisor maymanually determine a score. However, the related art approaches do nothave any way of taking disparate data from different data sources,performing operations on the data such as normalization, de-duplication,classification and optionally others, applying the refined data to aforecasting tool, and generating a forecast or recommendation based on adetermination that a particular indicator is critical, all automaticallyand all in real time.

This distinction is crucial, because the information and recommendationsmust be provided in real time in order for a user to be able toeffectively make decisions and execute the decisions in a timely manner,before the forecast has again changed due to the passage of time, thedispersion of information, new information or other events. Thereal-continuous determination and recalculation and re-forecastingprovides information and recommendations that is precise, accurate andavailable for decision support to the user.

Data Cleaning and Pipelining

According to the foregoing example implementations, users are sourced tocreate a panel. As provided herein, a panel may be selected according tothe following selection process.

An optimal panel to be used for forecast may be generated. Morespecifically, the selection process includes performing a filteroperation on the candidate users for the panel. For example, but not byway of limitation, the filter operation may be performed by theapplication of a filter, so as to generate a panel meeting one or morecriteria. According to the present example implementation, the criteriamay include, but are not limited to, the panel including users that arerepresentative of a population (e.g., US population) for theirgeolocation, with a substantially stable number of purchases from astarting date to an ending date (e.g., 2011 to the current date), with aconsistent number of transactions. Optionally, outliers and duplicatesmay also be removed.

As shown in FIG. 17, a selection process 1700 may be performed.Initially, the pool of candidate users is a fragmented panel consistingof 60 million users at 1701. After a first filter process performs thefiltering operation such that the pool of candidate users isrepresentative of the population for their geolocation, the filteredpool is narrowed to 15 million users at 1703. Subsequently, anotherfilter operation is performed to confirm a stable number of purchasesover a time interval, further narrowing the pool of candidate users to 4million users at 1705. At 1707, outliers and duplicates may be removed,and a filter operation may be performed for a consistent number oftransactions, to produce an optimal panel of 1.5 million users.

FIG. 18 illustrates a data pipeline according to an exampleimplementation. At 801, data normalization is performed. Data that isreceived from different institutions may have different structures. Inorder to properly use the data from the different institutions, the datamust be normalized with a fixed format. More specifically, the data istransformed from a text format into a distributed database that isdesigned to operate on top of the transactions.

At 1803, a data cleaning operation is performed. More specifically, thedata that is not required or desired for the data processing pipeline1800 is removed. For example but not by way of limitation, duplicatedtransactions, duplicated accounts and duplicated users are identifiedand removed. Further, incomplete data, such as incomplete transactionswith missing data, are also removed from the data. Accordingly, and asexplained above with respect to panel selection, the base of users thatfollows the selection process and filter operation is maintained in theuser database, and the outliers and duplicates are removed.

After the data cleaning 1803 has been completed, a classificationoperation 1805 is performed. In this operation, each of the transactionsin the database is classified. The classification is performed byanalyzing the description of the transaction, and associating a correctmerchant name with the description. In this operation, the quality ofthe association directly and critically influences the quality of thecorrelation and rejections that will be described further below. Morespecifically, to reach a desired accuracy, such as close to 100%, acombination of automated machine learning algorithms is combined withmanual human controls.

As an example of the foregoing classification operation 1805, an exampleextract is provided. According to one example implementation, an averagemonthly volume of processing may be more than 200 million transactions;each of those transactions must be associated with a correct company.

FIG. 19 illustrates the example extract. As can be seen in the exampleextract 1900, the name of the merchant is found in each of thetransactions.

Once the cleaned data has been classified as explained above, a modelingoperation 1807 is performed. More specifically, the modeling operation1807 generates forecasts. As inputs, the modeling operation 1807 appliesdata output from the classification 1805, as well as third-party input,for example Bloomberg data 1809. In the modeling operation 1807, manyforecasts are combined, to obtain an optimal results. The modelingoperation 1807 is specialized to a category associated with the company.Further, the modeling operation 1807 compensates for various biasfactors, such as seasonality and the like.

FIG. 20 illustrates an example implementation 2000 associated with themodeling operation 1807. More specifically, a plurality of sets ofpanels 2001, subject to the foregoing operations of the data pipeline1800, are provided to the plurality of corresponding sets of forecasts2003; outputs of the sets of forecasts 2003 are provided to pluralassemblers 2005, to generate a final forecast 2007.

In the modeling operation 1807, different categories of companies mayrequire different algorithms to generate the forecasts. For, but not byway of limitation, the algorithms must incorporate the differentbehavior of consumers for the different structures of revenue within acompany. Some of the categories may include, but are not limited to,fully owned restaurants, franchise restaurants, supermarket chains,insurance, and other companies.

The modeling operation 1807 also provides for bias correction. Forexample but not by way of limitation, the panel data may includehistorical data of several years, from thousands of users that sharedtheir data in exchange for a token or reward. Such an approach toobtaining the data allowed for a more complete understanding of the biasimpacted by the panels that are not randomized, and algorithms for thecorrection of the bias.

FIG. 21 illustrates a user experience 2100 associated with obtaining theinformation. At 2101, a user is provided with an input screen to inputdata and enter a referral code, as well as a number of points that maybe associated with completing the survey. At 2103, the completion of thesurvey by the user results in the number of points being increased, andan option for selection of a bank where the points may be deposited, aswell as a privacy statement.

To perform bias correction, historical data points are analyzed, todetermine how the bias behaves across time. According to one exampleimplementation, 9 algorithms were created for adjusting the bias in thedata. Then, those 9 algorithms were combined with three other algorithmsthat are used for tickers, and that are less impacted by the bias.

At 1811, an output of the modeling is provided to make predictions. Morespecifically, the data is aggregated and inserted in a database. Thedata in the database can be accessed and used by other rules, such astraders, and further retrieved for validation, back testing, etc.

Additionally, the data pipeline 1800 includes anomaly detection1813-1819. More specifically, an output of each of the elements of thedata pipeline is subject to anomaly detection, to identify anomaliesthat may compromise final predictions. As an example of the anomalydetection 1813-1819, dataflow anomalies in the pipeline chain mayexamine technical anomalies as well as data anomalies.

For example, but not by way of limitation, anomalies in the behavior ofa company for which forecasting is being performed may be analyzed andprovided, including, but not limited to the following:

1. Acquisitions or divestitures, sourced from third-party news sources

2. Changes in requirements that would result in different companybehavior, such as accounting standards, sourced from, for example, butnot by way of limitation, SEC (Securities and Exchange Commission)files.

3. Change in a ratio between franchisees and stores owned individually

4. A different duration of a quarter, such as changing from 90 days to97 days

5. Special sales promotions or other promotional activities for weeks,which may vary from quarter to quarter

6. Releases of new products by companies.

According to an example implementation, representativeness isconsidered. More specifically, according to a specific example, in 2019the US population was about 330 million individuals, with the averagefamily size being 3.14 members, such that there are roughly 105 millionfamilies, some studies indicating the number to be as high as 128million families. In the example implementations, the ratio between thenumber of US households and the best panel is roughly 70 to 85. Further,the ratio between the declared revenues of companies and the totalamount of purchases in the panel is between about 70 and 90. This ratiois consistent with the expected value, and is consistent acrossdifferent companies, such that the proportion of consumers is properlymaintained the panels according to example implementations.

FIGS. 22A and 22B illustrate various examples of comparison with data.FIG. 22A includes franchising examples, and FIG. 22B includes examplesof companies with a history of acquisitions, or anomalies.

FIG. 23 illustrates a comparison between results according to theexample implementations and the related art approaches. As can be seenin the column indicated as “DF” for the example implementations, and“1010 Data” for the related art approaches, a substantial difference inthe forecasting results shows substantially improved performance for theexample implementations.

FIG. 24 illustrates the technical basis according to statistical methodsfor the determination of the panel size, and the measurement of the realstatistical error.

From the central limit theorem, the theoretical % error for the forecastis given by

${E\mspace{14mu}\%} \propto {\frac{1}{\sqrt{N}}\frac{s}{\overset{¯}{x}}}$

The Error % in the forecast is proportional to the sample standarddeviation of the purchases and inverse to the square root of thepurchase number and the average amount.

That means that the panel size is adequate to generate accuratepredictions.

The real statistical error is even smaller, because we use thepreviously released revenues to correct and adjust the data.

The above-disclosed hardware implementations may be used to process theoperations of FIGS. 18-24, as would be understood by those skilled inthe art. More specifically, For example, but not by way of limitation,external data fetching according to the example implementationsdescribed herein may be performed by copying data from an external thirdparty (e.g., vendor), and storing the data in a cloud storage container.The data fetching process may be managed by a scheduling server, and/ora serverless compute service that executes operations to manage theexternal data storage and the associated compute resources. Further, theextraction, transformation and loading of data as described herein maybe executed by a batch management processor or service. Batch computingis the execution of a series of executable instructions (“jobs”) on oneor more processors without manual intervention by a user, e.g.,automatically. Input parameters maybe pre-defined through scripts,command-line arguments, control files, or job control language. A batchjob may be associated with completion of preceding jobs, or theavailability of certain inputs. Thus, the sequencing and scheduling ofmultiple jobs is critical. Optionally, batch processing may not beperformed with interactive processing. For example, the batch managementprocessor or service may permits a user to create a job queue and jobdefinition, and then to execute the job definition and review theresults. According to an example implementation a batch cluster includes256 CPUs, and an ETL-dedicated server having 64 cores and 312 GB of RAM.The number of running instances may be 1. The foregoing ETLinfrastructure may also be applied to the process of insight extraction.Further, an API is provided for data access. For example but not by wayof limitation, the REST API, which conforms to a REST style architectureand allows for interaction with RESTful resources, may be executed on aservice. The service may include, but is not limited to, hardware suchas 1 vCPU, 2 GB RAM, 10 GB SSD disk, and a minimum of two runninginstances. The API may be exposed to the Internet via an onlineapplication load balancer, which is elastic and permits configurationand routing of an incoming end-user to online applications based in thecloud, optionally pushing traffic across multiple targets in multipleavailability zones. The caching layer may be provided by a fast contentdelivery network (CDN) service, which may securely deliver the datadescribed herein with low latency and high transfer speeds. According tothe example implementations, containers may be run without having tomanage servers or clusters of instances, such that there is no need toprovision, configure, or scale clusters on virtual machines to executeoperations associated with containers.

Example Environment

FIG. 25 shows an example environment suitable for some exampleimplementations. Environment 2500 includes devices 2510-2555, and eachis communicatively connected to at least one other device via, forexample, network 2560 (e.g., by wired and/or wireless connections). Somedevices may be communicatively connected to one or more storage devices2540 and 2545.

An example of one or more devices 2510-2555 may be computing devices2600 described in FIG. 26, respectively. Devices 2505-2555 may include,but are not limited to, a computer 2510 (e.g., a laptop computingdevice) having a monitor, a mobile device 2515 (e.g., smartphone ortablet), a television 2520, a device associated with a vehicle 2525, aserver computer 2530, computing devices 2535 and 2550, storage devices2540 and 2545, and smart watch or other smart device 2555.

In some implementations, devices 2510-2525 and 2555 may be considereduser devices associated with the users of the enterprise. Devices2530-2550 may be devices associated with service providers (e.g., usedby the external host to provide services as described above and withrespect to the collecting and storing data).

The above-disclosed hardware implementations may be used in theenvironment of FIG. 25, as would be understood by those skilled in theart. More specifically, For example, but not by way of limitation,external data fetching according to the example implementationsdescribed herein may be performed by copying data from an external thirdparty (e.g., vendor), and storing the data in a cloud storage container.The data fetching process may be managed by a scheduling server, and/ora serverless compute service that executes operations to manage theexternal data storage and the associated compute resources. Further, theextraction, transformation and loading of data as described herein maybe executed by a batch management processor or service. Batch computingis the execution of a series of executable instructions (“jobs”) on oneor more processors without manual intervention by a user, e.g.,automatically. Input parameters maybe pre-defined through scripts,command-line arguments, control files, or job control language. A batchjob may be associated with completion of preceding jobs, or theavailability of certain inputs. Thus, the sequencing and scheduling ofmultiple jobs is critical. Optionally, batch processing may not beperformed with interactive processing. For example, the batch managementprocessor or service may permits a user to create a job queue and jobdefinition, and then to execute the job definition and review theresults. According to an example implementation a batch cluster includes256 CPUs, and an ETL-dedicated server having 64 cores and 312 GB of RAM.The number of running instances may be 1. The foregoing ETLinfrastructure may also be applied to the process of insight extraction.Further, an API is provided for data access. For example but not by wayof limitation, the REST API, which conforms to a REST style architectureand allows for interaction with RESTful resources, may be executed on aservice. The service may include, but is not limited to, hardware suchas 1 vCPU, 2 GB RAM, 10 GB SSD disk, and a minimum of two runninginstances. The API may be exposed to the Internet via an onlineapplication load balancer, which is elastic and permits configurationand routing of an incoming end-user to online applications based in thecloud, optionally pushing traffic across multiple targets in multipleavailability zones. The caching layer may be provided by a fast contentdelivery network (CDN) service, which may securely deliver the datadescribed herein with low latency and high transfer speeds. According tothe example implementations, containers may be run without having tomanage servers or clusters of instances, such that there is no need toprovision, configure, or scale clusters on virtual machines to executeoperations associated with containers.

Example Computing Environment

FIG. 26 shows an example computing environment with an example computingdevice suitable for implementing at least one example embodiment.Computing device 2605 in computing environment 2600 can include one ormore processing units, cores, or processors 2610, memory 2615 (e.g.,RAM, ROM, and/or the like), internal storage 2620 (e.g., magnetic,optical, solid state storage, and/or organic), and I/O interface 2625,all of which can be coupled on a communication mechanism or bus 2630 forcommunicating information. Processors 2610 can be general purposeprocessors (CPUs) and/or special purpose processors (e.g., digitalsignal processors (DSPs), graphics processing units (GPUs), and others).

In some example embodiments, computing environment 2600 may include oneor more devices used as analog-to-digital converters, digital-to-analogconverters, and/or radio frequency handlers.

Computing device 2605 can be communicatively coupled to input/userinterface 2635 and output device/interface 2640. Either one or both ofinput/user interface 2635 and output device/interface 2640 can be wiredor wireless interface and can be detachable. Input/user interface 2635may include any device, component, sensor, or interface, physical orvirtual, which can be used to provide input (e.g., keyboard, apointing/cursor control, microphone, camera, Braille, motion sensor,optical reader, and/or the like). Output device/interface 2640 mayinclude a display, monitor, printer, speaker, braille, or the like. Insome example embodiments, input/user interface 2635 and outputdevice/interface 2640 can be embedded with or physically coupled tocomputing device 2605 (e.g., a mobile computing device with buttons ortouch-screen input/user interface and an output or printing display, ora television).

Computing device 2605 can be communicatively coupled to external storage2645 and network 2650 for communicating with any number of networkedcomponents, devices, and systems, including one or more computingdevices of the same or different configuration. Computing device 2605 orany connected computing device can be functioning as, providing servicesof, or referred to as a server, client, thin server, general machine,special-purpose machine, or another label.

I/O interface 2625 can include, but is not limited to, wired and/orwireless interfaces using any communication or I/O protocols orstandards (e.g., Ethernet, 802.11x, Universal System Bus, WiMax, modem,a cellular network protocol, and the like) for communicating informationto and/or from at least all the connected components, devices, andnetwork in computing environment 2600. Network 2650 can be any networkor combination of networks (e.g., the Internet, local area network, widearea network, a telephonic network, a cellular network, satellitenetwork, and the like).

Computing device 2605 can use and/or communicate using computer-usableor computer-readable media, including transitory media andnon-transitory media. Transitory media include transmission media (e.g.,metal cables, fiber optics), signals, carrier waves, and the like.Non-transitory media include magnetic media (e.g., disks and tapes),optical media (e.g., CD ROM, digital video disks, Blu-ray disks), solidstate media (e.g., RAM, ROM, flash memory, solid-state storage), andother non-volatile storage or memory.

Computing device 2605 can be used to implement techniques, methods,applications, processes, or computer-executable instructions toimplement at least one embodiment (e.g., a described embodiment).Computer-executable instructions can be retrieved from transitory media,and stored on and retrieved from non-transitory media. The executableinstructions can be originated from one or more of any programming,scripting, and machine languages (e.g., C, C++, C#, Java, Visual Basic,Python, Perl, JavaScript, and others).

Processor(s) 2610 can execute under any operating system (OS) (notshown), in a native or virtual environment. To implement a describedembodiment, one or more online applications can be deployed that includelogic unit 2655, application programming interface (API) unit 2660,input unit 2665, output unit 2670, service processing unit 2690, andinter-unit communication mechanism 2695 for the different units tocommunicate with each other, with the OS, and with other applications(not shown). For example, alternate data processing unit 2675, taggingunit 2680, and modeling/forecasting unit 2685 may implement one or moreprocesses described above. The described units and elements can bevaried in design, function, configuration, or implementation and are notlimited to the descriptions provided.

In some example embodiments, when information or an executioninstruction is received by API unit 2660, it may be communicated to oneor more other units (e.g., logic unit 2655, input unit 2665, output unit2670, service processing unit 2690). For example, input unit 2665 mayuse API unit 2660 to connect with other data sources so that the serviceprocessing unit 2690 can process the information. Service processingunit 2690 performs the filtering of panelists, the filtering andcleaning/normalizing of data, and generation of the results, asexplained above.

In some examples, logic unit 2660 may be configured to control theinformation flow among the units and direct the services provided by APIunit 2660, input unit 2665, output unit 2670, alternate data processingunit 2675, tagging unit 2680, and modeling/forecasting unit 2685 inorder to implement an embodiment described above. For example, the flowof one or more processes or implementations may be controlled by logicunit 2655 alone or in conjunction with API unit 2665.

Although a few example implementations have been shown and described,these example implementations are provided to convey the subject matterdescribed herein to people who are familiar with this field. It shouldbe understood that the subject matter described herein may beimplemented in various forms without being limited to the describedexample implementations. The subject matter described herein can bepracticed without those specifically defined or described matters orwith other or different elements or matters not described. It will beappreciated by those familiar with this field that changes may be madein these example implementations without departing from the subjectmatter described herein as defined in the appended claims and theirequivalents.

I/We claim:
 1. A method comprising using at least one hardware processorto: receive a plurality of data related to one or more entities from aplurality of data sources; apply a predictive model to the plurality ofdata to predict a value of a critical indicator of performance for eachof the one or more entities; generate a graphical user interfacecomprising a watchlist, wherein the watchlist comprises, for each of theone or more entities, an identifier of the entity, an identifier of thecritical indicator predicted for the entity, a value associated with thecritical indicator predicted for the entity, and a recommendation basedon the value associated with the critical indicator predicted for theentity; and provide the graphical user interface to at least one user.2. The method of claim 1, wherein the machine-learning model comprises aplurality of algorithms, wherein each of the plurality of algorithms isassociated with one of a plurality of different revenue structures, andwherein applying the machine-learning model comprises, for each of theone or more entities, applying one of the plurality of algorithms thatis associated with a revenue structure of the entity.
 3. The method ofclaim 1, wherein the one or more entities are a plurality of entities,including a first entity and a second entity, and wherein the predictivemodel predicts a value of a first critical indicator, from among aplurality of critical indicators, for the first entity and a value of asecond critical indicator, from among the plurality of criticalindicators, for the second entity, wherein the first critical indicatoris different from the second critical indicator.
 4. The method of claim3, wherein the plurality of critical indicators comprises revenue. 5.The method of claim 3, wherein the plurality of critical indicatorscomprises a number of subscribed users.
 6. The method of claim 3,wherein the plurality of critical indicators comprises a number of storevisits.
 7. The method of claim 3, wherein the plurality of criticalindicators comprises a time spent on an online app or platform.
 8. Themethod of claim 3, further comprising using the at least one hardwareprocessor to, for each of the one or more entities, select the criticalindicator to be predicted by the predictive model for the entity basedon a type of the entity.
 9. The method of claim 8, further comprisingusing the at least one hardware processor to, for at least one of theone or more entities, change the critical indicator to be predicted bythe predictive model for the entity based on changes in the plurality ofdata related to the at least one entity.
 10. The method of claim 1,wherein the value associated with the critical indicator comprises apredicted change in value of the critical indicator.
 11. The method ofclaim 1, wherein the plurality of data is received in real time.
 12. Themethod of claim 1, wherein receiving the plurality of data comprises, bya scheduling service, fetching data from an external system, and storingthe data in a cloud storage container.
 13. The method of claim 12,wherein receiving the plurality of data further comprises extracting,transforming, and loading the plurality of data from the stored data inbatches based on predefined input parameters.
 14. The method of claim 1,wherein, for each of the one or more entities, the recommendationcomprises a single word indicating whether the entity is overperforming,neutral, or underperforming, based on the value associated with thecritical indicator predicted for the entity.
 15. The method of claim 1,wherein, for each of the one or more entities, the recommendationcomprises a numerical score based on the value associated with thecritical indicator predicted for the entity.
 16. The method of claim 15,wherein, for each of the one or more entities, the numerical score isfurther based on a size of the entity.
 17. The method of claim 1,wherein the plurality of data comprises one or more of financial data ofthe one or more entities, public-facing announcements by the one or moreentities, social media posts by the one or more entities, publicpresentations by the one or more entities, or public information postedby leaders of the one or more entities.
 18. The method of claim 1,wherein the application of the predictive model to the plurality of datais performed by at least one graphics processing unit (GPU).
 19. Asystem comprising: at least one hardware processor; and one or moresoftware modules comprising computer-executable instructions configuredto, when executed by the at least one hardware processor, receive aplurality of data related to one or more entities from a plurality ofdata sources, apply a predictive model to the plurality of data topredict a value of a critical indicator of performance for each of theone or more entities, generate a graphical user interface comprising awatchlist, wherein the watchlist comprises, for each of the one or moreentities, an identifier of the entity, an identifier of the criticalindicator predicted for the entity, a value associated with the criticalindicator predicted for the entity, and a recommendation based on thevalue associated with the critical indicator predicted for the entity,and provide the graphical user interface to at least one user.
 20. Anon-transitory computer-readable medium having instructions storedthereon, wherein the instructions, when executed by a processor, causethe processor to: receive a plurality of data related to one or moreentities from a plurality of data sources; apply a predictive model tothe plurality of data to predict a value of a critical indicator ofperformance for each of the one or more entities; generate a graphicaluser interface comprising a watchlist, wherein the watchlist comprises,for each of the one or more entities, an identifier of the entity, anidentifier of the critical indicator predicted for the entity, a valueassociated with the critical indicator predicted for the entity, and arecommendation based on the value associated with the critical indicatorpredicted for the entity; and provide the graphical user interface to atleast one user.