The Eagles Eyes of Cyber Shops – Recommender Systems

The Eagle’s Eye

How many times have you bought items that you really did not plan to by, on Amazon? How many times have you felt that a website knows a little too much about your hobbies, interests, likes etc.? It even gets creepier when you think the website is almost reading your mind. You feel as though some one is always watching you/your activity on-line all the time (Jeepers…that’s true). 

How  Do They Do It?

The technical name for the ‘Self Learning’ computer systems, used to enhance on-line shopping experience for the users and generate more business by making them buy more things,  in “Recommender Systems“.

It is an Information Filtering technique that uses the information you have provided in your profile (by filling in all those fields while registering or by just visiting the website frequently and clicking on stuff).  The system tries to map the characteristics of your profile with that of the Product or Service and uses a rating mechanism to present you the items that you are more likely to buy or browse.

Peek-a-booo…I Know You:

The information that makes up your profile is basically collected using two techniques, Implicit and Explicit.  Explicit method is where you answer questions or rate a product or service etc. Implicit is to turn on the Eagles Eyes on to your activity, what do do you browse, when do you browse etc.

So, next time you are visiting an on-line store, keep in mind, thousands of eagles eyes are watching you…

Cheers,

Venu.

Advertisements

Tags: , , ,

About Venu Mallarapu

I am currently working as Associate Director at Cognizant Technology Services in their Life Sciences division. I have over 15 years of experience in developing IT Solutions and Services, specifically for Life Sciences industry for about 9 years. I have worked with small to large pharma customers to address various business requirements in R&D, Sales and Marketing areas. IT Service Management is one of my other passions. I blog and write about technology frequently and have also presented at various conferences and workshops on wide variety of topics in technology.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: