If one of your goals in the New Year is to move toward using Big Data, then it’s time to move beyond the theoretical discussion to the nitty-gritty of implementations.
That doesn’t mean you should ignore your strategic goals, of course: It just means filling in the integration blanks between having Big Data and using Big Data.
TechTarget recently published a good starting point by excerpting chapter 10 from “Data Warehousing in the Age of Big Data,” written by Krish Krishnan, who is a Chicago-based executive consultant with Daugherty Business Solutions and a TDWI faculty member.
Conventional Big Data wisdom holds that in order to derive any value from technologies such as Hadoop, organizations need to invest in a cadre of data scientists to build complex analytics applications. The problem with that thinking is that by the time an organization assembles all the software and hardware expertise needed to launch a Big Data application, multiple years will have gone by.
Datameer is one of a handful of application providers that are challenging Hadoop conventional wisdom. Fresh off garnering an additional $19 million in funding this week, Datameer is making the case that what organizations really want is access to Big Data analytics applications that are about as complicated to use as a Microsoft Excel spreadsheet.
Natural catastrophes and man-made disasters worldwide reached $44 billion in insured losses in 2013—down from $81 billion in 2012, according to a Sigma preliminary report by Swiss Re.
The study found that total economic losses from disasters in 2013 totaled $130 billion and 25,000 lives were lost. Hurricane Haiyan alone, which hit the Philippines in November with record-breaking winds, claimed more than 7,000 lives. In 2012 total economic losses were $196 billion and 14,000 lives were lost.
We all (most anyway) know that social media and digital communications play a primary role in creating, expanding and responding to crises today. But it all seems sort of a mishmash, so I found these comments from Dallas Lawrence very helpful in distinguishing the three roles that social and digital media play:
First, social media is an instigator. Were there not a social platform that allows us to send out our every thought, or record every stupid thing that happens, the crisis wouldn’t have occurred.
The next role is that of accelerant. A similar crisis may have happened 20 years ago, but it would not have metastasized so quickly without social media. So Lawrence stresses we must be prepared to act immediately instead of waiting and seeing.
HEATHSVILLE, Va. – Hickory Ground Solutions, LLC, of Heathsville, Va., is helping to ease the pain of potential tornado destruction in Central Oklahoma's oil industry with supply chain mapping analysis.
This area gets hit hard with a lot of tornados. It can be devastating, said Bart Morrison, Chief Executive Officer of Hickory Ground Solutions and a member of the Muscogee (Creek) Nation.
Hickory Ground Solutions is teaming with Supply Chain Visions LLC, a consulting firm based in Boston, Mass., and Arlington, Va., on a contract from the Small Business Administration (SBA). The contract is part of SBA's Investing in Manufacturing Communities Partnership program.
The goal is to establish a plan that will identify other organizations in the area to assist with linking manufacturing businesses together to rebuild the local communities.
The team will work with economic development and planning organizations in the area to develop a detailed plan.
They will study what resources are available and the financial impact on the community. Another goal is to increase small business participation.
The team's mapping methodology will provide the necessary framework to grasp the underlying supply chain flows – and their interdependencies – in order to identify opportunity.
Founded in 2008, Hickory Ground Solutions is an operationally mature, customer-centric, and process driven 8(a) Native American Owned business. HGS is an innovator in the delivery of strategic consulting services to achieve measurable and lasting business results; including various IT Solutions from API architectures to Cyber Security Training, Cyber Risk Analysis
, Lean Six Sigma and Business Process Solutions, and Training.
Just $6 billion of the $44 billion in estimated insured global losses arising from catastrophes in 2013 were generated by man-made disasters, little changed from 2012, according to Swiss Re sigma preliminary estimates.
But as an article on the Lloyd’s website reports, even though natural catastrophes may have dominated the news headlines in 2013, a series of man-made disasters have had a significant impact on a number of communities.
In fact around 5,000 lives were lost as a result of man-made disasters in 2013, according to Swiss Re sigma estimates.
IDG News Service (Bangalore Bureau) — Target has confirmed that data from about 40 million credit and debit cards was stolen at its stores between Nov. 27 and Dec. 15.
The statement from the retailer Thursday follows reports that thieves had accessed data stored on the magnetic stripe on the back of credit and debit cards during the Black Friday weekend through card swiping machines that could have been tampered with at the retailer's stores, a practice known as card skimming.
The data could have been used to create counterfeit cards that could even be used to withdraw money at an ATM, according to the reports.
Lists, kits, packs… they often exhibit order and completeness, two dimensions that are also important for effective business continuity. They are also the underlying principles of the ‘battle box’, a repository for vital information to allow an organisation to carry on operating in adverse conditions. Just like first aid kits and motorists’ emergency packs, a battle box should focus on the essentials. It should also be accessible and ‘grabable’ so that it can be made readily available to those responding to an incident. However, there’s more a viable battle box than just ticking off items to be put in it.
Privacy is on trial in the United States. Legal activist Larry Klayman asked U.S. District Judge Richard J. Leonto require the NSA to stop collecting phone data and immediately delete the data they already have. Their argument was that US citizens have a right to privacy and this is a violation of the 4th Amendment of the Constitution protecting you from illegal search and seizure. Monday' ruling that this practice is unconstitutional has privacy activists cheering in the streets, but it will not be a lasting victory.
In the United States, there is not a single privacy law on the books. (You can argue that HIPAA is a privacy law, but nuances exists that can lessen its impact.) What is protected has come from judgments based on the application of the 4th Amendment regarding search and seizure. US citizens were given "privileges”, thanks to Richard Nixon, which say we have an expectation of privacy when using a phone, which basically means that the government has to get a warrant for a wiretap. (It’s worth noting that in the UK, they don’t get that privilege.)
Data is up for grabs. And everyone is grabbing.
CSO — Christmas is fast approaching. Now, and after the office is back to normal after the first of the year, employees are going to return with several shiny new gadgets, along with the expectation that they'll "just work" in the corporate environment. Security will be a distant afterthought, because it's still viewed as a process that hinders productivity.
The back and forth between security helping or hurting productivity is a battle that has existed before the mobile device boom, and it will exist long after the next big technological thing arrives. But the fact remains security is an essential aspect to operations.
Analysts from Frost & Sullivan have estimated that mobile endpoint protection market will reach one billion dollars in earned revenue by 2017, a rather large number given that last year the market was worth about $430 million. The reason for the large projection is simple; mobile is the new endpoint, and everyone has one.