According to Mr.Aman in our group this is the course we should start with
The videos can be found here
Best of luck
Big data for business
Big data is used to predict major life events like graduating or getting married, having a child, they do that by looking at the consumer behavior by monitoring the type of websites they visit. For a real-life example check this link ( how target found out the girl was pregnant)
By looking how often you log into their website, they can check what type of items you are looking.
Real life example:
I was looking to buy a mac book air on Amazon, then I changed my mind and I was watching youtube all the ads in the google ads were about mac laptops from Amazon
Another example: I wanted to buy some books about Data mining, but for some reason, I postponed buying it, next week I got an email from Amazon of all the highly rated Data mining books, I ended up buying 2, and they were really good.
Demographics like age- marital status – home address- websites you visit
The edited retail company won an award for using big data in predicting fashion trends, so they can actually tell the retailers what most popular colors, styles, brands when they are going to be popular which will help them in pricing them
Variety point to the many sources and types of data both structured and unstructured.We used to store data from sources like spreadsheets and databases. Now data comes in the form of emails, photos, videos, monitoring devices, PDFs, audio, etc. This variety of unstructured data creates problems for storage, mining and analyzing.
Structured data: refers to a data which are contained in relational databases and spreadsheets.
Unstructured data: is all those data that can’t be so readily classified and fit into a neat box: photos and graphic images, videos, streaming instrument data, webpages, PDF files, PowerPoint presentations, emails, blog entries,tweets, wikis and word processing documents
Multi-structured data refers to a variety of data formats and types and can be derived from interactions between people and machines, such as web applications or social networks. A great example is web log data, which includes a combination of text and visual images along with structured data like form or transactional information
Velocity, in Big data means that data is being generated very fast, it also, refers to the speed of storing data and analyzing it, usually, the data used to get generated by people, but now we have social media, a security cameras at airports, sensors, smartphones, smart wearable devices like Apple watch and Samsung GEAR, The flow of data is huge and continuous.This real-time data can help researchers and businesses make valuable decisions that provide strategic competitive advantages and ROI (Return on investment).
You can see the speed of data being generated in real time by visiting the website:
Volume refers to a data that is too big to work on a regular computer, As we can see a huge growth in the data storage as the data is now more than text data (as it used to be on the World wide web aka web 1.0). We can find data in the format of videos, music and large images (which are taken from our smartphones and most of the new smartphones got high megapixel cameras) on our social media channels. It is very common to have Terabytes and Petabytes of the storage system for the tech companies (Google – Amazon – Microsoft). As the database grows the applications and architecture built to support the data needs to be reevaluated quite often. One the main reasons of a having a big volume are that the data are being generated not only by humans but also by machines too.The big volume indeed represents Big Data.
In recent days I’ve spotted many new hires from computer science asking me; what should I know about this field? What are the expected interview questions? For that, since everyone wants to know everything about information security. As an information security analyst myself I will include all career basics and I will include advantage topics in the future as a series.
Information Security Analyst aka (ISA) is a field of planning and implementing security measures to an organization’s valuable assets wither its employees, systems, computer, network or buildings. These measures are referred to as (CIA) Confidentiality, Integrity, and Availability. In Confidentiality you want to take actions to protect the information secrecy and ensure that organizations’ valuable information is only readable by authorized personnel, example of a used tool > encryption. For Integrity, you are insuring that editing the data is done only by allowed employees and any unauthorized changes are detected and prevented. For example, of a used tool > hashes. Finally, Availability. In this matter, information must be available whenever its needed so DDOS attack (refer to as Distributed Deny of service attacks) are not blocking your employees from entering a necessary data. For example, of a used tool > backup, mirroring, RAID, cloud computing, etc.
To implement security a policy must be raised and approved, and guidelines should be set in place to ensure everyone is following the steps to secure the company from breaches. You cannot enforce a policy without awareness about its benefits and how it is helping the organization. Awareness can include tips on how to secure your data for example, through backup and retention…etc.
Many companies are initiating their own information security program their names. They might be different from each other’s, but their goal is the same; securing information. These programs can include Risk Management, Information Asset Management, Physical Security Management, Awareness Program, Access Management, Backup and Retention Management, Business Continuity, Disaster Recover Management and External Party Management. Each one of these has a ton of tools and programs to manage them. On a monthly basis I will include details on how to achieve the goals of each programs’ elements until it is fully covered.
Referring to (http://www.cyberdegrees.org/jobs/security-analyst/) it is mentioned that you can build hard skills in :
These skills are not a must, but it is very useful to build throughout your career if you want to get good knowledge.
MIS or IT…which one?
Previously, we dug in deeper into the differences of MIS vs CIS, and MIS vs CS. In this post, we will examine the differences between Management Information Systems (MIS) and Information Technology (IT).
MIS and IT are not entirely different; rather IT is a specific subset of the larger MIS field. In other words, MIS is a larger infrastructure and IT is a component of that infrastructure. For example, MIS may analyze departmental issues and support management in taking better, technically informed and more strategic decisions through certain objectives. In this case, IT will be the supporting platform to reach those MIS objectives.
The most encompassing definition of IT would be anything related to computers or computing technology, which essentially includes hardware, software, internet, and networking. What connects both MIS and IT is this: a company with an excellent IT framework, will find it easier to design, develop and deploy an MIS.
A career in information technology often requires a degree in computer or information science which requires the study of topics such as mathematics, database design, computer science, and programming languages. Such a degree can offer several career paths such as the following:
The illustration below sums up the comparison of the two fields of study:
Bottom line? When deciding which of these computer-related paths to pursue, it’s essential to be clear and detailed about what exactly you are looking for in your career. By fully understanding the differences and similarities between MIS and IT through systematic research and evaluation, prospective students such as yourself can better select an educational path, and hence a career path.
If you are reading this article, then you must be interested in the world of technology so you probably know that there are three broad areas: computer science, information technology, and information systems.
Management Information Systems (MIS)
Both degrees are likely to share mutual content however MIS degrees usually include a lot more business modules. The students study a wide range of business courses in order to learn how a business works. Further, they stratify this knowledge to help businesses to get the most from their information. In short, MIS spotlights on both business processes and information technology. Like CS, MIS students do learn programming but in an organization they are solicitude with designing a database system to be used by a business rather than creating the software to create a database system.
An MIS student is one who is interested to work with business and technology! Therefore, after studying MIS, you can work as a business analyst, systems engineer, systems architect, software testing engineer, and other similar positions.
Computer Science (CS)
As for CS, it is the study of computer technology, both hardware and software. It is concerned with the creation of programs that tell a computer what to do. Usually when you hear the term CS, you assume that it is all about programming! Well just to remind you, yes you do learn how to write programs but this is only one element of the field. Computer scientists design and analyze algorithms to solve programs and study the performance of computer hardware and software. CS students take several math and science courses as theoretical background for their major. These courses allow them to devise new ways to use computers or develop effective ways in solving computing problems.
|Computer information systems, business information systems, information systems||Software Engineering|
|Objective||More efficient or effective business||Reliable Computer Program|
|Core Skill||Problem Solving||Logic Procedure|
|Core Task||Determine business requirements for information systems||Deliver information systems to meet defined requirements|
|Theoretical vs. Applied||Balanced||Applied|
|Generic Job Title||Analyst/Designer||Builder|
|Typical Starting Job Title||Business System Analyst||Application Programmer|
|Career Goals||Senior Organizational Manager||Programming Manager|
When you ask Siri or Google Now for the nearest restaurant it uses your GPS location and process a massive amount of data (Big data) so it can give you an accurate recommendation
an on-demand music service, uses Hadoop big data analytics, to collect data from its millions of users worldwide and then uses the analyzed data to give informed music recommendations to individual users.
When you search for a book on amazon and then you scroll down, you will see some recommendation from amazon, suggesting you to buy the following book, it uses big data to show you similar books according to the book you are checking out.
When you watch a specific type of movie of a TV show, from your watching list Netflix will recommend you to other similar shows to watch