Big Data Lesson 6 – Big Data in Business

Big data for business

  • Predictive marketing

Big data is used to predict major life events like graduating or getting married, having a child, they do that by looking at the consumer behavior by monitoring the type of websites they visit. For a real-life example check this link ( how target found out the girl was pregnant)

 

  • Looking at consumer behavior.

By looking how often you log into their website, they can check what type of items you are looking.

Real life example:

I was looking to buy a mac book air on Amazon, then I changed my mind and I was watching youtube all the ads in the google ads were about mac laptops from Amazon

Another example: I wanted to buy some books about Data mining, but for some reason, I postponed buying it, next week I got an email from Amazon of all the highly rated Data mining books, I ended up buying 2, and they were really good.

  • Using Demographics

Demographics like age- marital status – home address- websites you visit

  • Predicting trends:

The edited retail company won an award for using big data in predicting fashion trends, so they can actually tell the retailers what most popular colors, styles, brands when they are going to be popular which will help them in pricing them

 

Introduction to Big Data Lesson 5

Lecture 5

Objectives:

  • What is Variety in Big data?
  • What is Structured data and Unstructured data and Multistructred data?

 

Variety

Variety point to the many sources and types of data both structured and unstructured.We used to store data from sources like spreadsheets and databases. Now data comes in the form of emails, photos, videos, monitoring devices, PDFs, audio, etc. This variety of unstructured data creates problems for storage, mining and analyzing.

Structured data: refers to a data which are contained in relational databases and spreadsheets.

Unstructured data: is all those data that can’t be so readily classified and fit into a neat box: photos and graphic images, videos, streaming instrument data, webpages, PDF files, PowerPoint presentations, emails, blog entries,tweets, wikis and word processing documents

Multi-structured data refers to a variety of data formats and types and can be derived from interactions between people and machines, such as web applications or social networks. A great example is web log data, which includes a combination of text and visual images along with structured data like form or transactional information

 

 

 

 

 

 

Introduction to Big Data Lesson 4

Velocity, in Big data means that data is being generated very fast, it also, refers to the speed of storing data and analyzing it, usually, the data used to get generated by people, but now we have social media, a security cameras at airports, sensors, smartphones, smart wearable devices like Apple watch and Samsung GEAR, The flow of data is huge and continuous.This real-time data can help researchers and businesses make valuable decisions that provide strategic competitive advantages and ROI (Return on investment).

You can see the speed of data being generated in real time by visiting the website:

InternetLiveStat

Introduction to Big Data Lesson 3

Lecture 3

Objectives:

  • What is Volume in Big data?

 

  • Volume

Volume refers to a data that is too big to work on a regular computer, As we can see a huge growth in the data storage as the data is now more than text data (as it used to be on the World wide web aka web 1.0). We can find data in the format of videos, music and large images (which are taken from our smartphones and most of the new smartphones got high megapixel cameras) on our social media channels. It is very common to have Terabytes and Petabytes of the storage system for the tech companies (Google – Amazon – Microsoft). As the database grows the applications and architecture built to support the data needs to be reevaluated quite often. One the main reasons of a having a big volume are that the data are being generated not only by humans but also by machines too.The big volume indeed represents Big Data.

 

 

 

 

 

Information Security Analyst

               In recent days I’ve spotted many new hires from computer science asking me; what should I know about this field? What are the expected interview questions? For that, since everyone wants to know everything about information security. As an information security analyst myself I will include all career basics and I will include advantage topics in the future as a series.

                  Information Security Analyst aka (ISA) is a field of planning and implementing security measures to an organization’s valuable assets wither its employees, systems, computer, network or buildings. These measures are referred to as (CIA) Confidentiality, Integrity, and Availability. In Confidentiality you want to take actions to protect the information secrecy and ensure that organizations’ valuable information is only readable by authorized personnel, example of a used tool > encryption. For Integrity, you are insuring that editing the data is done only by allowed employees and any unauthorized changes are detected and prevented. For example, of a used tool > hashes. Finally, Availability. In this matter, information must be available whenever its needed so DDOS attack (refer to as Distributed Deny of service attacks) are not blocking your employees from entering a necessary data. For example, of a used tool > backup, mirroring, RAID, cloud computing, etc.

opentext-graphic-for-web-information-security-en

                 To implement security a policy must be raised and approved, and guidelines should be set in place to ensure everyone is following the steps to secure the company from breaches. You cannot enforce a policy without awareness about its benefits and how it is helping the organization. Awareness can include tips on how to secure your data for example, through backup and retention…etc.

084c64e

                  Many companies are initiating their own information security program their names. They might be different from each other’s, but their goal is the same; securing information. These programs can include Risk Management, Information Asset Management, Physical Security Management, Awareness Program, Access Management, Backup and Retention Management, Business Continuity, Disaster Recover Management and External Party Management. Each one of these has a ton of tools and programs to manage them. On a monthly basis I will include details on how to achieve the goals of each programs’ elements until it is fully covered.

                  Referring to (http://www.cyberdegrees.org/jobs/security-analyst/) it is mentioned that you can build hard skills in :

  • IDS/IPS, penetration and vulnerability testing
  • DLP, anti-virus and anti-malware
  • TCP/IP, computer networking, routing and switching
  • Firewall and intrusion detection/prevention protocols
  • Windows, UNIX and Linux operating systems
  • Network protocols and packet analysis tools
  • C, C++, C#, Java or PHP programming languages
  • Cloud computing
  • SaaS models
  • Security Information and Event Management (SIEM)

These skills are not a must, but it is very useful to build throughout your career if you want to get good knowledge.

MIS vs IT

MIS or IT…which one?

Previously, we dug in deeper into the differences of MIS vs CIS, and MIS vs CS. In this post, we will examine the differences between Management Information Systems (MIS) and Information Technology (IT).

MIS and IT are not entirely different; rather IT is a specific subset of the larger MIS field. In other words, MIS is a larger infrastructure and IT is a component of that infrastructure. For example, MIS may analyze departmental issues and support management in taking better, technically informed and more strategic decisions through certain objectives. In this case, IT will be the supporting platform to reach those MIS objectives.

The most encompassing definition of IT would be anything related to computers or computing technology, which essentially includes hardware, software, internet, and networking. What connects both MIS and IT is this:  a company with an excellent IT framework, will find it easier to design, develop and deploy an MIS.

A career in information technology often requires a degree in computer or information science which requires the study of topics such as mathematics, database design, computer science, and programming languages. Such a degree can offer several career paths such as the following:

  • Network or database administration
  • Cybersecurity
  • Business intelligence
  • Enterprise resource planning
  • Computer programming
  • Software development

The illustration below sums up the comparison of the two fields of study:

dgdf

Bottom line? When deciding which of these computer-related paths to pursue, it’s essential to be clear and detailed about what exactly you are looking for in your career. By fully understanding the differences and similarities between MIS and IT through systematic research and evaluation, prospective students such as yourself can better select an educational path, and hence a career path.

MIS VS CS

If you are reading this article, then you must be interested in the world of technology so you probably know that there are three broad areas: computer science, information technology, and information systems.

Management Information Systems (MIS)

Both degrees are likely to share mutual content however MIS degrees usually include a lot more business modules. The students study a wide range of business courses in order to learn how a business works. Further, they stratify this knowledge to help businesses to get the most from their information. In short, MIS spotlights on both business processes and information technology. Like CS, MIS students do learn programming but in an organization they are solicitude with designing a database system to be used by a business rather than creating the software to create a database system.

 An MIS student is one who is interested to work with business and technology! Therefore, after studying MIS, you can work as a business analyst, systems engineer, systems architect, software testing engineer, and other similar positions.

Computer Science (CS)

As for CS, it is the study of computer technology, both hardware and software. It is concerned with the creation of programs that tell a computer what to do. Usually when you hear the term CS, you assume that it is all about programming! Well just to remind you, yes you do learn how to write programs but this is only one element of the field. Computer scientists design and analyze algorithms to solve programs and study the performance of computer hardware and software. CS students take several math and science courses as theoretical background for their major. These courses allow them to devise new ways to use computers or develop effective ways in solving computing problems.

  MIS CS
 

Also known

Computer information systems, business information systems, information systems Software Engineering
Focus Organization Software
Objective More efficient or effective business Reliable Computer Program
Core Skill Problem Solving Logic Procedure
Core Task Determine business requirements for information systems Deliver information systems to meet defined requirements
Theoretical vs. Applied Balanced Applied
Generic Job Title Analyst/Designer Builder
Typical Starting Job Title Business System Analyst Application Programmer
Career Goals Senior Organizational Manager Programming Manager
College Home Business Science

 

Introduction to Big Data Lesson 2

Objectives:

  • Application of Big Data for Consumers

 

  • Apple Siri and Google Now

When you ask Siri or Google Now for the nearest restaurant it uses your GPS location and process a massive amount of data (Big data) so it can give you an accurate recommendation

 

  • Spotify or Soundcloud

an on-demand music service, uses Hadoop big data analytics, to collect data from its millions of users worldwide and then uses the analyzed data to give informed music recommendations to individual users.

  • Amazon Recommendation

When you search for a book on amazon and then you scroll down, you will see some recommendation from amazon, suggesting you to buy the following book, it uses big data to show you similar books according to the book you are checking out.

  • Netflix

When you watch a specific type of movie of a TV show, from your watching list Netflix will recommend you to other similar shows to watch

Introduction to Big Data Lesson 1

 

Objectives:

  • What is Big Data?
  • Why big data? ( reasons of having big data)
  • 3 Vs of Big Data ( Volume- Velocity- Variety)

 

What is Big Data ? ( Arabic)

(البيانات الضخمة )

هي عبارة عن مجموعة البيانات الضخمة جداً والمعقدة لدرجة أنه يُصبح من الصعب معالجتها باستخدام أداة واحدة فقط من أدوات إدارة قواعد البيانات أو باستخدام تطبيقات معالجة البيانات التقليدية

  • What is big data and 3 Vs of Big Data ? (English)

Big data is similar to Regular data but in a high volume ( very big in size),and it’s getting generated in high velocity( very  fast) and its more than one type of data ( variety), so big data is in a simple terms a data that cant be fit in a regular computer and needs special type of storage and new ways of techniques to manage it ( it can’t be stored in a regular databases like Access or oracle)

  • Why Big Data?
    • Increase of storage capacities (like cloud computing – virtual drives – USB with gigabyte and terabyte of storage)
    • Increase of processing power (availability of Supercomputer- and smart computer like IBM Watson)
    • Availability of data (usually the data used to get generated by people , but now machines generates data as well , like in airports cameras are connected to software’s for facial recognition, in supermarkets previously very few who used to pay with ATM, now almost most of the people owns master card, growth of E-commerce like Amazon and Ebay..etc)