• Like

Generating actionable consumer insights from analytics - Telekom R&D

  • 158 views
Uploaded on

 

More in: Business , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
158
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
3
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Insight Valley Asia 2013 | May 16 & 17 | Bangkok, Thailand | www.insightvalley.com
  • 2. Insight Valley Asia 2013 | May 16 & 17 | Bangkok, Thailand | www.insightvalley.comThank you to our sponsor & partners!Gold SponsorSupported byOrganised by
  • 3. Generating actionable consumerinsights from analyticsShazri, researcher from tmrndmshazri@gmail.com
  • 4. talk roadmapinformation & data sources trendschallenges and roadblocks in big data andanalytics implementationopportunities toouse cases in health and telecommunication
  • 5. information and data sources trendmore powerful tabs - increased data vol. perperson.more real time network elements reportingunstructured and structured relational sources
  • 6. challenges and roadblocks in big data andanalytics implementation
  • 7. challenges and roadblocks in big data andanalytics implementationdifferent db sources have differentowners, - to target higher level ofanalytics abstraction.interfacing with unstructuredsources speeddemand of output speedsecurity ?
  • 8. Zoom in - SecurityThe following lists the security challenges in Big Data. The list was taken from Top Ten Big Data Security andPrivacy challenges, by Cloud Security Alliance.• Secure computations in distributed programming frameworks-Untrustworthy data mapper.• Security best practices for non-relational data stores-No in database security yet, now depends on middleware.• Secure data storage and transactions logs-No tier-ing strategies to differentiate type of data.• End-point input validation/filtering-Veracity, how do you make sure data is trustworthy.-many factor validation/verification.• Real-time security/compliance monitoring-what is anomalous in Big Data framework.-baseline signature?• Scalable and composable privacy-preserving data mining and analytics-some analytics results can be correlated with other external results that can infer identity.• Cryptographically enforced access control and secure communication-access must be encrypted.• Granular access control-Giving access to the right people, without being too troublesome.• Granular audits-What happened? When?• Data provenance-Meta data security and speed of processing.
  • 9. opportunities toomd:more organic and whole measures map toobjective functionnw:richer outputsnw:high velocity outputslg:cross web-app , mobile-app , local & securedsources search.
  • 10. use cases in health andtelecommunicationt:call centre - customer care and managementh:genomic analysist:high performance analytics and security
  • 11. thanksany questions ?
  • 12. Insight Valley Asia 2013 | May 16 & 17 | Bangkok, Thailand | www.insightvalley.comThank you to our sponsor & partners!Gold SponsorSupported byOrganised by
  • 13. Insight Valley Asia 2013 | May 16 & 17 | Bangkok, Thailand | www.insightvalley.com