SlideShare a Scribd company logo
1 of 10
Generating actionable consumer
insights from analytics
Shazri,
Researcher , Advanced Informatics,TM R&D
Researcher ,biophotonics group, photonics research centre, univ. malaya
mshazri@gmail.com
talk roadmap
information & data sources trends
challenges and roadblocks in big data and
analytics implementation
opportunities too
use cases in health and telecommunication
*Digression: market <-> user
spectrum.
Traditional Survey
Neo-Historical
Based Analysis
Say emotion/
satisfaction + neo-
historical analysis
context Action unto
Market wide
Range of
time
Customer
Specific
Right now
Customer
Specific +
Using @ wire
time info
Right now
Note: more variables , unto shorter time to action.
**information and data sources
trend
Personalized marketing; more powerful tabs -
increased data vol. per person.
Serv. tech unto satisfaction; more real time
network elements reporting
Emotion detection unto reaction/action;
unstructured and structured relational
sources
challenges and roadblocks in big data and
analytics implementation
Note: ‘analysis’ vs. ‘discovery’
challenges and roadblocks in big data and
analytics implementation
different db sources have different
owners, - to target higher level of
analytics abstraction.
interfacing with unstructured
sources speed
demand of output speed
security ?
Zoom in - Security
The following lists the security challenges in Big Data. The list was taken from Top Ten Big Data Security and
Privacy challenges, by Cloud Security Alliance.
• Secure computations in distributed programming frameworks
-Untrustworthy data mapper.
• Security best practices for non-relational data stores
-No in database security yet, now depends on middleware.
• Secure data storage and transactions logs
-No tier-ing strategies to differentiate type of data.
• End-point input validation/filtering
-Veracity, how do you make sure data is trustworthy.
-many factor validation/verification.
• Real-time security/compliance monitoring
-what is anomalous in Big Data framework.
-baseline signature?
• Scalable and composable privacy-preserving data mining and analytics
-some analytics results can be correlated with other external results that can infer identity.
• Cryptographically enforced access control and secure communication
-access must be encrypted.
• Granular access control
-Giving access to the right people, without being too troublesome.
• Granular audits
-What happened? When?
• Data provenance
-Meta data security and speed of processing.
opportunities too
md:more organic and whole measures map to
objective function
nw:richer outputs
nw:high velocity outputs
lg:cross web-app , mobile-app , local & secured
sources search.
use cases in health and
telecommunication
t:call centre - customer care and management
h:genomic analysis
t:high performance analytics and security
thanks
any questions ?

More Related Content

What's hot

Data analytics - May 2016
Data analytics - May 2016Data analytics - May 2016
Data analytics - May 2016Mark Yunger
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data AnalyticsNoel Hatch
 
SAP_Enterprise Threat Detection_One-1- Pager
SAP_Enterprise Threat Detection_One-1- PagerSAP_Enterprise Threat Detection_One-1- Pager
SAP_Enterprise Threat Detection_One-1- PagerSalman Akorede
 
Science Distributed's Chain Event: Distributed Science Pilot - Lauren Long
Science Distributed's Chain Event: Distributed Science Pilot - Lauren LongScience Distributed's Chain Event: Distributed Science Pilot - Lauren Long
Science Distributed's Chain Event: Distributed Science Pilot - Lauren LongSean Manion PhD
 
Data Quality Rules introduction
Data Quality Rules introductionData Quality Rules introduction
Data Quality Rules introductiondatatovalue
 
Umc floortje scheepers
Umc floortje scheepersUmc floortje scheepers
Umc floortje scheepersBigDataExpo
 
Тестирование данных с помощью Data Quality Services (MS SQL 12)
Тестирование данных с помощью Data Quality Services (MS SQL 12)Тестирование данных с помощью Data Quality Services (MS SQL 12)
Тестирование данных с помощью Data Quality Services (MS SQL 12)SQALab
 
The Case For Secure Data Science
The Case For Secure Data ScienceThe Case For Secure Data Science
The Case For Secure Data ScienceDaniel McEnnis
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber SecurityRishi Kant
 
YZU - Big Data Science - Course Information
YZU - Big Data Science - Course InformationYZU - Big Data Science - Course Information
YZU - Big Data Science - Course InformationRen-Hao (PAN) Pan
 
What is data science artical
What is data science articalWhat is data science artical
What is data science articalkavyapandala
 
Technology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity StrategiesTechnology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity StrategiesJack Pringle
 
Combining analytics and user research
Combining analytics and user researchCombining analytics and user research
Combining analytics and user researchAlex Tarling
 
Nexthink Healthcare Overview
Nexthink Healthcare OverviewNexthink Healthcare Overview
Nexthink Healthcare OverviewBrock Spradling
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityPratap Dangeti
 
Data Analytics in Real World
Data Analytics in Real WorldData Analytics in Real World
Data Analytics in Real Worldgeetachauhan
 
Blockchain, Science Publishing, and Replicability
Blockchain, Science Publishing, and ReplicabilityBlockchain, Science Publishing, and Replicability
Blockchain, Science Publishing, and ReplicabilitySean Manion PhD
 

What's hot (20)

Data analytics - May 2016
Data analytics - May 2016Data analytics - May 2016
Data analytics - May 2016
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
SAP_Enterprise Threat Detection_One-1- Pager
SAP_Enterprise Threat Detection_One-1- PagerSAP_Enterprise Threat Detection_One-1- Pager
SAP_Enterprise Threat Detection_One-1- Pager
 
Science Distributed's Chain Event: Distributed Science Pilot - Lauren Long
Science Distributed's Chain Event: Distributed Science Pilot - Lauren LongScience Distributed's Chain Event: Distributed Science Pilot - Lauren Long
Science Distributed's Chain Event: Distributed Science Pilot - Lauren Long
 
Big data analytics
Big data analyticsBig data analytics
Big data analytics
 
Data Quality Rules introduction
Data Quality Rules introductionData Quality Rules introduction
Data Quality Rules introduction
 
Umc floortje scheepers
Umc floortje scheepersUmc floortje scheepers
Umc floortje scheepers
 
Тестирование данных с помощью Data Quality Services (MS SQL 12)
Тестирование данных с помощью Data Quality Services (MS SQL 12)Тестирование данных с помощью Data Quality Services (MS SQL 12)
Тестирование данных с помощью Data Quality Services (MS SQL 12)
 
The Case For Secure Data Science
The Case For Secure Data ScienceThe Case For Secure Data Science
The Case For Secure Data Science
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
 
Resume
ResumeResume
Resume
 
YZU - Big Data Science - Course Information
YZU - Big Data Science - Course InformationYZU - Big Data Science - Course Information
YZU - Big Data Science - Course Information
 
Big dataprocessing cts2015
Big dataprocessing cts2015Big dataprocessing cts2015
Big dataprocessing cts2015
 
What is data science artical
What is data science articalWhat is data science artical
What is data science artical
 
Technology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity StrategiesTechnology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity Strategies
 
Combining analytics and user research
Combining analytics and user researchCombining analytics and user research
Combining analytics and user research
 
Nexthink Healthcare Overview
Nexthink Healthcare OverviewNexthink Healthcare Overview
Nexthink Healthcare Overview
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
 
Data Analytics in Real World
Data Analytics in Real WorldData Analytics in Real World
Data Analytics in Real World
 
Blockchain, Science Publishing, and Replicability
Blockchain, Science Publishing, and ReplicabilityBlockchain, Science Publishing, and Replicability
Blockchain, Science Publishing, and Replicability
 

Viewers also liked

Paper Soledad Quero - Acceptability of an Online Emotional Therapy System to ...
Paper Soledad Quero - Acceptability of an Online Emotional Therapy System to ...Paper Soledad Quero - Acceptability of an Online Emotional Therapy System to ...
Paper Soledad Quero - Acceptability of an Online Emotional Therapy System to ...WTHS
 
Daliburgh Progress 131211
Daliburgh Progress 131211Daliburgh Progress 131211
Daliburgh Progress 131211martinjoyce
 
Tidy it præsentation
Tidy it præsentationTidy it præsentation
Tidy it præsentationAnders Warrer
 
Paper Alejandro Gonzalez - An iPhone-based application for promoting type 2 d...
Paper Alejandro Gonzalez - An iPhone-based application for promoting type 2 d...Paper Alejandro Gonzalez - An iPhone-based application for promoting type 2 d...
Paper Alejandro Gonzalez - An iPhone-based application for promoting type 2 d...WTHS
 
Professional Innovator Development
Professional Innovator DevelopmentProfessional Innovator Development
Professional Innovator Developmentdanaclarke
 
Evaluating natural based toothpaste
Evaluating natural based toothpasteEvaluating natural based toothpaste
Evaluating natural based toothpasteJojo Asavanamuang
 
Alberto Esteban - Distributed and synchronized users’ profile management for ...
Alberto Esteban - Distributed and synchronized users’ profile management for ...Alberto Esteban - Distributed and synchronized users’ profile management for ...
Alberto Esteban - Distributed and synchronized users’ profile management for ...WTHS
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldWTHS
 
Paper Álvaro Hermida - Gas Control System for Neonates
Paper Álvaro Hermida - Gas Control System for NeonatesPaper Álvaro Hermida - Gas Control System for Neonates
Paper Álvaro Hermida - Gas Control System for NeonatesWTHS
 
Paper Viveca Jiménez - Supporting Mass Evacuation Guidance within Public Tran...
Paper Viveca Jiménez - Supporting Mass Evacuation Guidance within Public Tran...Paper Viveca Jiménez - Supporting Mass Evacuation Guidance within Public Tran...
Paper Viveca Jiménez - Supporting Mass Evacuation Guidance within Public Tran...WTHS
 

Viewers also liked (20)

Bayesian His2011
Bayesian His2011Bayesian His2011
Bayesian His2011
 
Bayesian His2011
Bayesian His2011Bayesian His2011
Bayesian His2011
 
Paper Soledad Quero - Acceptability of an Online Emotional Therapy System to ...
Paper Soledad Quero - Acceptability of an Online Emotional Therapy System to ...Paper Soledad Quero - Acceptability of an Online Emotional Therapy System to ...
Paper Soledad Quero - Acceptability of an Online Emotional Therapy System to ...
 
Daliburgh Progress 131211
Daliburgh Progress 131211Daliburgh Progress 131211
Daliburgh Progress 131211
 
Tidy it præsentation
Tidy it præsentationTidy it præsentation
Tidy it præsentation
 
Career Day 2012
Career Day 2012Career Day 2012
Career Day 2012
 
Bk teologi lingkungan
Bk teologi lingkunganBk teologi lingkungan
Bk teologi lingkungan
 
Paper Alejandro Gonzalez - An iPhone-based application for promoting type 2 d...
Paper Alejandro Gonzalez - An iPhone-based application for promoting type 2 d...Paper Alejandro Gonzalez - An iPhone-based application for promoting type 2 d...
Paper Alejandro Gonzalez - An iPhone-based application for promoting type 2 d...
 
Presentation1
Presentation1Presentation1
Presentation1
 
Professional Innovator Development
Professional Innovator DevelopmentProfessional Innovator Development
Professional Innovator Development
 
Evaluating natural based toothpaste
Evaluating natural based toothpasteEvaluating natural based toothpaste
Evaluating natural based toothpaste
 
Evaluation[1]
Evaluation[1]Evaluation[1]
Evaluation[1]
 
Cvk
CvkCvk
Cvk
 
Alberto Esteban - Distributed and synchronized users’ profile management for ...
Alberto Esteban - Distributed and synchronized users’ profile management for ...Alberto Esteban - Distributed and synchronized users’ profile management for ...
Alberto Esteban - Distributed and synchronized users’ profile management for ...
 
Pp.37 2012 pengelolaan_das_
Pp.37 2012 pengelolaan_das_Pp.37 2012 pengelolaan_das_
Pp.37 2012 pengelolaan_das_
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile world
 
Mullapperiyar
MullapperiyarMullapperiyar
Mullapperiyar
 
Paper Álvaro Hermida - Gas Control System for Neonates
Paper Álvaro Hermida - Gas Control System for NeonatesPaper Álvaro Hermida - Gas Control System for Neonates
Paper Álvaro Hermida - Gas Control System for Neonates
 
Paper Viveca Jiménez - Supporting Mass Evacuation Guidance within Public Tran...
Paper Viveca Jiménez - Supporting Mass Evacuation Guidance within Public Tran...Paper Viveca Jiménez - Supporting Mass Evacuation Guidance within Public Tran...
Paper Viveca Jiménez - Supporting Mass Evacuation Guidance within Public Tran...
 
Os ppt.3
Os ppt.3Os ppt.3
Os ppt.3
 

Similar to Generating actionable consumer insights from analytics

The Bigger They Are The Harder They Fall
The Bigger They Are The Harder They FallThe Bigger They Are The Harder They Fall
The Bigger They Are The Harder They FallTrillium Software
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data miningNeeda Multani
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data miningDatamining Tools
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON
 
Hadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitHadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitDataWorks Summit
 
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipelineQlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipelineSrikanth Sharma Boddupalli
 
Internet of things, Big Data and Analytics 101
Internet of things, Big Data and Analytics 101Internet of things, Big Data and Analytics 101
Internet of things, Big Data and Analytics 101Mukul Krishna
 
What is Big Data - Edvicon
What is Big Data - EdviconWhat is Big Data - Edvicon
What is Big Data - Edviconedviconin
 
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...IT Support Engineer
 
Prism presentation
Prism presentationPrism presentation
Prism presentationLakshmi .
 
IRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth EnhancementIRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth EnhancementIRJET Journal
 
A Survey on Big Data Analytics
A Survey on Big Data AnalyticsA Survey on Big Data Analytics
A Survey on Big Data AnalyticsBHARATH KUMAR
 
Customer Insights Prozess
Customer Insights ProzessCustomer Insights Prozess
Customer Insights ProzessCapgemini
 
Introduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleIntroduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleDr. Radhey Shyam
 

Similar to Generating actionable consumer insights from analytics (20)

The Bigger They Are The Harder They Fall
The Bigger They Are The Harder They FallThe Bigger They Are The Harder They Fall
The Bigger They Are The Harder They Fall
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
Thilga
ThilgaThilga
Thilga
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
 
Hadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitHadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business Unit
 
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipelineQlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
 
Internet of things, Big Data and Analytics 101
Internet of things, Big Data and Analytics 101Internet of things, Big Data and Analytics 101
Internet of things, Big Data and Analytics 101
 
uae views on big data
  uae views on  big data  uae views on  big data
uae views on big data
 
What is Big Data - Edvicon
What is Big Data - EdviconWhat is Big Data - Edvicon
What is Big Data - Edvicon
 
National Conference - Big Data - 31 Jan 2015
National Conference - Big Data - 31 Jan 2015National Conference - Big Data - 31 Jan 2015
National Conference - Big Data - 31 Jan 2015
 
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
 
Prism presentation
Prism presentationPrism presentation
Prism presentation
 
1 UNIT-DSP.pptx
1 UNIT-DSP.pptx1 UNIT-DSP.pptx
1 UNIT-DSP.pptx
 
IRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth EnhancementIRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth Enhancement
 
A Survey on Big Data Analytics
A Survey on Big Data AnalyticsA Survey on Big Data Analytics
A Survey on Big Data Analytics
 
Customer Insights Prozess
Customer Insights ProzessCustomer Insights Prozess
Customer Insights Prozess
 
Bigdata (1) converted
Bigdata (1) convertedBigdata (1) converted
Bigdata (1) converted
 
Introduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleIntroduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycle
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 

Generating actionable consumer insights from analytics

  • 1. Generating actionable consumer insights from analytics Shazri, Researcher , Advanced Informatics,TM R&D Researcher ,biophotonics group, photonics research centre, univ. malaya mshazri@gmail.com
  • 2. talk roadmap information & data sources trends challenges and roadblocks in big data and analytics implementation opportunities too use cases in health and telecommunication
  • 3. *Digression: market <-> user spectrum. Traditional Survey Neo-Historical Based Analysis Say emotion/ satisfaction + neo- historical analysis context Action unto Market wide Range of time Customer Specific Right now Customer Specific + Using @ wire time info Right now Note: more variables , unto shorter time to action.
  • 4. **information and data sources trend Personalized marketing; more powerful tabs - increased data vol. per person. Serv. tech unto satisfaction; more real time network elements reporting Emotion detection unto reaction/action; unstructured and structured relational sources
  • 5. challenges and roadblocks in big data and analytics implementation Note: ‘analysis’ vs. ‘discovery’
  • 6. challenges and roadblocks in big data and analytics implementation different db sources have different owners, - to target higher level of analytics abstraction. interfacing with unstructured sources speed demand of output speed security ?
  • 7. Zoom in - Security The following lists the security challenges in Big Data. The list was taken from Top Ten Big Data Security and Privacy challenges, by Cloud Security Alliance. • Secure computations in distributed programming frameworks -Untrustworthy data mapper. • Security best practices for non-relational data stores -No in database security yet, now depends on middleware. • Secure data storage and transactions logs -No tier-ing strategies to differentiate type of data. • End-point input validation/filtering -Veracity, how do you make sure data is trustworthy. -many factor validation/verification. • Real-time security/compliance monitoring -what is anomalous in Big Data framework. -baseline signature? • Scalable and composable privacy-preserving data mining and analytics -some analytics results can be correlated with other external results that can infer identity. • Cryptographically enforced access control and secure communication -access must be encrypted. • Granular access control -Giving access to the right people, without being too troublesome. • Granular audits -What happened? When? • Data provenance -Meta data security and speed of processing.
  • 8. opportunities too md:more organic and whole measures map to objective function nw:richer outputs nw:high velocity outputs lg:cross web-app , mobile-app , local & secured sources search.
  • 9. use cases in health and telecommunication t:call centre - customer care and management h:genomic analysis t:high performance analytics and security