SlideShare a Scribd company logo
Generating actionable consumer
insights from analytics
Shazri,
Researcher , Advanced Informatics,TM R&D
Researcher ,biophotonics group, photonics research centre, univ. malaya
mshazri@gmail.com
talk roadmap
information & data sources trends
challenges and roadblocks in big data and
analytics implementation
opportunities too
use cases in health and telecommunication
*Digression: market <-> user
spectrum.
Traditional Survey
Neo-Historical
Based Analysis
Say emotion/
satisfaction + neo-
historical analysis
context Action unto
Market wide
Range of
time
Customer
Specific
Right now
Customer
Specific +
Using @ wire
time info
Right now
Note: more variables , unto shorter time to action.
**information and data sources
trend
Personalized marketing; more powerful tabs -
increased data vol. per person.
Serv. tech unto satisfaction; more real time
network elements reporting
Emotion detection unto reaction/action;
unstructured and structured relational
sources
challenges and roadblocks in big data and
analytics implementation
Note: ‘analysis’ vs. ‘discovery’
challenges and roadblocks in big data and
analytics implementation
different db sources have different
owners, - to target higher level of
analytics abstraction.
interfacing with unstructured
sources speed
demand of output speed
security ?
Zoom in - Security
The following lists the security challenges in Big Data. The list was taken from Top Ten Big Data Security and
Privacy challenges, by Cloud Security Alliance.
• Secure computations in distributed programming frameworks
-Untrustworthy data mapper.
• Security best practices for non-relational data stores
-No in database security yet, now depends on middleware.
• Secure data storage and transactions logs
-No tier-ing strategies to differentiate type of data.
• End-point input validation/filtering
-Veracity, how do you make sure data is trustworthy.
-many factor validation/verification.
• Real-time security/compliance monitoring
-what is anomalous in Big Data framework.
-baseline signature?
• Scalable and composable privacy-preserving data mining and analytics
-some analytics results can be correlated with other external results that can infer identity.
• Cryptographically enforced access control and secure communication
-access must be encrypted.
• Granular access control
-Giving access to the right people, without being too troublesome.
• Granular audits
-What happened? When?
• Data provenance
-Meta data security and speed of processing.
opportunities too
md:more organic and whole measures map to
objective function
nw:richer outputs
nw:high velocity outputs
lg:cross web-app , mobile-app , local & secured
sources search.
use cases in health and
telecommunication
t:call centre - customer care and management
h:genomic analysis
t:high performance analytics and security
thanks
any questions ?

More Related Content

What's hot

Data analytics - May 2016
Data analytics - May 2016Data analytics - May 2016
Data analytics - May 2016
Mark Yunger
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
Noel Hatch
 
SAP_Enterprise Threat Detection_One-1- Pager
SAP_Enterprise Threat Detection_One-1- PagerSAP_Enterprise Threat Detection_One-1- Pager
SAP_Enterprise Threat Detection_One-1- PagerSalman Akorede
 
Science Distributed's Chain Event: Distributed Science Pilot - Lauren Long
Science Distributed's Chain Event: Distributed Science Pilot - Lauren LongScience Distributed's Chain Event: Distributed Science Pilot - Lauren Long
Science Distributed's Chain Event: Distributed Science Pilot - Lauren Long
Sean Manion PhD
 
Big data analytics
Big data analyticsBig data analytics
Big data analytics
RAVIKANTSHARMA98
 
Data Quality Rules introduction
Data Quality Rules introductionData Quality Rules introduction
Data Quality Rules introduction
datatovalue
 
Umc floortje scheepers
Umc floortje scheepersUmc floortje scheepers
Umc floortje scheepers
BigDataExpo
 
Тестирование данных с помощью Data Quality Services (MS SQL 12)
Тестирование данных с помощью Data Quality Services (MS SQL 12)Тестирование данных с помощью Data Quality Services (MS SQL 12)
Тестирование данных с помощью Data Quality Services (MS SQL 12)
SQALab
 
The Case For Secure Data Science
The Case For Secure Data ScienceThe Case For Secure Data Science
The Case For Secure Data Science
Daniel McEnnis
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
Rishi Kant
 
Resume
ResumeResume
YZU - Big Data Science - Course Information
YZU - Big Data Science - Course InformationYZU - Big Data Science - Course Information
YZU - Big Data Science - Course Information
Ren-Hao (PAN) Pan
 
Big dataprocessing cts2015
Big dataprocessing cts2015Big dataprocessing cts2015
Big dataprocessing cts2015
Artificial Intelligence Institute at UofSC
 
What is data science artical
What is data science articalWhat is data science artical
What is data science artical
kavyapandala
 
Technology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity StrategiesTechnology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity Strategies
Jack Pringle
 
Combining analytics and user research
Combining analytics and user researchCombining analytics and user research
Combining analytics and user research
Alex Tarling
 
Nexthink Healthcare Overview
Nexthink Healthcare OverviewNexthink Healthcare Overview
Nexthink Healthcare OverviewBrock Spradling
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
Pratap Dangeti
 
Data Analytics in Real World
Data Analytics in Real WorldData Analytics in Real World
Data Analytics in Real World
geetachauhan
 
Blockchain, Science Publishing, and Replicability
Blockchain, Science Publishing, and ReplicabilityBlockchain, Science Publishing, and Replicability
Blockchain, Science Publishing, and Replicability
Sean Manion PhD
 

What's hot (20)

Data analytics - May 2016
Data analytics - May 2016Data analytics - May 2016
Data analytics - May 2016
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
SAP_Enterprise Threat Detection_One-1- Pager
SAP_Enterprise Threat Detection_One-1- PagerSAP_Enterprise Threat Detection_One-1- Pager
SAP_Enterprise Threat Detection_One-1- Pager
 
Science Distributed's Chain Event: Distributed Science Pilot - Lauren Long
Science Distributed's Chain Event: Distributed Science Pilot - Lauren LongScience Distributed's Chain Event: Distributed Science Pilot - Lauren Long
Science Distributed's Chain Event: Distributed Science Pilot - Lauren Long
 
Big data analytics
Big data analyticsBig data analytics
Big data analytics
 
Data Quality Rules introduction
Data Quality Rules introductionData Quality Rules introduction
Data Quality Rules introduction
 
Umc floortje scheepers
Umc floortje scheepersUmc floortje scheepers
Umc floortje scheepers
 
Тестирование данных с помощью Data Quality Services (MS SQL 12)
Тестирование данных с помощью Data Quality Services (MS SQL 12)Тестирование данных с помощью Data Quality Services (MS SQL 12)
Тестирование данных с помощью Data Quality Services (MS SQL 12)
 
The Case For Secure Data Science
The Case For Secure Data ScienceThe Case For Secure Data Science
The Case For Secure Data Science
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
 
Resume
ResumeResume
Resume
 
YZU - Big Data Science - Course Information
YZU - Big Data Science - Course InformationYZU - Big Data Science - Course Information
YZU - Big Data Science - Course Information
 
Big dataprocessing cts2015
Big dataprocessing cts2015Big dataprocessing cts2015
Big dataprocessing cts2015
 
What is data science artical
What is data science articalWhat is data science artical
What is data science artical
 
Technology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity StrategiesTechnology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity Strategies
 
Combining analytics and user research
Combining analytics and user researchCombining analytics and user research
Combining analytics and user research
 
Nexthink Healthcare Overview
Nexthink Healthcare OverviewNexthink Healthcare Overview
Nexthink Healthcare Overview
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
 
Data Analytics in Real World
Data Analytics in Real WorldData Analytics in Real World
Data Analytics in Real World
 
Blockchain, Science Publishing, and Replicability
Blockchain, Science Publishing, and ReplicabilityBlockchain, Science Publishing, and Replicability
Blockchain, Science Publishing, and Replicability
 

Viewers also liked

Bayesian His2011
Bayesian His2011Bayesian His2011
Bayesian His2011
Mohammad Shazri Shahrir
 
Bayesian His2011
Bayesian His2011Bayesian His2011
Bayesian His2011
Mohammad Shazri Shahrir
 
Paper Soledad Quero - Acceptability of an Online Emotional Therapy System to ...
Paper Soledad Quero - Acceptability of an Online Emotional Therapy System to ...Paper Soledad Quero - Acceptability of an Online Emotional Therapy System to ...
Paper Soledad Quero - Acceptability of an Online Emotional Therapy System to ...WTHS
 
Daliburgh Progress 131211
Daliburgh Progress 131211Daliburgh Progress 131211
Daliburgh Progress 131211
martinjoyce
 
Tidy it præsentation
Tidy it præsentationTidy it præsentation
Tidy it præsentationAnders Warrer
 
Career Day 2012
Career Day 2012Career Day 2012
Career Day 2012
sohainstitute
 
Paper Alejandro Gonzalez - An iPhone-based application for promoting type 2 d...
Paper Alejandro Gonzalez - An iPhone-based application for promoting type 2 d...Paper Alejandro Gonzalez - An iPhone-based application for promoting type 2 d...
Paper Alejandro Gonzalez - An iPhone-based application for promoting type 2 d...WTHS
 
Professional Innovator Development
Professional Innovator DevelopmentProfessional Innovator Development
Professional Innovator Development
danaclarke
 
Evaluating natural based toothpaste
Evaluating natural based toothpasteEvaluating natural based toothpaste
Evaluating natural based toothpasteJojo Asavanamuang
 
Alberto Esteban - Distributed and synchronized users’ profile management for ...
Alberto Esteban - Distributed and synchronized users’ profile management for ...Alberto Esteban - Distributed and synchronized users’ profile management for ...
Alberto Esteban - Distributed and synchronized users’ profile management for ...
WTHS
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldWTHS
 
Paper Álvaro Hermida - Gas Control System for Neonates
Paper Álvaro Hermida - Gas Control System for NeonatesPaper Álvaro Hermida - Gas Control System for Neonates
Paper Álvaro Hermida - Gas Control System for NeonatesWTHS
 
Paper Viveca Jiménez - Supporting Mass Evacuation Guidance within Public Tran...
Paper Viveca Jiménez - Supporting Mass Evacuation Guidance within Public Tran...Paper Viveca Jiménez - Supporting Mass Evacuation Guidance within Public Tran...
Paper Viveca Jiménez - Supporting Mass Evacuation Guidance within Public Tran...WTHS
 

Viewers also liked (20)

Bayesian His2011
Bayesian His2011Bayesian His2011
Bayesian His2011
 
Bayesian His2011
Bayesian His2011Bayesian His2011
Bayesian His2011
 
Paper Soledad Quero - Acceptability of an Online Emotional Therapy System to ...
Paper Soledad Quero - Acceptability of an Online Emotional Therapy System to ...Paper Soledad Quero - Acceptability of an Online Emotional Therapy System to ...
Paper Soledad Quero - Acceptability of an Online Emotional Therapy System to ...
 
Daliburgh Progress 131211
Daliburgh Progress 131211Daliburgh Progress 131211
Daliburgh Progress 131211
 
Tidy it præsentation
Tidy it præsentationTidy it præsentation
Tidy it præsentation
 
Career Day 2012
Career Day 2012Career Day 2012
Career Day 2012
 
Bk teologi lingkungan
Bk teologi lingkunganBk teologi lingkungan
Bk teologi lingkungan
 
Paper Alejandro Gonzalez - An iPhone-based application for promoting type 2 d...
Paper Alejandro Gonzalez - An iPhone-based application for promoting type 2 d...Paper Alejandro Gonzalez - An iPhone-based application for promoting type 2 d...
Paper Alejandro Gonzalez - An iPhone-based application for promoting type 2 d...
 
Presentation1
Presentation1Presentation1
Presentation1
 
Professional Innovator Development
Professional Innovator DevelopmentProfessional Innovator Development
Professional Innovator Development
 
Evaluating natural based toothpaste
Evaluating natural based toothpasteEvaluating natural based toothpaste
Evaluating natural based toothpaste
 
Evaluation[1]
Evaluation[1]Evaluation[1]
Evaluation[1]
 
Cvk
CvkCvk
Cvk
 
Alberto Esteban - Distributed and synchronized users’ profile management for ...
Alberto Esteban - Distributed and synchronized users’ profile management for ...Alberto Esteban - Distributed and synchronized users’ profile management for ...
Alberto Esteban - Distributed and synchronized users’ profile management for ...
 
Pp.37 2012 pengelolaan_das_
Pp.37 2012 pengelolaan_das_Pp.37 2012 pengelolaan_das_
Pp.37 2012 pengelolaan_das_
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile world
 
Mullapperiyar
MullapperiyarMullapperiyar
Mullapperiyar
 
Paper Álvaro Hermida - Gas Control System for Neonates
Paper Álvaro Hermida - Gas Control System for NeonatesPaper Álvaro Hermida - Gas Control System for Neonates
Paper Álvaro Hermida - Gas Control System for Neonates
 
Paper Viveca Jiménez - Supporting Mass Evacuation Guidance within Public Tran...
Paper Viveca Jiménez - Supporting Mass Evacuation Guidance within Public Tran...Paper Viveca Jiménez - Supporting Mass Evacuation Guidance within Public Tran...
Paper Viveca Jiménez - Supporting Mass Evacuation Guidance within Public Tran...
 
Os ppt.3
Os ppt.3Os ppt.3
Os ppt.3
 

Similar to Generating actionable consumer insights from analytics

The Bigger They Are The Harder They Fall
The Bigger They Are The Harder They FallThe Bigger They Are The Harder They Fall
The Bigger They Are The Harder They FallTrillium Software
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data miningNeeda Multani
 
Thilga
ThilgaThilga
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
Datamining Tools
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
Phil Huggins FBCS CITP
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON
 
Hadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitHadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitDataWorks Summit
 
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipelineQlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Srikanth Sharma Boddupalli
 
Internet of things, Big Data and Analytics 101
Internet of things, Big Data and Analytics 101Internet of things, Big Data and Analytics 101
Internet of things, Big Data and Analytics 101
Mukul Krishna
 
uae views on big data
  uae views on  big data  uae views on  big data
uae views on big data
Aravindharamanan S
 
What is Big Data - Edvicon
What is Big Data - EdviconWhat is Big Data - Edvicon
What is Big Data - Edvicon
edviconin
 
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
IT Support Engineer
 
Prism presentation
Prism presentationPrism presentation
Prism presentation
Lakshmi .
 
1 UNIT-DSP.pptx
1 UNIT-DSP.pptx1 UNIT-DSP.pptx
1 UNIT-DSP.pptx
PothyeswariPothyes
 
IRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth EnhancementIRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth Enhancement
IRJET Journal
 
A Survey on Big Data Analytics
A Survey on Big Data AnalyticsA Survey on Big Data Analytics
A Survey on Big Data Analytics
BHARATH KUMAR
 
Customer Insights Prozess
Customer Insights ProzessCustomer Insights Prozess
Customer Insights Prozess
Capgemini
 
Bigdata (1) converted
Bigdata (1) convertedBigdata (1) converted
Bigdata (1) converted
THILAKAVATHIRAMRAJ
 
Introduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleIntroduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycle
Dr. Radhey Shyam
 

Similar to Generating actionable consumer insights from analytics (20)

The Bigger They Are The Harder They Fall
The Bigger They Are The Harder They FallThe Bigger They Are The Harder They Fall
The Bigger They Are The Harder They Fall
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
Thilga
ThilgaThilga
Thilga
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
 
Hadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitHadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business Unit
 
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipelineQlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
 
Internet of things, Big Data and Analytics 101
Internet of things, Big Data and Analytics 101Internet of things, Big Data and Analytics 101
Internet of things, Big Data and Analytics 101
 
uae views on big data
  uae views on  big data  uae views on  big data
uae views on big data
 
What is Big Data - Edvicon
What is Big Data - EdviconWhat is Big Data - Edvicon
What is Big Data - Edvicon
 
National Conference - Big Data - 31 Jan 2015
National Conference - Big Data - 31 Jan 2015National Conference - Big Data - 31 Jan 2015
National Conference - Big Data - 31 Jan 2015
 
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
 
Prism presentation
Prism presentationPrism presentation
Prism presentation
 
1 UNIT-DSP.pptx
1 UNIT-DSP.pptx1 UNIT-DSP.pptx
1 UNIT-DSP.pptx
 
IRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth EnhancementIRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth Enhancement
 
A Survey on Big Data Analytics
A Survey on Big Data AnalyticsA Survey on Big Data Analytics
A Survey on Big Data Analytics
 
Customer Insights Prozess
Customer Insights ProzessCustomer Insights Prozess
Customer Insights Prozess
 
Bigdata (1) converted
Bigdata (1) convertedBigdata (1) converted
Bigdata (1) converted
 
Introduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleIntroduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycle
 

Recently uploaded

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Generating actionable consumer insights from analytics

  • 1. Generating actionable consumer insights from analytics Shazri, Researcher , Advanced Informatics,TM R&D Researcher ,biophotonics group, photonics research centre, univ. malaya mshazri@gmail.com
  • 2. talk roadmap information & data sources trends challenges and roadblocks in big data and analytics implementation opportunities too use cases in health and telecommunication
  • 3. *Digression: market <-> user spectrum. Traditional Survey Neo-Historical Based Analysis Say emotion/ satisfaction + neo- historical analysis context Action unto Market wide Range of time Customer Specific Right now Customer Specific + Using @ wire time info Right now Note: more variables , unto shorter time to action.
  • 4. **information and data sources trend Personalized marketing; more powerful tabs - increased data vol. per person. Serv. tech unto satisfaction; more real time network elements reporting Emotion detection unto reaction/action; unstructured and structured relational sources
  • 5. challenges and roadblocks in big data and analytics implementation Note: ‘analysis’ vs. ‘discovery’
  • 6. challenges and roadblocks in big data and analytics implementation different db sources have different owners, - to target higher level of analytics abstraction. interfacing with unstructured sources speed demand of output speed security ?
  • 7. Zoom in - Security The following lists the security challenges in Big Data. The list was taken from Top Ten Big Data Security and Privacy challenges, by Cloud Security Alliance. • Secure computations in distributed programming frameworks -Untrustworthy data mapper. • Security best practices for non-relational data stores -No in database security yet, now depends on middleware. • Secure data storage and transactions logs -No tier-ing strategies to differentiate type of data. • End-point input validation/filtering -Veracity, how do you make sure data is trustworthy. -many factor validation/verification. • Real-time security/compliance monitoring -what is anomalous in Big Data framework. -baseline signature? • Scalable and composable privacy-preserving data mining and analytics -some analytics results can be correlated with other external results that can infer identity. • Cryptographically enforced access control and secure communication -access must be encrypted. • Granular access control -Giving access to the right people, without being too troublesome. • Granular audits -What happened? When? • Data provenance -Meta data security and speed of processing.
  • 8. opportunities too md:more organic and whole measures map to objective function nw:richer outputs nw:high velocity outputs lg:cross web-app , mobile-app , local & secured sources search.
  • 9. use cases in health and telecommunication t:call centre - customer care and management h:genomic analysis t:high performance analytics and security