SlideShare a Scribd company logo
1 of 2
Big Data: Best Practice & How to Avoid Pitfalls
The big data premise is simple and logical – in an age where every pixel can be tracked and measured,
the challenge isn't having the data or accessing it, but making sense of it all. And for companies
interested in learning what's working and what's not, sorting through mountains of data in order to see
those insights is a promise that's hard to ignore.
But before you get into it here are five best practices that you should be aware of to avoid major pitfalls.
Right sizing the scope
Defining multiple clusters of inter-related functions will allow for a more carefully thought out
solution to each problem. More often than not these will converge or intersect to a greater or
smaller extent.
A Clear Problem Statement
Defining the problem that needs a Big data solution is the first step to a successful outcome. Take
the time to identify, understand and build consensus. There will often be more than one
problem(s). Repeat step 1 for each.
Commit to Delivering a Solution: Build a Resource Strategy
Lack of designated resources with the right skill set can be the single most important cause of time
and cost overhead. Build a big data group separate from preexisting BI, data warehousing, and data
management teams. Start small – a combination of business and IT users and leaders to shape
projects would be the right place to begin.
Avoid Overinvesting - Identify a Non-starter & Course Correct
Take your Big Data Solution model for a test drive. Apply a set of test data to it to see how well the
rules perform. This will help you identify the norm as well as the outliers.
Learn as you Go – Adapt as you Learn
A viable Big Data solution can be called so if it stands the test of time including market fluctuations
and ever changing customer needs. Therefore it is imperative that the solutions be looked upon as
living entities that need to grow and evolve to stay relevant and produce the necessary results in
business.

More Related Content

Viewers also liked

Introduction of Big data, NoSQL & Hadoop
Introduction of Big data, NoSQL & HadoopIntroduction of Big data, NoSQL & Hadoop
Introduction of Big data, NoSQL & HadoopSavvycom Savvycom
 
Vital AI: Big Data Modeling
Vital AI: Big Data ModelingVital AI: Big Data Modeling
Vital AI: Big Data ModelingVital.AI
 
6 Data Modeling for NoSQL 2/2
6 Data Modeling for NoSQL 2/26 Data Modeling for NoSQL 2/2
6 Data Modeling for NoSQL 2/2Fabio Fumarola
 
5 Data Modeling for NoSQL 1/2
5 Data Modeling for NoSQL 1/25 Data Modeling for NoSQL 1/2
5 Data Modeling for NoSQL 1/2Fabio Fumarola
 
Data Modeling for NoSQL
Data Modeling for NoSQLData Modeling for NoSQL
Data Modeling for NoSQLTony Tam
 
SQL, NoSQL, BigData in Data Architecture
SQL, NoSQL, BigData in Data ArchitectureSQL, NoSQL, BigData in Data Architecture
SQL, NoSQL, BigData in Data ArchitectureVenu Anuganti
 
Slides: NoSQL Data Modeling Using JSON Documents – A Practical Approach
Slides: NoSQL Data Modeling Using JSON Documents – A Practical ApproachSlides: NoSQL Data Modeling Using JSON Documents – A Practical Approach
Slides: NoSQL Data Modeling Using JSON Documents – A Practical ApproachDATAVERSITY
 
Modeling Big Data with the ArchiMate 3.0 Language
Modeling Big Data with the ArchiMate 3.0 LanguageModeling Big Data with the ArchiMate 3.0 Language
Modeling Big Data with the ArchiMate 3.0 LanguageIver Band
 
Data Modeling for Big Data
Data Modeling for Big DataData Modeling for Big Data
Data Modeling for Big DataDATAVERSITY
 

Viewers also liked (11)

Introduction of Big data, NoSQL & Hadoop
Introduction of Big data, NoSQL & HadoopIntroduction of Big data, NoSQL & Hadoop
Introduction of Big data, NoSQL & Hadoop
 
Vital AI: Big Data Modeling
Vital AI: Big Data ModelingVital AI: Big Data Modeling
Vital AI: Big Data Modeling
 
Big Data Modeling
Big Data ModelingBig Data Modeling
Big Data Modeling
 
Nosql data models
Nosql data modelsNosql data models
Nosql data models
 
6 Data Modeling for NoSQL 2/2
6 Data Modeling for NoSQL 2/26 Data Modeling for NoSQL 2/2
6 Data Modeling for NoSQL 2/2
 
5 Data Modeling for NoSQL 1/2
5 Data Modeling for NoSQL 1/25 Data Modeling for NoSQL 1/2
5 Data Modeling for NoSQL 1/2
 
Data Modeling for NoSQL
Data Modeling for NoSQLData Modeling for NoSQL
Data Modeling for NoSQL
 
SQL, NoSQL, BigData in Data Architecture
SQL, NoSQL, BigData in Data ArchitectureSQL, NoSQL, BigData in Data Architecture
SQL, NoSQL, BigData in Data Architecture
 
Slides: NoSQL Data Modeling Using JSON Documents – A Practical Approach
Slides: NoSQL Data Modeling Using JSON Documents – A Practical ApproachSlides: NoSQL Data Modeling Using JSON Documents – A Practical Approach
Slides: NoSQL Data Modeling Using JSON Documents – A Practical Approach
 
Modeling Big Data with the ArchiMate 3.0 Language
Modeling Big Data with the ArchiMate 3.0 LanguageModeling Big Data with the ArchiMate 3.0 Language
Modeling Big Data with the ArchiMate 3.0 Language
 
Data Modeling for Big Data
Data Modeling for Big DataData Modeling for Big Data
Data Modeling for Big Data
 

More from Bodhtree

Bodhtree salesforce.com consulting_partner
Bodhtree salesforce.com consulting_partnerBodhtree salesforce.com consulting_partner
Bodhtree salesforce.com consulting_partnerBodhtree
 
Potential link between digital adoption and business growth
Potential link between digital adoption and business growthPotential link between digital adoption and business growth
Potential link between digital adoption and business growthBodhtree
 
Advanced analytics playing a vital role for health insurers
Advanced analytics playing a vital role for health insurersAdvanced analytics playing a vital role for health insurers
Advanced analytics playing a vital role for health insurersBodhtree
 
Bodhtree workforce productivity_improvement_solution
Bodhtree workforce productivity_improvement_solutionBodhtree workforce productivity_improvement_solution
Bodhtree workforce productivity_improvement_solutionBodhtree
 
Bodhtree executive management_program_tracking_solution
Bodhtree executive management_program_tracking_solutionBodhtree executive management_program_tracking_solution
Bodhtree executive management_program_tracking_solutionBodhtree
 
Bodhtree key account_planning_solution
Bodhtree key account_planning_solutionBodhtree key account_planning_solution
Bodhtree key account_planning_solutionBodhtree
 
Bodhtree cloud geotagging_solution
Bodhtree cloud geotagging_solutionBodhtree cloud geotagging_solution
Bodhtree cloud geotagging_solutionBodhtree
 
Bodhtree healthcare payer solutions
Bodhtree healthcare payer solutionsBodhtree healthcare payer solutions
Bodhtree healthcare payer solutionsBodhtree
 
Tele health startup case study
Tele health startup case studyTele health startup case study
Tele health startup case studyBodhtree
 
How unused Big Data turns into Big Value
How unused Big Data turns into Big ValueHow unused Big Data turns into Big Value
How unused Big Data turns into Big ValueBodhtree
 
Change is the only constant
Change is the only constantChange is the only constant
Change is the only constantBodhtree
 
Bodhtree Corporate Overview
Bodhtree Corporate OverviewBodhtree Corporate Overview
Bodhtree Corporate OverviewBodhtree
 
Balance your Supply Chain with Big Data
Balance your Supply Chain with Big DataBalance your Supply Chain with Big Data
Balance your Supply Chain with Big DataBodhtree
 
Business Analytics from Bodhtree
Business Analytics from BodhtreeBusiness Analytics from Bodhtree
Business Analytics from BodhtreeBodhtree
 
Bodhtree Corporate Deck
Bodhtree Corporate DeckBodhtree Corporate Deck
Bodhtree Corporate DeckBodhtree
 

More from Bodhtree (15)

Bodhtree salesforce.com consulting_partner
Bodhtree salesforce.com consulting_partnerBodhtree salesforce.com consulting_partner
Bodhtree salesforce.com consulting_partner
 
Potential link between digital adoption and business growth
Potential link between digital adoption and business growthPotential link between digital adoption and business growth
Potential link between digital adoption and business growth
 
Advanced analytics playing a vital role for health insurers
Advanced analytics playing a vital role for health insurersAdvanced analytics playing a vital role for health insurers
Advanced analytics playing a vital role for health insurers
 
Bodhtree workforce productivity_improvement_solution
Bodhtree workforce productivity_improvement_solutionBodhtree workforce productivity_improvement_solution
Bodhtree workforce productivity_improvement_solution
 
Bodhtree executive management_program_tracking_solution
Bodhtree executive management_program_tracking_solutionBodhtree executive management_program_tracking_solution
Bodhtree executive management_program_tracking_solution
 
Bodhtree key account_planning_solution
Bodhtree key account_planning_solutionBodhtree key account_planning_solution
Bodhtree key account_planning_solution
 
Bodhtree cloud geotagging_solution
Bodhtree cloud geotagging_solutionBodhtree cloud geotagging_solution
Bodhtree cloud geotagging_solution
 
Bodhtree healthcare payer solutions
Bodhtree healthcare payer solutionsBodhtree healthcare payer solutions
Bodhtree healthcare payer solutions
 
Tele health startup case study
Tele health startup case studyTele health startup case study
Tele health startup case study
 
How unused Big Data turns into Big Value
How unused Big Data turns into Big ValueHow unused Big Data turns into Big Value
How unused Big Data turns into Big Value
 
Change is the only constant
Change is the only constantChange is the only constant
Change is the only constant
 
Bodhtree Corporate Overview
Bodhtree Corporate OverviewBodhtree Corporate Overview
Bodhtree Corporate Overview
 
Balance your Supply Chain with Big Data
Balance your Supply Chain with Big DataBalance your Supply Chain with Big Data
Balance your Supply Chain with Big Data
 
Business Analytics from Bodhtree
Business Analytics from BodhtreeBusiness Analytics from Bodhtree
Business Analytics from Bodhtree
 
Bodhtree Corporate Deck
Bodhtree Corporate DeckBodhtree Corporate Deck
Bodhtree Corporate Deck
 

Recently uploaded

Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...SOFTTECHHUB
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 

Recently uploaded (20)

Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 

Big Data: Best Practice & How to Avoid Pitfalls

  • 1. Big Data: Best Practice & How to Avoid Pitfalls The big data premise is simple and logical – in an age where every pixel can be tracked and measured, the challenge isn't having the data or accessing it, but making sense of it all. And for companies interested in learning what's working and what's not, sorting through mountains of data in order to see those insights is a promise that's hard to ignore. But before you get into it here are five best practices that you should be aware of to avoid major pitfalls. Right sizing the scope Defining multiple clusters of inter-related functions will allow for a more carefully thought out solution to each problem. More often than not these will converge or intersect to a greater or smaller extent. A Clear Problem Statement
  • 2. Defining the problem that needs a Big data solution is the first step to a successful outcome. Take the time to identify, understand and build consensus. There will often be more than one problem(s). Repeat step 1 for each. Commit to Delivering a Solution: Build a Resource Strategy Lack of designated resources with the right skill set can be the single most important cause of time and cost overhead. Build a big data group separate from preexisting BI, data warehousing, and data management teams. Start small – a combination of business and IT users and leaders to shape projects would be the right place to begin. Avoid Overinvesting - Identify a Non-starter & Course Correct Take your Big Data Solution model for a test drive. Apply a set of test data to it to see how well the rules perform. This will help you identify the norm as well as the outliers. Learn as you Go – Adapt as you Learn A viable Big Data solution can be called so if it stands the test of time including market fluctuations and ever changing customer needs. Therefore it is imperative that the solutions be looked upon as living entities that need to grow and evolve to stay relevant and produce the necessary results in business.