SlideShare a Scribd company logo
Big Data
Risks and Opportunities
Kenny Huang, Ph.D. 黃勝雄博士
Executive Council Member, APNIC
亞太網路資訊中心董事
huangksh@gmail.com
2015.06.09
Agenda
2
1
2
3
4
Big Data Technologies
Big Data Market
Opportunities, Risks,& Capital Trends
Algorithmic Accountability & Privacy
Internet of Things Definition
3
The Internet of Things (IoT) is the network of physical objects or "things"
embedded with electronics, software, sensors and connectivity to enable
it to achieve greater value and service by exchanging data with the
manufacturer, operator and/or other connected devices. Each thing is
uniquely identifiable through its embedded computing system but is able
to interoperate within the existing Internet infrastructure.
IoT = Devices (RFID tags, Sensors, ..) +
Networks + Services + Data + Analytics
“In the world of IoT, even cows will be connected”
Source : The Economist 2010
IoT Size & Potential
4
Source : CISCO
 Urban Planning
 Smart Cities
 Sustainable Environments
 Healthcare
 Emergency Response
 Waste Management
 Intelligent Shopping
 Smart Product Management
 Smart Meters
 Smart Homes
 Smart Automobiles
 Smart Agriculture (cows)
 Smart Grid
 Intelligent Business Decisions
IoT Potential Applications
Examples of IoT
5
Google Glass Weight Scale
Sense Mother Jawbone Up
SkyBell
Light bulb
Nest Thermostat Belkin Wemo Firefox iKettle
IoT Architectural Design
6
Question : How to build systems that work well ?
 Breaking them into tractable components.
 “Modularity based on abstraction is the way things get done.” – Liskov
 If you can’t manage, evolve, or understand a system, probably don’t have
the right abstraction.
Cloud Data Centre
Core Network
Access Network
Things Network
Web server hosting
IP/MPLS
Ethernet; Mobile; WiFi
RFID; NFC; Bluetooth
Energy Administration Architecture
7
Application servers;
Database servers
IP/MPLS
WiFi 3G
Asset managementReliability improvement
Smart metering
Water Administration Architecture
8
Application servers;
Database servers
IP/MPLS
WiFi 3G
Field devices
Smart metering
Quality monitoring and
Water control
Smart City Architecture
9
Application servers;
Database servers
IP/MPLS
WiFi 3G
Public lighting
Intelligent
transportation
Public safety
management
IoT Technologies
10
detect anomalies analyze a mix of structured, semi-structured
and unstructured data
Sensor Analytics
Stream Analytics
Big Data Analytics
Real-time Analytics
Machine Learning Analytics
Statistical Analytics
enables business users to get up-to-the-minute
data by directly accessing OS
enables developers to combine streams of data
with historic records to derive business insights
find patterns and identify trends
building of the predictive models by using
machine learning techniques
Big Data
11
ASA
2005 – Roger Magoulas uses the term “Big Data”
McKinsey Global Institute
Big Data: The next frontier for innovation, Competition, and productivity.
White House
Big Data Initiative : $200 Million in New R&D Investment on Big Data for
scientific discovery, environmental and biomedical research, education, and
national security
The New Oil
As far back as 2006, market researcher Cliver Humby declared data “the
new oil.” Just as oil once fired dreams a century or more ago, data is today
driving a vision of economic and technical innovation. If “crude” data can
be extracted, refined, and piped to where it can impact decisions in real
time, its value will soar.
International Year of Statistics - 2013
McKinsey Global Institute, May 2011
Press Release. White House of OSTP. March 29 , 2012
CISCO ISBG, June 2012
Big Data : Size
12
The 3Vs of Big Data
13
90% of the data in the world
today was created within
the last two years
People to People
People to Machine
Machine to Machine
2.9 emails sent
every second
20 hours of video uploaded
every minute
50 million tweets per day
Volume
Variety
Velocity
Big Data Ecosystem
14
Generation
Data Types
 Structured
(relational)
 Unstructured
(adhoc)
Data Classes
 Human
 Machine
Data Velocity
 Batch
 Streaming
Data Class Types
Data Mgmt. & Storage
 Store
 Secure
 Access
 Network
Engines
 Hadoop MapReduce
 Apache Tools
 Cloudera/IBM/EMC
 Visualization
Prepare Data For
Analytics
 ETIL / Data Integration
 Workflow Scheduler
 System Tools
Data Analytics
 Algorithmics
 automation
 In Real Time
Business Analytics
 Visualization
 Interoperate with
SQL -RDBMs
 BI/EDW
Business Analysis
 Decision Support
 Just in Time
Business Model
Business User
 Market
Penetration
Enhancement
 Cash Flow/ROI
Operational IT
Store Access Prepare
Analytics
Analyze Visualize Analyze Business
Usage
Source : Sybase
15
Analytics: Static Data vs. Streaming Data
Static Data Streaming Data
Multiple Passes Single Pass
Persistent Inherently Temporal
Offline Analytics Online as well as Offline Analytics
Analytics Based on All the Data Analytics Based on a Subset of Data
Only the current state is relevant Consideration of the order of the input
Relatively low update rate Potentially high update rate
Little or no time requirements Real-time requirements
Assumes exact data Assumes outdated/inaccurate data
Plannable query processing Variable data arrival and data characteristics
DBMS (Database Management System) DSMS (Data Stream Management System)
Persistent relational data Volatile transient data streams
Random access Sequential access
One-time queries Continuous queries
Unlimited secondary storage Limited main memory
Only the current state is relevant Consideration of the order of the input
Relatively low update rate Potentially high update rate
Little or no time requirements Real-time requirements
Assumes exact data Assume outdated / inaccurate data
Standing queries Ad-hoc queries
Big Data Challenges & Data Life of Cycle
16
Input Raw Data
Collection
Cleaning, Validation
and Serialization
Transformation
& Augmentation
Output
Interpretation &
Presentation
Mining & Analytics
DB Storage &
Management
 Sensor data brings numerous challenges with it in the context of data collection, storage and
processing. This is because sensor data processing often requires efficient in-network and
real-time data stream processing from massive volumes of possibly uncertain data from
various sources. The data generated from these sensors arrives in the form of streams.
 At every phase of the big data life cycle, there are research issues along each steps
 To handle these streaming sensor data model-based techniques are employed, such as :
statistical, signal processing, regression-based, machine learning, probabilistic, time series.
17
Example of Model-based Technique : Kalman Filter
18
Probabilistic Models: In sensor data cleaning, inferring sensor values is perhaps the most import
task, since systems can then detect and clean dirty sensor values by comparing raw sensor values
with the corresponding inferred sensor values.
The Kalman filter is perhaps on of the most common probabilistic models to compute inferred
values corresponding to raw sensor values.
19
In the sliding window model, only the recent past is the objective concern of stream
processing. The fundamental sliding windows are of fixed size, which are similar to first-in,
first-out data structure.
 The input is still a stream of data values or elements.
 A data value arrives at each time instant; it later expires after a number of time stamps
equal to the window size n
 The current window at any time instant is the set of data elements that have not yet
expired.
The Sliding Window Model
Hadoop
20
 Processing Platform for Big Data Processing
 Using the “MapReduce” processing technique
 MapReduce is the processing part of Hadoop
 HDFS is the data part of Hadoop
 Attributes
 Highly scalable
 Commodity HW-based
 Open source: low cost
 Batch processing centric
MapReduce
HDFS
Machine
Hive
HBase
Mahout
Pig
Oozie
Flume
Scoop
Projects
Set of open source projects
Map->Reduce and HDFS Architecture
21
TaskTracker
DataNode
Machine
JobTracker
NameNode
TaskTracker
DataNode
Machine
TaskTracker
DataNode
Machine
JobTracker keeps track of jobs being run
NameNode keeps information on
data location
Master
Slave Slave Slave
22
1. The network is reliable
2. Latency is zero
3. Bandwidth is infinite
4. The network is secure
5. Topology doesn’t change
6. There is one administrator
7. Transport cost is zero
8. The network is homogeneous
The Eight Fallacies of Distributed Computing
Source: Peter Deutsch
23
Source : Ray Kurzweil
10−5
1
105
1010
1015
1020
1025
1030
1035
1040
1045
1050
1055
1060
1900 1920 1940 1960 1980 2000 2020 2040 2060 2080 2100
Year
CalculationsperSecondper$1,000
Exponential Growth of Computing
Logarithmic Plot
By 2020s, computers have the same power as the human brain
Deep Learning
24
 Iterative Algorithm
 Learning at different levels of abstraction
 Non-linear transforms
 Typically neural nets
 Genetic programming
 Neural networks
 Quantum computers
 Wisdom of Crowds
Examples of Iterative Algorithm
What is Deep Learning
Google First Quantum Computer
25
“We actually think quantum
machine learning may provide
the most creative problem-
solving process under the known
laws of physics.” – Google Blog
26
Ginni Rometty, CEO of IBM
“In the future, every decision that mankind makes is going
to be informed by a cognitive system like Watson.”
Deep Learning Application Areas
27
1
2
3
4
Big Data Technologies
Big Data Market
Opportunities, Risks,& Capital Trends
Algorithmic Accountability & Privacy
Rainmaker I
Prophet
28
Viktor Mayer-Schönberger
Eric Schmidt
“we now uncover as much data in
48 hours – 1.8 zettabytes – as
humans gathered from the dawn of
civilization to the year 2003”
Rainmaker II
Knowledge Marketer
29
Big Data Hype Circle Big Data Maturity Model
Hype
Create Perception with Correlation
30
source: Google
* correlation doesn’t prove causation
Formulate Illusion
31
source: Sybase
Umbrella
Business Marketer
32
Problem
Whose Problem ?
33
Avoid Fallacy of Irrelevancy
Questions :
1 You want to solve IT giants' (Google/FB) problems ?
2 You want to solve future problems with today’s technologies and price ?
3 Forging illusive needs immediately to leverage technology trends ?
“Excel is very powerful. The fact is that programmers generally don't realize this.” (Jay, LinkedIn)
34
1
2
3
4
Big Data Technologies
Big Data Market
Opportunities, Risks,& Capital Trends
Algorithmic Accountability & Privacy
35
Create new service
offerings
Satisfy customers
Provide contextual
relevance
Information based
differentiation
Sell raw information
Provide
benchmarking
Deliver analysis and
insights
Information based
brokering
Foster marketplaces
Drive deal making
Enable advertising
Information based
delivery networks
Big Data Business Model
(HBR, 2012)
What happened ?
(Reporting)
How and why did it
happen?
(Modeling
experimental design)
What is happening ?
(Alert)
What’s the next best
action?
(recommendation)
What will happen ?
(Extrapolation)
What’s the best/worst
than can happen?
(prediction,
optimization)
Information
Insight
Past Present Future
Questions Addressed by Data Analytics
(Harris & Morrison)
Target used data mining to predict buying habits of customer going
through major life events
 Target was able to identify 25 products that when analyzed together helped
determine a “pregnancy prediction” score
 Sent baby-related promotions to women based score
Case Studies
36
Outcome
 Sales of Target’s Mom and Baby products sharply increased soon after
advertising campaigns
 Privacy concerns: Target had to adjust how it communicated the new
promotions
General Electric using Big Data to optimize the service contracts &
maintenance.
Netflix used Big Data to predict if a TV show will be successful – “House
of Cards” series, Director & promotion.
LinkedIn used Big Data to develop “People You May Know” products -
30% higher click-thru-rates
37
Buying
opportunity
#2
VisibilityinMedia
Time
Technology
Tigger
Peak of
Inflated
Expectations
Trough of
Disillusionment
Slope of
Enlightenment
Plateau of
Productivity
Education
Buying
opportunity
#1
Danger
Zone
Reality
Check
RealValue
2 years 5 years
Source : Gartner; Dr. Kenny Huang Revised
Gartner Hype Cycle
38
Buying
opportunity
#2
VisibilityinMedia
Time
Buying
opportunity
#1
Danger
Zone
2 years 5 years
Source : Dr. Kenny Huang Revised
Time
Innovators
2.5%
Early Majority
34%
Late Majority
34%
Laggards
16%
Early
Adapters
13.5%
Chasm
Technology
Tigger
Peak of
Inflated
Expectations
Trough of
Disillusionment
Slope of
Enlightenment
Plateau of
Productivity
Hype Cycle and Technology Adoption
Cycle Plotted Together
Big Data Visibility and Demand
39
“Big Data” Google Trends @2015.06.04
US TW
26% piloting
11% may invest in 1 year
7% may invest in 2 years
2015 Gartner research on adoption of Hadoop Technology
”Future demand for Hadoop looks fairly anemic over at least
the next 24 months“. Merv Adrian, Gartner Research. (2015)
Big Data Buying Opportunity for Taiwan
40
VisibilityinMedia
Time
Danger
Zone
Source : Gartner; Dr. Kenny Huang Revised
Big Data Visibility
as of June 2015
Next
Buying
Opportunity
2017 < Time *
* Ref revised Hype cycle diagram, Google trends 2015, Gartner research 2015
41
Risk (Standard Deviation)
ExpectedReturn
Government Bonds
Corporate Bonds
Common Stock
Real Estate
Futures
Big Data ?
New Innovation !!
Source : Dr. Kenny Huang Illustration
Risk Acceptance
Risk-Return Tradeoff
Investment Risking Model
42
Risk Acceptance
Risk Mitigation
Risk Avoidance
Startup; Series A
Due Diligence
Change Investment Objects
Risk Acceptance
Risk Mitigation
Risk Avoidance
Don’t Use Taxpayers’ Money
Pilot Projects; Research
Change Technology Policy
Business Entity
Government Institution
Big Data Adoption Strategy
43
 Focus on your own
business
 Adopt and separate; or
 Adopt keep internal; or
 Attack back and disrupt
the disruption
 Focus on your own
business
 Attack back and disrupt
the disruption; or
 Embrace the innovation
and scale it up
Source : MIT Sloan Motivation To Response
AbilityToResponse
Low High
LowHigh
Financial Model Quizzes
44
Big Data
Technology
Provider
Big Data
Solution
Integration
Big Data
As A Service
Fixed cost
BEP
Fixed cost
BEP
Fixed cost
BEPsales
cost
cost
cost
salessales
A B C
[ ] [ ] [ ]
*BEP : Breakeven Point
Global Capital Market Trends
45
Source : Designed by Dr. Kenny Huang
MM USD
46
IPOs and Private Financing Deals in the Tech Sector since 2000 (United States)
Source: PwC
Source: Techcrunch
If there is a bubble, investors would recover their investment and perhaps walk away
with positive return, the biggest losers for sure would be the employees and founders.
Game Rule : You Pick The Valuation, I Pick The Terms
47
48
1
2
3
4
Big Data Technologies
Big Data Market
Opportunities, Risks,& Capital Trends
Algorithmic Accountability & Privacy
Algorithms Rule The World
49
We should interrogate the architecture of
cyberspace as we interrogate the code of
Congress.
- Lawrence Lessig, Code is Law, 2000
Algorithmic Accountability
50
Algorithms Are Everywhere
Algorithmic Accountability
 How can we characterize the bias or power of an algorithm?
 When might algorithms be wronging us, or making
consequential decisions?
 What role should be involved in holding algorithmic power
to account ?
Algorithmic Confusing
 Algorithms are not transparent
 Technical complexity is a barrier
(Nick Diakopoulos)
Algorithmic Power : Decisions
51
3 2 1Prioritization
Classification
Association
Filtering
52
Input Output
Input / Output of An Algorithm
Algorithm
Input OutputAlgorithm
WSJ Price Discrimination
Do different people pay different prices depending on
their geography or browser history ? Yes
Source: WSJ, Dec 2012
Staples.com
e
53
Transparency
 Voluntary incentives for self-disclosure about algorithms
 Trade secrets
 Gaming / manipulation
 Goodhart’s Law: “ When a measure becomes a target, it ceases
to be a good measure.”
 Cognitive complexity
 Transparency information needs to be accessible and
understandable
sdfdsf
54
Other Stories from Algorithms
 Discriminatory / Unfair
 Mistake that denies a service
 Censorship
 Breaks law or social norm
 False Prediction
sdfdsf
Next Step
 Teaching algorithmic accountability
 It will be messy and hard
 Legal issues
 Computer Fraud and Abuse Act
 Ethical implications of publishing more information
 Transparency policy
 What factors to expose, frequency, format of disclosure
Critical Considerations for Big Data Practices
55
Customers will want to know
that you are collecting data
why and what you are
collecting
that their confidentiality is
preserved
that their data is accessible
Privacy
Customers will want
an unique URL where they
can see what you’ve
collected
to know what sensors you
are using
that an API is interrogating
the data
Transparency
Customers will expect
to be the owner of the
data & be the copyright
holder.
To decide who they allow
access to (might not even
be you)
Ownership
Concern with Big Data Practices
56
Source : Whitehouse Big Data Review
PRISM Tasking Process
57
Massive Surveillance vs. Human Rights
58
Article 12:
No one shall be subjected to arbitrary interference with his
privacy, family, home or correspondence, nor to attacks
upon his honour and reputation.
59
Source : appledaily, 2015.04.25Source : The Truman Show
60
USA Today
2015.06.03
The New York Times
2015.06.03
61
62
".... The big question is this: how do we design
systems that make use of our data collectively to
benefit society as a whole, while at the same time
protecting people individual? Or..... how do we find
a "Nash equilibrium" for data collection..........."

More Related Content

What's hot

The Growing Importance of Data Cleaning
The Growing Importance of Data CleaningThe Growing Importance of Data Cleaning
The Growing Importance of Data Cleaning
CarolineSmith912130
 
Importance of Data Mining
Importance of Data MiningImportance of Data Mining
Importance of Data Mining
Scottperrone
 
What Is Data Science? | Introduction to Data Science | Data Science For Begin...
What Is Data Science? | Introduction to Data Science | Data Science For Begin...What Is Data Science? | Introduction to Data Science | Data Science For Begin...
What Is Data Science? | Introduction to Data Science | Data Science For Begin...
Simplilearn
 
Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
Gajanand Sharma
 
Exploratory data analysis
Exploratory data analysis Exploratory data analysis
Exploratory data analysis
Peter Reimann
 
Data Engineering Basics
Data Engineering BasicsData Engineering Basics
Data Engineering Basics
Catherine Kimani
 
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
Bernard Marr
 
Introduction to Data Analytics
Introduction to Data AnalyticsIntroduction to Data Analytics
Introduction to Data Analytics
Utkarsh Sharma
 
Presentation on Big Data
Presentation on Big DataPresentation on Big Data
Presentation on Big Data
Maruf Abdullah (Rion)
 
Big Data & Analytics (Conceptual and Practical Introduction)
Big Data & Analytics (Conceptual and Practical Introduction)Big Data & Analytics (Conceptual and Practical Introduction)
Big Data & Analytics (Conceptual and Practical Introduction)
Yaman Hajja, Ph.D.
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
Ghulam Imaduddin
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
RohithND
 
Exploratory data analysis with Python
Exploratory data analysis with PythonExploratory data analysis with Python
Exploratory data analysis with Python
Davis David
 
Big data Presentation
Big data PresentationBig data Presentation
Big data Presentation
Aswadmehar
 
Data mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, ClassificationData mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, Classification
Dr. Abdul Ahad Abro
 
What is big data?
What is big data?What is big data?
What is big data?
David Wellman
 
Data Analytics For Beginners | Introduction To Data Analytics | Data Analytic...
Data Analytics For Beginners | Introduction To Data Analytics | Data Analytic...Data Analytics For Beginners | Introduction To Data Analytics | Data Analytic...
Data Analytics For Beginners | Introduction To Data Analytics | Data Analytic...
Edureka!
 
Exploratory Data Analysis
Exploratory Data AnalysisExploratory Data Analysis
Exploratory Data Analysis
Umair Shafique
 
Data Analytics
Data AnalyticsData Analytics
Data Analytics
Srinimf-Slides
 

What's hot (20)

The Growing Importance of Data Cleaning
The Growing Importance of Data CleaningThe Growing Importance of Data Cleaning
The Growing Importance of Data Cleaning
 
Importance of Data Mining
Importance of Data MiningImportance of Data Mining
Importance of Data Mining
 
What Is Data Science? | Introduction to Data Science | Data Science For Begin...
What Is Data Science? | Introduction to Data Science | Data Science For Begin...What Is Data Science? | Introduction to Data Science | Data Science For Begin...
What Is Data Science? | Introduction to Data Science | Data Science For Begin...
 
Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
 
Exploratory data analysis
Exploratory data analysis Exploratory data analysis
Exploratory data analysis
 
Data Engineering Basics
Data Engineering BasicsData Engineering Basics
Data Engineering Basics
 
Data cleansing
Data cleansingData cleansing
Data cleansing
 
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
 
Introduction to Data Analytics
Introduction to Data AnalyticsIntroduction to Data Analytics
Introduction to Data Analytics
 
Presentation on Big Data
Presentation on Big DataPresentation on Big Data
Presentation on Big Data
 
Big Data & Analytics (Conceptual and Practical Introduction)
Big Data & Analytics (Conceptual and Practical Introduction)Big Data & Analytics (Conceptual and Practical Introduction)
Big Data & Analytics (Conceptual and Practical Introduction)
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
Exploratory data analysis with Python
Exploratory data analysis with PythonExploratory data analysis with Python
Exploratory data analysis with Python
 
Big data Presentation
Big data PresentationBig data Presentation
Big data Presentation
 
Data mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, ClassificationData mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, Classification
 
What is big data?
What is big data?What is big data?
What is big data?
 
Data Analytics For Beginners | Introduction To Data Analytics | Data Analytic...
Data Analytics For Beginners | Introduction To Data Analytics | Data Analytic...Data Analytics For Beginners | Introduction To Data Analytics | Data Analytic...
Data Analytics For Beginners | Introduction To Data Analytics | Data Analytic...
 
Exploratory Data Analysis
Exploratory Data AnalysisExploratory Data Analysis
Exploratory Data Analysis
 
Data Analytics
Data AnalyticsData Analytics
Data Analytics
 

Viewers also liked

Big-data analytics: challenges and opportunities
Big-data analytics: challenges and opportunitiesBig-data analytics: challenges and opportunities
Big-data analytics: challenges and opportunities
台灣資料科學年會
 
Big Data - The 5 Vs Everyone Must Know
Big Data - The 5 Vs Everyone Must KnowBig Data - The 5 Vs Everyone Must Know
Big Data - The 5 Vs Everyone Must Know
Bernard Marr
 
What is Big Data?
What is Big Data?What is Big Data?
What is Big Data?
Bernard Marr
 
Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...Eftychia Chalvatzi
 
risks and mitigations of releasing data
risks and mitigations of releasing datarisks and mitigations of releasing data
risks and mitigations of releasing data
Sara-Jayne Terp
 
MS PPM Summit Chicago_Nov 2015
MS PPM Summit Chicago_Nov 2015MS PPM Summit Chicago_Nov 2015
MS PPM Summit Chicago_Nov 2015Ludvic Baquie
 
Big Data
Big DataBig Data
Big Data
Marian Borca
 
How to tackle big data from a security
How to tackle big data from a securityHow to tackle big data from a security
How to tackle big data from a security
Tyrone Systems
 
Big data Europe: concept, platform and pilots
Big data Europe: concept, platform and pilotsBig data Europe: concept, platform and pilots
Big data Europe: concept, platform and pilots
BigData_Europe
 
7 Characteristics of a Bad (Big) Data Platform
7 Characteristics of a Bad (Big) Data Platform7 Characteristics of a Bad (Big) Data Platform
7 Characteristics of a Bad (Big) Data Platform
Harshal Deo (HD)
 
Big data landscape version 2.0
Big data landscape version 2.0Big data landscape version 2.0
Big data landscape version 2.0
Matt Turck
 
Intel and Cloudera: Accelerating Enterprise Big Data Success
Intel and Cloudera: Accelerating Enterprise Big Data SuccessIntel and Cloudera: Accelerating Enterprise Big Data Success
Intel and Cloudera: Accelerating Enterprise Big Data Success
Cloudera, Inc.
 
Big Data Solutions Executive Overview
Big Data Solutions Executive OverviewBig Data Solutions Executive Overview
Big Data Solutions Executive Overview
RCG Global Services
 
Big data in healthcare
Big data in healthcareBig data in healthcare
Big data in healthcare
BYTE Project
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security Alliance
Information Security Awareness Group
 
WSO2 Big Data Analytics Platform
WSO2 Big Data Analytics PlatformWSO2 Big Data Analytics Platform
WSO2 Big Data Analytics Platform
Samisa Abeysinghe
 
Intel boubker el mouttahid
Intel boubker el mouttahidIntel boubker el mouttahid
Intel boubker el mouttahid
BigDataExpo
 
How to design a linear control system
How to design a linear control systemHow to design a linear control system
How to design a linear control system
Alireza Mirzaei
 

Viewers also liked (20)

Big-data analytics: challenges and opportunities
Big-data analytics: challenges and opportunitiesBig-data analytics: challenges and opportunities
Big-data analytics: challenges and opportunities
 
Big Data - The 5 Vs Everyone Must Know
Big Data - The 5 Vs Everyone Must KnowBig Data - The 5 Vs Everyone Must Know
Big Data - The 5 Vs Everyone Must Know
 
What is Big Data?
What is Big Data?What is Big Data?
What is Big Data?
 
Big data ppt
Big  data pptBig  data ppt
Big data ppt
 
Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...
 
risks and mitigations of releasing data
risks and mitigations of releasing datarisks and mitigations of releasing data
risks and mitigations of releasing data
 
MS PPM Summit Chicago_Nov 2015
MS PPM Summit Chicago_Nov 2015MS PPM Summit Chicago_Nov 2015
MS PPM Summit Chicago_Nov 2015
 
Big Data
Big DataBig Data
Big Data
 
How to tackle big data from a security
How to tackle big data from a securityHow to tackle big data from a security
How to tackle big data from a security
 
Big data Europe: concept, platform and pilots
Big data Europe: concept, platform and pilotsBig data Europe: concept, platform and pilots
Big data Europe: concept, platform and pilots
 
7 Characteristics of a Bad (Big) Data Platform
7 Characteristics of a Bad (Big) Data Platform7 Characteristics of a Bad (Big) Data Platform
7 Characteristics of a Bad (Big) Data Platform
 
Big data landscape version 2.0
Big data landscape version 2.0Big data landscape version 2.0
Big data landscape version 2.0
 
A Big Data Concept
A Big Data ConceptA Big Data Concept
A Big Data Concept
 
Intel and Cloudera: Accelerating Enterprise Big Data Success
Intel and Cloudera: Accelerating Enterprise Big Data SuccessIntel and Cloudera: Accelerating Enterprise Big Data Success
Intel and Cloudera: Accelerating Enterprise Big Data Success
 
Big Data Solutions Executive Overview
Big Data Solutions Executive OverviewBig Data Solutions Executive Overview
Big Data Solutions Executive Overview
 
Big data in healthcare
Big data in healthcareBig data in healthcare
Big data in healthcare
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security Alliance
 
WSO2 Big Data Analytics Platform
WSO2 Big Data Analytics PlatformWSO2 Big Data Analytics Platform
WSO2 Big Data Analytics Platform
 
Intel boubker el mouttahid
Intel boubker el mouttahidIntel boubker el mouttahid
Intel boubker el mouttahid
 
How to design a linear control system
How to design a linear control systemHow to design a linear control system
How to design a linear control system
 

Similar to Big Data : Risks and Opportunities

Big Data Expo 2015 - IBM 5 predictions
Big Data Expo 2015 - IBM 5 predictionsBig Data Expo 2015 - IBM 5 predictions
Big Data Expo 2015 - IBM 5 predictions
BigDataExpo
 
Analytics&IoT
Analytics&IoTAnalytics&IoT
Analytics&IoT
Selvaraj Kesavan
 
Big Data et eGovernment
Big Data et eGovernmentBig Data et eGovernment
Big Data et eGovernment
eGov Innovation Center
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data Virtualization
Denodo
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleSai Janakiram Penumuru
 
Big Data Analytics for Real Time Systems
Big Data Analytics for Real Time SystemsBig Data Analytics for Real Time Systems
Big Data Analytics for Real Time Systems
Kamalika Dutta
 
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Son Phan
 
IoT Big Data Analytics Insights from Patents
IoT Big Data Analytics Insights from PatentsIoT Big Data Analytics Insights from Patents
IoT Big Data Analytics Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
PayamBarnaghi
 
10-Hot-Data-Analytics-Tre-8904178.ppsx
10-Hot-Data-Analytics-Tre-8904178.ppsx10-Hot-Data-Analytics-Tre-8904178.ppsx
10-Hot-Data-Analytics-Tre-8904178.ppsx
SangeetaTripathi8
 
A Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data ScienceA Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data Science
tlcj97
 
Future of Data Strategy (ASEAN)
Future of Data Strategy (ASEAN)Future of Data Strategy (ASEAN)
Future of Data Strategy (ASEAN)
Denodo
 
Trivento summercamp masterclass 9/9/2016
Trivento summercamp masterclass 9/9/2016Trivento summercamp masterclass 9/9/2016
Trivento summercamp masterclass 9/9/2016
Stavros Kontopoulos
 
Making Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's EdgeMaking Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's Edge
Cognizant
 
Three Dimensions of Data as a Service
Three Dimensions of Data as a ServiceThree Dimensions of Data as a Service
Three Dimensions of Data as a Service
Denodo
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
Sreedhar Chowdam
 
QuickView #3 - Big Data
QuickView #3 - Big DataQuickView #3 - Big Data
QuickView #3 - Big Data
Sonovate
 
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate
Oomph! Recruitment
 
MAKING SENSE OF IOT DATA W/ BIG DATA + DATA SCIENCE - CHARLES CAI
MAKING SENSE OF IOT DATA W/ BIG DATA + DATA SCIENCE - CHARLES CAIMAKING SENSE OF IOT DATA W/ BIG DATA + DATA SCIENCE - CHARLES CAI
MAKING SENSE OF IOT DATA W/ BIG DATA + DATA SCIENCE - CHARLES CAI
Big Data Week
 
Presentación Marcos Grilanda /Amazon Web Services - eCommerce Day Santiago 2017
Presentación Marcos Grilanda /Amazon Web Services - eCommerce Day Santiago 2017Presentación Marcos Grilanda /Amazon Web Services - eCommerce Day Santiago 2017
Presentación Marcos Grilanda /Amazon Web Services - eCommerce Day Santiago 2017
eCommerce Institute
 

Similar to Big Data : Risks and Opportunities (20)

Big Data Expo 2015 - IBM 5 predictions
Big Data Expo 2015 - IBM 5 predictionsBig Data Expo 2015 - IBM 5 predictions
Big Data Expo 2015 - IBM 5 predictions
 
Analytics&IoT
Analytics&IoTAnalytics&IoT
Analytics&IoT
 
Big Data et eGovernment
Big Data et eGovernmentBig Data et eGovernment
Big Data et eGovernment
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data Virtualization
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with Oracle
 
Big Data Analytics for Real Time Systems
Big Data Analytics for Real Time SystemsBig Data Analytics for Real Time Systems
Big Data Analytics for Real Time Systems
 
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
 
IoT Big Data Analytics Insights from Patents
IoT Big Data Analytics Insights from PatentsIoT Big Data Analytics Insights from Patents
IoT Big Data Analytics Insights from Patents
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
 
10-Hot-Data-Analytics-Tre-8904178.ppsx
10-Hot-Data-Analytics-Tre-8904178.ppsx10-Hot-Data-Analytics-Tre-8904178.ppsx
10-Hot-Data-Analytics-Tre-8904178.ppsx
 
A Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data ScienceA Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data Science
 
Future of Data Strategy (ASEAN)
Future of Data Strategy (ASEAN)Future of Data Strategy (ASEAN)
Future of Data Strategy (ASEAN)
 
Trivento summercamp masterclass 9/9/2016
Trivento summercamp masterclass 9/9/2016Trivento summercamp masterclass 9/9/2016
Trivento summercamp masterclass 9/9/2016
 
Making Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's EdgeMaking Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's Edge
 
Three Dimensions of Data as a Service
Three Dimensions of Data as a ServiceThree Dimensions of Data as a Service
Three Dimensions of Data as a Service
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
QuickView #3 - Big Data
QuickView #3 - Big DataQuickView #3 - Big Data
QuickView #3 - Big Data
 
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate
 
MAKING SENSE OF IOT DATA W/ BIG DATA + DATA SCIENCE - CHARLES CAI
MAKING SENSE OF IOT DATA W/ BIG DATA + DATA SCIENCE - CHARLES CAIMAKING SENSE OF IOT DATA W/ BIG DATA + DATA SCIENCE - CHARLES CAI
MAKING SENSE OF IOT DATA W/ BIG DATA + DATA SCIENCE - CHARLES CAI
 
Presentación Marcos Grilanda /Amazon Web Services - eCommerce Day Santiago 2017
Presentación Marcos Grilanda /Amazon Web Services - eCommerce Day Santiago 2017Presentación Marcos Grilanda /Amazon Web Services - eCommerce Day Santiago 2017
Presentación Marcos Grilanda /Amazon Web Services - eCommerce Day Santiago 2017
 

More from Kenny Huang Ph.D.

Taiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsTaiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber Norms
Kenny Huang Ph.D.
 
Internet Governance Model in Taiwan
Internet Governance Model in TaiwanInternet Governance Model in Taiwan
Internet Governance Model in Taiwan
Kenny Huang Ph.D.
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital Diplomacy
Kenny Huang Ph.D.
 
Internet Routing Security
Internet Routing SecurityInternet Routing Security
Internet Routing Security
Kenny Huang Ph.D.
 
網路治理概念、組織及案例
網路治理概念、組織及案例網路治理概念、組織及案例
網路治理概念、組織及案例
Kenny Huang Ph.D.
 
Ethical Considerations in AI
Ethical Considerations in AIEthical Considerations in AI
Ethical Considerations in AI
Kenny Huang Ph.D.
 
創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案
Kenny Huang Ph.D.
 
APNIC44 Briefing
APNIC44 BriefingAPNIC44 Briefing
APNIC44 Briefing
Kenny Huang Ph.D.
 
共享經濟關鍵議題之探討
共享經濟關鍵議題之探討共享經濟關鍵議題之探討
共享經濟關鍵議題之探討
Kenny Huang Ph.D.
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
Kenny Huang Ph.D.
 
網路中立性簡介
網路中立性簡介網路中立性簡介
網路中立性簡介
Kenny Huang Ph.D.
 
談已發展與發展中國家數位落差
談已發展與發展中國家數位落差談已發展與發展中國家數位落差
談已發展與發展中國家數位落差
Kenny Huang Ph.D.
 
Spectrum Policy
Spectrum PolicySpectrum Policy
Spectrum Policy
Kenny Huang Ph.D.
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
Kenny Huang Ph.D.
 
Smart Energy
Smart EnergySmart Energy
Smart Energy
Kenny Huang Ph.D.
 
Smart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service ProvisioningSmart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service Provisioning
Kenny Huang Ph.D.
 
物聯網與工業4.0情境分析
物聯網與工業4.0情境分析物聯網與工業4.0情境分析
物聯網與工業4.0情境分析
Kenny Huang Ph.D.
 
Cloud Computing Business Models Review
Cloud Computing Business Models ReviewCloud Computing Business Models Review
Cloud Computing Business Models Review
Kenny Huang Ph.D.
 
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Kenny Huang Ph.D.
 
Taiwan Network Environment Analysis
Taiwan Network Environment AnalysisTaiwan Network Environment Analysis
Taiwan Network Environment Analysis
Kenny Huang Ph.D.
 

More from Kenny Huang Ph.D. (20)

Taiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsTaiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber Norms
 
Internet Governance Model in Taiwan
Internet Governance Model in TaiwanInternet Governance Model in Taiwan
Internet Governance Model in Taiwan
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital Diplomacy
 
Internet Routing Security
Internet Routing SecurityInternet Routing Security
Internet Routing Security
 
網路治理概念、組織及案例
網路治理概念、組織及案例網路治理概念、組織及案例
網路治理概念、組織及案例
 
Ethical Considerations in AI
Ethical Considerations in AIEthical Considerations in AI
Ethical Considerations in AI
 
創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案創新網路服務產業發展條例建議草案
創新網路服務產業發展條例建議草案
 
APNIC44 Briefing
APNIC44 BriefingAPNIC44 Briefing
APNIC44 Briefing
 
共享經濟關鍵議題之探討
共享經濟關鍵議題之探討共享經濟關鍵議題之探討
共享經濟關鍵議題之探討
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
網路中立性簡介
網路中立性簡介網路中立性簡介
網路中立性簡介
 
談已發展與發展中國家數位落差
談已發展與發展中國家數位落差談已發展與發展中國家數位落差
談已發展與發展中國家數位落差
 
Spectrum Policy
Spectrum PolicySpectrum Policy
Spectrum Policy
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Smart Energy
Smart EnergySmart Energy
Smart Energy
 
Smart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service ProvisioningSmart Vehicle and Data Service Provisioning
Smart Vehicle and Data Service Provisioning
 
物聯網與工業4.0情境分析
物聯網與工業4.0情境分析物聯網與工業4.0情境分析
物聯網與工業4.0情境分析
 
Cloud Computing Business Models Review
Cloud Computing Business Models ReviewCloud Computing Business Models Review
Cloud Computing Business Models Review
 
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
Democracy 3.0 Experiences From Taiwan; Internet Empowerment in Taiwan Sunflow...
 
Taiwan Network Environment Analysis
Taiwan Network Environment AnalysisTaiwan Network Environment Analysis
Taiwan Network Environment Analysis
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

Big Data : Risks and Opportunities

  • 1. Big Data Risks and Opportunities Kenny Huang, Ph.D. 黃勝雄博士 Executive Council Member, APNIC 亞太網路資訊中心董事 huangksh@gmail.com 2015.06.09
  • 2. Agenda 2 1 2 3 4 Big Data Technologies Big Data Market Opportunities, Risks,& Capital Trends Algorithmic Accountability & Privacy
  • 3. Internet of Things Definition 3 The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected devices. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. IoT = Devices (RFID tags, Sensors, ..) + Networks + Services + Data + Analytics “In the world of IoT, even cows will be connected” Source : The Economist 2010
  • 4. IoT Size & Potential 4 Source : CISCO  Urban Planning  Smart Cities  Sustainable Environments  Healthcare  Emergency Response  Waste Management  Intelligent Shopping  Smart Product Management  Smart Meters  Smart Homes  Smart Automobiles  Smart Agriculture (cows)  Smart Grid  Intelligent Business Decisions IoT Potential Applications
  • 5. Examples of IoT 5 Google Glass Weight Scale Sense Mother Jawbone Up SkyBell Light bulb Nest Thermostat Belkin Wemo Firefox iKettle
  • 6. IoT Architectural Design 6 Question : How to build systems that work well ?  Breaking them into tractable components.  “Modularity based on abstraction is the way things get done.” – Liskov  If you can’t manage, evolve, or understand a system, probably don’t have the right abstraction. Cloud Data Centre Core Network Access Network Things Network Web server hosting IP/MPLS Ethernet; Mobile; WiFi RFID; NFC; Bluetooth
  • 7. Energy Administration Architecture 7 Application servers; Database servers IP/MPLS WiFi 3G Asset managementReliability improvement Smart metering
  • 8. Water Administration Architecture 8 Application servers; Database servers IP/MPLS WiFi 3G Field devices Smart metering Quality monitoring and Water control
  • 9. Smart City Architecture 9 Application servers; Database servers IP/MPLS WiFi 3G Public lighting Intelligent transportation Public safety management
  • 10. IoT Technologies 10 detect anomalies analyze a mix of structured, semi-structured and unstructured data Sensor Analytics Stream Analytics Big Data Analytics Real-time Analytics Machine Learning Analytics Statistical Analytics enables business users to get up-to-the-minute data by directly accessing OS enables developers to combine streams of data with historic records to derive business insights find patterns and identify trends building of the predictive models by using machine learning techniques
  • 11. Big Data 11 ASA 2005 – Roger Magoulas uses the term “Big Data” McKinsey Global Institute Big Data: The next frontier for innovation, Competition, and productivity. White House Big Data Initiative : $200 Million in New R&D Investment on Big Data for scientific discovery, environmental and biomedical research, education, and national security The New Oil As far back as 2006, market researcher Cliver Humby declared data “the new oil.” Just as oil once fired dreams a century or more ago, data is today driving a vision of economic and technical innovation. If “crude” data can be extracted, refined, and piped to where it can impact decisions in real time, its value will soar. International Year of Statistics - 2013 McKinsey Global Institute, May 2011 Press Release. White House of OSTP. March 29 , 2012 CISCO ISBG, June 2012
  • 12. Big Data : Size 12
  • 13. The 3Vs of Big Data 13 90% of the data in the world today was created within the last two years People to People People to Machine Machine to Machine 2.9 emails sent every second 20 hours of video uploaded every minute 50 million tweets per day Volume Variety Velocity
  • 14. Big Data Ecosystem 14 Generation Data Types  Structured (relational)  Unstructured (adhoc) Data Classes  Human  Machine Data Velocity  Batch  Streaming Data Class Types Data Mgmt. & Storage  Store  Secure  Access  Network Engines  Hadoop MapReduce  Apache Tools  Cloudera/IBM/EMC  Visualization Prepare Data For Analytics  ETIL / Data Integration  Workflow Scheduler  System Tools Data Analytics  Algorithmics  automation  In Real Time Business Analytics  Visualization  Interoperate with SQL -RDBMs  BI/EDW Business Analysis  Decision Support  Just in Time Business Model Business User  Market Penetration Enhancement  Cash Flow/ROI Operational IT Store Access Prepare Analytics Analyze Visualize Analyze Business Usage Source : Sybase
  • 15. 15 Analytics: Static Data vs. Streaming Data Static Data Streaming Data Multiple Passes Single Pass Persistent Inherently Temporal Offline Analytics Online as well as Offline Analytics Analytics Based on All the Data Analytics Based on a Subset of Data Only the current state is relevant Consideration of the order of the input Relatively low update rate Potentially high update rate Little or no time requirements Real-time requirements Assumes exact data Assumes outdated/inaccurate data Plannable query processing Variable data arrival and data characteristics DBMS (Database Management System) DSMS (Data Stream Management System) Persistent relational data Volatile transient data streams Random access Sequential access One-time queries Continuous queries Unlimited secondary storage Limited main memory Only the current state is relevant Consideration of the order of the input Relatively low update rate Potentially high update rate Little or no time requirements Real-time requirements Assumes exact data Assume outdated / inaccurate data Standing queries Ad-hoc queries
  • 16. Big Data Challenges & Data Life of Cycle 16 Input Raw Data Collection Cleaning, Validation and Serialization Transformation & Augmentation Output Interpretation & Presentation Mining & Analytics DB Storage & Management  Sensor data brings numerous challenges with it in the context of data collection, storage and processing. This is because sensor data processing often requires efficient in-network and real-time data stream processing from massive volumes of possibly uncertain data from various sources. The data generated from these sensors arrives in the form of streams.  At every phase of the big data life cycle, there are research issues along each steps  To handle these streaming sensor data model-based techniques are employed, such as : statistical, signal processing, regression-based, machine learning, probabilistic, time series.
  • 17. 17
  • 18. Example of Model-based Technique : Kalman Filter 18 Probabilistic Models: In sensor data cleaning, inferring sensor values is perhaps the most import task, since systems can then detect and clean dirty sensor values by comparing raw sensor values with the corresponding inferred sensor values. The Kalman filter is perhaps on of the most common probabilistic models to compute inferred values corresponding to raw sensor values.
  • 19. 19 In the sliding window model, only the recent past is the objective concern of stream processing. The fundamental sliding windows are of fixed size, which are similar to first-in, first-out data structure.  The input is still a stream of data values or elements.  A data value arrives at each time instant; it later expires after a number of time stamps equal to the window size n  The current window at any time instant is the set of data elements that have not yet expired. The Sliding Window Model
  • 20. Hadoop 20  Processing Platform for Big Data Processing  Using the “MapReduce” processing technique  MapReduce is the processing part of Hadoop  HDFS is the data part of Hadoop  Attributes  Highly scalable  Commodity HW-based  Open source: low cost  Batch processing centric MapReduce HDFS Machine Hive HBase Mahout Pig Oozie Flume Scoop Projects Set of open source projects
  • 21. Map->Reduce and HDFS Architecture 21 TaskTracker DataNode Machine JobTracker NameNode TaskTracker DataNode Machine TaskTracker DataNode Machine JobTracker keeps track of jobs being run NameNode keeps information on data location Master Slave Slave Slave
  • 22. 22 1. The network is reliable 2. Latency is zero 3. Bandwidth is infinite 4. The network is secure 5. Topology doesn’t change 6. There is one administrator 7. Transport cost is zero 8. The network is homogeneous The Eight Fallacies of Distributed Computing Source: Peter Deutsch
  • 23. 23 Source : Ray Kurzweil 10−5 1 105 1010 1015 1020 1025 1030 1035 1040 1045 1050 1055 1060 1900 1920 1940 1960 1980 2000 2020 2040 2060 2080 2100 Year CalculationsperSecondper$1,000 Exponential Growth of Computing Logarithmic Plot By 2020s, computers have the same power as the human brain
  • 24. Deep Learning 24  Iterative Algorithm  Learning at different levels of abstraction  Non-linear transforms  Typically neural nets  Genetic programming  Neural networks  Quantum computers  Wisdom of Crowds Examples of Iterative Algorithm What is Deep Learning
  • 25. Google First Quantum Computer 25 “We actually think quantum machine learning may provide the most creative problem- solving process under the known laws of physics.” – Google Blog
  • 26. 26 Ginni Rometty, CEO of IBM “In the future, every decision that mankind makes is going to be informed by a cognitive system like Watson.” Deep Learning Application Areas
  • 27. 27 1 2 3 4 Big Data Technologies Big Data Market Opportunities, Risks,& Capital Trends Algorithmic Accountability & Privacy
  • 28. Rainmaker I Prophet 28 Viktor Mayer-Schönberger Eric Schmidt “we now uncover as much data in 48 hours – 1.8 zettabytes – as humans gathered from the dawn of civilization to the year 2003”
  • 29. Rainmaker II Knowledge Marketer 29 Big Data Hype Circle Big Data Maturity Model
  • 30. Hype Create Perception with Correlation 30 source: Google * correlation doesn’t prove causation
  • 33. Problem Whose Problem ? 33 Avoid Fallacy of Irrelevancy Questions : 1 You want to solve IT giants' (Google/FB) problems ? 2 You want to solve future problems with today’s technologies and price ? 3 Forging illusive needs immediately to leverage technology trends ? “Excel is very powerful. The fact is that programmers generally don't realize this.” (Jay, LinkedIn)
  • 34. 34 1 2 3 4 Big Data Technologies Big Data Market Opportunities, Risks,& Capital Trends Algorithmic Accountability & Privacy
  • 35. 35 Create new service offerings Satisfy customers Provide contextual relevance Information based differentiation Sell raw information Provide benchmarking Deliver analysis and insights Information based brokering Foster marketplaces Drive deal making Enable advertising Information based delivery networks Big Data Business Model (HBR, 2012) What happened ? (Reporting) How and why did it happen? (Modeling experimental design) What is happening ? (Alert) What’s the next best action? (recommendation) What will happen ? (Extrapolation) What’s the best/worst than can happen? (prediction, optimization) Information Insight Past Present Future Questions Addressed by Data Analytics (Harris & Morrison)
  • 36. Target used data mining to predict buying habits of customer going through major life events  Target was able to identify 25 products that when analyzed together helped determine a “pregnancy prediction” score  Sent baby-related promotions to women based score Case Studies 36 Outcome  Sales of Target’s Mom and Baby products sharply increased soon after advertising campaigns  Privacy concerns: Target had to adjust how it communicated the new promotions General Electric using Big Data to optimize the service contracts & maintenance. Netflix used Big Data to predict if a TV show will be successful – “House of Cards” series, Director & promotion. LinkedIn used Big Data to develop “People You May Know” products - 30% higher click-thru-rates
  • 37. 37 Buying opportunity #2 VisibilityinMedia Time Technology Tigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity Education Buying opportunity #1 Danger Zone Reality Check RealValue 2 years 5 years Source : Gartner; Dr. Kenny Huang Revised Gartner Hype Cycle
  • 38. 38 Buying opportunity #2 VisibilityinMedia Time Buying opportunity #1 Danger Zone 2 years 5 years Source : Dr. Kenny Huang Revised Time Innovators 2.5% Early Majority 34% Late Majority 34% Laggards 16% Early Adapters 13.5% Chasm Technology Tigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity Hype Cycle and Technology Adoption Cycle Plotted Together
  • 39. Big Data Visibility and Demand 39 “Big Data” Google Trends @2015.06.04 US TW 26% piloting 11% may invest in 1 year 7% may invest in 2 years 2015 Gartner research on adoption of Hadoop Technology ”Future demand for Hadoop looks fairly anemic over at least the next 24 months“. Merv Adrian, Gartner Research. (2015)
  • 40. Big Data Buying Opportunity for Taiwan 40 VisibilityinMedia Time Danger Zone Source : Gartner; Dr. Kenny Huang Revised Big Data Visibility as of June 2015 Next Buying Opportunity 2017 < Time * * Ref revised Hype cycle diagram, Google trends 2015, Gartner research 2015
  • 41. 41 Risk (Standard Deviation) ExpectedReturn Government Bonds Corporate Bonds Common Stock Real Estate Futures Big Data ? New Innovation !! Source : Dr. Kenny Huang Illustration Risk Acceptance Risk-Return Tradeoff
  • 42. Investment Risking Model 42 Risk Acceptance Risk Mitigation Risk Avoidance Startup; Series A Due Diligence Change Investment Objects Risk Acceptance Risk Mitigation Risk Avoidance Don’t Use Taxpayers’ Money Pilot Projects; Research Change Technology Policy Business Entity Government Institution
  • 43. Big Data Adoption Strategy 43  Focus on your own business  Adopt and separate; or  Adopt keep internal; or  Attack back and disrupt the disruption  Focus on your own business  Attack back and disrupt the disruption; or  Embrace the innovation and scale it up Source : MIT Sloan Motivation To Response AbilityToResponse Low High LowHigh
  • 44. Financial Model Quizzes 44 Big Data Technology Provider Big Data Solution Integration Big Data As A Service Fixed cost BEP Fixed cost BEP Fixed cost BEPsales cost cost cost salessales A B C [ ] [ ] [ ] *BEP : Breakeven Point
  • 45. Global Capital Market Trends 45 Source : Designed by Dr. Kenny Huang MM USD
  • 46. 46 IPOs and Private Financing Deals in the Tech Sector since 2000 (United States) Source: PwC Source: Techcrunch If there is a bubble, investors would recover their investment and perhaps walk away with positive return, the biggest losers for sure would be the employees and founders. Game Rule : You Pick The Valuation, I Pick The Terms
  • 47. 47
  • 48. 48 1 2 3 4 Big Data Technologies Big Data Market Opportunities, Risks,& Capital Trends Algorithmic Accountability & Privacy
  • 49. Algorithms Rule The World 49 We should interrogate the architecture of cyberspace as we interrogate the code of Congress. - Lawrence Lessig, Code is Law, 2000
  • 50. Algorithmic Accountability 50 Algorithms Are Everywhere Algorithmic Accountability  How can we characterize the bias or power of an algorithm?  When might algorithms be wronging us, or making consequential decisions?  What role should be involved in holding algorithmic power to account ? Algorithmic Confusing  Algorithms are not transparent  Technical complexity is a barrier (Nick Diakopoulos)
  • 51. Algorithmic Power : Decisions 51 3 2 1Prioritization Classification Association Filtering
  • 52. 52 Input Output Input / Output of An Algorithm Algorithm Input OutputAlgorithm WSJ Price Discrimination Do different people pay different prices depending on their geography or browser history ? Yes Source: WSJ, Dec 2012 Staples.com
  • 53. e 53 Transparency  Voluntary incentives for self-disclosure about algorithms  Trade secrets  Gaming / manipulation  Goodhart’s Law: “ When a measure becomes a target, it ceases to be a good measure.”  Cognitive complexity  Transparency information needs to be accessible and understandable
  • 54. sdfdsf 54 Other Stories from Algorithms  Discriminatory / Unfair  Mistake that denies a service  Censorship  Breaks law or social norm  False Prediction sdfdsf Next Step  Teaching algorithmic accountability  It will be messy and hard  Legal issues  Computer Fraud and Abuse Act  Ethical implications of publishing more information  Transparency policy  What factors to expose, frequency, format of disclosure
  • 55. Critical Considerations for Big Data Practices 55 Customers will want to know that you are collecting data why and what you are collecting that their confidentiality is preserved that their data is accessible Privacy Customers will want an unique URL where they can see what you’ve collected to know what sensors you are using that an API is interrogating the data Transparency Customers will expect to be the owner of the data & be the copyright holder. To decide who they allow access to (might not even be you) Ownership
  • 56. Concern with Big Data Practices 56 Source : Whitehouse Big Data Review
  • 58. Massive Surveillance vs. Human Rights 58 Article 12: No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation.
  • 59. 59 Source : appledaily, 2015.04.25Source : The Truman Show
  • 60. 60 USA Today 2015.06.03 The New York Times 2015.06.03
  • 61. 61
  • 62. 62 ".... The big question is this: how do we design systems that make use of our data collectively to benefit society as a whole, while at the same time protecting people individual? Or..... how do we find a "Nash equilibrium" for data collection..........."