The document discusses how big data is transforming how we work and live. It explains that big data requires both business and IT approaches to extract value from data. The document promotes embracing big data now for future business success and outlines EMC's big data solutions for storage, analytics, and building new applications.
The Business Case for Green Building in SerbiaJerry Yudelson
The Business Case for Green Building in Eastern Europe. Presentation to Serbia Green Building Council inaugural conference in Belgrade, 23 February 2012.
Design for Interaction
by Daniel Tunkelang, Chief Scientist of Endeca
An invited presentation at SIGMOD '09 (http://sigmod09.org/)
Research in information retrieval has focused on presenting the most relevant results to a user in response to a free-text search query. Research in database systems assumes a model where the user enters a formal query, and the results are exactly those the user requested. Neither community has emphasized user interaction—a critical concern for practical information access.
As William Goffman noted in the 1960s and Nick Belkin continually reminds us today, the relationship between a document and query, though necessary, is not sufficient to determine relevance—yet ranked retrieval approaches rely heavily or exclusively on this relationship. Meanwhile, recent work on database usability by Jeff Naughton and H.V. Jagadish surfaces the rigidity of database systems that return nothing unless users know how to formulate precise queries.
This talk presents human-computer information retrieval (HCIR) as a general approach that addresses some of the key challenges facing both research communities. A vision first put forward by Gary Marchionini, HCIR expects people and systems to work together to implement information access. Such an approach requires rethinking information access not as a matching or ranking problem, but rather as a communication problem. Specifically, we need interfaces that optimize the bidirectional communication between the user and the system, thus optimizing the symbiotic division of labor between the two.
This talk reviews the history of HCIR efforts and presents ongoing work to implement the HCIR vision. In particular, it presents an interactive set retrieval approach that responds to queries with an overview of the user's current context and an organized set of options for incremental exploration.
The Business Case for Green Building in SerbiaJerry Yudelson
The Business Case for Green Building in Eastern Europe. Presentation to Serbia Green Building Council inaugural conference in Belgrade, 23 February 2012.
Design for Interaction
by Daniel Tunkelang, Chief Scientist of Endeca
An invited presentation at SIGMOD '09 (http://sigmod09.org/)
Research in information retrieval has focused on presenting the most relevant results to a user in response to a free-text search query. Research in database systems assumes a model where the user enters a formal query, and the results are exactly those the user requested. Neither community has emphasized user interaction—a critical concern for practical information access.
As William Goffman noted in the 1960s and Nick Belkin continually reminds us today, the relationship between a document and query, though necessary, is not sufficient to determine relevance—yet ranked retrieval approaches rely heavily or exclusively on this relationship. Meanwhile, recent work on database usability by Jeff Naughton and H.V. Jagadish surfaces the rigidity of database systems that return nothing unless users know how to formulate precise queries.
This talk presents human-computer information retrieval (HCIR) as a general approach that addresses some of the key challenges facing both research communities. A vision first put forward by Gary Marchionini, HCIR expects people and systems to work together to implement information access. Such an approach requires rethinking information access not as a matching or ranking problem, but rather as a communication problem. Specifically, we need interfaces that optimize the bidirectional communication between the user and the system, thus optimizing the symbiotic division of labor between the two.
This talk reviews the history of HCIR efforts and presents ongoing work to implement the HCIR vision. In particular, it presents an interactive set retrieval approach that responds to queries with an overview of the user's current context and an organized set of options for incremental exploration.
The Humanitarian Face of Big Data | ICCM 2013Jon Gosier
What's the big deal with Big Data? How does it affect the humanitarian community? Is it all hype? What are the benefits and potential applications? This talk explores the 'humanitarian face of big data'.
CREDITS
========
Smolan, R. (2012) Human Face Of Big Data. Against All Odds Publications
Balet, C. (2013) Strangers in the Light. Gerhard Steidl Druckerei und Verlag
Photos by Josh Grow, Catherine Balet, & Peter Menzel
Cited Projects: D8A.com, AidData.org, un.data.gov, Thomson Reuters, appfrica.com, MetaLayer.com, statfrica.com, SiftDeck.com
The Humanitarian Face of Big Data | ICCM 2013Jon Gosier
What's the big deal with Big Data? How does it affect the humanitarian community? Is it all hype? What are the benefits and potential applications? This talk explores the 'humanitarian face of big data'.
CREDITS
========
Smolan, R. (2012) Human Face Of Big Data. Against All Odds Publications
Balet, C. (2013) Strangers in the Light. Gerhard Steidl Druckerei und Verlag
Photos by Josh Grow, Catherine Balet, & Peter Menzel
Cited Projects: D8A.com, AidData.org, un.data.gov, Thomson Reuters, appfrica.com, MetaLayer.com, statfrica.com, SiftDeck.com
She has been an unofficial ambassador of Satya Paul saris, and now Mandira Bedi has chosen the brand yet again for her return to the small screen as the host of reality show ‘Jo Jeeta Wohi Superstar 2’.
Global e-commerce sales are growing at a steady clip – and to no one’s surprise, fraud is growing, too. E-commerce fraud affects all parties in the payment card value chain – from the major card brands that sit at the top of the industry to the billions of credit and debit cardholders worldwide who shop online.
View session via http://www.emc.com/events/rsa/02-20-13-FraudTrends.htm
Collaboration by individuals, organizations, and communities with the right tools and resources is essential in achieving success with data science. Join us for a live demonstration of how you can leverage a data science platform, an open-source model, internal and external data, analytics tools, and visualization using Hadoop. See how unprecedented access to data scientists can deliver entirely new levels of insight to push the boundaries of what’s possible. Find out what you can do NOW to move your data science efforts forward.
The presentation will discuss the meaning of cloud technologies, various cloud approaches, the three paths to private cloud, challenges associated with private cloud and big data.
Your Data Center Boundaries Don’t Exist Anymore! EMC
In the pre-cloud era, data centers were simpler to define and restrict. As organizations move to public, private, and hybrid clouds, they have to account for internal, industrial, and government compliance initiatives and oversight that impacts data center architecture and information flow. This session describes data center challenges in the Cloud Era and articulates real-life best practices to address those challenges.
( EMC World 2012 ) :Apache Hadoop is now enterprise ready. This session reviews the features/roadmap of Hadoop. We will review some of the key capabilities of GPHD 1.x and our plans for 2012.
Discover what comes next for IBM Watson and the industries particularly suited for Watson solutions, such as healthcare, banking, and the financial sector. All of which deal with massive amounts of unstructured data coming from various sources. Find out how the advanced analytics used in Watson are being put to work in businesses around the world.
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
CloudBoost is a cloud-enabling solution from EMC
Facilitates secure, automatic, efficient data transfer to private and public clouds for Long-Term Retention (LTR) of backups. Seamlessly extends existing data protection solutions to elastic, resilient, scale-out cloud storage
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
With EMC XtremIO all-flash array, improve
1) your competitive agility with real-time analytics & development
2) your infrastructure agility with elastic provisioning for performance & capacity
3) your TCO with 50% lower capex and opex and double the storage lifecycle.
• Citrix & EMC XtremIO: Better Together
• XtremIO Design Fundamentals for VDI
• Citrix XenDesktop & XtremIO
-- Image Management & Storage
-- Demonstrations
-- XtremIO XenDesktop Integration
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
Explore findings from the EMC Forum IT Study and learn how cloud computing, social, mobile, and big data megatrends are shaping IT as a business driver globally.
Reference architecture with MIRANTIS OPENSTACK PLATFORM.The changes that are going on in IT with disruptions from technology, business and culture and so IT to solve the issues has to change from moving from traditional models to broker provider model.
Force Cyber Criminals to Shop Elsewhere
Learn the value of having an Identity Management and Governance solution and how retailers today are benefiting by strengthening their defenses and bolstering their Identity Management capabilities.
Container-based technology has experienced a recent revival and is becoming adopted at an explosive rate. For those that are new to the conversation, containers offer a way to virtualize an operating system. This virtualization isolates processes, providing limited visibility and resource utilization to each, such that the processes appear to be running on separate machines. In short, allowing more applications to run on a single machine. Here is a brief timeline of key moments in container history.
This white paper provides an overview of EMC's data protection solutions for the data lake - an active repository to manage varied and complex Big Data workloads
This infographic highlights key stats and messages from the analyst report from J.Gold Associates that addresses the growing economic impact of mobile cybercrime and fraud.
This white paper describes how an intelligence-driven governance, risk management, and compliance (GRC) model can create an efficient, collaborative enterprise GRC strategy across IT, Finance, Operations, and Legal areas.
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
This white paper discusses the results of a CIO UK survey on a“Trust Paradox,” defined as employees and business partners being both the weakest link in an organization’s security as well as trusted agents in achieving the company’s goals.