SlideShare a Scribd company logo
1
Data is increasingly cheap and ubiquitous. We are now
digitizing analog content that was created over centuries
and collecting myriad new types of data from web logs,
mobile devices, sensors, instruments, and transactions.
IBM estimates that 90 percent of the data in the world
today has been created in the past two years.
The rise of "big data" has the potential to deepen our
understanding of phenomena ranging from physical and
biological systems to human, social and economic
behavior.
Let’s understand the term “DATA
SCIENCE”
Data science is an investigation of where data originates
from, and how it can be transformed into a significant
resource, how it can be beneficial to the fields like
business examination that consolidates software
engineering. Data Science includes utilizing techniques
and numerous algorithms to investigate massive
measures of information and to concentrate learning
from them. Mining a lot of structured and unstructured
information can help an organization get control over
costs, increase operational efficiency, perceive new
market trends and increment the organization's upper
hand.
“DATA SCIENCE PROCESS”
In data science, various components are involved such as
organisation of data, packaging of data and delivering of
data .Organising is the first most phase in which physical
location and structure of the data is planned and then
executed. Packaging is where prototypes are constructed,
the statistics are performed and the visualization is
produced. Delivering is the last most phase where results
gets placed and value of the various operations are
obtained. However, what separates data science from all
other existing roles is that they also need to have a
continual awareness of What, How, Who and Why. A
data scientist needs to know what will be the output of
the data science process and must have a clear vision to
this output. A data scientist needs to have a clearly
defined plan as to how this output is required to
October 2016, Issue-2
IT Flash Newsletter
be achieved within the constraints of available
resources and time. A data scientist needs to deeply
understand who are the people that will be involved
in creating the output and most of all the data
scientists must know why there is a motivation
behind attempting to manifest the creative
visualization.
In this highly competitive world of business, data is
an invaluable resource. Almost all major business are
data-driven i.e. they’re collecting the enormous
amount of data and the conclusions they are drawing
out of that data. This whole process starts with the
process of collection of raw facts and figures
generated from the business operations. As the data is
huge and scattered, it is processed or mined so that
cleaned data set is obtained. After the cleaning
process, data is clustered and analyzed so that these
data patterns could make sense. After analyzing the
data, data is then visualized in the form of statistical
reports and predictive analysis is done on the basis of
these reports. Thus, these statistics are used to base
the company’s decisions, define market scope,
products for the business or may be suitable or
targeted customers for the business.
TOOLS AND TECHNIQUES USED IN DATA
SCIENCE
Data that is handled by the data scientists is not small,
we’re talking here about big data (both structured and
unstructured). Thus, to handle this data, multiple
technologies are used as data science is not a single step
process and has different technical aspects and
requirements at every step. Some of the technologies
and techniques used in data science are:
DATA SCIENCE “PROCESS AND ITS TOOLS”
2
visualization of data after the cleaning
and mining of data is done. It is very
famous among data scientists as it
provides thousands of extension packages
that are needed for statistical modeling of
data. Companies related to finance, health
care, marketing business, etc. use R
language for analysis. Currently
companies like Bing, Facebook and Bank
of America are using R for analysis.
E) Scala – Scala programing language has
become increasingly popular in data
mining because it can perform both object
oriented (OOP) and functional
programming. Companies like
FourSquare, LinkedIn, Siemens and
Twitter are using Scala language.
F) Excel – Excel is a widely available tool
that can perform highly sophisticated
analysis of data. Though it is not capable
of analysis of massive data as compared
to Hadoop but it is powerful enough for
small scale analytic projects which
include clustering, optimization and
predictive analysis using supervised
machine learning.
A) Hadoop –Basically, Hadoop is an open
source software designed for managing the
storage and utilization problems of the big
data by bringing the analytics to the data
for processing by using powerful
functionalities like MapReduce.
Prominent users of Hadoop are Facebook
and Yahoo.
B) Spark – Spark is a framework based on
clustered computing. It has the ability to
run over Hadoop file system and
overcome the speed related problems of
traditional MapReduce by providing data
parallelism and in memory storage instead
of disk making analysis faster.
C) Python – Python is a high level language
which provides excellent libraries for data
science. Some of these libraries are Scipy
and Numpy for statistic modelling, Orange
and Pattern for data mining, Scikit library
for machine learning, etc. Python has
attracted users like EverNote and Spotify.
.
D) R Language – R is a famous software
package which is used to perform
mathematical operations and the
G) SAS – SAS or Statistical
Analysis System is a data
mining software suite used
for data science features like
data management, advanced
analytics and social media
analytics. It uses its analytics
features for quality predictive
modeling of data and
visualization. Despite being
very costly tool, it is very
famous among the data
scientists due to its
integration with open source
tools like R, Python and
Hadoop. Thus, making it a
very powerful tool for data
science
Apart from these techniques
and technologies, many other
technologies are used like IBM
SPSS, A/B Testing,
Optimizely, Maxymyser,
Clojure language, Java
language, Adobe Target, etc.
-Komal Jaiswal and Nitin Jain-
MCA- I and IInd Year
“AI- NIGHTMARE MACHINE KNOWS WHAT SCARES YOU”
The idea of artificial intelligence (AI) —
autonomous computers that can learn
independently. Those individuals
probably wouldn't find it reassuring to
hear that a group of researchers is
deliberately training computers to get
better at scaring people. The project,
appropriately enough, is named
"Nightmare Machine." Digital
innovators in the U.S. and Australia
partnered to create an algorithm that
would enable a computer to
understand what makes certain images
frightening, and then use that data to
transform any image, no matter how
harmless-looking, into the stuff of
nightmares.
Images created by Nightmare Machine
are unsettling. Iconic buildings from
around the world appear eroded and
distorted within shadowy settings or
amid charred and smoldering
landscapes, glimpsed through what
appears to be murky, polluted water or
toxic gas clouds.
Nightmare Machine's faces are equally
disturbing. Some of the subjects are
almost abstract, but subtle — creepy
suggestions of hollow eyes, bloody
shadows and decaying flesh still cause
unease. Even the lovable Muppet
Kermit the Frog emerges from the
process as a zombie-like creature that
would terrify toddlers and adults, too.
The primary reason for building
Nightmare Machine was to explore the
common fear inspired by intelligent
computers. They wanted to playfully
confront the anxiety inspired by AI,
and simultaneously test if a computer
is capable of understanding and
visualizing what makes people afraid.
The designers used a form of artificial
intelligence called "deep learning" —
a system of data structures and
programs mimicking the neural
connections in a human brain.
"Deep-learning algorithms perform
remarkably well in several tasks
considered difficult or impossible,"
The research group's main goal is to
understand the barriers between
human and machine cooperation.
Nightmare Machine could use your
help to learn how to become even
scarier.
3
megha.gupta@jimsindia.org“DDoS ATTACK THAT DISRUPTED INTERNET WAS LARGEST OF ITS KIND IN
HISTORY”
Friday, 21st October 2016
On Friday, 21st
October 2016, When
people of Europe and America having
their prime time for casual news,
reading, tweeting etc.. but some of them
had trouble in accessing their usual sites
and services that day. Similar problems
were reported across the globe where
their servers of Dyn, a company that
controls much of the internet’s domain
name system (DNS) infrastructure were
accessed and on investigation, it was
found that the problem was due to to
Distributed Denial of Service attack
(DDoS).
A Distribute Denial of Service
(DDos) attack is an attempt to make
an online service unavailable by
overwhelming it with traffic from
multiple sources.
The cyber-attack that brought down
much of America’s internet on 21st
October, 2016 was caused by a new
weapon called the Mirai botnet and
is likely the largest of its kind in
history.
It was remained under sustained
assault for most of the day, bringing
down sites including Twitter, the
Guardian, Netflix, Reddit, CNN
and many others in Europe and the
US.
The cause of the outage was a
Distributed Denial of Service
(DDoS) attack, in which a network
of computers infected with special
malware, known as a “botnet”,
were coordinated into bombarding
a server with traffic until it
collapsed under the strain
Mirai was the “primary source of
malicious attack traffic”.
Unlike other botnets, which are
typically made up of computers, the
Mirai botnet is largely made up
of so-called “Internet of Things”
(IoT) devices such as digital
cameras and DVR players.
Because it has so many internet-
connected devices to choose from,
attacks from Mirai are much larger
than what most DDoS attacks could
previously achieve. Dyn estimated
that the attack had involved
“100,000 malicious endpoints”,
and the company, which is still
investigating the attack, said there
had been reports of extraordinary
attack strength of 1.2Tbps.
Sumedha Sen and Tanisha Jain
BCA-IInd Year and MCA-Ist year
“ONLINE PRIVACY MAY BE BOOSTED BY US FCC DATA RULES”
28th
October 2016,
Earlier, customer’s personal
information can be easily shared by
the Internet Service Provider with the
Ad agencies without seeking their
consent and customer starts getting
emails of the product which is not of
their interest. Now, customer can
easily get rid of from at least some
online tracking easily by new
approved rules. On 27th
October 2016,
The Federal Communications
Commission approved rules that
Internet service provider like
OOSTED BY NEW US FCC
DATA RULES
ONLINE PRIVACY MAY
Comcast, AT&T and Verizon
need to ask customers' permission
to use or share much of their data
with third parties like advertisers.
According to the FCC's new rules,
The internet service providers will
be required to get a customer's
explicit consent before they can
use or share "sensitive" personal
information. Sensitive data
includes browsing history, mobile
location data, TV viewing history,
call and text message records, and
mobile apps data we use.
The rules also require service
providers to spell out to consumers
what data they collect and why. It
requires service providers to notify
customers of data breaches. It's the
consumers' information, not the
network's, unless the consumer
gives permission"- FCC Chairman
Tom Wheeler said during a press
conference. "Internet Service
E PRIVACY MAY BE
Providers shouldn't be able to sell
something that isn't theirs without
customer’s permission”. This could
potentially make it harder for Ad-
agencies to build advertising businesses
that could serve as competitors to Google
and Facebook. Google and Facebook-
digital-ad behemoths are not covered
by the new FCC rules.
Cable and phone companies want to
increase revenue from ad businesses of
their own - AT&T has said increasing
advertising tailored to customers'
preferences is one of its goals with its
$85.4 billion purchase of HBO, CNN
and TBS owner Time Warner. Verizon
has bought AOL and agreed to buy
Yahoo in order to build up a digital-ad
business.
FCC officials approved the said rules in
the last week of October, 2016 and these
rules will pose new challenges for
companies like HBO, CNN, and Time
Warner.
RULES
ONLINE PRIVACY MAY BE
4
“MAKE YOUR PASSWORD HACK PROOF BY SENDING IT THROUGH YOUR BODY”
When wireless signals are sent
through the air, there is a possibility
that they can be intercepted by
a hacker. If this wireless
communication contains sensitive
information like a password, this is
particularly concerning.
When we send a wireless
WiFi signal, it’s broadcasting every-
-where and any eavesdropper wifi
channel can hack into the stream and
try to break that encrypted password.
“Fingerprint sensors have so far
been used as an input device. It can
be shown for the first time that
fingerprint sensors can be re-
purposed to send out information
that is confined to the body,” said Dr.
Shyam Gollakota, UW Assistant
Professor of Computer Science and
Engineering.
These “On Body Transmissions”
offers a more secure way to transmit
authenticated information between
devices that touch parts of the body
such as a smart door lock or wearable
medical device and a phone or device
that confirms your identity by asking
you to type in a password.
Let’s say if one wants to open a door
using an electronic smart lock then one
can touch the doorknob and touch the
fingerprint sensor on his/her phone and
transmit his / her secret credentials
through his /her without leaking
that personal information over the
air.”
The research team tested the
technique on iPhone and other
fingerprint sensors as well as
Lenovo laptop trackpads and the
Adafruit capacitive touchpad.
The research team from the
UW’s Networks and Mobile
Systems Lab systematically
analyzed smartphone sensors to
understand which of them
generates low-frequency
transmissions below 30 megahertz
that travel well through the human
body but don’t propagate over the
air.
The researchers found that
fingerprint sensors and touchpads
generate signals in the 2 to 10
megahertz range and
employ capacitive coupling to
sense where your finger is in space
and to identify the ridges and
valleys that form unique
fingerprint patterns.
“UNKNOWN FACTS IN IT”
 The Password for the computer
controls of nuclear tipped missiles of
the U.S was 00000000.
 The first 1 GB hard disk was announced
in 1980 which weighed about 550 pounds
and had a price tag of $40, 000.
 The first microprocessor created by Intel
was the 4004. It was designed for a
calculator.
 The 30th
of November is known as
“Computer Security Day”.
 Hewlett Packard was started at garage
in Palo Alto in 1939.
 The First Computer mouse was
invented by Doug Englebart in around
1964 and was made of wood.
Incharge: Ms. Chandni Kohli Editorial Team: Dr. Praveen Kumar Gupta
Mr. Sanjive Saxena

More Related Content

What's hot

BigData
BigDataBigData
BigData
Viveka Sharma
 
Big data unit i
Big data unit iBig data unit i
Big data unit i
Navjot Kaur
 
A Review Paper on Big Data: Technologies, Tools and Trends
A Review Paper on Big Data: Technologies, Tools and TrendsA Review Paper on Big Data: Technologies, Tools and Trends
A Review Paper on Big Data: Technologies, Tools and Trends
IRJET Journal
 
An Introduction to Big Data
An Introduction to Big DataAn Introduction to Big Data
An Introduction to Big Data
eXascale Infolab
 
Data Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesData Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research Opportunities
Kathirvel Ayyaswamy
 
Big data
Big dataBig data
Motivation for big data
Motivation for big dataMotivation for big data
Motivation for big data
Arockiaraj Durairaj
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
130214 copy
130214   copy130214   copy
130214 copy
Arpit Arora
 
Big data (word file)
Big data  (word file)Big data  (word file)
Big data (word file)
Shahbaz Anjam
 
Research paper on big data and hadoop
Research paper on big data and hadoopResearch paper on big data and hadoop
Research paper on big data and hadoop
Shree M.L.Kakadiya MCA mahila college, Amreli
 
Challenges of Big Data Research
Challenges of Big Data ResearchChallenges of Big Data Research
Challenges of Big Data Research
Regional Science Academy
 
Big Data Analytics : Understanding for Research Activity
Big Data Analytics : Understanding for Research ActivityBig Data Analytics : Understanding for Research Activity
Big Data Analytics : Understanding for Research Activity
Andry Alamsyah
 
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of thingsBig Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Ramakant Gawande
 
Big Data World
Big Data WorldBig Data World
Big Data World
Hossein Zahed
 
Big Data and Computer Science Education
Big Data and Computer Science EducationBig Data and Computer Science Education
Big Data and Computer Science Education
James Hendler
 
#BigDataCanarias: "Big Data & Career Paths"
#BigDataCanarias: "Big Data & Career Paths"#BigDataCanarias: "Big Data & Career Paths"
#BigDataCanarias: "Big Data & Career Paths"
Marcos Colebrook-Santamaria
 
A Big Data Timeline
A Big Data TimelineA Big Data Timeline
A Big Data Timeline
Big Cloud
 

What's hot (20)

1
11
1
 
BigData
BigDataBigData
BigData
 
Big data unit i
Big data unit iBig data unit i
Big data unit i
 
A Review Paper on Big Data: Technologies, Tools and Trends
A Review Paper on Big Data: Technologies, Tools and TrendsA Review Paper on Big Data: Technologies, Tools and Trends
A Review Paper on Big Data: Technologies, Tools and Trends
 
An Introduction to Big Data
An Introduction to Big DataAn Introduction to Big Data
An Introduction to Big Data
 
Data Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesData Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research Opportunities
 
Big data
Big dataBig data
Big data
 
Motivation for big data
Motivation for big dataMotivation for big data
Motivation for big data
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
130214 copy
130214   copy130214   copy
130214 copy
 
Big data (word file)
Big data  (word file)Big data  (word file)
Big data (word file)
 
Research paper on big data and hadoop
Research paper on big data and hadoopResearch paper on big data and hadoop
Research paper on big data and hadoop
 
Challenges of Big Data Research
Challenges of Big Data ResearchChallenges of Big Data Research
Challenges of Big Data Research
 
Big Data Analytics : Understanding for Research Activity
Big Data Analytics : Understanding for Research ActivityBig Data Analytics : Understanding for Research Activity
Big Data Analytics : Understanding for Research Activity
 
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of thingsBig Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
 
Big Data-Job 2
Big Data-Job 2Big Data-Job 2
Big Data-Job 2
 
Big Data World
Big Data WorldBig Data World
Big Data World
 
Big Data and Computer Science Education
Big Data and Computer Science EducationBig Data and Computer Science Education
Big Data and Computer Science Education
 
#BigDataCanarias: "Big Data & Career Paths"
#BigDataCanarias: "Big Data & Career Paths"#BigDataCanarias: "Big Data & Career Paths"
#BigDataCanarias: "Big Data & Career Paths"
 
A Big Data Timeline
A Big Data TimelineA Big Data Timeline
A Big Data Timeline
 

Viewers also liked

Itepalcingo aprendizaje competencias.
Itepalcingo aprendizaje competencias.Itepalcingo aprendizaje competencias.
Itepalcingo aprendizaje competencias.Ivontv
 
Nathan Rosen's book review in New York Law Journal, September 28, 2015 on Sim...
Nathan Rosen's book review in New York Law Journal, September 28, 2015 on Sim...Nathan Rosen's book review in New York Law Journal, September 28, 2015 on Sim...
Nathan Rosen's book review in New York Law Journal, September 28, 2015 on Sim...
Nathan Rosen
 
120417 trends4
120417 trends4120417 trends4
120417 trends4jmgd007
 
Actividades inicio de año y responsabilidades del movimiento estudiantil
Actividades inicio de año y responsabilidades del movimiento estudiantilActividades inicio de año y responsabilidades del movimiento estudiantil
Actividades inicio de año y responsabilidades del movimiento estudiantilMauro León
 
Eu vg mghv
Eu vg mghvEu vg mghv
Eu vg mghv12mary
 
Momentos de la experiencia de aprendizaje
Momentos de la experiencia de aprendizajeMomentos de la experiencia de aprendizaje
Momentos de la experiencia de aprendizaje
eugenia_vilema
 
Caracterización de subpoblaciones celulares asociadas al proceso inflamatorio...
Caracterización de subpoblaciones celulares asociadas al proceso inflamatorio...Caracterización de subpoblaciones celulares asociadas al proceso inflamatorio...
Caracterización de subpoblaciones celulares asociadas al proceso inflamatorio...
Conferencia Sindrome Metabolico
 
Everything you need to know about LinkedIn to create powerfully persuasive pr...
Everything you need to know about LinkedIn to create powerfully persuasive pr...Everything you need to know about LinkedIn to create powerfully persuasive pr...
Everything you need to know about LinkedIn to create powerfully persuasive pr...
Nathan Rosen
 
El arte y el juego
El arte y el juegoEl arte y el juego
El arte y el juego
gene0307
 
NJFuture Redevelopment Forum 2016 Holt
NJFuture Redevelopment Forum 2016 HoltNJFuture Redevelopment Forum 2016 Holt
NJFuture Redevelopment Forum 2016 Holt
New Jersey Future
 
Dealing in un inspected non-fungible
Dealing in un inspected non-fungibleDealing in un inspected non-fungible
Dealing in un inspected non-fungible
Rana Muneer Ahmad
 

Viewers also liked (15)

Itepalcingo aprendizaje competencias.
Itepalcingo aprendizaje competencias.Itepalcingo aprendizaje competencias.
Itepalcingo aprendizaje competencias.
 
Nathan Rosen's book review in New York Law Journal, September 28, 2015 on Sim...
Nathan Rosen's book review in New York Law Journal, September 28, 2015 on Sim...Nathan Rosen's book review in New York Law Journal, September 28, 2015 on Sim...
Nathan Rosen's book review in New York Law Journal, September 28, 2015 on Sim...
 
120417 trends4
120417 trends4120417 trends4
120417 trends4
 
Actividades inicio de año y responsabilidades del movimiento estudiantil
Actividades inicio de año y responsabilidades del movimiento estudiantilActividades inicio de año y responsabilidades del movimiento estudiantil
Actividades inicio de año y responsabilidades del movimiento estudiantil
 
Eu vg mghv
Eu vg mghvEu vg mghv
Eu vg mghv
 
Actividad 8
Actividad 8Actividad 8
Actividad 8
 
Momentos de la experiencia de aprendizaje
Momentos de la experiencia de aprendizajeMomentos de la experiencia de aprendizaje
Momentos de la experiencia de aprendizaje
 
Caracterización de subpoblaciones celulares asociadas al proceso inflamatorio...
Caracterización de subpoblaciones celulares asociadas al proceso inflamatorio...Caracterización de subpoblaciones celulares asociadas al proceso inflamatorio...
Caracterización de subpoblaciones celulares asociadas al proceso inflamatorio...
 
Dudwk7
Dudwk7Dudwk7
Dudwk7
 
Everything you need to know about LinkedIn to create powerfully persuasive pr...
Everything you need to know about LinkedIn to create powerfully persuasive pr...Everything you need to know about LinkedIn to create powerfully persuasive pr...
Everything you need to know about LinkedIn to create powerfully persuasive pr...
 
El arte y el juego
El arte y el juegoEl arte y el juego
El arte y el juego
 
Ponte 7Zip
Ponte 7ZipPonte 7Zip
Ponte 7Zip
 
Paso 1
Paso 1Paso 1
Paso 1
 
NJFuture Redevelopment Forum 2016 Holt
NJFuture Redevelopment Forum 2016 HoltNJFuture Redevelopment Forum 2016 Holt
NJFuture Redevelopment Forum 2016 Holt
 
Dealing in un inspected non-fungible
Dealing in un inspected non-fungibleDealing in un inspected non-fungible
Dealing in un inspected non-fungible
 

Similar to JIMS Rohini IT Flash Monthly Newsletter - October Issue

Big data
Big dataBig data
Big data
Abhishek Palo
 
Big data
Big dataBig data
Big data
Abhishek Palo
 
Big data-ppt-
Big data-ppt-Big data-ppt-
Big data-ppt-
Bhagya Patil
 
Age Friendly Economy - Introduction to Big Data
Age Friendly Economy - Introduction to Big DataAge Friendly Economy - Introduction to Big Data
Age Friendly Economy - Introduction to Big Data
AgeFriendlyEconomy
 
Big data-ppt
Big data-pptBig data-ppt
Big data-ppt
Nazir Ahmed
 
Introduction to big data – convergences.
Introduction to big data – convergences.Introduction to big data – convergences.
Introduction to big data – convergences.
saranya270513
 
Whitepaper: Know Your Big Data – in 10 Minutes! - Happiest Minds
Whitepaper: Know Your Big Data – in 10 Minutes! - Happiest MindsWhitepaper: Know Your Big Data – in 10 Minutes! - Happiest Minds
Whitepaper: Know Your Big Data – in 10 Minutes! - Happiest Minds
Happiest Minds Technologies
 
Tools for Unstructured Data Analytics
Tools for Unstructured Data AnalyticsTools for Unstructured Data Analytics
Tools for Unstructured Data AnalyticsRavi Teja
 
Big Data: Big Issues for IP
Big Data: Big Issues for IPBig Data: Big Issues for IP
Big Data: Big Issues for IP
Dr. Haxel Consult
 
Unit 1 Introduction to Data Analytics .pptx
Unit 1 Introduction to Data Analytics .pptxUnit 1 Introduction to Data Analytics .pptx
Unit 1 Introduction to Data Analytics .pptx
vipulkondekar
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applicationsSubrat Swain
 
The future of big data analytics
The future of big data analyticsThe future of big data analytics
The future of big data analytics
Ahmed Banafa
 
Big Data And Analytics: A Summary Of The X 4.0 Era
Big Data And Analytics: A Summary Of The X 4.0 EraBig Data And Analytics: A Summary Of The X 4.0 Era
Big Data And Analytics: A Summary Of The X 4.0 Era
JohnWilson47710
 
Moving Toward Big Data: Challenges, Trends and Perspectives
Moving Toward Big Data: Challenges, Trends and PerspectivesMoving Toward Big Data: Challenges, Trends and Perspectives
Moving Toward Big Data: Challenges, Trends and Perspectives
IJRESJOURNAL
 
1 UNIT-DSP.pptx
1 UNIT-DSP.pptx1 UNIT-DSP.pptx
1 UNIT-DSP.pptx
PothyeswariPothyes
 
Smart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart dataSmart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart data
caniceconsulting
 
An Overview of BigData
An Overview of BigDataAn Overview of BigData
An Overview of BigData
Valarmathi V
 
Big data seminor
Big data seminorBig data seminor
Big data seminor
berasrujana
 
UNIT 1 -BIG DATA ANALYTICS Full.pdf
UNIT 1 -BIG DATA ANALYTICS Full.pdfUNIT 1 -BIG DATA ANALYTICS Full.pdf
UNIT 1 -BIG DATA ANALYTICS Full.pdf
vvpadhu
 
Big data
Big dataBig data
Big data
ArchanaMani2
 

Similar to JIMS Rohini IT Flash Monthly Newsletter - October Issue (20)

Big data
Big dataBig data
Big data
 
Big data
Big dataBig data
Big data
 
Big data-ppt-
Big data-ppt-Big data-ppt-
Big data-ppt-
 
Age Friendly Economy - Introduction to Big Data
Age Friendly Economy - Introduction to Big DataAge Friendly Economy - Introduction to Big Data
Age Friendly Economy - Introduction to Big Data
 
Big data-ppt
Big data-pptBig data-ppt
Big data-ppt
 
Introduction to big data – convergences.
Introduction to big data – convergences.Introduction to big data – convergences.
Introduction to big data – convergences.
 
Whitepaper: Know Your Big Data – in 10 Minutes! - Happiest Minds
Whitepaper: Know Your Big Data – in 10 Minutes! - Happiest MindsWhitepaper: Know Your Big Data – in 10 Minutes! - Happiest Minds
Whitepaper: Know Your Big Data – in 10 Minutes! - Happiest Minds
 
Tools for Unstructured Data Analytics
Tools for Unstructured Data AnalyticsTools for Unstructured Data Analytics
Tools for Unstructured Data Analytics
 
Big Data: Big Issues for IP
Big Data: Big Issues for IPBig Data: Big Issues for IP
Big Data: Big Issues for IP
 
Unit 1 Introduction to Data Analytics .pptx
Unit 1 Introduction to Data Analytics .pptxUnit 1 Introduction to Data Analytics .pptx
Unit 1 Introduction to Data Analytics .pptx
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
 
The future of big data analytics
The future of big data analyticsThe future of big data analytics
The future of big data analytics
 
Big Data And Analytics: A Summary Of The X 4.0 Era
Big Data And Analytics: A Summary Of The X 4.0 EraBig Data And Analytics: A Summary Of The X 4.0 Era
Big Data And Analytics: A Summary Of The X 4.0 Era
 
Moving Toward Big Data: Challenges, Trends and Perspectives
Moving Toward Big Data: Challenges, Trends and PerspectivesMoving Toward Big Data: Challenges, Trends and Perspectives
Moving Toward Big Data: Challenges, Trends and Perspectives
 
1 UNIT-DSP.pptx
1 UNIT-DSP.pptx1 UNIT-DSP.pptx
1 UNIT-DSP.pptx
 
Smart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart dataSmart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart data
 
An Overview of BigData
An Overview of BigDataAn Overview of BigData
An Overview of BigData
 
Big data seminor
Big data seminorBig data seminor
Big data seminor
 
UNIT 1 -BIG DATA ANALYTICS Full.pdf
UNIT 1 -BIG DATA ANALYTICS Full.pdfUNIT 1 -BIG DATA ANALYTICS Full.pdf
UNIT 1 -BIG DATA ANALYTICS Full.pdf
 
Big data
Big dataBig data
Big data
 

More from JIMS Rohini Sector 5

Verve 2024 JIMS Rohini Annual Fest Delhi College Fest
Verve 2024 JIMS Rohini Annual Fest Delhi College FestVerve 2024 JIMS Rohini Annual Fest Delhi College Fest
Verve 2024 JIMS Rohini Annual Fest Delhi College Fest
JIMS Rohini Sector 5
 
Export Procedure of Rice from India to Russia
Export Procedure of Rice from India to RussiaExport Procedure of Rice from India to Russia
Export Procedure of Rice from India to Russia
JIMS Rohini Sector 5
 
Enhancing Multi-Refinery Supply Chain Efficiency
Enhancing Multi-Refinery Supply Chain EfficiencyEnhancing Multi-Refinery Supply Chain Efficiency
Enhancing Multi-Refinery Supply Chain Efficiency
JIMS Rohini Sector 5
 
Case Study Inland Container Depot Supply Chain
Case Study Inland Container Depot Supply ChainCase Study Inland Container Depot Supply Chain
Case Study Inland Container Depot Supply Chain
JIMS Rohini Sector 5
 
JIMS Rohini PGDM Newsletter | July 2023
JIMS Rohini PGDM Newsletter  | July 2023JIMS Rohini PGDM Newsletter  | July 2023
JIMS Rohini PGDM Newsletter | July 2023
JIMS Rohini Sector 5
 
JIMS Placement highlights batch 2021-23
JIMS Placement highlights  batch 2021-23JIMS Placement highlights  batch 2021-23
JIMS Placement highlights batch 2021-23
JIMS Rohini Sector 5
 
Annual Students Convention- Prastuti 2018
Annual Students Convention- Prastuti 2018Annual Students Convention- Prastuti 2018
Annual Students Convention- Prastuti 2018
JIMS Rohini Sector 5
 
IT FDP on computing technologies- A Panoramic View
IT FDP on computing technologies- A Panoramic ViewIT FDP on computing technologies- A Panoramic View
IT FDP on computing technologies- A Panoramic View
JIMS Rohini Sector 5
 
JIMS Rohini Alumni Magazine Pizzazz 2017
JIMS Rohini Alumni Magazine Pizzazz 2017JIMS Rohini Alumni Magazine Pizzazz 2017
JIMS Rohini Alumni Magazine Pizzazz 2017
JIMS Rohini Sector 5
 
TechByte 2017 - 14th Annual IT Symposium- - JIMS Rohini
TechByte 2017 - 14th Annual IT Symposium- - JIMS RohiniTechByte 2017 - 14th Annual IT Symposium- - JIMS Rohini
TechByte 2017 - 14th Annual IT Symposium- - JIMS Rohini
JIMS Rohini Sector 5
 
MDP on Conflict Management at Workplace
MDP on Conflict Management at WorkplaceMDP on Conflict Management at Workplace
MDP on Conflict Management at Workplace
JIMS Rohini Sector 5
 
JIMS Rohini PGDM Retail Management Program
JIMS Rohini PGDM Retail Management ProgramJIMS Rohini PGDM Retail Management Program
JIMS Rohini PGDM Retail Management Program
JIMS Rohini Sector 5
 
International Conference | ICAMP2017 - JIMS Rohini
International Conference | ICAMP2017 - JIMS RohiniInternational Conference | ICAMP2017 - JIMS Rohini
International Conference | ICAMP2017 - JIMS Rohini
JIMS Rohini Sector 5
 
JIMS Rohini PGDM Admissions are Open For Session 2017-19
JIMS Rohini PGDM Admissions are Open For Session 2017-19JIMS Rohini PGDM Admissions are Open For Session 2017-19
JIMS Rohini PGDM Admissions are Open For Session 2017-19
JIMS Rohini Sector 5
 
JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’
 JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’ JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’
JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’
JIMS Rohini Sector 5
 
JIMS Rohini News - Introduction to Derivatives
JIMS Rohini News - Introduction to DerivativesJIMS Rohini News - Introduction to Derivatives
JIMS Rohini News - Introduction to Derivatives
JIMS Rohini Sector 5
 
Top Management College - JIMS Rohini News - Data Collection - PGDM - BBA - ...
Top Management College - JIMS Rohini News - Data Collection -  PGDM - BBA  - ...Top Management College - JIMS Rohini News - Data Collection -  PGDM - BBA  - ...
Top Management College - JIMS Rohini News - Data Collection - PGDM - BBA - ...
JIMS Rohini Sector 5
 
Post Graduate Diploma in Management - JIMS Rohini Admissions Open 2016 - JIMS...
Post Graduate Diploma in Management - JIMS Rohini Admissions Open 2016 - JIMS...Post Graduate Diploma in Management - JIMS Rohini Admissions Open 2016 - JIMS...
Post Graduate Diploma in Management - JIMS Rohini Admissions Open 2016 - JIMS...
JIMS Rohini Sector 5
 
Replacement Problem - Dr. Bhupender SOM - JIMS Rohini Faculty Presentation
Replacement Problem - Dr. Bhupender SOM - JIMS Rohini Faculty PresentationReplacement Problem - Dr. Bhupender SOM - JIMS Rohini Faculty Presentation
Replacement Problem - Dr. Bhupender SOM - JIMS Rohini Faculty Presentation
JIMS Rohini Sector 5
 
JIMS Rohini News - PGDM - IB Admissions Open - JIMS Rohini News
JIMS Rohini News - PGDM - IB Admissions Open - JIMS Rohini NewsJIMS Rohini News - PGDM - IB Admissions Open - JIMS Rohini News
JIMS Rohini News - PGDM - IB Admissions Open - JIMS Rohini News
JIMS Rohini Sector 5
 

More from JIMS Rohini Sector 5 (20)

Verve 2024 JIMS Rohini Annual Fest Delhi College Fest
Verve 2024 JIMS Rohini Annual Fest Delhi College FestVerve 2024 JIMS Rohini Annual Fest Delhi College Fest
Verve 2024 JIMS Rohini Annual Fest Delhi College Fest
 
Export Procedure of Rice from India to Russia
Export Procedure of Rice from India to RussiaExport Procedure of Rice from India to Russia
Export Procedure of Rice from India to Russia
 
Enhancing Multi-Refinery Supply Chain Efficiency
Enhancing Multi-Refinery Supply Chain EfficiencyEnhancing Multi-Refinery Supply Chain Efficiency
Enhancing Multi-Refinery Supply Chain Efficiency
 
Case Study Inland Container Depot Supply Chain
Case Study Inland Container Depot Supply ChainCase Study Inland Container Depot Supply Chain
Case Study Inland Container Depot Supply Chain
 
JIMS Rohini PGDM Newsletter | July 2023
JIMS Rohini PGDM Newsletter  | July 2023JIMS Rohini PGDM Newsletter  | July 2023
JIMS Rohini PGDM Newsletter | July 2023
 
JIMS Placement highlights batch 2021-23
JIMS Placement highlights  batch 2021-23JIMS Placement highlights  batch 2021-23
JIMS Placement highlights batch 2021-23
 
Annual Students Convention- Prastuti 2018
Annual Students Convention- Prastuti 2018Annual Students Convention- Prastuti 2018
Annual Students Convention- Prastuti 2018
 
IT FDP on computing technologies- A Panoramic View
IT FDP on computing technologies- A Panoramic ViewIT FDP on computing technologies- A Panoramic View
IT FDP on computing technologies- A Panoramic View
 
JIMS Rohini Alumni Magazine Pizzazz 2017
JIMS Rohini Alumni Magazine Pizzazz 2017JIMS Rohini Alumni Magazine Pizzazz 2017
JIMS Rohini Alumni Magazine Pizzazz 2017
 
TechByte 2017 - 14th Annual IT Symposium- - JIMS Rohini
TechByte 2017 - 14th Annual IT Symposium- - JIMS RohiniTechByte 2017 - 14th Annual IT Symposium- - JIMS Rohini
TechByte 2017 - 14th Annual IT Symposium- - JIMS Rohini
 
MDP on Conflict Management at Workplace
MDP on Conflict Management at WorkplaceMDP on Conflict Management at Workplace
MDP on Conflict Management at Workplace
 
JIMS Rohini PGDM Retail Management Program
JIMS Rohini PGDM Retail Management ProgramJIMS Rohini PGDM Retail Management Program
JIMS Rohini PGDM Retail Management Program
 
International Conference | ICAMP2017 - JIMS Rohini
International Conference | ICAMP2017 - JIMS RohiniInternational Conference | ICAMP2017 - JIMS Rohini
International Conference | ICAMP2017 - JIMS Rohini
 
JIMS Rohini PGDM Admissions are Open For Session 2017-19
JIMS Rohini PGDM Admissions are Open For Session 2017-19JIMS Rohini PGDM Admissions are Open For Session 2017-19
JIMS Rohini PGDM Admissions are Open For Session 2017-19
 
JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’
 JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’ JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’
JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’
 
JIMS Rohini News - Introduction to Derivatives
JIMS Rohini News - Introduction to DerivativesJIMS Rohini News - Introduction to Derivatives
JIMS Rohini News - Introduction to Derivatives
 
Top Management College - JIMS Rohini News - Data Collection - PGDM - BBA - ...
Top Management College - JIMS Rohini News - Data Collection -  PGDM - BBA  - ...Top Management College - JIMS Rohini News - Data Collection -  PGDM - BBA  - ...
Top Management College - JIMS Rohini News - Data Collection - PGDM - BBA - ...
 
Post Graduate Diploma in Management - JIMS Rohini Admissions Open 2016 - JIMS...
Post Graduate Diploma in Management - JIMS Rohini Admissions Open 2016 - JIMS...Post Graduate Diploma in Management - JIMS Rohini Admissions Open 2016 - JIMS...
Post Graduate Diploma in Management - JIMS Rohini Admissions Open 2016 - JIMS...
 
Replacement Problem - Dr. Bhupender SOM - JIMS Rohini Faculty Presentation
Replacement Problem - Dr. Bhupender SOM - JIMS Rohini Faculty PresentationReplacement Problem - Dr. Bhupender SOM - JIMS Rohini Faculty Presentation
Replacement Problem - Dr. Bhupender SOM - JIMS Rohini Faculty Presentation
 
JIMS Rohini News - PGDM - IB Admissions Open - JIMS Rohini News
JIMS Rohini News - PGDM - IB Admissions Open - JIMS Rohini NewsJIMS Rohini News - PGDM - IB Admissions Open - JIMS Rohini News
JIMS Rohini News - PGDM - IB Admissions Open - JIMS Rohini News
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

JIMS Rohini IT Flash Monthly Newsletter - October Issue

  • 1. 1 Data is increasingly cheap and ubiquitous. We are now digitizing analog content that was created over centuries and collecting myriad new types of data from web logs, mobile devices, sensors, instruments, and transactions. IBM estimates that 90 percent of the data in the world today has been created in the past two years. The rise of "big data" has the potential to deepen our understanding of phenomena ranging from physical and biological systems to human, social and economic behavior. Let’s understand the term “DATA SCIENCE” Data science is an investigation of where data originates from, and how it can be transformed into a significant resource, how it can be beneficial to the fields like business examination that consolidates software engineering. Data Science includes utilizing techniques and numerous algorithms to investigate massive measures of information and to concentrate learning from them. Mining a lot of structured and unstructured information can help an organization get control over costs, increase operational efficiency, perceive new market trends and increment the organization's upper hand. “DATA SCIENCE PROCESS” In data science, various components are involved such as organisation of data, packaging of data and delivering of data .Organising is the first most phase in which physical location and structure of the data is planned and then executed. Packaging is where prototypes are constructed, the statistics are performed and the visualization is produced. Delivering is the last most phase where results gets placed and value of the various operations are obtained. However, what separates data science from all other existing roles is that they also need to have a continual awareness of What, How, Who and Why. A data scientist needs to know what will be the output of the data science process and must have a clear vision to this output. A data scientist needs to have a clearly defined plan as to how this output is required to October 2016, Issue-2 IT Flash Newsletter be achieved within the constraints of available resources and time. A data scientist needs to deeply understand who are the people that will be involved in creating the output and most of all the data scientists must know why there is a motivation behind attempting to manifest the creative visualization. In this highly competitive world of business, data is an invaluable resource. Almost all major business are data-driven i.e. they’re collecting the enormous amount of data and the conclusions they are drawing out of that data. This whole process starts with the process of collection of raw facts and figures generated from the business operations. As the data is huge and scattered, it is processed or mined so that cleaned data set is obtained. After the cleaning process, data is clustered and analyzed so that these data patterns could make sense. After analyzing the data, data is then visualized in the form of statistical reports and predictive analysis is done on the basis of these reports. Thus, these statistics are used to base the company’s decisions, define market scope, products for the business or may be suitable or targeted customers for the business. TOOLS AND TECHNIQUES USED IN DATA SCIENCE Data that is handled by the data scientists is not small, we’re talking here about big data (both structured and unstructured). Thus, to handle this data, multiple technologies are used as data science is not a single step process and has different technical aspects and requirements at every step. Some of the technologies and techniques used in data science are: DATA SCIENCE “PROCESS AND ITS TOOLS”
  • 2. 2 visualization of data after the cleaning and mining of data is done. It is very famous among data scientists as it provides thousands of extension packages that are needed for statistical modeling of data. Companies related to finance, health care, marketing business, etc. use R language for analysis. Currently companies like Bing, Facebook and Bank of America are using R for analysis. E) Scala – Scala programing language has become increasingly popular in data mining because it can perform both object oriented (OOP) and functional programming. Companies like FourSquare, LinkedIn, Siemens and Twitter are using Scala language. F) Excel – Excel is a widely available tool that can perform highly sophisticated analysis of data. Though it is not capable of analysis of massive data as compared to Hadoop but it is powerful enough for small scale analytic projects which include clustering, optimization and predictive analysis using supervised machine learning. A) Hadoop –Basically, Hadoop is an open source software designed for managing the storage and utilization problems of the big data by bringing the analytics to the data for processing by using powerful functionalities like MapReduce. Prominent users of Hadoop are Facebook and Yahoo. B) Spark – Spark is a framework based on clustered computing. It has the ability to run over Hadoop file system and overcome the speed related problems of traditional MapReduce by providing data parallelism and in memory storage instead of disk making analysis faster. C) Python – Python is a high level language which provides excellent libraries for data science. Some of these libraries are Scipy and Numpy for statistic modelling, Orange and Pattern for data mining, Scikit library for machine learning, etc. Python has attracted users like EverNote and Spotify. . D) R Language – R is a famous software package which is used to perform mathematical operations and the G) SAS – SAS or Statistical Analysis System is a data mining software suite used for data science features like data management, advanced analytics and social media analytics. It uses its analytics features for quality predictive modeling of data and visualization. Despite being very costly tool, it is very famous among the data scientists due to its integration with open source tools like R, Python and Hadoop. Thus, making it a very powerful tool for data science Apart from these techniques and technologies, many other technologies are used like IBM SPSS, A/B Testing, Optimizely, Maxymyser, Clojure language, Java language, Adobe Target, etc. -Komal Jaiswal and Nitin Jain- MCA- I and IInd Year “AI- NIGHTMARE MACHINE KNOWS WHAT SCARES YOU” The idea of artificial intelligence (AI) — autonomous computers that can learn independently. Those individuals probably wouldn't find it reassuring to hear that a group of researchers is deliberately training computers to get better at scaring people. The project, appropriately enough, is named "Nightmare Machine." Digital innovators in the U.S. and Australia partnered to create an algorithm that would enable a computer to understand what makes certain images frightening, and then use that data to transform any image, no matter how harmless-looking, into the stuff of nightmares. Images created by Nightmare Machine are unsettling. Iconic buildings from around the world appear eroded and distorted within shadowy settings or amid charred and smoldering landscapes, glimpsed through what appears to be murky, polluted water or toxic gas clouds. Nightmare Machine's faces are equally disturbing. Some of the subjects are almost abstract, but subtle — creepy suggestions of hollow eyes, bloody shadows and decaying flesh still cause unease. Even the lovable Muppet Kermit the Frog emerges from the process as a zombie-like creature that would terrify toddlers and adults, too. The primary reason for building Nightmare Machine was to explore the common fear inspired by intelligent computers. They wanted to playfully confront the anxiety inspired by AI, and simultaneously test if a computer is capable of understanding and visualizing what makes people afraid. The designers used a form of artificial intelligence called "deep learning" — a system of data structures and programs mimicking the neural connections in a human brain. "Deep-learning algorithms perform remarkably well in several tasks considered difficult or impossible," The research group's main goal is to understand the barriers between human and machine cooperation. Nightmare Machine could use your help to learn how to become even scarier.
  • 3. 3 megha.gupta@jimsindia.org“DDoS ATTACK THAT DISRUPTED INTERNET WAS LARGEST OF ITS KIND IN HISTORY” Friday, 21st October 2016 On Friday, 21st October 2016, When people of Europe and America having their prime time for casual news, reading, tweeting etc.. but some of them had trouble in accessing their usual sites and services that day. Similar problems were reported across the globe where their servers of Dyn, a company that controls much of the internet’s domain name system (DNS) infrastructure were accessed and on investigation, it was found that the problem was due to to Distributed Denial of Service attack (DDoS). A Distribute Denial of Service (DDos) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. The cyber-attack that brought down much of America’s internet on 21st October, 2016 was caused by a new weapon called the Mirai botnet and is likely the largest of its kind in history. It was remained under sustained assault for most of the day, bringing down sites including Twitter, the Guardian, Netflix, Reddit, CNN and many others in Europe and the US. The cause of the outage was a Distributed Denial of Service (DDoS) attack, in which a network of computers infected with special malware, known as a “botnet”, were coordinated into bombarding a server with traffic until it collapsed under the strain Mirai was the “primary source of malicious attack traffic”. Unlike other botnets, which are typically made up of computers, the Mirai botnet is largely made up of so-called “Internet of Things” (IoT) devices such as digital cameras and DVR players. Because it has so many internet- connected devices to choose from, attacks from Mirai are much larger than what most DDoS attacks could previously achieve. Dyn estimated that the attack had involved “100,000 malicious endpoints”, and the company, which is still investigating the attack, said there had been reports of extraordinary attack strength of 1.2Tbps. Sumedha Sen and Tanisha Jain BCA-IInd Year and MCA-Ist year “ONLINE PRIVACY MAY BE BOOSTED BY US FCC DATA RULES” 28th October 2016, Earlier, customer’s personal information can be easily shared by the Internet Service Provider with the Ad agencies without seeking their consent and customer starts getting emails of the product which is not of their interest. Now, customer can easily get rid of from at least some online tracking easily by new approved rules. On 27th October 2016, The Federal Communications Commission approved rules that Internet service provider like OOSTED BY NEW US FCC DATA RULES ONLINE PRIVACY MAY Comcast, AT&T and Verizon need to ask customers' permission to use or share much of their data with third parties like advertisers. According to the FCC's new rules, The internet service providers will be required to get a customer's explicit consent before they can use or share "sensitive" personal information. Sensitive data includes browsing history, mobile location data, TV viewing history, call and text message records, and mobile apps data we use. The rules also require service providers to spell out to consumers what data they collect and why. It requires service providers to notify customers of data breaches. It's the consumers' information, not the network's, unless the consumer gives permission"- FCC Chairman Tom Wheeler said during a press conference. "Internet Service E PRIVACY MAY BE Providers shouldn't be able to sell something that isn't theirs without customer’s permission”. This could potentially make it harder for Ad- agencies to build advertising businesses that could serve as competitors to Google and Facebook. Google and Facebook- digital-ad behemoths are not covered by the new FCC rules. Cable and phone companies want to increase revenue from ad businesses of their own - AT&T has said increasing advertising tailored to customers' preferences is one of its goals with its $85.4 billion purchase of HBO, CNN and TBS owner Time Warner. Verizon has bought AOL and agreed to buy Yahoo in order to build up a digital-ad business. FCC officials approved the said rules in the last week of October, 2016 and these rules will pose new challenges for companies like HBO, CNN, and Time Warner. RULES ONLINE PRIVACY MAY BE
  • 4. 4 “MAKE YOUR PASSWORD HACK PROOF BY SENDING IT THROUGH YOUR BODY” When wireless signals are sent through the air, there is a possibility that they can be intercepted by a hacker. If this wireless communication contains sensitive information like a password, this is particularly concerning. When we send a wireless WiFi signal, it’s broadcasting every- -where and any eavesdropper wifi channel can hack into the stream and try to break that encrypted password. “Fingerprint sensors have so far been used as an input device. It can be shown for the first time that fingerprint sensors can be re- purposed to send out information that is confined to the body,” said Dr. Shyam Gollakota, UW Assistant Professor of Computer Science and Engineering. These “On Body Transmissions” offers a more secure way to transmit authenticated information between devices that touch parts of the body such as a smart door lock or wearable medical device and a phone or device that confirms your identity by asking you to type in a password. Let’s say if one wants to open a door using an electronic smart lock then one can touch the doorknob and touch the fingerprint sensor on his/her phone and transmit his / her secret credentials through his /her without leaking that personal information over the air.” The research team tested the technique on iPhone and other fingerprint sensors as well as Lenovo laptop trackpads and the Adafruit capacitive touchpad. The research team from the UW’s Networks and Mobile Systems Lab systematically analyzed smartphone sensors to understand which of them generates low-frequency transmissions below 30 megahertz that travel well through the human body but don’t propagate over the air. The researchers found that fingerprint sensors and touchpads generate signals in the 2 to 10 megahertz range and employ capacitive coupling to sense where your finger is in space and to identify the ridges and valleys that form unique fingerprint patterns. “UNKNOWN FACTS IN IT”  The Password for the computer controls of nuclear tipped missiles of the U.S was 00000000.  The first 1 GB hard disk was announced in 1980 which weighed about 550 pounds and had a price tag of $40, 000.  The first microprocessor created by Intel was the 4004. It was designed for a calculator.  The 30th of November is known as “Computer Security Day”.  Hewlett Packard was started at garage in Palo Alto in 1939.  The First Computer mouse was invented by Doug Englebart in around 1964 and was made of wood. Incharge: Ms. Chandni Kohli Editorial Team: Dr. Praveen Kumar Gupta Mr. Sanjive Saxena