SlideShare a Scribd company logo
1
Dati: la quinta rivoluzione
dell’Information Technology
Mario Rasetti
ISI Foundation – Torino
ISI Global Science Foundation – New York
The context: il mondo in cui viviamo
Italy 44.5 50.8 1950 to 1990
Le Città
‣ process & workflow analytics
‣ location-aware services
‣ organizational science
‣ social science & health
‣ infectious disease dynamics
Internet of (Every)thing:
nuove interazioni fra
persone, oggetti, luoghi
Our world is more and more complex and data-based:
4.7 billion people own a cell phone, every day over 410 billion
e-mails and 35 billion SMSs are exchanged, 700 million
pictures are uploaded on Facebook. The information created
and exchanged yerarly (2014) is 6 zettabyte of data (1
zettabyte = 1021 bytes: the 1250 pages of Tolstoj’s War and
Peace would be contained 323 billion times in it, and the
whole Library of Congress of Washinton 4 million times) and
every year grows 40% (in 3 years we’ll reach a yottabyte,
1024).
A world in which every year 1.4 billion cars circulate, over 2.5
billion people fly on airplanes, the growth of population,
urbanization, commercial exchanges, global migrations is
more and more entangled with that of technologies,
generating one interconnected ‘socio-technical’ system.
Let’s concentrate first on the
Big Data Big Challenge,
that of extracting the large amount of information flowing in
and around the complex systems we live with, itself available
through huge amounts of data
Big Data have a variety of diverse features:
• BD in science (e.g., Hubble, Genoma, CERN) :
typically well organized in well built data-bases
• BD in society :
allow for a true TOMOGRAPHY of SOCIETY and make
possible ‘predictions’ not reasonable before (cf., e.g.,
H1N1 pandemics, 2009)
or targets/strategies:
 BD hardware challenge (HPC: high performance computing); e.g.,
quantum: a mix of limits & hopes
 BD manipulation the greatest computer science challenges:
beyond Turing, interaction-based computing, data mining:
extracting value from data
i.e., turning 'Big Data Science' into an 'ICT Big Science’, coupling
methods and data with theories and models, endowing ICT with new,
more efficient tools to turn
data into information,
information into knowledge,
and eventually
knowledge into wisdom.
as ICT becomes integral part of the fabric of nature and society.
?
IT is facing what is referred to as its fifth revolution; the next step after
the mainframe era, the PC era, the Internet and Web 1.0 era, the mobile
and Web 2.0 era: the era of Big Data.
The true essence of Big Data is Evidence-based Decision Making
www.whitehouse.gov/issues/technology/big-data-review
• Big data is saving lives. […] By collecting and analyzing millions of
data points from a neonatal intensive care unit, one study was able to
identify factors, like slight changes in body temperature and heart rate,
that serve as early warning signs an infection may be taking root […]
• Big data is making the economy work better. […] Utility companies
are starting to use big data to predict periods of peak electric demand,
adjusting the grid to be more efficient and potentially averting brown-
outs.
• Big data is saving taxpayer dollars. The Centers for Medicare and
Medicaid Services have begun using predictive analytics […] to flag
likely instances of reimbursement fraud before claims are paid. […]
has already stopped, prevented, or identified $115 million in fraudulent
payments.
opportunità
• Big data tools can alter the balance of power between
government and citizen. […] government uses of big data also have
the potential to chill the exercise of free speech or free association. As
more data is collected, analyzed, and stored on both public and
private systems, we must be vigilant in ensuring that balance is
maintained between government and citizens […]
• Big data tools could lead to discriminatory outcomes. As more
decisions about our commercial and personal lives are determined by
algorithms […] we must pay careful attention that big data does not
systematically disadvantage certain groups, whether inadvertently or
intentionally.
• Big data tools can reveal intimate personal details. […] data
fusion can also lead to the so-called “mosaic effect,” whereby
personally identifiable information can be discerned even from
ostensibly anonymized data. […]
rischi hi
MacKinsey BD Report (2013)
(USA)
IBM estimate (2014) - worldwide
the big picture
 the digital image of the world is tracking the world
more and more closely:
 use computation to extract patterns and establish
causal inferences using tools from data mining,
machine learning, statistics
 mathematical modeling and forecast happen on a
data-rich landscape and are fed by data streams from
multiple sources
 we can assess our models against reality at
unprecedented speed and scale, and feed this back to
models
 society at large is involved, besides nature
the role of Complexity Science
Bevys of Starlings
Multi-agent – Multi-scale – Emergent effects
25
www.gov.uk/government/publications/reducing-obesity-obesity-system-map
complessità
TOPOLOGY-BASED
ALGORITHMS
Connection
strengths
(shades of gray;
20 brain regions)
Binarization (threshold)
Reordering and
modularization
Brain Network
The data space splits into the direct sum of irreps of G. The
general ‘covariance matrix’ of a generic machine learning
algorithm becomes ‘block-diagonal’: all zeroes are pushed to the
upper-right / lower-left corners.
Data Driven
Approach
Theory &
Models
Mathematics &
Foundation of
Complex
Systems
Data Science
Big Data
Computational
Social Science
Collective Phenomena in
Physics & Materials Science
Quantum
Science &
Complexity
Complexity
Science
Computational Epidemiology
& Public Health
Citizen
Science &
Smart Cities
ISI Foundation:
research

More Related Content

What's hot

The art and science of data-driven journalism
The art and science of data-driven journalism The art and science of data-driven journalism
The art and science of data-driven journalism
Alexander Howard
 
Data Journalism
Data JournalismData Journalism
Data Journalism
Mindy McAdams
 
Are We Measuring the Right Things? From Disclosing Datasets to! Reshaping Da...
Are We Measuring the Right Things? From Disclosing Datasets to! Reshaping Da...Are We Measuring the Right Things? From Disclosing Datasets to! Reshaping Da...
Are We Measuring the Right Things? From Disclosing Datasets to! Reshaping Da...
Jonathan Gray
 
Statistics in Journalism Sheffield 2014
Statistics in Journalism Sheffield 2014Statistics in Journalism Sheffield 2014
Statistics in Journalism Sheffield 2014
Elpidio del Campo Cañizares
 
Data journalism Overview
Data journalism OverviewData journalism Overview
Data journalism Overview
Alexander Howard
 
Wedf brochure (september)
Wedf brochure (september)Wedf brochure (september)
Wedf brochure (september)
Morne Olivier
 
Innovation, KM, and Data.gov
Innovation, KM, and Data.govInnovation, KM, and Data.gov
Innovation, KM, and Data.gov
Jeanne Holm
 
The Internet of Toys, the datafied child, and the production of the surveille...
The Internet of Toys, the datafied child, and the production of the surveille...The Internet of Toys, the datafied child, and the production of the surveille...
The Internet of Toys, the datafied child, and the production of the surveille...
GiovannaMascheroni
 
Open innovation in governance
Open innovation in governanceOpen innovation in governance
Open innovation in governance
Alexander Howard
 
Towards a More Open World
Towards a More Open WorldTowards a More Open World
Towards a More Open World
Alexander Howard
 
Towards a Genealogy of Open Data
Towards a Genealogy of Open DataTowards a Genealogy of Open Data
Towards a Genealogy of Open Data
Jonathan Gray
 
Vafopoulos is the 2faces of janus
Vafopoulos is the 2faces of janusVafopoulos is the 2faces of janus
Vafopoulos is the 2faces of janusvafopoulos
 
Information society
Information society Information society
Information society andraelena95
 
Using Data for Science Journalism
Using Data for Science JournalismUsing Data for Science Journalism
Using Data for Science Journalism
Jonathan Gray
 
Information society (2)
Information society (2)Information society (2)
Information society (2)Shifan Mihilar
 
Opening Government
Opening GovernmentOpening Government
Opening Government
Alexander Howard
 
CrisisCommons Statement for the Record
CrisisCommons Statement for the RecordCrisisCommons Statement for the Record
CrisisCommons Statement for the Record
Heather Blanchard
 
Big Data Digital Humanitarianism Lightning Talk
Big Data Digital Humanitarianism Lightning TalkBig Data Digital Humanitarianism Lightning Talk
Big Data Digital Humanitarianism Lightning Talk
Ryan Burns
 
The Challenge - and Opportunity - of 'Big Data'
The Challenge - and Opportunity - of 'Big Data'The Challenge - and Opportunity - of 'Big Data'
The Challenge - and Opportunity - of 'Big Data'Serge Milman
 
Citizen Engagement Project
Citizen Engagement ProjectCitizen Engagement Project
Citizen Engagement ProjectBret Costain
 

What's hot (20)

The art and science of data-driven journalism
The art and science of data-driven journalism The art and science of data-driven journalism
The art and science of data-driven journalism
 
Data Journalism
Data JournalismData Journalism
Data Journalism
 
Are We Measuring the Right Things? From Disclosing Datasets to! Reshaping Da...
Are We Measuring the Right Things? From Disclosing Datasets to! Reshaping Da...Are We Measuring the Right Things? From Disclosing Datasets to! Reshaping Da...
Are We Measuring the Right Things? From Disclosing Datasets to! Reshaping Da...
 
Statistics in Journalism Sheffield 2014
Statistics in Journalism Sheffield 2014Statistics in Journalism Sheffield 2014
Statistics in Journalism Sheffield 2014
 
Data journalism Overview
Data journalism OverviewData journalism Overview
Data journalism Overview
 
Wedf brochure (september)
Wedf brochure (september)Wedf brochure (september)
Wedf brochure (september)
 
Innovation, KM, and Data.gov
Innovation, KM, and Data.govInnovation, KM, and Data.gov
Innovation, KM, and Data.gov
 
The Internet of Toys, the datafied child, and the production of the surveille...
The Internet of Toys, the datafied child, and the production of the surveille...The Internet of Toys, the datafied child, and the production of the surveille...
The Internet of Toys, the datafied child, and the production of the surveille...
 
Open innovation in governance
Open innovation in governanceOpen innovation in governance
Open innovation in governance
 
Towards a More Open World
Towards a More Open WorldTowards a More Open World
Towards a More Open World
 
Towards a Genealogy of Open Data
Towards a Genealogy of Open DataTowards a Genealogy of Open Data
Towards a Genealogy of Open Data
 
Vafopoulos is the 2faces of janus
Vafopoulos is the 2faces of janusVafopoulos is the 2faces of janus
Vafopoulos is the 2faces of janus
 
Information society
Information society Information society
Information society
 
Using Data for Science Journalism
Using Data for Science JournalismUsing Data for Science Journalism
Using Data for Science Journalism
 
Information society (2)
Information society (2)Information society (2)
Information society (2)
 
Opening Government
Opening GovernmentOpening Government
Opening Government
 
CrisisCommons Statement for the Record
CrisisCommons Statement for the RecordCrisisCommons Statement for the Record
CrisisCommons Statement for the Record
 
Big Data Digital Humanitarianism Lightning Talk
Big Data Digital Humanitarianism Lightning TalkBig Data Digital Humanitarianism Lightning Talk
Big Data Digital Humanitarianism Lightning Talk
 
The Challenge - and Opportunity - of 'Big Data'
The Challenge - and Opportunity - of 'Big Data'The Challenge - and Opportunity - of 'Big Data'
The Challenge - and Opportunity - of 'Big Data'
 
Citizen Engagement Project
Citizen Engagement ProjectCitizen Engagement Project
Citizen Engagement Project
 

Similar to Rasetti fondazioneisi 29_06_2015

WEF - Personal Data New Asset Report2011
WEF - Personal Data New Asset Report2011WEF - Personal Data New Asset Report2011
WEF - Personal Data New Asset Report2011Vincent Ducrey
 
Big Data Paper
Big Data PaperBig Data Paper
Big Data Paper
Andile Ngcaba
 
Big data for development
Big data for development Big data for development
Big data for development
Junaid Qadir
 
Energing Technology and the Creative Economy
Energing Technology and the Creative EconomyEnerging Technology and the Creative Economy
Energing Technology and the Creative Economy
Jerome Glenn
 
What Data Can Do: A Typology of Mechanisms . Angèle Christin
What Data Can Do: A Typology of Mechanisms . Angèle Christin What Data Can Do: A Typology of Mechanisms . Angèle Christin
What Data Can Do: A Typology of Mechanisms . Angèle Christin
eraser Juan José Calderón
 
C017361724
C017361724C017361724
C017361724
IOSR Journals
 
Computing, cognition and the future of knowing,. by IBM
Computing, cognition and the future of knowing,. by IBMComputing, cognition and the future of knowing,. by IBM
Computing, cognition and the future of knowing,. by IBM
Virginia Fernandez
 
Learning to trust artificial intelligence systems accountability, compliance ...
Learning to trust artificial intelligence systems accountability, compliance ...Learning to trust artificial intelligence systems accountability, compliance ...
Learning to trust artificial intelligence systems accountability, compliance ...
Diego Alberto Tamayo
 
AI WORLD: I-World: EIS Global Innovation Platform: BIG Knowledge World vs. BI...
AI WORLD: I-World: EIS Global Innovation Platform: BIG Knowledge World vs. BI...AI WORLD: I-World: EIS Global Innovation Platform: BIG Knowledge World vs. BI...
AI WORLD: I-World: EIS Global Innovation Platform: BIG Knowledge World vs. BI...
Azamat Abdoullaev
 
Societal and ethical issues of digitization
Societal and ethical issues of digitizationSocietal and ethical issues of digitization
Societal and ethical issues of digitization
eraser Juan José Calderón
 
Ppt shark global forum session 3 2012 v4
Ppt shark global forum session 3 2012 v4Ppt shark global forum session 3 2012 v4
Ppt shark global forum session 3 2012 v4GlobalForum
 
Data privacy and security in ICT4D - Meeting Report
Data privacy and security in ICT4D - Meeting Report Data privacy and security in ICT4D - Meeting Report
Data privacy and security in ICT4D - Meeting Report
UN Global Pulse
 
Internet Essays
Internet EssaysInternet Essays
Internet Essays
Paper Writing Services
 
Impact Of IT on Society.
Impact Of IT on Society.Impact Of IT on Society.
Impact Of IT on Society.
Monica Khatri
 
Baban Hasnat is a professor of international business and ec.docx
Baban Hasnat is a professor of international business and ec.docxBaban Hasnat is a professor of international business and ec.docx
Baban Hasnat is a professor of international business and ec.docx
wilcockiris
 
Overcomming Big Data Mining Challenges for Revolutionary Breakthroughs in Com...
Overcomming Big Data Mining Challenges for Revolutionary Breakthroughs in Com...Overcomming Big Data Mining Challenges for Revolutionary Breakthroughs in Com...
Overcomming Big Data Mining Challenges for Revolutionary Breakthroughs in Com...
AnthonyOtuonye
 
Big Data - Big Deal? - Edison's Academic Paper in SMU
Big Data - Big Deal? - Edison's Academic Paper in SMUBig Data - Big Deal? - Edison's Academic Paper in SMU
Big Data - Big Deal? - Edison's Academic Paper in SMU
Edison Lim Jun Hao
 
Student Presentation: AI & Government
Student Presentation: AI & GovernmentStudent Presentation: AI & Government
Student Presentation: AI & Government
ShaynaBlum
 
Short and Long of Data Driven Innovation
Short and Long of Data Driven InnovationShort and Long of Data Driven Innovation
Short and Long of Data Driven Innovation
David De Roure
 
The Big Data Economy
The Big Data EconomyThe Big Data Economy
The Big Data Economy
Emcien Corporation
 

Similar to Rasetti fondazioneisi 29_06_2015 (20)

WEF - Personal Data New Asset Report2011
WEF - Personal Data New Asset Report2011WEF - Personal Data New Asset Report2011
WEF - Personal Data New Asset Report2011
 
Big Data Paper
Big Data PaperBig Data Paper
Big Data Paper
 
Big data for development
Big data for development Big data for development
Big data for development
 
Energing Technology and the Creative Economy
Energing Technology and the Creative EconomyEnerging Technology and the Creative Economy
Energing Technology and the Creative Economy
 
What Data Can Do: A Typology of Mechanisms . Angèle Christin
What Data Can Do: A Typology of Mechanisms . Angèle Christin What Data Can Do: A Typology of Mechanisms . Angèle Christin
What Data Can Do: A Typology of Mechanisms . Angèle Christin
 
C017361724
C017361724C017361724
C017361724
 
Computing, cognition and the future of knowing,. by IBM
Computing, cognition and the future of knowing,. by IBMComputing, cognition and the future of knowing,. by IBM
Computing, cognition and the future of knowing,. by IBM
 
Learning to trust artificial intelligence systems accountability, compliance ...
Learning to trust artificial intelligence systems accountability, compliance ...Learning to trust artificial intelligence systems accountability, compliance ...
Learning to trust artificial intelligence systems accountability, compliance ...
 
AI WORLD: I-World: EIS Global Innovation Platform: BIG Knowledge World vs. BI...
AI WORLD: I-World: EIS Global Innovation Platform: BIG Knowledge World vs. BI...AI WORLD: I-World: EIS Global Innovation Platform: BIG Knowledge World vs. BI...
AI WORLD: I-World: EIS Global Innovation Platform: BIG Knowledge World vs. BI...
 
Societal and ethical issues of digitization
Societal and ethical issues of digitizationSocietal and ethical issues of digitization
Societal and ethical issues of digitization
 
Ppt shark global forum session 3 2012 v4
Ppt shark global forum session 3 2012 v4Ppt shark global forum session 3 2012 v4
Ppt shark global forum session 3 2012 v4
 
Data privacy and security in ICT4D - Meeting Report
Data privacy and security in ICT4D - Meeting Report Data privacy and security in ICT4D - Meeting Report
Data privacy and security in ICT4D - Meeting Report
 
Internet Essays
Internet EssaysInternet Essays
Internet Essays
 
Impact Of IT on Society.
Impact Of IT on Society.Impact Of IT on Society.
Impact Of IT on Society.
 
Baban Hasnat is a professor of international business and ec.docx
Baban Hasnat is a professor of international business and ec.docxBaban Hasnat is a professor of international business and ec.docx
Baban Hasnat is a professor of international business and ec.docx
 
Overcomming Big Data Mining Challenges for Revolutionary Breakthroughs in Com...
Overcomming Big Data Mining Challenges for Revolutionary Breakthroughs in Com...Overcomming Big Data Mining Challenges for Revolutionary Breakthroughs in Com...
Overcomming Big Data Mining Challenges for Revolutionary Breakthroughs in Com...
 
Big Data - Big Deal? - Edison's Academic Paper in SMU
Big Data - Big Deal? - Edison's Academic Paper in SMUBig Data - Big Deal? - Edison's Academic Paper in SMU
Big Data - Big Deal? - Edison's Academic Paper in SMU
 
Student Presentation: AI & Government
Student Presentation: AI & GovernmentStudent Presentation: AI & Government
Student Presentation: AI & Government
 
Short and Long of Data Driven Innovation
Short and Long of Data Driven InnovationShort and Long of Data Driven Innovation
Short and Long of Data Driven Innovation
 
The Big Data Economy
The Big Data EconomyThe Big Data Economy
The Big Data Economy
 

More from CSI Piemonte

"SocializziAmo" per un uso sicuro e consapevole dei social da parte dei minori
"SocializziAmo" per un uso sicuro e consapevole dei social da parte dei minori"SocializziAmo" per un uso sicuro e consapevole dei social da parte dei minori
"SocializziAmo" per un uso sicuro e consapevole dei social da parte dei minori
CSI Piemonte
 
Audit GDPR
Audit GDPRAudit GDPR
Audit GDPR
CSI Piemonte
 
Audit di compliance e rapporti con i fornitori
Audit di compliance e rapporti con i fornitoriAudit di compliance e rapporti con i fornitori
Audit di compliance e rapporti con i fornitori
CSI Piemonte
 
Gli audit in ambito privacy
Gli audit in ambito privacyGli audit in ambito privacy
Gli audit in ambito privacy
CSI Piemonte
 
Riconoscere e contrastare le minacce
Riconoscere e contrastare le minacceRiconoscere e contrastare le minacce
Riconoscere e contrastare le minacce
CSI Piemonte
 
Cyber ready?
Cyber ready?Cyber ready?
Cyber ready?
CSI Piemonte
 
Il fattore umano
Il fattore umanoIl fattore umano
Il fattore umano
CSI Piemonte
 
Videosorveglianza e GDPR
Videosorveglianza e GDPRVideosorveglianza e GDPR
Videosorveglianza e GDPR
CSI Piemonte
 
Videosorveglianza e biometria. Nuove frontiere tra tecnologia e tutela dei di...
Videosorveglianza e biometria. Nuove frontiere tra tecnologia e tutela dei di...Videosorveglianza e biometria. Nuove frontiere tra tecnologia e tutela dei di...
Videosorveglianza e biometria. Nuove frontiere tra tecnologia e tutela dei di...
CSI Piemonte
 
Sicurezza Urbana Integrata
Sicurezza Urbana IntegrataSicurezza Urbana Integrata
Sicurezza Urbana Integrata
CSI Piemonte
 
Titolare e Responsabile protezione dati: la comunicazione
Titolare e Responsabile protezione dati: la comunicazioneTitolare e Responsabile protezione dati: la comunicazione
Titolare e Responsabile protezione dati: la comunicazione
CSI Piemonte
 
Far crescere la cultura della privacy
Far crescere la cultura della privacyFar crescere la cultura della privacy
Far crescere la cultura della privacy
CSI Piemonte
 
La figura del DPO: compiti e funzioni all'interno dell'organizzazione del tit...
La figura del DPO: compiti e funzioni all'interno dell'organizzazione del tit...La figura del DPO: compiti e funzioni all'interno dell'organizzazione del tit...
La figura del DPO: compiti e funzioni all'interno dell'organizzazione del tit...
CSI Piemonte
 
Privacy e cybersecurity: la comunicazione
Privacy e cybersecurity: la comunicazionePrivacy e cybersecurity: la comunicazione
Privacy e cybersecurity: la comunicazione
CSI Piemonte
 
Data Breach: i rischi odierni e come prevenirli
Data Breach: i rischi odierni e come prevenirliData Breach: i rischi odierni e come prevenirli
Data Breach: i rischi odierni e come prevenirli
CSI Piemonte
 
Guidelines on Examples regarding Data Breach Notification
Guidelines on Examples regarding Data Breach NotificationGuidelines on Examples regarding Data Breach Notification
Guidelines on Examples regarding Data Breach Notification
CSI Piemonte
 
Responsabile della protezione dei dati, una figura chiave RPD| DPO
Responsabile della protezione dei dati, una figura chiave RPD| DPOResponsabile della protezione dei dati, una figura chiave RPD| DPO
Responsabile della protezione dei dati, una figura chiave RPD| DPO
CSI Piemonte
 
So di non sapere?
So di non sapere?So di non sapere?
So di non sapere?
CSI Piemonte
 
Errori tipici nella gestione del data breach
Errori tipici nella gestione del data breachErrori tipici nella gestione del data breach
Errori tipici nella gestione del data breach
CSI Piemonte
 
Sicurezza informatica: non solo tecnologia
Sicurezza informatica: non solo tecnologiaSicurezza informatica: non solo tecnologia
Sicurezza informatica: non solo tecnologia
CSI Piemonte
 

More from CSI Piemonte (20)

"SocializziAmo" per un uso sicuro e consapevole dei social da parte dei minori
"SocializziAmo" per un uso sicuro e consapevole dei social da parte dei minori"SocializziAmo" per un uso sicuro e consapevole dei social da parte dei minori
"SocializziAmo" per un uso sicuro e consapevole dei social da parte dei minori
 
Audit GDPR
Audit GDPRAudit GDPR
Audit GDPR
 
Audit di compliance e rapporti con i fornitori
Audit di compliance e rapporti con i fornitoriAudit di compliance e rapporti con i fornitori
Audit di compliance e rapporti con i fornitori
 
Gli audit in ambito privacy
Gli audit in ambito privacyGli audit in ambito privacy
Gli audit in ambito privacy
 
Riconoscere e contrastare le minacce
Riconoscere e contrastare le minacceRiconoscere e contrastare le minacce
Riconoscere e contrastare le minacce
 
Cyber ready?
Cyber ready?Cyber ready?
Cyber ready?
 
Il fattore umano
Il fattore umanoIl fattore umano
Il fattore umano
 
Videosorveglianza e GDPR
Videosorveglianza e GDPRVideosorveglianza e GDPR
Videosorveglianza e GDPR
 
Videosorveglianza e biometria. Nuove frontiere tra tecnologia e tutela dei di...
Videosorveglianza e biometria. Nuove frontiere tra tecnologia e tutela dei di...Videosorveglianza e biometria. Nuove frontiere tra tecnologia e tutela dei di...
Videosorveglianza e biometria. Nuove frontiere tra tecnologia e tutela dei di...
 
Sicurezza Urbana Integrata
Sicurezza Urbana IntegrataSicurezza Urbana Integrata
Sicurezza Urbana Integrata
 
Titolare e Responsabile protezione dati: la comunicazione
Titolare e Responsabile protezione dati: la comunicazioneTitolare e Responsabile protezione dati: la comunicazione
Titolare e Responsabile protezione dati: la comunicazione
 
Far crescere la cultura della privacy
Far crescere la cultura della privacyFar crescere la cultura della privacy
Far crescere la cultura della privacy
 
La figura del DPO: compiti e funzioni all'interno dell'organizzazione del tit...
La figura del DPO: compiti e funzioni all'interno dell'organizzazione del tit...La figura del DPO: compiti e funzioni all'interno dell'organizzazione del tit...
La figura del DPO: compiti e funzioni all'interno dell'organizzazione del tit...
 
Privacy e cybersecurity: la comunicazione
Privacy e cybersecurity: la comunicazionePrivacy e cybersecurity: la comunicazione
Privacy e cybersecurity: la comunicazione
 
Data Breach: i rischi odierni e come prevenirli
Data Breach: i rischi odierni e come prevenirliData Breach: i rischi odierni e come prevenirli
Data Breach: i rischi odierni e come prevenirli
 
Guidelines on Examples regarding Data Breach Notification
Guidelines on Examples regarding Data Breach NotificationGuidelines on Examples regarding Data Breach Notification
Guidelines on Examples regarding Data Breach Notification
 
Responsabile della protezione dei dati, una figura chiave RPD| DPO
Responsabile della protezione dei dati, una figura chiave RPD| DPOResponsabile della protezione dei dati, una figura chiave RPD| DPO
Responsabile della protezione dei dati, una figura chiave RPD| DPO
 
So di non sapere?
So di non sapere?So di non sapere?
So di non sapere?
 
Errori tipici nella gestione del data breach
Errori tipici nella gestione del data breachErrori tipici nella gestione del data breach
Errori tipici nella gestione del data breach
 
Sicurezza informatica: non solo tecnologia
Sicurezza informatica: non solo tecnologiaSicurezza informatica: non solo tecnologia
Sicurezza informatica: non solo tecnologia
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

Rasetti fondazioneisi 29_06_2015

  • 1. 1 Dati: la quinta rivoluzione dell’Information Technology Mario Rasetti ISI Foundation – Torino ISI Global Science Foundation – New York
  • 2. The context: il mondo in cui viviamo
  • 3.
  • 4.
  • 5. Italy 44.5 50.8 1950 to 1990
  • 7. ‣ process & workflow analytics ‣ location-aware services ‣ organizational science ‣ social science & health ‣ infectious disease dynamics Internet of (Every)thing: nuove interazioni fra persone, oggetti, luoghi
  • 8.
  • 9. Our world is more and more complex and data-based: 4.7 billion people own a cell phone, every day over 410 billion e-mails and 35 billion SMSs are exchanged, 700 million pictures are uploaded on Facebook. The information created and exchanged yerarly (2014) is 6 zettabyte of data (1 zettabyte = 1021 bytes: the 1250 pages of Tolstoj’s War and Peace would be contained 323 billion times in it, and the whole Library of Congress of Washinton 4 million times) and every year grows 40% (in 3 years we’ll reach a yottabyte, 1024). A world in which every year 1.4 billion cars circulate, over 2.5 billion people fly on airplanes, the growth of population, urbanization, commercial exchanges, global migrations is more and more entangled with that of technologies, generating one interconnected ‘socio-technical’ system.
  • 10. Let’s concentrate first on the Big Data Big Challenge, that of extracting the large amount of information flowing in and around the complex systems we live with, itself available through huge amounts of data Big Data have a variety of diverse features: • BD in science (e.g., Hubble, Genoma, CERN) : typically well organized in well built data-bases • BD in society : allow for a true TOMOGRAPHY of SOCIETY and make possible ‘predictions’ not reasonable before (cf., e.g., H1N1 pandemics, 2009)
  • 11. or targets/strategies:  BD hardware challenge (HPC: high performance computing); e.g., quantum: a mix of limits & hopes  BD manipulation the greatest computer science challenges: beyond Turing, interaction-based computing, data mining: extracting value from data i.e., turning 'Big Data Science' into an 'ICT Big Science’, coupling methods and data with theories and models, endowing ICT with new, more efficient tools to turn data into information, information into knowledge, and eventually knowledge into wisdom. as ICT becomes integral part of the fabric of nature and society.
  • 12. ? IT is facing what is referred to as its fifth revolution; the next step after the mainframe era, the PC era, the Internet and Web 1.0 era, the mobile and Web 2.0 era: the era of Big Data. The true essence of Big Data is Evidence-based Decision Making
  • 13.
  • 14.
  • 16. • Big data is saving lives. […] By collecting and analyzing millions of data points from a neonatal intensive care unit, one study was able to identify factors, like slight changes in body temperature and heart rate, that serve as early warning signs an infection may be taking root […] • Big data is making the economy work better. […] Utility companies are starting to use big data to predict periods of peak electric demand, adjusting the grid to be more efficient and potentially averting brown- outs. • Big data is saving taxpayer dollars. The Centers for Medicare and Medicaid Services have begun using predictive analytics […] to flag likely instances of reimbursement fraud before claims are paid. […] has already stopped, prevented, or identified $115 million in fraudulent payments. opportunità
  • 17. • Big data tools can alter the balance of power between government and citizen. […] government uses of big data also have the potential to chill the exercise of free speech or free association. As more data is collected, analyzed, and stored on both public and private systems, we must be vigilant in ensuring that balance is maintained between government and citizens […] • Big data tools could lead to discriminatory outcomes. As more decisions about our commercial and personal lives are determined by algorithms […] we must pay careful attention that big data does not systematically disadvantage certain groups, whether inadvertently or intentionally. • Big data tools can reveal intimate personal details. […] data fusion can also lead to the so-called “mosaic effect,” whereby personally identifiable information can be discerned even from ostensibly anonymized data. […] rischi hi
  • 18. MacKinsey BD Report (2013) (USA) IBM estimate (2014) - worldwide
  • 19. the big picture  the digital image of the world is tracking the world more and more closely:  use computation to extract patterns and establish causal inferences using tools from data mining, machine learning, statistics  mathematical modeling and forecast happen on a data-rich landscape and are fed by data streams from multiple sources  we can assess our models against reality at unprecedented speed and scale, and feed this back to models  society at large is involved, besides nature
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. the role of Complexity Science
  • 25. Bevys of Starlings Multi-agent – Multi-scale – Emergent effects 25
  • 28.
  • 29.
  • 30. Connection strengths (shades of gray; 20 brain regions) Binarization (threshold) Reordering and modularization Brain Network
  • 31. The data space splits into the direct sum of irreps of G. The general ‘covariance matrix’ of a generic machine learning algorithm becomes ‘block-diagonal’: all zeroes are pushed to the upper-right / lower-left corners.
  • 32.
  • 33. Data Driven Approach Theory & Models Mathematics & Foundation of Complex Systems Data Science Big Data Computational Social Science Collective Phenomena in Physics & Materials Science Quantum Science & Complexity Complexity Science Computational Epidemiology & Public Health Citizen Science & Smart Cities ISI Foundation: research