Big data is a new frontier in innovation, characterized by vast data sets that require extensive computer processing to spot trends, and improve productivity. The ability to gather such data sets and effectively translate them in to strategy is seen as a new way of competing and innovating (Manyika et al., 2011). My area of interest is fashion, an area where creativity remains more important than data processing. Yet, big data is having an impact on the mainstream fringes of the fashion business.
For example, mainstream retailers are seeking to acquire more data points from their customers about a variety of different variables, and use those data points to more accurately meet the market's needs. Each season, millions of dollars' worth of merchandise goes unsold, to be sent to discounters at a fraction of the expected cost. This creates waste in the economic system of both the producers and retailers.…… [Read More]
Faris (2013) speculates as to whether NSA leaks will compromise big data's future. The article, published on the website Dataversity, notes that there is public concerns about data leaks at NSA. Consumers are becoming more aware about just how much of their information is available to the government. The author calls into question the dichotomy of private data and public data, in particular were corporate entities are gathering data, and then that data finds its way into the hands of government. The author concludes by noting that big data is a growing field, but there are still going to be customers who are wary.
The point Faris makes about customers being willing participants is valid in that most people are perfectly willing to divulge information. Only when they overtly know that this information is being used to market to them may they have a problem with it, but…… [Read More]
Nowadays, enterprises are employing statisticians when carrying out sophisticated data analysis. This is caused by the increased affordability in data acquisition and data storage among large scale and small-scale enterprises. This article focuses on highlighting the emerging Magnetic, Agile, Deep (MAD) data analysis. This is figured out as a shift from traditional enterprise data intelligence. The article presents its design philosophy as well as experience and techniques that portray MAD as one of the biggest advertising networks for the interactive media. Moreover, data parallel algorithms are presented for sophisticated techniques putting more emphasis on density methods. Another crucial reflection of the article is the database system features, which facilitate agile design and flexible construction of the algorithm (Cohen, Dolan, & Dunlap 2009).
The article has included the knowledge from some prior study. For instance, the standard business practices applied in the large scale data analysis revolves around the…… [Read More]
Big Data ole in Obama e-Election
The volumes, rapid velocity and variation of data otherwise referred to as Big Data has been used in the electioneering process especially in terms of directing the trends of voter psychology and the subsequent voting patterns, a specific example being the Obama reelection process that took more of the internet direction than the traditional door-to-door approach in the campaigns. This paper will hence expound on the way Big Data has been and can be used in the monitoring and manipulation of the internet users especially the voting block, how this data can be mishandled and the possibility of infringements into the privacy of the individuals whose data is online. It will also evaluate the possibility of having checks on the handling, storage and use of personal data that is online.
There have been varied uses of the Big data in the contemporary…… [Read More]
875). Often success introduces complacency, rigidity, and over confidence that eventually erode a firm's capability and product relevance. Arie de Geus (1997) identified four main traits for a successful firm; the first is the ability to change with a changing environment (Lovas & Ghoshal, 2000, p.875). A successful firm is capable of creating community vision, purpose, and personality, and it is able to develop and maintain working relationships. Lastly, a successful firm has conservative financing strategies, and is able to learn to perpetuate it. Self-perpetuation is a strategy identified in this study as necessary for current business strategies to survive in today's market.
ole of Technology in Business Strategy
Business strategy is continually evolving as information technology and business process redesign assist in the innovative design of central business processes (Broadbent, Don & Weill, 1999, p.159). New it systems have contributed to the reduction of coordination, production and information costs…… [Read More]
Authors Note: Rosenbaum is technology and retail analysts. She writes articles for the New York imes and Forbes.
Saikali, A. (2013, December 30). he arget Data Breach Lawsuits: Why every Company Should Care. Data Security Law Journal. Retrieved from: http://www.datasecuritylawjournal.com/2013/12/30/the-target-data-breach-lawsuits-why-every-company-should-care/
he article provides insight on the number of lawsuits filed against different organizations and strengthens the need for the companies to protect their information from data breach. he article shows the significant effects the data breach has to the organizations involved and their consumers. As such, it recommends on the need for the adoption of effective strategies aimed at protecting the organizations from breach of data, hence, the relevance of the big data.
Author Notes: Siakali writes on issues related to data security and data privacy.
hompson, L.L. (2011). Data Breach Encryption Handbook. Chicago, IL: American Bar Association.
hompson takes an in-depth analysis of the escalating data breaches across the…… [Read More]
Open Data Source for Election 2014
Open data are the data that can be freely redistributed and used by anyone for personal or research purpose. One of the examples of open data is a government data that contain tremendous resources. Moreover, the open government data can assist in making a better decision. By law, the government data should be opened to anybody. Thus, the political analysts and statisticians have taken the advantages of the open data to generate a big data for the U.S. 2014 senate election in order to predict the outcome of the election results.
The purpose of this research is to investigate the role of big data for the analysis of the 2014 U.S. senate election. Since 2012, the big data has played a major role in the U.S. politics. In 2012, the epublican used the data analytics in winning the 2012 Presidential election by using the…… [Read More]
personally understood as well as how/whether the topic could/should be applicable to public sector decisions. The author will also explain whether the data will be useful in a future job. While many of the topics in this course are attributed to and associated with the private sector, the usage of these tools and topics in the public sector is pervasive as well even if the manifestation is a bit different in many cases.
The spreadsheet modeling supplement from the class text is the first thing that will be discussed. The introduction alludes to the somewhat common presumptions about how Excel modeling and data modeling in general is something that is more in line with what private businesses need and that cannot be further from the truth. The supplement starts off with a good bullet point summary of what is involved in spreadsheet modeling. The author of this response does understand…… [Read More]
What is "big data" and how does this field relate to decision analysis?
Big data is really an expansion and improvement on what has been done for years and that is the collection and analysis of data. However, the two major differences that have emerged over the years is that the amount of data that can be harnessed at one time is much larger than it used to be and analytics/analysis of modern information systems can analyze the data much quicker, with much better accuracy and in ways that were elusive if not impossible in prior years and generations of technology. As an example, a robust information services/Big Data framework could find trends and outliers much quicker than a person, presuming a person could find them at all. This all relates to decision analysis in that the computers of today can do a lot of the work for…… [Read More]
Many companies are making use of big data to give themselves competitive advantage. Tesla is a good example of this. Tesla installed its Autopilot self-driving system on its cars in late 2015, even though the system is not activated. But what it has done is allowed the company to collect data on 1.3 billion miles of driving. This in turn "allows Tesla's engineers to fine-tune the algorithms that control its cars' active-safety systems," the basis of fully autonomous driving (Edelstein, 2016). Other car companies are working towards self-driving cars, but are doing it without the benefit of this enormous data set, which means that Tesla should in theory enjoy a technological competitive advantage with its self-driving cars (Edelstein, 2016).
The implementation of this big data is a work in progress. It will take years, and in theory the implementation should remain ongoing even once Tesla's cars are fully…… [Read More]
Our company is in the fashion industry specializing in discounted designer clothes and accessories for men and women. We currently have a brick and mortar location and a small online presence. The owner’s goal is to promote growth of the online store and become customer centric. Through the expansion of the online presence, the owner wants to get the process streamlined from brick and mortar to the online platform.
Through some research and considerations, we believe that Big Data and Knowledge Management along with Business Analytics and Business Intelligence Solutions will be the key to gaining the online presence that our company needs to build and sustain future growth.
As the ultimate goals are to create an online presence and customer focused business. Integrating Customer Knowledge Management, Business Analytics and Intelligence, will both provide us the necessary information about our current customers and…… [Read More]
The amassing of data has become an integral process of life in the 21st century (Nunan and Di Domenico, 2013, p. 2). This fact is partially reflected by the fact that in contemporary times, people are generating much more data than they previously did. Every time someone goes shopping and makes a purchase with a credit card, receives a call or sends a text message, or visits a web site on a computer or downloads information to a mobile phone application, they are generating data. This data is stored and, through sophisticated processes of analytics that involve data mining and even predictive capabilities, is analyzed to determine aspects of consumer, individual, and collective behavior. The generation of these massive quantities of data in the myriad forms such data takes at the rapidity of real-time access is known as big data, which government representatives claim they are analyzing to…… [Read More]
The client has been using an ERP system to integrate financial and non-financial information for decision-making. They have been hearing about Big Data. Briefly explain the concept of Big Data, including its advantages and disadvantages.
Generally speaking, the confluence of Enterprise Resource Planning, ERP, and Big Data is seen as a boon and "win" for the companies that use them to help their business. Indeed, businesses that can use Big Data to manage and wield massive amounts of data in ways that are advantageous from a business and strategic standpoint will tend to do much better than those that are unwilling or unable to do so. One upside to the melding of these two concepts and technologies is that the benefits are outstanding. A downside is that not all ERP systems are accustomed and designed to properly harness and use Big Data resources. Indeed, an ERP or Big…… [Read More]
Crime and criminological data can be gathered, interpreted, and represented in different ways. The use of “big data” in criminology has helped illuminate the efficacy of various prevention or intervention policies and programs, as well as helping to better allocate resources for criminal justice. In the United States, the main data sources include the Uniform Crime Reporting (UCR) from the Federal Bureau of Investigation (FBI). The UCR is subdivided into the National Incident-Based Reporting System (NIBRS), the Summary Reporting System (SRS), the Law Enforcement Officers Killed and Assaulted (LEOKA) Program, and the Hate Crime Statistics Program, each of which track specific types of crime data (FBI, 2018). Another major crime data system used in the United States is the Bureau of Justice Statistics (BJS) National Crime Victimization Survey (NCVS). A similar tool has been used on an international scale with the United Nations Interregional Crime and Justice Research Institute (UNICRI)…… [Read More]
Big data has become one of the most important aspects of supply chain management. The concept of big data refers to the massive data sets that are generated when millions of individual activities are tracked. These data sets are processed to yield insights that help inform managerial decision-making. Supply chains in particular have leveraged big data because companies have been able to develop technology to not only capture hundreds of millions of data points, but to process them in meaningful ways to eliminate waste and promote efficiency in the supply chain systems. This paper will examine the concept of big data, how it has arisen and come to dominate supply chain management, and look at the different ways big data is transforming the supply chain function. Lastly, the paper will take a closer look at the future for big data with respect to supply chain management. As it becomes…… [Read More]
SQL and ig Data
Gaining greater insights into terabytes of unstructured and structured data organizations have been collecting in many cases for decades across diverse computing and storage platforms are increasingly being unified through advanced data and system architectures. ig Data is the term used to define very large, diverse data sets that contain both structured and unstructured data that defy analysis using conventional database management and analytics applications (International Journal of Micrographics & Optical Technology, 2010). ig Data is an area generating much interest in enterprises as this collection of data analysis, aggregation and extraction techniques continue to deliver valuable insights into how companies can become more competitive (Datskovsky, 2013). Structured Query Language (SQL) is a widely accepted approach to querying databases, aggregating and analyzing data and creating useful reports that guide decision making in organizations (Rys, 2011). Enterprise software companies are creating ig Data analytics applications that include…… [Read More]
ig data: What does it mean for your business?
Once data about consumers was relatively difficult to amass. Now, in the digital age businesses are assaulted with a plethora of sources of consumer data. "Data now stream from daily life: from phones and credit cards and televisions and computers; from the infrastructure of cities; from sensor-equipped buildings, trains, buses, planes, bridges, and factories. The data flow so fast that the total accumulation of the past two years -- a zettabyte -- dwarfs the prior record of human civilization" (Shaw 2014). The big data revolution has the power to be as revolutionary as the Internet in the ways that businesses conduct commerce and consumers view themselves. "ig data is distinct from the Internet, although the Web makes it much easier to collect and share data. ig data is about more than just communication: the idea is that we can learn from…… [Read More]
Internet also known as the big data to the market researchers. The article also aims to show the disadvantages associated with the big data like privacy issues. The article presents two dimensions of the Internet use, its benefits, and disadvantages. However, its analysis lies more on the benefits than the disadvantages. The major reasons for supporting these aims are premised on the authors' ability to identify the benefits and the risks associated with the big data and their analysis to support the claims. Through this, they succeed in convincing the reader about the benefits and dangers associated with of the Internet (Nunan & Di Domenico, 2013).
The authors have used different research strategies to support their purposes. They used empirical studies conducted by other researchers like MS 2006, Leigh 2010, Jacobs 2009, Ohm 2009, and IBM to support their case. For example, they obtained information from MS' 2006 research to…… [Read More]
Target's Data Breach affected over 80 million customers (Bayuk, 2010). However, it is probable that more people might have been affected. Certain client information, besides the payment card data was stolen during the breach. The company has confirmed that information regarding customers was taken from systems beyond point of sale. This means that customers who made online purchase or those who emailed the company were affected. In this case, the points of sale systems used by customers to swipe their credit cards are linked to the company's network, like everything else. However, the existing evidence is based on correlational expert reports. It does not show the opportunities enabling hackers to compromise people via point of sale machines and connect to the company network. These customers will now receive emails that resemble a lot like emails from Target Company or emails from bank that will ask customers to key in their…… [Read More]
healthcare model that could enable physicians determine their patients' susceptibility to future disease on the bases of their medical records, and most importantly, their similarity to other patients. They acknowledge that despite numerous studies indicating a shift from the traditional disease-based to the more effective patient-centered approach of healthcare delivery, there still exists a knowledge gap, particularly because of the lack of a computational tool that can effectively discover patients' disease patterns without "falling prey to the noise" (Chawla & Davis, 2013, p. 660). The authors put forth the CAE model, which they posit addresses these concerns better than the existing models. They base their development on a number of findings from exiting literature.
The CAE model establishes risk factors by leveraging a patient's symptoms and traits with their interactions and biological disease information. To this end, its operation rides on the findings of a 2009 study by Schadt, which…… [Read More]
Data Mining Habits
There are several advantages to the type of customer data collection process that Hill (2012) indicated Target is employing on its customers. One is that it enables the company to due highly specific, targeted marketing efforts. Thus, the company can become more effective in marketing products and services to customers. Also, customers can derive benefit from this sort of analysis. They can receive coupons and promotional offers that are tailored to their individual shopping habits and needs. As such, they can purchase more at Target for less money, while sating their shopping and lifestyles needs in the process.
However, there are both legal and ethical ramifications of the sort of data mining and analytics that Target is utilizing on its customers. These predominantly pertain to privacy. In the use case Hill (2015) references, the store was able to glean that a young woman was pregnant before her…… [Read More]
The business opportunity that Starbucks sought to pursue was to grow its market in the grocery space. By designing K-Cups that appealed to consumers’ tastes, Starbucks sought to compete with other companies, such as Proctor and Gamble and Smuckers. The idea was to get Starbucks brand ready-made drinks into peoples’ homes so that they could have them without having to go to the store. As Sarah Whitten noted, “It’s a way for [Starbucks] to expand a brand that’s already owning retail and bring it into consumer’s homes…So, they can almost double consumption because consumers are going to want to drink it when they go to the actual Starbucks locations and now they have the freedom to drink it at home.” By analyzing customer data, Starbucks was able to identify a variety of drink formulations that would appeal to the largest segment of consumers.
The analytical methodology that Starbucks…… [Read More]
1). hat must be done? Notwithstanding any decision on taxes, Odland insists that government spending must be cut.
Meanwhile a January, 2013 article in the respected Guardian publication shows that the federal debt ceiling has gone up from "…an unimaginable $14.3 trillion" in August, 2012, to "$16.394tn as part of a package agreed then" (Rogers, 2013). The debt ceiling has not received a great deal of attention in the past but recently Republicans have demanded that the hite House agree to severe cuts in the federal budget in return for their willingness to agree to a raise in the debt ceiling. It is what some writers have called a "manufactured crisis" in ashington -- conservatives trying to force the hand of Obama -- but meantime are the Democrats the worst budget managers when it comes to raising the debt ceiling? Not really, Rogers explains. Republican presidents have raised the debt…… [Read More]
SUFING & MINING THE WAVE OF BIG DATA
What used to consider a simple annoyance or frustration has now become a respected field of inquiry. Consumer information has transformed into Big Data. As with many things that are vast, Big Data has the potential to intimidate. It is now the professional responsibility of people working in many fields to be aware of Big Data, and be able to use it to their respective organization's advantage. Navigating through and understanding what Big Data is a formidable challenge in of itself, yet not impossible. Effective management of the 21st century cannot fear or be overwhelmed by Big Data; managers must learn how to use Big Data like any other tool within their professional arsenal to maintain the status quo and even ahead or make establish new trends in business.
Big Data is in simple terms, mass quantities of data that are…… [Read More]
Analytics and the Growing Dominance of Big Data are
evolutionizing Strategic Decision-Making
The level of uncertainty and risk that pervade many enterprises today is growing, as the dynamics and economics of markets are changing rapidly. The many rapid, turbulent structural changes in industries is also leading to a greater reliance on analytics and the nascent area of Big Data as well. The potential of this second area, Big Data, is in determining patterns in massive data sets that have in many cases been collected for decades within enterprises. The abundance of data within enterprises, when combined with Big Data aggregation and analytics techniques, can be used for drastically reducing risk and uncertainty in even the most challenging and fast-moving industries. Big Data is being hyped heavily by analytics systems and enterprise application providers as well, as this category of software allows for the use of long-standing analytics and business intelligence…… [Read More]
DBMS and Data Warehouses
(1) in this writing assignment, you will create a brochure advertising your services as a data repository.
Powered By Excellence
Data epository Service
Powered By Excellence is the only data repository service with globally-located data centers across each continent, each with specific security, reliability and fault redundancy systems in place.
Our staff includes world-class experts on the following platforms: IBM, Microsoft, Oracle, MySQL, Informix, Sybase, Teradata and SAS expertise in-house as part of our consulting services division.
Analytics Advisory Services
Big Data Consultancy - Map and Hadoop expertise for gaining insights from very large datasets)
Custom Software Development
SaaS Application Support
Scalable File Storage
Private Cloud Hosting (Dedicated storage and unlimited virtual machines)
High performance with a world-class platform
24/7 Administrator Access
Unlimited Virtual Machine Use
Service Level Agreement (SLA) metrics available 24/7
Trusted Provider of Data epository Services:
ISO…… [Read More]
customer shopping, assertions and otherwise is nothing new. However, the manifestations and degree to which this data is used in the modern marketing sphere is much more substantial and significant than it used to be. Just one example of a firm that does this is Amazon. This report shall explain what data that company uses, the additional data that they might attain from other vendors, the specific insights or information that is extracted from the raw data, how the analysis of the data translates into decisions and so forth. While Amazon has to be careful when it comes to the depth and breadth of how they use the data they get a hold of, there is no question that the use of that data is the core of their creation and sustaining of their business.
In the grand scheme of things, Amazon has not been around all that long.…… [Read More]
data collection mentioned earlier. This report shall focus on the data collection in particular. Within this report, there shall be a recitation of the data collection approach, a definition of the proper data collection channels, a description and depiction of the purchase of external data sets to assist in the problem, the development and description of data quality and other data governance issues and a planning of the ongoing storage and maintenance of the data. While planning and execute data analytics is not rocket science, as they say, it is something that is very important and needs to be done right the first time.
The author of this report knows that a ten million dollar investment is not insignificant. As such, there should be a proceeding with caution yet expediency. As noted in the prior project, JC Dollar is in the right general area of analysis but is obviously not…… [Read More]
risks associated with exchanging data with outside partners. The most significant risk is probably with respect to data security. A survey of people within the health care industry noted that within the industry there are a number of concerns expressed relating to security. These include the risks of exchanging data between health care providers and government (fear of government), storage in insecure databases (fear of technology), and patient registration on insecure websites (again, fear of technology). The problem is that the people expressing these fears are not IT professionals and do not actually understand the risks that they are afraid of. They fear that there is growing interest among thieves trying to steal personal health records. The market for social security numbers, Medicare or Medicaid numbers or other health numbers is driving these fears (Diana, 2014).
Basically, a major issue here is that health care providers do not trust their…… [Read More]
Technology Impact on Clinical esearch and the Interrelationship of Uniform Data Format Standards
With increasing robustness of technology, clinical programmers began realizing inefficiencies in metadata and recreation from scratch each time, in addition to overlapping data elements over research works. Further, they saw the numerous inconsistent techniques for collection of specific, seemingly-simple data elements. The most straightforward example conveying the above challenge is: defining subject gender (Female or Male) in a clinical research work. At a swift glance, this appears to be a rather clearly defined data point. But, as is proven, even seemingly simple elements can prove challenging (McBride, 2014). An evolution is occurring in data management. By embracing emergent technologies once again, data managers are likely to be a lot more efficient than before. Under this article, only some aspects of innovation impact clinical managers of data are covered; however, it is evident that, over time, several…… [Read More]
research database be part of the protocol development team. Perhaps the most eminent of these reasons pertains to the need to have the data collection process aligned with the efforts of the protocol development team. The sort of congruence that needs to exist between database collection and protocol development is essential to ensuring that the data that is captured for analysis directly relates to the research study as a whole. In this sense, the research database design process contributes to the development of a research study's protocol in that it provides a mechanism for determining what sort of data is possible to capture (and able to be analyzed) to support the purpose of the study. Again, it is critical to have these two elements in a research study aligned because the former directly influences the latter. If a research database is not able to capture data that is used to…… [Read More]
Mandatory Data etention Laws in Australia
Ethics on Communication Details Being ecorded and Stored
The main issue concerning the topic is the aspect of whether it is right or wrong to keep data and information with respect to privacy and confidentiality as the data retention implies that the private information of the public will be accessed without their consent. There are many parties who are likely being impacted by these concerns. To start with, there is the general public whose private information will be accessed and retained devoid of any informed consent (Coyne, 2015).
The other parties who are likely to be impacted will be companies whose sensitive information will be accessed and hacking of such data could have adverse effects on their business operations. As opined by Coyne (2015), with the introduced aspect of protection class warrants being voted down, it implies that even journalists who might have information…… [Read More]
Evidence-based practice (EBP) is defined as the conscientious, judicious, and explicit use of current best evidence to make decisions about patient care. EBP incorporates the best available evidence in order to guide nursing care and improve patient outcomes. This will assist health practitioners to address health care questions by using an evaluative and qualitative approach. EBP is a problem-solving approach to clinical practice and involves the search for and critically appraising the most relevant evidence, one\\'s clinical experience and the preferences of the patient (Fortunato, Grainger, & Abou-El-Enein, 2018). The process involved in EBP allows the practitioner to assess research, clinical guidelines, and other information resources that are based on high-quality findings and apply the results obtained to improve their practice.
Since EBP heavily relies on research and searching for available evidence to support a hypothetical question in order to solve a current problem, it is vital that one understands…… [Read More]
Analysis of the data:
The information contained in this article is highly useful and informative for someone who truly wants to understand why America is repeatedly under attack by its own organizations. There may be variety of other factors too but Brill correctly identifies the presence of complex systems and lack of understanding about low probability issues as the critical factors affecting American accident-prone organizations today. e fail to understand that some of the very high consequence accidents that have low probability of ever occurring are the actual cause of future problems and hence must not be ignored at any cost. Here we can apply Murphy's law and say that if something can go wrong, it will- given the current organizational system working in America.
Limited and justifiable conclusion:
e can thus conclude that despite America's best efforts to avoid accidents, there is a good chance that not only it…… [Read More]
This is troubling, because if one of these two elements is taking place, it could cause the study to lose its accuracy. (Lofland, 2006)
What problems might you face with qualitative research?
There are several different problems that could be faced when conducting qualitative research the most notable would include: a limited sample size and the possibility of identify various anomalies as the underlying trend. This is problematic, because all qualitative research will involve selecting a certain sample and then corroborating it with other findings. In cases where, the sample size could be millions or billions of people, the results could be different from the views of the majority. This is because the population sample would normally focus, on a few hundred to tens of thousands of participants. This is a small portion of the population demographic, as their views could represent the minority. The fact that the sample was…… [Read More]
Everyone is under suspicion, according to the eye of the camera. Everyone is treated as if they are a likely criminal. This has a negative psychological affect on the general population who are not criminals.
For those who are not criminals, they feel as if their privacy is being invaded for no reason. They are reduced to being under suspicion and scrutinized even though they are upstanding citizens. They feel as if they are being treated as a criminal and that their freedoms are being slowly eaten away one by one. More and more the general population expresses concerns about the trend toward and Orwellian world. The telescreens in Orwell's world broadcast propaganda and continually exaggerated positive production numbers and lied about the failing state of the economy. The telescreens made the economy sound like a growth economy, when it was slowly slipping away, sound familiar?
In Orwell's novel, inston…… [Read More]
biggest factor that a college student or a business executive should consider when shopping for a microcomputer is what that computer will be used for. For example, if the computer is going to be used primarily for data storage, then the hard drive is the most important component of the computer. However, if the computer will be used for internet research, then the CPU is the most important component. Another factor to take into consideration are how long the user will be sitting in front of the computer at each usage. If the user will be spending long hours staring at the monitor, an anti-glare LCD monitor would help prevent eye strain. Other questions to ask include: "Will the user need a laptop or a desktop?" "Does the user want a cordless mouse and keyboard?," and of course there is the question of the operating system - is the user…… [Read More]
He could be successful if the evidence establishes that the delay caused by weather and by Big Bank's deviation from specs were significantly less responsible for the delay that the personnel issues at Systems. He will probably not be successful unless the unavailability of Glenda Givealot was much more of a contributing factor to the delay than the spec deviation. Big Bank's damages are limited by contract to a maximum of 12 months of fees paid to Systems and no other economic damages.
3. Review the facts provided and the sample contract. What provisions of the contract could you cite to support an argument that it is not in Big Banks best interest to rescind the contract? What facts could you cite to support an argument that Big Bank be responsible for some of these issues and/or not in compliance with the contract?
Under Section 2a, Big Bank is responsible…… [Read More]
The five management programs have the same common dependent variables. These are the average turnover, the weekly profit and the monthly staff time cost. The independent variable for this experiment is the management system that is used. There are five different management systems that are being used at the company, and they differ in their methods. The data presented show the impact of the different management systems on the different output measures (dependent variables).
The wild card is the type of store data. The company investigated this using three store categories, and presented its findings, but they were not presented with statistical analysis. As such, they should not be considered to be an independent variable.
Outcome variables are the dependent variables.. Ultimately, for this company the variables should reflect a wider variety of output measures for each store. . The output variables should be related to the success measures.…… [Read More]
Neo-looked confused. "Programs hacking programs?" To which the Oracle replied, "At some time, a program was written to govern everything. The only time you see a program is when it's malfunctioning, and needs to be replaced, or exiled." Jack, I know you are new in the IT department, but I can't emphasize enough the need for you to take the Oracle's advice. We want our software, CRM modules, and sales processing databases to function without being seen. We don't need any programs fowling up other programs. I don't want to have to fight any 'vampires' or 'ghost twins' because you have allowed the database data dictionary to get corrupted.
The data dictionary is a tool which keeps the other programs up-to-date, and feeds information to the other querying programs as to what to expect from the data they are receiving. The data dictionary is a separate, and important indexing…… [Read More]
Security and Privacy
Five Central Concerns About Data Security and Privacy
The five central concerns about data security and privacy that are the most common in personal and business use of computers are presented in this paper. Password security, the need companies have to keep their employees up-to-date with security training, and defining checks and balances to make sure information is not compromised are the three most important according to research. Website security and giving website users the option of defining privacy settings are also very important (Casal, Flavian, Guinaliu, 2007).
Five Central Concerns About Data Security and Privacy
The most common way a computer system is broken into is when a hacker, thief or dishonest person gets a password and uses it to get unauthorized information. Passwords are often very simple, with "123" or "password" being used the most often. This is why many security training programs will always…… [Read More]
Collapse of the Big Three
America was once the leader and pioneer in the auto industry, a title that the country had for decades and a title that was so dear to America's heart that it was unfathomable to think that title might ever be lost. It's commonly misconstrued that America invented the automobile, when in reality that honor goes to German Karl Benz in 1885 (ozema, 2010). "Americans did, however, industrialize the love of the automobile. America loves big, fast cars, and for many decades American car companies shared the biggest slice of the auto industry pie" (ozema, 2010). America made having a car and the business of making cars firmly entrenched in American culture. This was a fact which kept the economy stimulated and which provided a consistent level of financial stability for the nation and the civilians within it. However the decade of the eighties marked the…… [Read More]
Database Data Warehouse Design
Our company, Data Analytic Limited, specializes in collecting and analyzing data for various organizations. Over the years, we have assisted various companies to turn raw data into valuable information that assists the companies in making effective decision profitable in the short and long run. Our research and data analytics are geared towards giving extra edge to various companies. Our services include processing and analyzing terabytes of data to provide customer meaningful information for business decision and enhance competitive market advantages. ecent growth of our company necessitates the needs to design and develop data warehouse that will accommodate large volume of customer data.
Objective of this project is to design and develop the data warehouse for our company.
Importance of Data Warehousing for our Organization
Comprehensive portfolios of our business include Business, Market, and Financial research, Data processing services and Domain based analytics. While the relational database…… [Read More]
Crime Data Sources in the United States
The collection of crime data in the United States is carried out through different approaches including Uniform Crime eports and the National Incident-Based eporting System, which also act as the two primary sources of crime data for crime reporting. The data obtained from these sources are used for research and documentation of crime status at the county, state, and national levels. Notably, the National Incident-Based eporting System emerged as an advancement of the conventional summary of Uniform Crime eports that were used to track crime in the country. In addition, the Congress uses data from these sources together with those from the National Crime Victimization Survey to guide policy decisions and create suitable responses to crime. While the use of these sources helps in dealing with crime in the United States, they have some similarities and differences between them with regards to methodological…… [Read More]
Data Input, Output, Storage Devices and Determining the Speed of a Computer
This paper has made use of the different input and output methods for computers as well as studied the differences between primary and secondary storage. It also checks for the roles of different computer parts in the overall working of the computer.
In computer terminology, data is something that is unprocessed and raw, which does not have a series of clusters within it. On the other hand, information is more detailed and the better form than that of data. It is processed data, whereby it is meaningful data that can be used for manipulation in the computer networks as well as in the computer itself. This paper discusses the different types of methods of data input and output as well as storage devices and also aims at determining the speed of a particular computer.
Data is very significant…… [Read More]
City of Alexandria -- Time Series Data
Tufte (2001) and other ambassadors of the visual display of data have shown us how easily it is to understand complex data when it is graphically represented in ways that our minds are designed to understand. Tufte argues that "experience with the analysis of data…is essential for achieving precision and grace in the presence of statistics, .but even textbook of graphical design are silent about how to think about numbers" (Tufte, 2001, p. 104). Tufke remarks, that "Illustrators too often see their work as an exclusively artistic enterprise -- the words "creative," "concept," and "style" combine regularly in all possible permutations -- a Big Think jargon for the small task of constructing a time-series a few data points long" (Tufte, 2001, p. 204). Visual display of data has other uses than simply an elegant way to view, appreciate, and analyze data. The process…… [Read More]
Success-promoting action questions involve "resource adequacy, management and control structure, bureaucratic rules and regulations, political effectiveness, and feedback and evaluation" (437). Following the necessary pattern of realistic yet personally-sensitive inquiry when formulating good questions, Wolman considers the fact that differing situations will require discretion with regard to how much value is placed on measurement vs. action questions. Wolman concludes that no matter what, implications for success vs. failure must be considered and questioned thoroughly before any public policy plan is carried out. Further research along these lines may result in a formal guiding theory on the "why's and how's" of ensuring program or policy success.
Behn, . (1995). The Big Questions of Public Management. Public Administration eview, 55 (4), 313.
Brewer, J. (2005). Formulating esearch Questions, in Foundations in Multimethod esearch. Sage Publications.
Camburn, E., owan, B., & Taylor, J.E. (2003). Distributed Leadership in Schools: The Case of Elementary…… [Read More]
725 degree Kelvin (-454.765 degree Fahrenheit, -270.425 degree Celsius) Cosmic Microwave ackground radiation (CM) that pervades the observable universe. This is believed to be the remnant that scientists were looking for. Penzias and Wilson shared the 1978 Nobel Prize for Physics for this discovery.
Finally, the abundance of the "light elements" hydrogen and helium found in the observable universe are believed to support the ig ang model of origins (the ig-ang Theory Web site, 2003).
In 2003, Physicist Robert Gentry proposed an alternative to the standard ig ang theory, an alternative that also accounts for the evidences listed above (Eastman and Missler, 1996). Gentry believes that the standard ig ang model is founded upon a faulty paradigm that he claims is inconsistent with the empirical data. Gentry bases his model on Einstein's static-spacetime paradigm that he claims is the "genuine cosmic Rosetta."
Gentry is not alone. Other high-profile dissenters include…… [Read More]
Secondary Data eview
Solving the Problem of Decreasing evenues
Due to continuing instability in the stock market, the business I originally wrote about, Unit Investment Trust that was part of JP Morgan, had been losing money since 2002. Ultimately, those in charge of such decisions, chose to sell the UIT part of the business.
Over the last few years, many businesses have faced similar problems because of the recession and stagnant economy, and other businesses have gotten into trouble because of other issues.
One such company is featured in an article from the Boston Business Journal. Ultimate Parking Inc. is a Boston-based valet parking company. This company was doing well enough that it was able to spin-off another venture called premier Curbside Valet. Originally the second company did very until the curbside restrictions in the aftermath of 9/11 completely destroyed the second company. In the words of the owner and…… [Read More]
10. What is your ultimate goal career?
I am pretty content overseeing this store but someday I may work toward becoming a regional or statewide manager.
11. Who are some of the biggest suppliers for the equipment that are used at your business?
One of our biggest suppliers is Hewlitt Packard who supplies most of our computer technology equipment that helps us run the store. It is handled through our IT department.
12. How do you handle lack of structure at work?
We provide incentives including production, and sales goals in which employees can compete to win prize, trips etc. We also provide quotas to help the staff maintain a healthy pace at work.
13. When a problem arises, what are the processes of identifying and diagnosing the problem?
The employees closest to the problem are to bring it to their immediate supervisor who will address it or pass it…… [Read More]
Future of Data Storage in Computer Networks
There are a number of problems facing the future of information technology including the fact that networks are increasingly asked to expand in order to accommodate more and more data. Many experts believe that such increases will mean two things; one that the networks will become increasingly secure, and two because of the security, the data contained on the network will become more difficult to access. This study sought to determine the various processes that are currently being used to secure data on various networks, and to determine if that security will, or will not, ensure that data will become incrementally more difficult to obtain. To this end, this study used the most current literature available to determine if there is a problem with the data being stored in the current manner, or if there is a perception that the data will be…… [Read More]
Domestic Tourism Scenario and Government Data Obtaining
A new domestic tourism operator specializing in surf holidays wishes to build an interactive web site that allows the customer to see in real time the weather, wind, surf, and other data relating to their destination. As a new and bold initiative, the operator wishes to tie in the price of the holiday with the weather situation Better waves and better weather attract a higher price and vice versa. It is a new and potentially risky project, and the business owner is exceedingly concerned about how such a plan will play out. In viewing the risks associated with this project, as well as the top ten steps that would be undertaken to deliver this project to completion, one can understand that such a project is not only innovative but will prove exceedingly beneficial to the company over the long-haul.
In undertaking a project…… [Read More]
The charts show us why.
2. ape: There were also a huge number of rapes during these 5 years but interestingly rapes actually increased from 644 cases in 1990 to 763 cases in 21995 (1998 and 2001 showed the level to remain approximately consistent and then to drop to 294 cases in 2010). N This may have been due to the case that the Bronx, always a hotbed of violence and unrest had to defuse their energy somewhere. Hence, they turned to rape instead of murder to do so. Nonetheless, the fact that rape did not decrease is interesting
Staten Island 1990-1995
1. Murder -- There were 29 murder cases in 1990 compared to 26 in 1995. The level had dropped but not dramatically. In fact, the decline was an insignificant -- 34.6%. Nonetheless, we see Guilliani's influence here too. (Murder levels greatly decreased in the years following although recently,…… [Read More]
Additionally, with the opening of boundaries, foreign producers would penetrate the American market and seek consumers. This led to a situation in which most products were labeled Made in China, Made in Mexico and so on. The response was that of emphasizing on the Made in the U.S.A. brand and the stimulation of national production and consumption of the nationally manufactured items.
To be however complete in assessment, it is true that the past recent decades have brought about intensifying forces of globalization and market liberalization. They led to a situation in which international trade became extremely popular. Additionally, several international organizations and alliances were formed to regulate and promote free international trade, such as the World Trade Organization or NAFTA. The consequence was the significant reduction in trade barriers, namely the elimination of several barriers to imports.
While it is true that some of these barriers have been resurrected…… [Read More]
Predictive analytics help companies to understand the behavior of consumers. The way that predictive analytics works is that data from the past is used to help refine predictions about the future (CGI, 2013). Companies basically analyzed demand in terms of a wide range of variables in order to arrive at a better estimate for future outcomes than otherwise would have been found. It is basically the same principle as predicting that a colder, snowier winter will help Wal-Mart sell more snowblowers, but with hard data, sophisticated algorithms and reliable outputs -- such as x number of snow days will equal y number of snow blowers sold.
One of the interesting elements of predictive analytics is with associations, and this has been used fairly extensively in retail. Associations discovery is where correlations between things are noted that might not have been apparent. So that link between snow blowers and…… [Read More]
In this Facebook data breach essay, we discuss how Facebook allowed applications to mine user data. The essay will explain what data was breached, how it was breached, and how that data was used. Furthermore, the essay will also discuss the repercussions of the breach, including Facebook founder Mark Zuckerberg’s hearing in front of the United States Senate, issues involving Cambridge Analytical, and information that is being revealed about additional data breaches.
In addition to explaining the data breach, the essay will also discuss whether Facebook has a responsibility to users to keep data safe, and the steps that Facebook is taking to resolve data breaches in the future. This example essay should not only provide you with an overview of the Facebook data breach, but also provide you with a technical guide on how to write an academic essay. It will include the following parts of a standard academic…… [Read More]
fall 2007, the United States economy was rolling along in a healthy fashion having enjoyed 24 consecutive quarters of positive Gross Domestic Product growth. The Standard and Poors Index was over 1,500 and unemployment was below 5%. There was essentially no inflation. These were all good numbers and normally indicative of a health economy (Bloomberg Business eek).
Roughly 12 months later everything had changed. Treasury Secretary Henry Paulson surprised everyone by announcing that the Government was intending to intervene in the U.S. economy by holding reverse auctions where the troubled assets of several domestic financial institutions would be bought (Landler). As matters worsened quickly, the proposed auction concept was expanded to the point that the Government would actually purchase equity positions in some of the country's largest banks. The argument offered by Paulson was that such measures were needed to stabilize the troubled financial markets, avoid bank failures, and prevent…… [Read More]
Young Diverse Children Living in ig Cities
This paper will focus on the lives and challenges minority and culturally diverse youths face growing up in major urban city environments, such as Newark, New York, altimore or Seattle. The advent of major metropolitan areas has stimulated a rapidly increasing population of disadvantaged and volatile youths. In today's America, it seems that more and more young people growing up in major cities are subjected to poor socio-economic conditions, which anymore lead to an increased likelihood for violence and life disruption.
Today's youths growing up in major urban cities are often disadvantaged; they lack the self-esteem, confidence and tools necessary to succeed in their later adulthood. I hope through my research to uncover facts related to urban distress among youths. I hope to also explore community organizations that have focused their efforts on improving the conditions prevalent among urban youths. I propose that…… [Read More]
Team Skills Mock Scenario Analysis
Big Petroleum Company is merging its eastern and western offices, and 72 employees from the company's eastern office will be moving to the west. In order to ensure that the move runs smoothly in terms of moving logistics, housing, office space requirements and integration of the eastern employees into the existing western office structure, a skilled team of workers must be compiled. In viewing the components of the five-member team needed for the success of this project, one can better understand why this project is suitable for a team and how each respective member plays a role in the project's overall success.
Five-Member Team, Duties, and Significance to the Project
The successful completion of the aforementioned project will need the respective successful completion of an innumerable series of tasks that will each prove necessary to ensure that a fully functioning integrated Big Petroleum Company…… [Read More]
Federal Forensic Data Analytics
There are definite advantages to the Federal Bureau of Investigation's Digital Forensic Data Analytics program. Many of those advantages are well aligned with the integration of this program into the Strategic IT Plan for this organization. Essentially, the aforementioned program can increase the efficiency of the bureau's information technology initiatives, while simultaneously lowering costs and reducing the sort of infrastructure required to sustain this program. Additionally, this program can help this bureau maximize its current resources without needing to make substantial investments in other ones.
The analytics capabilities of the Digital Forensic Data Analytics program of the FBI far surpass those that it previously had for forensic analytics. One of the most immediate impacts of this program towards costs relates to the predictive capabilities of this program. By utilizing various components of cognitive computing including machine learning and other sophisticated algorithms such as deep learning and…… [Read More]