Use our essay title generator to get ideas and recommendations instantly
Big data is a new frontier in innovation, characterized by vast data sets that require extensive computer processing to spot trends, and improve productivity. The ability to gather such data sets and effectively translate them in to strategy is seen as a new way of competing and innovating (Manyika et al., 2011). My area of interest is fashion, an area where creativity remains more important than data processing. Yet, big data is having an impact on the mainstream fringes of the fashion business.
For example, mainstream retailers are seeking to acquire more data points from their customers about a variety of different variables, and use those data points to more accurately meet the market's needs. Each season, millions of dollars' worth of merchandise goes unsold, to be sent to discounters at a fraction of the expected cost. This creates waste in the economic system of both the producers and retailers.…
Deamicis, C. (2013). Lingerie and algorithms: Big data comes to fashion. Pando Daily. Retrieved November 9, 2013 from http://pandodaily.com/2013/10/23/lingerie-and-algorithms-big-data-comes-to-fashion/
Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C. & Byers, A. (2011). Big data: the next frontier for innovation, competition, and productivity. McKinsey Global Institute. Retrieved November 9, 2013 from http://www.mckinsey.com/insights/business_technology/big_data_the_next_frontier_for_innovation
Trites, D. (2013). Big data: The next big trend in fashion. SAP Business Innovation. Retrieved November 9, 2013 from http://blogs.sap.com/innovation/industries/big-data-next-big-trend-fashion-0661043
Faris (2013) speculates as to whether NSA leaks will compromise big data's future. The article, published on the website Dataversity, notes that there is public concerns about data leaks at NSA. Consumers are becoming more aware about just how much of their information is available to the government. The author calls into question the dichotomy of private data and public data, in particular were corporate entities are gathering data, and then that data finds its way into the hands of government. The author concludes by noting that big data is a growing field, but there are still going to be customers who are wary.
The point Faris makes about customers being willing participants is valid in that most people are perfectly willing to divulge information. Only when they overtly know that this information is being used to market to them may they have a problem with it, but…
Boyd, D. & Crawford, K. (2012). Critical questions for big data. Information, Communication and Society. Vol. 15 (5) 662-679.
Chen, H., Chiang, R. & Storey, V. (2012). Business intelligence and analytics: From big data to big impact. MIS Quarterly. Vol. 36 (4) 1165-1188.
Cohen, J., Dolan, B., Dunlap, M., Hellerstein, J. & Welton, C. (2009) MAD skills: New analysis practices for big data. VLDB '09. August 24-28, 2009, Lyon, France.
Faris, S. (2013). Have the NSA leaks compromised big data's future? www.dataversity.net Retrieved from http://www.dataversity.net/have-the-nsa-leaks-compromised-big-datas-future/
Nowadays, enterprises are employing statisticians when carrying out sophisticated data analysis. This is caused by the increased affordability in data acquisition and data storage among large scale and small-scale enterprises. This article focuses on highlighting the emerging Magnetic, Agile, Deep (MAD) data analysis. This is figured out as a shift from traditional enterprise data intelligence. The article presents its design philosophy as well as experience and techniques that portray MAD as one of the biggest advertising networks for the interactive media. Moreover, data parallel algorithms are presented for sophisticated techniques putting more emphasis on density methods. Another crucial reflection of the article is the database system features, which facilitate agile design and flexible construction of the algorithm (Cohen, Dolan, & Dunlap 2009).
The article has included the knowledge from some prior study. For instance, the standard business practices applied in the large scale data analysis revolves around the…
Cohen, J., Dolan, B., & Dunlap, M. (2009). MAD skills: new analysis practices for big data
Big Data ole in Obama e-Election
The volumes, rapid velocity and variation of data otherwise referred to as Big Data has been used in the electioneering process especially in terms of directing the trends of voter psychology and the subsequent voting patterns, a specific example being the Obama reelection process that took more of the internet direction than the traditional door-to-door approach in the campaigns. This paper will hence expound on the way Big Data has been and can be used in the monitoring and manipulation of the internet users especially the voting block, how this data can be mishandled and the possibility of infringements into the privacy of the individuals whose data is online. It will also evaluate the possibility of having checks on the handling, storage and use of personal data that is online.
There have been varied uses of the Big data in the contemporary…
Hiner J., (2012).How big data is being used today: Three ways. Retrieved June 27, 2014 from http://www.zdnet.com/how-big-data-is-being-used-today-three-ways-7000005714/
Lenard T. & Rubin P., (2013). The Big Data Revolution: Privacy Considerations. Retrieved June 27, 2014 from http://www.techpolicyinstitute.org/files/lenard_rubin_thebigdatarevolutionprivacyconsiderations.pdf
Wakefield J., (2013). Tomorrow's cities: How big data is changing the world. Retrieved June 27, 2014 from http://www.bbc.com/news/technology-23253949
875). Often success introduces complacency, rigidity, and over confidence that eventually erode a firm's capability and product relevance. Arie de Geus (1997) identified four main traits for a successful firm; the first is the ability to change with a changing environment (Lovas & Ghoshal, 2000, p.875). A successful firm is capable of creating community vision, purpose, and personality, and it is able to develop and maintain working relationships. Lastly, a successful firm has conservative financing strategies, and is able to learn to perpetuate it. Self-perpetuation is a strategy identified in this study as necessary for current business strategies to survive in today's market.
ole of Technology in Business Strategy
Business strategy is continually evolving as information technology and business process redesign assist in the innovative design of central business processes (Broadbent, Don & Weill, 1999, p.159). New it systems have contributed to the reduction of coordination, production and information costs…
Abareshi, a. (2010). The Choice of Business Strategy and New Organizational Forms: Model and Instrument Development. Interdisciplinary Journal of Contemporary Research in Business, 2(5), 9-38.
Allio, R.J. And Randall, R.M. (2010). Kiechel's History of Corporate Strategy. Strategy & Leadership, 38(3), 29-34.
Alpaslan, C.M., Green, S.E. And Mitroff, I.I. (2009). Context of Crises: Towards a Stakeholder Theory of Crisis Management. Journal of Contingencies and Crisis Management, 17(1), 38-49.
Berman, S.J. & Hagan, J. (2006). How Technology-Driven Business Strategy can Spur Innovation and Growth. Strategy & Leadership, 34(2), 28-34.
Authors Note: Rosenbaum is technology and retail analysts. She writes articles for the New York imes and Forbes.
Saikali, A. (2013, December 30). he arget Data Breach Lawsuits: Why every Company Should Care. Data Security Law Journal. Retrieved from: http://www.datasecuritylawjournal.com/2013/12/30/the-target-data-breach-lawsuits-why-every-company-should-care/
he article provides insight on the number of lawsuits filed against different organizations and strengthens the need for the companies to protect their information from data breach. he article shows the significant effects the data breach has to the organizations involved and their consumers. As such, it recommends on the need for the adoption of effective strategies aimed at protecting the organizations from breach of data, hence, the relevance of the big data.
Author Notes: Siakali writes on issues related to data security and data privacy.
hompson, L.L. (2011). Data Breach Encryption Handbook. Chicago, IL: American Bar Association.
hompson takes an in-depth analysis of the escalating data breaches across the…
Thompson, L.L. (2011). Data Breach Encryption Handbook. Chicago, IL: American Bar Association.
Thompson takes an in-depth analysis of the escalating data breaches across the world and their associated legal implications. She takes a specific focus on the legal implications of data breaches alongside the encryption technology, information security, and methods of preventing data breaches. The fact that the author uses information from different organizations hit by data breaches in the past forms the strength of the author's work. The book is important for the study because it provides insights into different issues related to data breach such as methods the hackers use to access the information and ways of preventing data breach in an organization.
Authors Note: Thomson is a senior engineer and private advocate at the CSC. She has published on topics related to data breach prevention and is the vice chair of the American Bar Association (ABA).
Open Data Source for Election 2014
Open data are the data that can be freely redistributed and used by anyone for personal or research purpose. One of the examples of open data is a government data that contain tremendous resources. Moreover, the open government data can assist in making a better decision. By law, the government data should be opened to anybody. Thus, the political analysts and statisticians have taken the advantages of the open data to generate a big data for the U.S. 2014 senate election in order to predict the outcome of the election results.
The purpose of this research is to investigate the role of big data for the analysis of the 2014 U.S. senate election. Since 2012, the big data has played a major role in the U.S. politics. In 2012, the epublican used the data analytics in winning the 2012 Presidential election by using the…
Scherer,(2012). Inside the Secret World of the Data Crunchers Who Helped Obama Win, Time, Nov. 7, 2012.
Shen, G. (2013). Big Data, Analytics and Elections. Analytics Inform.
The Economist (2014). The Republicans win the Senate. The Economists.
Woodie, A. (2014). How Data Analytics Shaped Election Day 2014. Datanami.
personally understood as well as how/whether the topic could/should be applicable to public sector decisions. The author will also explain whether the data will be useful in a future job. While many of the topics in this course are attributed to and associated with the private sector, the usage of these tools and topics in the public sector is pervasive as well even if the manifestation is a bit different in many cases.
The spreadsheet modeling supplement from the class text is the first thing that will be discussed. The introduction alludes to the somewhat common presumptions about how Excel modeling and data modeling in general is something that is more in line with what private businesses need and that cannot be further from the truth. The supplement starts off with a good bullet point summary of what is involved in spreadsheet modeling. The author of this response does understand…
IBM. (2011). The power of analytics for public sector (pp. 1-28). Somers, NY: IBM.
Riley, G. (2006). The Cost-Benefit Principle -- Economics -- tutor2u. Tutor2u.net. Retrieved 18
March 2016, from http://tutor2u.net/economics/revision-notes/a2-micro-cost-benefit-analysis.html
What is "big data" and how does this field relate to decision analysis?
Big data is really an expansion and improvement on what has been done for years and that is the collection and analysis of data. However, the two major differences that have emerged over the years is that the amount of data that can be harnessed at one time is much larger than it used to be and analytics/analysis of modern information systems can analyze the data much quicker, with much better accuracy and in ways that were elusive if not impossible in prior years and generations of technology. As an example, a robust information services/Big Data framework could find trends and outliers much quicker than a person, presuming a person could find them at all. This all relates to decision analysis in that the computers of today can do a lot of the work for…
IBM. (2011). The power of analytics for public sector (pp. 1-28). Somers, New York: IBM
Institute for Business Value.
Many companies are making use of big data to give themselves competitive advantage. Tesla is a good example of this. Tesla installed its Autopilot self-driving system on its cars in late 2015, even though the system is not activated. But what it has done is allowed the company to collect data on 1.3 billion miles of driving. This in turn "allows Tesla's engineers to fine-tune the algorithms that control its cars' active-safety systems," the basis of fully autonomous driving (Edelstein, 2016). Other car companies are working towards self-driving cars, but are doing it without the benefit of this enormous data set, which means that Tesla should in theory enjoy a technological competitive advantage with its self-driving cars (Edelstein, 2016).
The implementation of this big data is a work in progress. It will take years, and in theory the implementation should remain ongoing even once Tesla's cars are fully…
Edelstein, S. (2016) Tesla's autonomous-car efforts use big data no other carmaker has. Green Car Reports. Retrieved February 21, 2017 from http://www.greencarreports.com/news/1108065_teslas-autonomous-car-efforts-use-big-data-no-other-carmaker-has
Versace, C. (2014). Talking big data and analytics with IBM. Forbes. Retrieved February 21, 2017 from http://www.forbes.com /sites/chrisversace/2014/04/01/talking-big-data-and-analytics-with-ibm/#7a0f0f974aa7
Our company is in the fashion industry specializing in discounted designer clothes and accessories for men and women. We currently have a brick and mortar location and a small online presence. The owner’s goal is to promote growth of the online store and become customer centric. Through the expansion of the online presence, the owner wants to get the process streamlined from brick and mortar to the online platform.
Through some research and considerations, we believe that Big Data and Knowledge Management along with Business Analytics and Business Intelligence Solutions will be the key to gaining the online presence that our company needs to build and sustain future growth.
As the ultimate goals are to create an online presence and customer focused business. Integrating Customer Knowledge Management, Business Analytics and Intelligence, will both provide us the necessary information about our current customers and…
Cooney, M. (2012). 10 common mobile security problems to attack. PCWorld.
Retrieved from http://www.pcworld.com/article/2010278/10-common-mobile-security-problems-to-attack.html
Deirdre M. (2014). Be like Zappos: Three steps to make big data work for your small business.
Retrieved from http://www.jacquette.com/be-like-zappos-three-steps-to-make-big-data-work-for-your-small-business/
Gonsalves, A. (2013). Many iOS Apps Found Open to Hijacking on Public Wi-Fi. CSOOnline.
Retrieved from http://www.csoonline.com/article/2134135/mobile-security/many-ios-apps-found-open-to-hijacking-on-public-wi-fi.html
Oracle. (2014). Kohl’s sets foundation for future growth with Oracle retail. Retrieved from
The amassing of data has become an integral process of life in the 21st century (Nunan and Di Domenico, 2013, p. 2). This fact is partially reflected by the fact that in contemporary times, people are generating much more data than they previously did. Every time someone goes shopping and makes a purchase with a credit card, receives a call or sends a text message, or visits a web site on a computer or downloads information to a mobile phone application, they are generating data. This data is stored and, through sophisticated processes of analytics that involve data mining and even predictive capabilities, is analyzed to determine aspects of consumer, individual, and collective behavior. The generation of these massive quantities of data in the myriad forms such data takes at the rapidity of real-time access is known as big data, which government representatives claim they are analyzing to…
Byman, D., Wittes, B. (2014). Reforming the NSA. Foreign Affairs. 93(3), 127-138.
This source considers a number of possibilities for reforming the NSA which are viable in the wake of Snowden's security breach. It examines other country's approaches to espionage as well. In provides an in-depth read into the considerations the NSA must make for securing the country
Hackett, K. (2013). Edward Snowden: the new brand of whistle blower. Quill. 101(5), 26-31. This source examines the ramifications of the actions of whistle blowers, and attempts to deconstruct the privacy issues associated with security concerns in the U.S. It details the actions of Snowden.
Nuna, D., Di Domenica, M. (2013). Market research and the ethics of big data. International Journal of Market Research. 55(4), 2-13. This source considers the practice of amassing and analyzing big data largely from a marketing research perspective. It details the wide scope of data that is regularly stored and scrutinized regarding the lives of citizens.
The client has been using an ERP system to integrate financial and non-financial information for decision-making. They have been hearing about Big Data. Briefly explain the concept of Big Data, including its advantages and disadvantages.
Generally speaking, the confluence of Enterprise Resource Planning, ERP, and Big Data is seen as a boon and "win" for the companies that use them to help their business. Indeed, businesses that can use Big Data to manage and wield massive amounts of data in ways that are advantageous from a business and strategic standpoint will tend to do much better than those that are unwilling or unable to do so. One upside to the melding of these two concepts and technologies is that the benefits are outstanding. A downside is that not all ERP systems are accustomed and designed to properly harness and use Big Data resources. Indeed, an ERP or Big…
Crime and criminological data can be gathered, interpreted, and represented in different ways. The use of “big data” in criminology has helped illuminate the efficacy of various prevention or intervention policies and programs, as well as helping to better allocate resources for criminal justice. In the United States, the main data sources include the Uniform Crime Reporting (UCR) from the Federal Bureau of Investigation (FBI). The UCR is subdivided into the National Incident-Based Reporting System (NIBRS), the Summary Reporting System (SRS), the Law Enforcement Officers Killed and Assaulted (LEOKA) Program, and the Hate Crime Statistics Program, each of which track specific types of crime data (FBI, 2018). Another major crime data system used in the United States is the Bureau of Justice Statistics (BJS) National Crime Victimization Survey (NCVS). A similar tool has been used on an international scale with the United Nations Interregional Crime and Justice Research Institute (UNICRI)…
Big data has become one of the most important aspects of supply chain management. The concept of big data refers to the massive data sets that are generated when millions of individual activities are tracked. These data sets are processed to yield insights that help inform managerial decision-making. Supply chains in particular have leveraged big data because companies have been able to develop technology to not only capture hundreds of millions of data points, but to process them in meaningful ways to eliminate waste and promote efficiency in the supply chain systems. This paper will examine the concept of big data, how it has arisen and come to dominate supply chain management, and look at the different ways big data is transforming the supply chain function. Lastly, the paper will take a closer look at the future for big data with respect to supply chain management. As it becomes…
SQL and ig Data
Gaining greater insights into terabytes of unstructured and structured data organizations have been collecting in many cases for decades across diverse computing and storage platforms are increasingly being unified through advanced data and system architectures. ig Data is the term used to define very large, diverse data sets that contain both structured and unstructured data that defy analysis using conventional database management and analytics applications (International Journal of Micrographics & Optical Technology, 2010). ig Data is an area generating much interest in enterprises as this collection of data analysis, aggregation and extraction techniques continue to deliver valuable insights into how companies can become more competitive (Datskovsky, 2013). Structured Query Language (SQL) is a widely accepted approach to querying databases, aggregating and analyzing data and creating useful reports that guide decision making in organizations (Rys, 2011). Enterprise software companies are creating ig Data analytics applications that include…
Baker, B. 2013, "Enterprise Analytics: Optimize Performance, Process and Decisions Through Big Data," Quality Progress, vol. 46, no. 6, pp. 68.
Datskovsky, Galina, PhD., C.R.M. 2013, "Harnessing Big Data for Competitive Advantage," Information Management, vol. 47, no. 1, pp. 1.
Ferguson, R.B. 2013, "The Big Deal About a Big Data Culture (and Innovation)," MIT Sloan Management Review, vol. 54, no. 2, pp. 1-5.
Ferguson, R.B. 2012, "The Storage and Transfer Challenges of Big Data," MIT Sloan Management Review, vol. 53, no. 4, pp. 1-4.
ig data: What does it mean for your business?
Once data about consumers was relatively difficult to amass. Now, in the digital age businesses are assaulted with a plethora of sources of consumer data. "Data now stream from daily life: from phones and credit cards and televisions and computers; from the infrastructure of cities; from sensor-equipped buildings, trains, buses, planes, bridges, and factories. The data flow so fast that the total accumulation of the past two years -- a zettabyte -- dwarfs the prior record of human civilization" (Shaw 2014). The big data revolution has the power to be as revolutionary as the Internet in the ways that businesses conduct commerce and consumers view themselves. "ig data is distinct from the Internet, although the Web makes it much easier to collect and share data. ig data is about more than just communication: the idea is that we can learn from…
Corbin, K. 2014. CIOs must balance cloud security and customer service. CIO Magazine.
Available at: http://www.cio.com/article/2379776/government/cios-must-balance-cloud-security-and-customer-service.html [2 Nov 2014]
Cukier, K.N. & Schoenberger, V. 2013. The rise of Big Data. Foreign Affairs. Available at:
http://www.foreignaffairs.com/articles/139104/kenneth-neil-cukier-and-viktor-mayer-schoenberger/the-rise-of-big-data [2 Nov 2014]
Internet also known as the big data to the market researchers. The article also aims to show the disadvantages associated with the big data like privacy issues. The article presents two dimensions of the Internet use, its benefits, and disadvantages. However, its analysis lies more on the benefits than the disadvantages. The major reasons for supporting these aims are premised on the authors' ability to identify the benefits and the risks associated with the big data and their analysis to support the claims. Through this, they succeed in convincing the reader about the benefits and dangers associated with of the Internet (Nunan & Di Domenico, 2013).
The authors have used different research strategies to support their purposes. They used empirical studies conducted by other researchers like MS 2006, Leigh 2010, Jacobs 2009, Ohm 2009, and IBM to support their case. For example, they obtained information from MS' 2006 research to…
Nunan, D., & Di Domenico, M. (2013). Market research and the ethics of big data. The International Journal of Market Research, 55(4), 2-13.
Herodotou, H., Lim, H., Luo, G., Borisov, N., Dong, L., Cetin, F.B., & Babu, S. (2011). Starfish: A self-tuning system for big data analytics. In CIDR (pp. 261 -- "272). Retrieved from http://x86.cs.duke.edu/~gang/documents/CIDR11_Paper36.pdf
Target's Data Breach affected over 80 million customers (Bayuk, 2010). However, it is probable that more people might have been affected. Certain client information, besides the payment card data was stolen during the breach. The company has confirmed that information regarding customers was taken from systems beyond point of sale. This means that customers who made online purchase or those who emailed the company were affected. In this case, the points of sale systems used by customers to swipe their credit cards are linked to the company's network, like everything else. However, the existing evidence is based on correlational expert reports. It does not show the opportunities enabling hackers to compromise people via point of sale machines and connect to the company network. These customers will now receive emails that resemble a lot like emails from Target Company or emails from bank that will ask customers to key in their…
Bayuk, J.L. (2010). CyberForensics: Understanding information security investigations. New York: Humana Press.
Tehan, R. (2008). Data security breaches: Context and incident summaries. New York: Novinkna Books.
Boyda, D. & Crawfordb, K. (2012). CRITICAL QUESTIONS FOR BIG DATA: Information, Communication & Society, 15:5, 662-679, DOI:10.1080/1369118X.2012.678878. Retrieved from http://dx.doi.org/10.1080/1369118X.2012.678878
healthcare model that could enable physicians determine their patients' susceptibility to future disease on the bases of their medical records, and most importantly, their similarity to other patients. They acknowledge that despite numerous studies indicating a shift from the traditional disease-based to the more effective patient-centered approach of healthcare delivery, there still exists a knowledge gap, particularly because of the lack of a computational tool that can effectively discover patients' disease patterns without "falling prey to the noise" (Chawla & Davis, 2013, p. 660). The authors put forth the CAE model, which they posit addresses these concerns better than the existing models. They base their development on a number of findings from exiting literature.
The CAE model establishes risk factors by leveraging a patient's symptoms and traits with their interactions and biological disease information. To this end, its operation rides on the findings of a 2009 study by Schadt, which…
Anderson, J.D. (2006). Qualitative and Quantitative Research. Imperial COE. Retrieved 6 June 2014 from http://www.icoe.org/webfm_send/1936
Chawla, N.V. & Davis, D.A. (2013). Bringing Big Data to Personalized Healthcare: A Patient-Centered Framework. JGIM, 28(3), 660-665.
Data Mining Habits
There are several advantages to the type of customer data collection process that Hill (2012) indicated Target is employing on its customers. One is that it enables the company to due highly specific, targeted marketing efforts. Thus, the company can become more effective in marketing products and services to customers. Also, customers can derive benefit from this sort of analysis. They can receive coupons and promotional offers that are tailored to their individual shopping habits and needs. As such, they can purchase more at Target for less money, while sating their shopping and lifestyles needs in the process.
However, there are both legal and ethical ramifications of the sort of data mining and analytics that Target is utilizing on its customers. These predominantly pertain to privacy. In the use case Hill (2015) references, the store was able to glean that a young woman was pregnant before her…
Atahan, P., Sarkar, S. (2011) Accelerated learning of user profiles. Management Science. 57(2), 215-239.
Hill, K. (2012). How Target figured out a teen girl was pregnant before her father did. www.forbes.com Retrieved from http://www.forbes.com /sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/#328d768134c6
The business opportunity that Starbucks sought to pursue was to grow its market in the grocery space. By designing K-Cups that appealed to consumers’ tastes, Starbucks sought to compete with other companies, such as Proctor and Gamble and Smuckers. The idea was to get Starbucks brand ready-made drinks into peoples’ homes so that they could have them without having to go to the store. As Sarah Whitten noted, “It’s a way for [Starbucks] to expand a brand that’s already owning retail and bring it into consumer’s homes…So, they can almost double consumption because consumers are going to want to drink it when they go to the actual Starbucks locations and now they have the freedom to drink it at home.” By analyzing customer data, Starbucks was able to identify a variety of drink formulations that would appeal to the largest segment of consumers.
The analytical methodology that Starbucks…
1). hat must be done? Notwithstanding any decision on taxes, Odland insists that government spending must be cut.
Meanwhile a January, 2013 article in the respected Guardian publication shows that the federal debt ceiling has gone up from "…an unimaginable $14.3 trillion" in August, 2012, to "$16.394tn as part of a package agreed then" (Rogers, 2013). The debt ceiling has not received a great deal of attention in the past but recently Republicans have demanded that the hite House agree to severe cuts in the federal budget in return for their willingness to agree to a raise in the debt ceiling. It is what some writers have called a "manufactured crisis" in ashington -- conservatives trying to force the hand of Obama -- but meantime are the Democrats the worst budget managers when it comes to raising the debt ceiling? Not really, Rogers explains. Republican presidents have raised the debt…
Amadeo, K. (2013). The U.S. Debt and How it Got So Big. About.com. Retrieved June 2, 2013, from http://useconomy.about.com .
Blodget, H. (2012). Here's the Biggest Problem in the American Economy. Business Insider. Retrieved June 2, 2013, from http://www.businessinsider.com .
Odland, S. (2012). My Top 10 Economic Worries. Forbes. Retrieved June 2, 2013, from http://www.forbes.com .
Rogers, S. (2013). U.S. debt ceiling: how big is it and how has it changed. The Guardian.
SUFING & MINING THE WAVE OF BIG DATA
What used to consider a simple annoyance or frustration has now become a respected field of inquiry. Consumer information has transformed into Big Data. As with many things that are vast, Big Data has the potential to intimidate. It is now the professional responsibility of people working in many fields to be aware of Big Data, and be able to use it to their respective organization's advantage. Navigating through and understanding what Big Data is a formidable challenge in of itself, yet not impossible. Effective management of the 21st century cannot fear or be overwhelmed by Big Data; managers must learn how to use Big Data like any other tool within their professional arsenal to maintain the status quo and even ahead or make establish new trends in business.
Big Data is in simple terms, mass quantities of data that are…
Byrne, N. (2011) Mining Big Data for Meaning. Technology_IRELAND, 4(42), 28 -- 31.
Chong, R.F. (2012) Starting your education in big data. IBM developerWorks, BigDataUniversity, Available from: http://www.ibm.com/developerWorks . 2012 July 13.
Forsyth Communications. (2012) For Big Data Analytics There's No Such Thing as Too Big: The Compelling Economics and Technology of Big Data Computing. Available from: http://www.4sythcomm.com. 2012 July 11.
Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., & Byers, A.H. (2011) Big data: The next frontier for innovation, competition, and productivity. McKinsey Global Institute, McKinsey & Company: New York.
Analytics and the Growing Dominance of Big Data are
evolutionizing Strategic Decision-Making
The level of uncertainty and risk that pervade many enterprises today is growing, as the dynamics and economics of markets are changing rapidly. The many rapid, turbulent structural changes in industries is also leading to a greater reliance on analytics and the nascent area of Big Data as well. The potential of this second area, Big Data, is in determining patterns in massive data sets that have in many cases been collected for decades within enterprises. The abundance of data within enterprises, when combined with Big Data aggregation and analytics techniques, can be used for drastically reducing risk and uncertainty in even the most challenging and fast-moving industries. Big Data is being hyped heavily by analytics systems and enterprise application providers as well, as this category of software allows for the use of long-standing analytics and business intelligence…
Bughin, J., Chui, M., & Manyika, J.. (2010). Clouds, big data, and smart assets: Ten tech-enabled business trends to watch. The McKinsey Quarterly,(4), 26.
Malcolm Chisholm. (2009). The Dawn of Big Data: Are we on the cusp of a new paradigm that goes beyond what we can do with traditional data stores?. Information Management, 19(8), 45.
Jim Ericson. (2010). Is data science: If ultra-large scale data can reinvent military intelligence, it could change the way we see information. Information Management, 20(7), 18.
Jacobs, A.. (2009). The Pathologies of Big Data. Association for Computing Machinery. Communications of the ACM, 52(8), 36.
DBMS and Data Warehouses
(1) in this writing assignment, you will create a brochure advertising your services as a data repository.
Powered By Excellence
Data epository Service
Powered By Excellence is the only data repository service with globally-located data centers across each continent, each with specific security, reliability and fault redundancy systems in place.
Our staff includes world-class experts on the following platforms: IBM, Microsoft, Oracle, MySQL, Informix, Sybase, Teradata and SAS expertise in-house as part of our consulting services division.
Analytics Advisory Services
Big Data Consultancy - Map and Hadoop expertise for gaining insights from very large datasets)
Custom Software Development
SaaS Application Support
Scalable File Storage
Private Cloud Hosting (Dedicated storage and unlimited virtual machines)
High performance with a world-class platform
24/7 Administrator Access
Unlimited Virtual Machine Use
Service Level Agreement (SLA) metrics available 24/7
Trusted Provider of Data epository Services:
(Benander, Benander, Fadlalla, Gregory, 2000)
Benander, A., Benander, B., Fadlalla, A., & Gregory, J. (2000). Data warehouse administration and management. Information Systems Management, 17(1), 71-80.
Choudhary, A.K., Harding, J.A., & Tiwari, M.K. (2009). Data mining in manufacturing: A review based on the kind of knowledge. Journal of Intelligent Manufacturing, 20(5), 501-521.
He, Z., Lee, B.S., & Snapp, R. (2005). Self-tuning cost modeling of user-defined functions in an object-relational DBMS. ACM Transactions on Database Systems, 30(3), 812-812.
customer shopping, assertions and otherwise is nothing new. However, the manifestations and degree to which this data is used in the modern marketing sphere is much more substantial and significant than it used to be. Just one example of a firm that does this is Amazon. This report shall explain what data that company uses, the additional data that they might attain from other vendors, the specific insights or information that is extracted from the raw data, how the analysis of the data translates into decisions and so forth. While Amazon has to be careful when it comes to the depth and breadth of how they use the data they get a hold of, there is no question that the use of that data is the core of their creation and sustaining of their business.
In the grand scheme of things, Amazon has not been around all that long.…
Chaffey, D. (2014). Amazon.com case study - Smart Insights Digital Marketing Advice. Smart Insights. Retrieved 5 August 2016, from http://www.smartinsights.com/digital-marketing-strategy/online-business-revenue-models/amazon-case-study/
Madden, S. (2012). How Companies Like Amazon Use Big Data To Make You Love Them. Co.Design. Retrieved 5 August 2016, from http://www.fastcodesign.com/1669551/how-companies-like-amazon-use-big-data-to-make-you-love-them
Moylan, B. (2016). Gawker.com. Retrieved 5 August 2016, from http://gawker.com/5842230/drug-stores-finally-marketing-to-the-beer-pong-and-drunken-hook-up-demographic
Taylor, H. (2015). Amazon tests status quo with aggressive big data play. CNBC. Retrieved 5 August 2016, from http://www.cnbc.com/2015/10/07/amazon-super-powers-web-services-with-data-analytics.html
data collection mentioned earlier. This report shall focus on the data collection in particular. Within this report, there shall be a recitation of the data collection approach, a definition of the proper data collection channels, a description and depiction of the purchase of external data sets to assist in the problem, the development and description of data quality and other data governance issues and a planning of the ongoing storage and maintenance of the data. While planning and execute data analytics is not rocket science, as they say, it is something that is very important and needs to be done right the first time.
The author of this report knows that a ten million dollar investment is not insignificant. As such, there should be a proceeding with caution yet expediency. As noted in the prior project, JC Dollar is in the right general area of analysis but is obviously not…
Arrington, S.C. (2013). The Nays Have It: Computer Fraud and Abuse Act Should Not
Apply to Employees Who Violate Employer Imposed Computer Access and Data
Use Restrictions to Steal Company Data. Journal Of Internet Law, 16(12), 3-20.
Bata, S.A., Beard, J., Egri, E., & Morris, D. (2011). Retail revenue management:
risks associated with exchanging data with outside partners. The most significant risk is probably with respect to data security. A survey of people within the health care industry noted that within the industry there are a number of concerns expressed relating to security. These include the risks of exchanging data between health care providers and government (fear of government), storage in insecure databases (fear of technology), and patient registration on insecure websites (again, fear of technology). The problem is that the people expressing these fears are not IT professionals and do not actually understand the risks that they are afraid of. They fear that there is growing interest among thieves trying to steal personal health records. The market for social security numbers, Medicare or Medicaid numbers or other health numbers is driving these fears (Diana, 2014).
Basically, a major issue here is that health care providers do not trust their…
Diana, A. (2014). Obamacare vs. patient data security: Ponemon research. Information Week. Retrieved June 5, 2014 from http://www.informationweek.com/healthcare/security-and-privacy/obamacare-vs.-patient-data-security-ponemon-research/d/d-id/1127663
Englebardt, S.P., & Nelson, R. (2002). Health care informatics: An interdisciplinary approach. St. Louis, Mo: Mosby.
Groves, P., Kayyall, B., Knott, D. & Van Kuiken, S. (2013). The big data revolution in health care. McKinsey & Company. Retrieved June 5, 2014 from http://www.mckinsey.com/~/media/mckinsey/dotcom/client_service/healthcare%20systems%20and%20services/pdfs/the_big_data_revolution_in_healthcare.ashx
Technology Impact on Clinical esearch and the Interrelationship of Uniform Data Format Standards
With increasing robustness of technology, clinical programmers began realizing inefficiencies in metadata and recreation from scratch each time, in addition to overlapping data elements over research works. Further, they saw the numerous inconsistent techniques for collection of specific, seemingly-simple data elements. The most straightforward example conveying the above challenge is: defining subject gender (Female or Male) in a clinical research work. At a swift glance, this appears to be a rather clearly defined data point. But, as is proven, even seemingly simple elements can prove challenging (McBride, 2014). An evolution is occurring in data management. By embracing emergent technologies once again, data managers are likely to be a lot more efficient than before. Under this article, only some aspects of innovation impact clinical managers of data are covered; however, it is evident that, over time, several…
Cooper, C.M.D. (2009). Office of Translational Sciences, CDER, FDA. Computational Science and Data Standards in CDER, 8th Annual DIA eCTD Conference.
Etheredge, L.M. (2007). A Rapid-Learning Health System. Health Affairs, 26, no. 2: w107-w118.
Krishnankutty, B., Bellary, S., Kumar, N. B. R., & Moodahadu, L. S. (2012). Data management in clinical research: An overview. Indian Journal of Pharmacology, 44(2), 168-172. Doi: 10.4103/0253-7613.93842
Leroux, H., McBride S. & Gibson, S. (2011). On selecting a clinical trial management system for large scale, multi-centre, multi-modal clinical research study. Studies in Health Technology and Informatics 168: 89-95.
research database be part of the protocol development team. Perhaps the most eminent of these reasons pertains to the need to have the data collection process aligned with the efforts of the protocol development team. The sort of congruence that needs to exist between database collection and protocol development is essential to ensuring that the data that is captured for analysis directly relates to the research study as a whole. In this sense, the research database design process contributes to the development of a research study's protocol in that it provides a mechanism for determining what sort of data is possible to capture (and able to be analyzed) to support the purpose of the study. Again, it is critical to have these two elements in a research study aligned because the former directly influences the latter. If a research database is not able to capture data that is used to…
Harper, J. (2014). The vital intersection between science and technology. www.dataversity.net. Retrieved from http://www.dataversity.net/vital-intersection-science-technology/
Harper, J. (2014). Governing self-service analytics. www.dataversity.net. Retrieved from http://www.dataversity.net/governing-self-service-analytics/
Mandatory Data etention Laws in Australia
Ethics on Communication Details Being ecorded and Stored
The main issue concerning the topic is the aspect of whether it is right or wrong to keep data and information with respect to privacy and confidentiality as the data retention implies that the private information of the public will be accessed without their consent. There are many parties who are likely being impacted by these concerns. To start with, there is the general public whose private information will be accessed and retained devoid of any informed consent (Coyne, 2015).
The other parties who are likely to be impacted will be companies whose sensitive information will be accessed and hacking of such data could have adverse effects on their business operations. As opined by Coyne (2015), with the introduced aspect of protection class warrants being voted down, it implies that even journalists who might have information…
Asha. (2013). Issues in Ethics: Confidentiality. Retrieved 24 September 2015 from: http://www.asha.org/Practice/ethics/Confidentiality/#sec1.2
Coyne, A. (2015). Mammoth last-ditch effort by Greens, indies knocked back. Itnews. Retrieved 24 September 2015 from: http://www.itnews.com.au/news/australia-passes-data-retention-into-law-402127
Dalby, S. (2014). Protecting your privacy: Our stand against 'mandatory data retention'. Iinet. Retrieved 24 September 2015 from: http://blog.iinet.net.au/protecting-your-privacy/
Daly, A. (2014). The Ethics of Big Data. Electronic Frontiers. Retrieved 24 September 2015 from: https://www.efa.org.au/2014/11/06/ethics-big-data/
Evidence-based practice (EBP) is defined as the conscientious, judicious, and explicit use of current best evidence to make decisions about patient care. EBP incorporates the best available evidence in order to guide nursing care and improve patient outcomes. This will assist health practitioners to address health care questions by using an evaluative and qualitative approach. EBP is a problem-solving approach to clinical practice and involves the search for and critically appraising the most relevant evidence, one\\'s clinical experience and the preferences of the patient (Fortunato, Grainger, & Abou-El-Enein, 2018). The process involved in EBP allows the practitioner to assess research, clinical guidelines, and other information resources that are based on high-quality findings and apply the results obtained to improve their practice.
Since EBP heavily relies on research and searching for available evidence to support a hypothetical question in order to solve a current problem, it is vital that one understands…
Analysis of the data:
The information contained in this article is highly useful and informative for someone who truly wants to understand why America is repeatedly under attack by its own organizations. There may be variety of other factors too but Brill correctly identifies the presence of complex systems and lack of understanding about low probability issues as the critical factors affecting American accident-prone organizations today. e fail to understand that some of the very high consequence accidents that have low probability of ever occurring are the actual cause of future problems and hence must not be ignored at any cost. Here we can apply Murphy's law and say that if something can go wrong, it will- given the current organizational system working in America.
Limited and justifiable conclusion:
e can thus conclude that despite America's best efforts to avoid accidents, there is a good chance that not only it…
We can thus conclude that despite America's best efforts to avoid accidents, there is a good chance that not only it will have accidents and disasters both natural and economic but also they will be bigger and wider in magnitude and impact. This will happen not because of we lack serious interest in controlling accidents, but primarily because of that very fact. This doesn't mean we must not control accidents but rather we must try not to focus on the too obvious ones only. We must also take into consideration the ones that are unlikely to happen but if they occurred, they could have a huge impact on our economy and society.
This article can be found at http://www.forbes.com /2010/09/21/bp-toyota-gas-technology-cio-network-disasters.html
This is troubling, because if one of these two elements is taking place, it could cause the study to lose its accuracy. (Lofland, 2006)
What problems might you face with qualitative research?
There are several different problems that could be faced when conducting qualitative research the most notable would include: a limited sample size and the possibility of identify various anomalies as the underlying trend. This is problematic, because all qualitative research will involve selecting a certain sample and then corroborating it with other findings. In cases where, the sample size could be millions or billions of people, the results could be different from the views of the majority. This is because the population sample would normally focus, on a few hundred to tens of thousands of participants. This is a small portion of the population demographic, as their views could represent the minority. The fact that the sample was…
Do the Ends Justify the Means. (2010). Online Ethics Center. Retrieved September 18, 2010, from http://www.onlineethics.org/CMS/research/rescases/gradres/gradresv1/justify.aspx
Ethics in Qualitative Research. (n.d.). Ethics in Health Care Research. Retrieved September 18, 2010, from http://www.sahealthinfo.org/ethics/ethicsqualitative.htm
Qualitative Measures. (2006). Research Methods. Retrieved September 18, 2010, from http://www.socialresearchmethods.net/kb/qual.php
Berg, B. (2007). Qualitative Research Method for Social Science. Boston, MA: Allyn and Bacon.
Everyone is under suspicion, according to the eye of the camera. Everyone is treated as if they are a likely criminal. This has a negative psychological affect on the general population who are not criminals.
For those who are not criminals, they feel as if their privacy is being invaded for no reason. They are reduced to being under suspicion and scrutinized even though they are upstanding citizens. They feel as if they are being treated as a criminal and that their freedoms are being slowly eaten away one by one. More and more the general population expresses concerns about the trend toward and Orwellian world. The telescreens in Orwell's world broadcast propaganda and continually exaggerated positive production numbers and lied about the failing state of the economy. The telescreens made the economy sound like a growth economy, when it was slowly slipping away, sound familiar?
In Orwell's novel, inston…
Froomkin, D. Obama Hasn't Entirely Abandoned the Bush Playbook. February 18, 2009. the
Washington Post. < http://voices.washingtonpost.com/white-house-watch/bush-rollback/obama-hasnt-entirely-abandoned.html >. Accessed December 6, 2010.
London Evening Standard. George Orwell, Big Brother is watching your house. March 31, 2007.
< http://www.thisislondon.co.uk/news/article-23391081-george-orwell-big-brother-is-watching-your-house.do > . Accessed December 5, 2010.
biggest factor that a college student or a business executive should consider when shopping for a microcomputer is what that computer will be used for. For example, if the computer is going to be used primarily for data storage, then the hard drive is the most important component of the computer. However, if the computer will be used for internet research, then the CPU is the most important component. Another factor to take into consideration are how long the user will be sitting in front of the computer at each usage. If the user will be spending long hours staring at the monitor, an anti-glare LCD monitor would help prevent eye strain. Other questions to ask include: "Will the user need a laptop or a desktop?" "Does the user want a cordless mouse and keyboard?," and of course there is the question of the operating system - is the user…
Malik, Om. "Free Wi-Fi? Get Ready for Googlenet." Business 2.0 September 2005. http://www.business2.com/b2/web/articles/print/0,17925,1093558,00.html
Shimpi, Anand Lal. "Fall IDF 2005 - Day 1: Intel Introduces new Microprocessor Architecture." Anand Tech.com August 23, 2005.
"Toshiba Releases First Hard Disk Drive Based on Perpendicular Magnetic Recording." Geekzone August17, 2005.
He could be successful if the evidence establishes that the delay caused by weather and by Big Bank's deviation from specs were significantly less responsible for the delay that the personnel issues at Systems. He will probably not be successful unless the unavailability of Glenda Givealot was much more of a contributing factor to the delay than the spec deviation. Big Bank's damages are limited by contract to a maximum of 12 months of fees paid to Systems and no other economic damages.
3. Review the facts provided and the sample contract. What provisions of the contract could you cite to support an argument that it is not in Big Banks best interest to rescind the contract? What facts could you cite to support an argument that Big Bank be responsible for some of these issues and/or not in compliance with the contract?
Under Section 2a, Big Bank is responsible…
The five management programs have the same common dependent variables. These are the average turnover, the weekly profit and the monthly staff time cost. The independent variable for this experiment is the management system that is used. There are five different management systems that are being used at the company, and they differ in their methods. The data presented show the impact of the different management systems on the different output measures (dependent variables).
The wild card is the type of store data. The company investigated this using three store categories, and presented its findings, but they were not presented with statistical analysis. As such, they should not be considered to be an independent variable.
Outcome variables are the dependent variables.. Ultimately, for this company the variables should reflect a wider variety of output measures for each store. . The output variables should be related to the success measures.…
Investopedia (2015). Sales per square foot. Investopedia. Retrieved December 10, 2015 from http://www.investopedia.com/terms/s/sales-per-square-foot.asp
Taylor, C. (2015). What is a simple random sample? About.com. Retrieved December 10, 2015 from http://statistics.about.com/od/HelpandTutorials/a/What-Is-A-Simple-Random-Sample.htm
Baldwin, S. (2006). Organisational justice. Institute for Employment Studies. Retrieved December 10, 2015 from http://www.employment-studies.co.uk/system/files/resources/files/mp73.pdf
Hannan, M. & Freeman, J. (1984). Structural inertia and organizational change. American Sociological Review. Vol. 49 (2) 149-164.
Neo-looked confused. "Programs hacking programs?" To which the Oracle replied, "At some time, a program was written to govern everything. The only time you see a program is when it's malfunctioning, and needs to be replaced, or exiled." Jack, I know you are new in the IT department, but I can't emphasize enough the need for you to take the Oracle's advice. We want our software, CRM modules, and sales processing databases to function without being seen. We don't need any programs fowling up other programs. I don't want to have to fight any 'vampires' or 'ghost twins' because you have allowed the database data dictionary to get corrupted.
The data dictionary is a tool which keeps the other programs up-to-date, and feeds information to the other querying programs as to what to expect from the data they are receiving. The data dictionary is a separate, and important indexing…
Tribunella, T. (2002) Designing Relational Database Systems. The CPA Journal, Vol. 72.
Weber, A. (2000, Oct. 1) 14 No-Fail Steps to Building a Database. Target Marketing;
Collapse of the Big Three
America was once the leader and pioneer in the auto industry, a title that the country had for decades and a title that was so dear to America's heart that it was unfathomable to think that title might ever be lost. It's commonly misconstrued that America invented the automobile, when in reality that honor goes to German Karl Benz in 1885 (ozema, 2010). "Americans did, however, industrialize the love of the automobile. America loves big, fast cars, and for many decades American car companies shared the biggest slice of the auto industry pie" (ozema, 2010). America made having a car and the business of making cars firmly entrenched in American culture. This was a fact which kept the economy stimulated and which provided a consistent level of financial stability for the nation and the civilians within it. However the decade of the eighties marked the…
Anderson, P. (2008, November 11). Expert Examines Impact Of Big Three's Collapse. Retrieved from Npr.org: http://www.npr.org/templates/story/story.php?storyId=96875257
Dunbar, W., & May, G. (1995). Michigan: A History of the Wolverine State. Grand Rapids: Eerdmans Publishing.
Gatesman, A. (2005). Why are Foreign Manufactured Cars Gaining Market Share in the U.S. market? . Retrieved from Iwu.edu: http://www.iwu.edu/economics/PPE13/gatesman.pdf
Gordon, E. (2005, May 4). The Decline of the 'Big Three' U.S. Auto Makers. Retrieved from npr.org: http://www.npr.org/templates/story/story.php?storyId=4630187
Database Data Warehouse Design
Our company, Data Analytic Limited, specializes in collecting and analyzing data for various organizations. Over the years, we have assisted various companies to turn raw data into valuable information that assists the companies in making effective decision profitable in the short and long run. Our research and data analytics are geared towards giving extra edge to various companies. Our services include processing and analyzing terabytes of data to provide customer meaningful information for business decision and enhance competitive market advantages. ecent growth of our company necessitates the needs to design and develop data warehouse that will accommodate large volume of customer data.
Objective of this project is to design and develop the data warehouse for our company.
Importance of Data Warehousing for our Organization
Comprehensive portfolios of our business include Business, Market, and Financial research, Data processing services and Domain based analytics. While the relational database…
Hillard, R. (2010). Information-Driven Business. UK. Wiley.
Microsoft (2012).Data Warehousing | Microsoft SQL Server 2012. Microsoft Corp.
Patil, P.S., Srikantha, R., Suryakant, B.P. (2011). Simplification in the Reporting and Analysis Optimization of the Data Warehousing System:, Foundation of Computer Science, 9 (6): 33 -- 37.
Rostek, K. (2010). Data Analytic Processing in Data Warehouses. Foundations of Management, 2(1), (2010), 99-116.
Crime Data Sources in the United States
The collection of crime data in the United States is carried out through different approaches including Uniform Crime eports and the National Incident-Based eporting System, which also act as the two primary sources of crime data for crime reporting. The data obtained from these sources are used for research and documentation of crime status at the county, state, and national levels. Notably, the National Incident-Based eporting System emerged as an advancement of the conventional summary of Uniform Crime eports that were used to track crime in the country. In addition, the Congress uses data from these sources together with those from the National Crime Victimization Survey to guide policy decisions and create suitable responses to crime. While the use of these sources helps in dealing with crime in the United States, they have some similarities and differences between them with regards to methodological…
Addington, L.A. (2008, February). Assessing the Extent of Nonresponse Bias on NIBRS
Estimates of Violent Crime. Journal of Contemporary Criminal Justice, 24(1), 32-49.
"Data Collection Guidelines." (2000, August). National Incident-Based Reporting System.
Retrieved from U.S. Department of Justice website: https://www.fortworthpd.com/docmgmt/NIBRS_Volume1_Major_Differences.pdf
Data Input, Output, Storage Devices and Determining the Speed of a Computer
This paper has made use of the different input and output methods for computers as well as studied the differences between primary and secondary storage. It also checks for the roles of different computer parts in the overall working of the computer.
In computer terminology, data is something that is unprocessed and raw, which does not have a series of clusters within it. On the other hand, information is more detailed and the better form than that of data. It is processed data, whereby it is meaningful data that can be used for manipulation in the computer networks as well as in the computer itself. This paper discusses the different types of methods of data input and output as well as storage devices and also aims at determining the speed of a particular computer.
Data is very significant…
Author Unknown, 2004 General Computer Basic Input/Output System Overview URL 1: http://support.microsoft.com/default.aspx?scid=299697
Tyson, Jeff, 2004 How BIOS Works URL 2: http://computer.howstuffworks.com/bios.htm
City of Alexandria -- Time Series Data
Tufte (2001) and other ambassadors of the visual display of data have shown us how easily it is to understand complex data when it is graphically represented in ways that our minds are designed to understand. Tufte argues that "experience with the analysis of data…is essential for achieving precision and grace in the presence of statistics, .but even textbook of graphical design are silent about how to think about numbers" (Tufte, 2001, p. 104). Tufke remarks, that "Illustrators too often see their work as an exclusively artistic enterprise -- the words "creative," "concept," and "style" combine regularly in all possible permutations -- a Big Think jargon for the small task of constructing a time-series a few data points long" (Tufte, 2001, p. 204). Visual display of data has other uses than simply an elegant way to view, appreciate, and analyze data. The process…
Averch, H.A. (XXX). Chapter 10 Using expert judgment. [In XXXX].
Gladwell, M. (2007, November 12). Dangerous minds: Criminal profiling made easy. The New Yorker.
Miller, J.E. (2005). The Chicago guide to writing about multivariate analysis. Chicago, Il.: University of Chicago Press.
Meier,, K.J., Brudney, J.L., and Bohte, J. (2005). Applied statistics for public and nonprofit Administration, 6th ed. Belmont, CA: Thompson Wadsworth.
Success-promoting action questions involve "resource adequacy, management and control structure, bureaucratic rules and regulations, political effectiveness, and feedback and evaluation" (437). Following the necessary pattern of realistic yet personally-sensitive inquiry when formulating good questions, Wolman considers the fact that differing situations will require discretion with regard to how much value is placed on measurement vs. action questions. Wolman concludes that no matter what, implications for success vs. failure must be considered and questioned thoroughly before any public policy plan is carried out. Further research along these lines may result in a formal guiding theory on the "why's and how's" of ensuring program or policy success.
Behn, . (1995). The Big Questions of Public Management. Public Administration eview, 55 (4), 313.
Brewer, J. (2005). Formulating esearch Questions, in Foundations in Multimethod esearch. Sage Publications.
Camburn, E., owan, B., & Taylor, J.E. (2003). Distributed Leadership in Schools: The Case of Elementary…
Behn, R. (1995). The Big Questions of Public Management. Public Administration Review, 55 (4), 313.
Brewer, J. (2005). Formulating Research Questions, in Foundations in Multimethod Research. Sage Publications.
Camburn, E., Rowan, B., & Taylor, J.E. (2003). Distributed Leadership in Schools: The Case of Elementary Schools Adopting Comprehensive School Reform Models. Educational Evaluation and Policy Analysis, 25 (4), 347-373.
Feldman, M., Skoldberg, K., Brown, R.N., & Horner, D. (2004). Making Sense of Stories: A Rhetorical Approach to Narrative Analysis. Journal of Public Administration Research and Theory, 14 (2), 147-170.
725 degree Kelvin (-454.765 degree Fahrenheit, -270.425 degree Celsius) Cosmic Microwave ackground radiation (CM) that pervades the observable universe. This is believed to be the remnant that scientists were looking for. Penzias and Wilson shared the 1978 Nobel Prize for Physics for this discovery.
Finally, the abundance of the "light elements" hydrogen and helium found in the observable universe are believed to support the ig ang model of origins (the ig-ang Theory Web site, 2003).
In 2003, Physicist Robert Gentry proposed an alternative to the standard ig ang theory, an alternative that also accounts for the evidences listed above (Eastman and Missler, 1996). Gentry believes that the standard ig ang model is founded upon a faulty paradigm that he claims is inconsistent with the empirical data. Gentry bases his model on Einstein's static-spacetime paradigm that he claims is the "genuine cosmic Rosetta."
Gentry is not alone. Other high-profile dissenters include…
Eastman, Mark. Missler, Chuck. The Creator: Beyond Time and Space, (1996) p. 11.
W. Wayt Gibbs, "Profile: George F.R. Ellis," Scientific American, October 1995, Vol. 273, No.4, p. 55.
Big-Bang-Theory.com. (2002). Big Bang Theory. Retrieved from the Internet at: www. Big-Bang-Theory.com.
Gish, Duane. (June, 1991). The Big Bang Theory Collapses. Institute for Creation Research.
Secondary Data eview
Solving the Problem of Decreasing evenues
Due to continuing instability in the stock market, the business I originally wrote about, Unit Investment Trust that was part of JP Morgan, had been losing money since 2002. Ultimately, those in charge of such decisions, chose to sell the UIT part of the business.
Over the last few years, many businesses have faced similar problems because of the recession and stagnant economy, and other businesses have gotten into trouble because of other issues.
One such company is featured in an article from the Boston Business Journal. Ultimate Parking Inc. is a Boston-based valet parking company. This company was doing well enough that it was able to spin-off another venture called premier Curbside Valet. Originally the second company did very until the curbside restrictions in the aftermath of 9/11 completely destroyed the second company. In the words of the owner and…
Archambeault, B. "Shifting Gears." Boston Business Journal, http://.bizjournals.com/entrepenrenur/2004/06/28/1.html
Archambeault, B. "Golden Moldy." Boston Business Journal
Hillix, D. "Quitting Was not an Option." Dallas Business Journal
10. What is your ultimate goal career?
I am pretty content overseeing this store but someday I may work toward becoming a regional or statewide manager.
11. Who are some of the biggest suppliers for the equipment that are used at your business?
One of our biggest suppliers is Hewlitt Packard who supplies most of our computer technology equipment that helps us run the store. It is handled through our IT department.
12. How do you handle lack of structure at work?
We provide incentives including production, and sales goals in which employees can compete to win prize, trips etc. We also provide quotas to help the staff maintain a healthy pace at work.
13. When a problem arises, what are the processes of identifying and diagnosing the problem?
The employees closest to the problem are to bring it to their immediate supervisor who will address it or pass it…
Future of Data Storage in Computer Networks
There are a number of problems facing the future of information technology including the fact that networks are increasingly asked to expand in order to accommodate more and more data. Many experts believe that such increases will mean two things; one that the networks will become increasingly secure, and two because of the security, the data contained on the network will become more difficult to access. This study sought to determine the various processes that are currently being used to secure data on various networks, and to determine if that security will, or will not, ensure that data will become incrementally more difficult to obtain. To this end, this study used the most current literature available to determine if there is a problem with the data being stored in the current manner, or if there is a perception that the data will be…
Axellson, A-S. & Schroeder, R. (2009). Making it open and keeping it safe: E-enabled data-sharing in Sweden. Acta Sociologica, 52(3), 213-226.
Datt, S. (2011, Winter). The information explosion: Trends in technology review. The Journal of Government Financial Management, 60(4), 46-54.
Folk, M. & Barkstrom, B. (2003). Attributes of file formats for long-term preservation of scientific and engineering data in digital libraries. Paper presented at the Joint Conference
on Digital Libraries, Houston, TX, May 27-31.
Domestic Tourism Scenario and Government Data Obtaining
A new domestic tourism operator specializing in surf holidays wishes to build an interactive web site that allows the customer to see in real time the weather, wind, surf, and other data relating to their destination. As a new and bold initiative, the operator wishes to tie in the price of the holiday with the weather situation Better waves and better weather attract a higher price and vice versa. It is a new and potentially risky project, and the business owner is exceedingly concerned about how such a plan will play out. In viewing the risks associated with this project, as well as the top ten steps that would be undertaken to deliver this project to completion, one can understand that such a project is not only innovative but will prove exceedingly beneficial to the company over the long-haul.
In undertaking a project…
Arrigo, J. And Curtis, S. (2010). "Climate, weather and tourism: bridging science and practice." Web. Retrieved from: http://www.ecu.edu/cs-acad/sustainabletourism/upload/Climate-Weather-Tourism-final-book.pdf .
2 June 2012].
Boutelle, J. (2006). "Understanding organizational stakeholders for design success."
The charts show us why.
2. ape: There were also a huge number of rapes during these 5 years but interestingly rapes actually increased from 644 cases in 1990 to 763 cases in 21995 (1998 and 2001 showed the level to remain approximately consistent and then to drop to 294 cases in 2010). N This may have been due to the case that the Bronx, always a hotbed of violence and unrest had to defuse their energy somewhere. Hence, they turned to rape instead of murder to do so. Nonetheless, the fact that rape did not decrease is interesting
Staten Island 1990-1995
1. Murder -- There were 29 murder cases in 1990 compared to 26 in 1995. The level had dropped but not dramatically. In fact, the decline was an insignificant -- 34.6%. Nonetheless, we see Guilliani's influence here too. (Murder levels greatly decreased in the years following although recently,…
BJS. Bureau of Justice Statistics
Police Department City of New York
Additionally, with the opening of boundaries, foreign producers would penetrate the American market and seek consumers. This led to a situation in which most products were labeled Made in China, Made in Mexico and so on. The response was that of emphasizing on the Made in the U.S.A. brand and the stimulation of national production and consumption of the nationally manufactured items.
To be however complete in assessment, it is true that the past recent decades have brought about intensifying forces of globalization and market liberalization. They led to a situation in which international trade became extremely popular. Additionally, several international organizations and alliances were formed to regulate and promote free international trade, such as the World Trade Organization or NAFTA. The consequence was the significant reduction in trade barriers, namely the elimination of several barriers to imports.
While it is true that some of these barriers have been resurrected…
Erixon, F., Sally, R., September 9, 2009, Keynes at Home, Smith Abroad, the Wall Street Journal
Predictive analytics help companies to understand the behavior of consumers. The way that predictive analytics works is that data from the past is used to help refine predictions about the future (CGI, 2013). Companies basically analyzed demand in terms of a wide range of variables in order to arrive at a better estimate for future outcomes than otherwise would have been found. It is basically the same principle as predicting that a colder, snowier winter will help Wal-Mart sell more snowblowers, but with hard data, sophisticated algorithms and reliable outputs -- such as x number of snow days will equal y number of snow blowers sold.
One of the interesting elements of predictive analytics is with associations, and this has been used fairly extensively in retail. Associations discovery is where correlations between things are noted that might not have been apparent. So that link between snow blowers and…
CGI. (2013). Predictive analytics. CGI Retrieved June 2, 2014 from http://www.cgi.com/sites/default/files/white-papers/Predictive-analytics-white-paper.pdf
Jain, A., Murty, M. & Flynn, P. (1999). Data clustering: A review. ACM Computing Systems. Vol. 31 (3) 264-323.
Nearing, B. (2013). Mining Internet for chunks of gold. Times Union. Retrieved June 2, 2014 from http://www.timesunion.com/business/article/Mining-Internet-for-chunks-of-gold-5056469.php
Olavsrud, T. (2014). CIOs should push big data projects but prioritize privacy. CIO Magazine. Retrieved June 2, 2014 from http://www.cio.com/article/753612/CIOs_Should_Push_Big_Data_Projects_but_Prioritize_Privacy
In this Facebook data breach essay, we discuss how Facebook allowed applications to mine user data. The essay will explain what data was breached, how it was breached, and how that data was used. Furthermore, the essay will also discuss the repercussions of the breach, including Facebook founder Mark Zuckerberg’s hearing in front of the United States Senate, issues involving Cambridge Analytical, and information that is being revealed about additional data breaches.
In addition to explaining the data breach, the essay will also discuss whether Facebook has a responsibility to users to keep data safe, and the steps that Facebook is taking to resolve data breaches in the future. This example essay should not only provide you with an overview of the Facebook data breach, but also provide you with a technical guide on how to write an academic essay. It will include the following parts of a standard academic…
fall 2007, the United States economy was rolling along in a healthy fashion having enjoyed 24 consecutive quarters of positive Gross Domestic Product growth. The Standard and Poors Index was over 1,500 and unemployment was below 5%. There was essentially no inflation. These were all good numbers and normally indicative of a health economy (Bloomberg Business eek).
Roughly 12 months later everything had changed. Treasury Secretary Henry Paulson surprised everyone by announcing that the Government was intending to intervene in the U.S. economy by holding reverse auctions where the troubled assets of several domestic financial institutions would be bought (Landler). As matters worsened quickly, the proposed auction concept was expanded to the point that the Government would actually purchase equity positions in some of the country's largest banks. The argument offered by Paulson was that such measures were needed to stabilize the troubled financial markets, avoid bank failures, and prevent…
Ashcraft, Adam B. "Are Banks Really Special? New Evidence from the FDIC-Induced Failure of Healthy Banks." The American Economic Review (2005): 1712-1730.
Bloomberg Business Week. "The Economy on the Edge." 19 November 2007. Bloomberg Business Week. 12 December 2011 .
Carliner, Michael S. "Development of federal homeownership "policy." Housing Policy Debate (1998): 299-321.
Case, Karl E. "Is There a Bubble in the Housing Market?" Brookings Papers on Economic Activity (2003): 299-362.
Young Diverse Children Living in ig Cities
This paper will focus on the lives and challenges minority and culturally diverse youths face growing up in major urban city environments, such as Newark, New York, altimore or Seattle. The advent of major metropolitan areas has stimulated a rapidly increasing population of disadvantaged and volatile youths. In today's America, it seems that more and more young people growing up in major cities are subjected to poor socio-economic conditions, which anymore lead to an increased likelihood for violence and life disruption.
Today's youths growing up in major urban cities are often disadvantaged; they lack the self-esteem, confidence and tools necessary to succeed in their later adulthood. I hope through my research to uncover facts related to urban distress among youths. I hope to also explore community organizations that have focused their efforts on improving the conditions prevalent among urban youths. I propose that…
Achtyes, Eric. (1998). "Big Problem, Small Band Aid." The Daily. Available: http://archives.thedaily.washington.edu/1998/110298/O5.i-.html
Casey Foundation. (2004). Available: http://www.aecf.org
Casey Foundation. Child Trends.
Child Trends. (2004). "Raising Children in Big Cities." Right Start City Trends. Child Trends Kids Count Special Report. The Annie E. Casey Foundation. Available:
Team Skills Mock Scenario Analysis
Big Petroleum Company is merging its eastern and western offices, and 72 employees from the company's eastern office will be moving to the west. In order to ensure that the move runs smoothly in terms of moving logistics, housing, office space requirements and integration of the eastern employees into the existing western office structure, a skilled team of workers must be compiled. In viewing the components of the five-member team needed for the success of this project, one can better understand why this project is suitable for a team and how each respective member plays a role in the project's overall success.
Five-Member Team, Duties, and Significance to the Project
The successful completion of the aforementioned project will need the respective successful completion of an innumerable series of tasks that will each prove necessary to ensure that a fully functioning integrated Big Petroleum Company…
Dong-Hua, Wang, and Zailani, Suhaiza. "Supply Chain Relationship and Design
Quality," in International Journal of Management, 28(4): pp. 36-40. December 2011. Web. Retrieved from: ProQuest Database.
McLean, Bob. "The ISO 15489 Imperative," in Information Management Journal, 36(6):
pp. 25-31. December 2002. Web. Retrieved from: ProQuest Database.
Federal Forensic Data Analytics
There are definite advantages to the Federal Bureau of Investigation's Digital Forensic Data Analytics program. Many of those advantages are well aligned with the integration of this program into the Strategic IT Plan for this organization. Essentially, the aforementioned program can increase the efficiency of the bureau's information technology initiatives, while simultaneously lowering costs and reducing the sort of infrastructure required to sustain this program. Additionally, this program can help this bureau maximize its current resources without needing to make substantial investments in other ones.
The analytics capabilities of the Digital Forensic Data Analytics program of the FBI far surpass those that it previously had for forensic analytics. One of the most immediate impacts of this program towards costs relates to the predictive capabilities of this program. By utilizing various components of cognitive computing including machine learning and other sophisticated algorithms such as deep learning and…
Cheng, W. (2016). What's a CFO's biggest fear, and how can machine learning help? www.analyticsweek.com Retrieved from https://analyticsweek.com/content/whats-a-cfos-biggest-fear-and-how-can-machine-learning-help/
Harper, J. (2016). Creating "Data Culture" with self-service analytics. www.analyticsweek.com Retrieved from https://analyticsweek.com/content/creating-data-culture-with-self-service-analytics/
Miller Inc. is a company that wishes to develop a new and more efficicent data repository for all data collected, stored, and transferred. Their desire to create a data warehouse that operates quickly with less effort is the purpose of this project. Adaptation of database modeling along with designing their data warehouse will lead to higher consumer and employee satisfaction. The project goal is to create a database schema to work as well be designed alongside other components such as identifying metadata in order to let IT model the data warehouse, implement and test it.
to identify and gather database requirements, design the dimensional model, develop the system architecture, design the relational database and online transactional processing model, develop the data maintenance application, develop analysis applications to test and deploy the system through a series of steps intended to reduce error rate. The types of applications for use will be…