Vajad kellegagi rääkida?
Küsi julgelt abi LasteAbi
Logi sisse

Summary about Big Data (0)

1 Hindamata
Punktid
Inglise keel - Kõik luuletused, mis on inglise keeles

Lõik failist

Summary
This is the summary for the presentation about big data by xxx. The presentation was divided into four topics. Starting with what is big data and briefly about it’s history, secondly discussed about it’s characteristics , nextly what can one do with big data and lasty the 5 big data challenges.
Firstly the author brought out what does the term big data mean . Big data is a term for data sets that are so large or complex that traditional data processing application software is inadequate to deal with them .
In the article „Big Data For SMBs“ the author mentioned that big data could be described with the three V-s: volume, velocity and variety. This paragraph talked about the amount , speed and variety of the data gathered. The author continued with big data opportunities. She brought out that by dipping into and analyzing big data, one can find out who the most valuable customers are, analyze competitors’ actions , to be familiar with recent changes on the marketplace and understanding how to make operations more efficient.

Summary about Big Data #1
Punktid 50 punkti Autor soovib selle materjali allalaadimise eest saada 50 punkti.
Leheküljed ~ 1 leht Lehekülgede arv dokumendis
Aeg2017-11-01 Kuupäev, millal dokument üles laeti
Allalaadimisi 7 laadimist Kokku alla laetud
Kommentaarid 0 arvamust Teiste kasutajate poolt lisatud kommentaarid
Autor timyy Õppematerjali autor
Inglisekeelne kokkuvõte presentatsioonist teemal Big Data. Õppejõud Mare Lepik, hinne 5, näeb ära kuidas koostada kokkuvõtet. Akadeemiline inglise keel sooritatud hindele 5

Sarnased õppematerjalid

thumbnail
9
docx

Big data in cloud

e w e r a o f b i g d a t a . P ii s Big a v data a l in t C o clou o l d I T opportu I 0 Academic essay (ITI0103) 2019 spring Introduction “Data is Everything and Everyone is Data. “[1] The ability to collect, organize, structure and analyse data on a large scale is probably the most significant trait that sets us, humans, apart from our primate friends. [1] To comprehend the opportunities and threats regarding big data located within the cloud, one must first realize the essence of them. Big data is not only what its name says, but it is also so much more. What is Big data? Big data is a term, which is used to describe a broad spectrum of concepts: from the

Algoritmid ja andmestruktuurid
thumbnail
16
docx

Social media information and data collection and security

New Media Economy Social media information and data collection and security In this brief essay, i would like to focus on the social media platforms in our moren society. How people use them, what kind of information we give away, what companies will do with this. Information sharing and data protection has become very popular theme in the recent few years. People care more about their privacy and avoid „big brother“ foreshadowing. It is important to know what social media platforms promise and are they really going to keep it. Users should think about what they share and what kind of information they generate. Because it is all recorded and some info can be traced back to real people. Privacy and data protecion topics are becoming more and more important and the amouts of data generated is becoming larger

Inglise keel
thumbnail
140
pdf

Thesis Kivimaa August 2022

The research question for this research project is – “How is it possible to calculate IT security effectiveness?”. The aim of this research is to use this reference model to calculate and to optimize major university’s and a small CSP-s (Cloud Service Provider) security posture and their spending’s on security measures. Aim is to develop a reference model to support IT Security team and business side to make reasoned and optimal decisions about IT security and all that with a reasonable number of manhours. In this Graded Security Expert System (GSES) aka Graded Security Reference Model (GSRM) the quantitative metrics of the graded security approach are used to express the relations between security goals, security confidence and security costs. What makes this model unique, is the option to use previous customers security templates/models – cutting the implementation time from 500+ manhours to as low as 50 manhours. The first

Infotehnoloogia
thumbnail
2
docx

How the right of privacy was viewed in the 1890s and 2010s.

The two articles have questioned - What is privacy ? The simplest answer would be that the privacy is a human right and like in the first article by Warren & Brandeis, they quote Judge Cooly who sayd that, the privacy is the right to be let alone. This means, that a person is free to go and do what ever the person wants, no one has a right to harm him/her physically or mentally and vice versa. What ever the person decides to do, nobody else has the right to know about it without persons premission. Julie Cohen starts her essay with a point that privacy has the image problem. In the world where there is no mobile platforms, data mining social meedia, in simple words the internet, its easyer to leave the person alone, but what can we do in the world where is very difficult to be incognito because your every move is statistics and sometimes lawfully, somebodys elses bussines ?. Julie Cohen continues with describeing the new sight of the privacy

Ajalugu
thumbnail
40
doc

Introduction of SCM

2. Procurement process: Strategic plans are developed with suppliers to support the manufacturing flow management process and development of new products. In firms where operations extend globally, sourcing should be managed on a global basis. The desired outcome is a win-win relationship, where both parties benefit, and reduction times in the design cycle and product development is achieved. Also, the purchasing function develops rapid communication systems, such as electronic data interchange and Internet 15 linkages to faster transfer possible requirements. Activities related to obtaining products and materials from outside suppliers requires performing resource planning, supply sourcing, negotiation, order placement, inbound transportation, storage and handling and quality assurance Also, includes the responsibility to coordinate with suppliers in scheduling, supply continuity &

Kategoriseerimata
thumbnail
228
pdf

Kuidas muudab mudelprojekteerimine teraskonstruktsioonide valmistamist ja ehitamist

its low weight and high strength in both compression and tension. Therefore, the steel design and construction industry has been on the forefront of technical innovation. The purpose of this study is to determine how 3D and BIM are changing the design, fabrication and construction of complex steel structures. The thesis is qualitative in nature, in that it tries to determine the effects of virtual design and construction based on in-depth analysis of two case studies. Data were collected during 5 interviews with people who were intimately involved in the projects. Background information was obtained from professional journals, engineering articles and conference papers. During analysis, the data were compared to propositions that emerged from the literature review to determine whether a clear pattern was present. A comparison table was created to compare the effects of virtual design and construction of the two projects. Additionally, a schedule is

Ehituskonstruktsioonid
thumbnail
14
docx

Misusing and Abusing the IoT ( Ingliskeelne referaat andmeturve ITX0040 jaoks)

Misusing and Abusing the IoT - Now and in the Future The Internet of Things is the network of physical objects—devices, vehicles, buildings and other items which are embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data [1]. As the amount of devices connected to the internet of things is constantly on the rise, making it innately more secure and protecting those devices from abuse, in a sense of unwanted access , manipulation by third parties and other scenarios, is rapidly turning into a pressing issue. According to some sources there were about 13.4 billion connected devices back in 2015 and the projections show there might be up to 38.5 billion such devices in 2020 [2]. As the

Andmeturbe alused
thumbnail
11
doc

Using Blogs as a Platform in the TEFL

ABSTRACT This work analyses the usefulness of blogging in teaching English as a foreign language. The definition of the term `blog' is provided along with the advantages and disadvantages of blogs' usage in practice. The analysis of language skills developed by students throughout the use of blogs for learning purposes is given in the paper with possible limitations that blogs have. Author of this paper also shares personal comments about the experience in the field. In this paper it is also described which research methods are planned to be employed for the conduction of research project. 2 ABSTRACT........................................................................................2 REFERENCES...................................................................................11

Inglise keel




Kommentaarid (0)

Kommentaarid sellele materjalile puuduvad. Ole esimene ja kommenteeri



Sellel veebilehel kasutatakse küpsiseid. Kasutamist jätkates nõustute küpsiste ja veebilehe üldtingimustega Nõustun