Wetting Our Toes In The Big Data Sea

Wetting Our Toes In The Big Data Sea

World population has reached 7 billion, and as of the middle of 2012, it is estimated that worldwide there are 2.4 billion Internet users, more than a third of the Earth’s population.

As universal as the Internet has become, it is perhaps not a completely understood thing. Perhaps it can be thought of as the logical extension of the Neolithic cave paintings.

In the history of media, the Internet is not only the simplest means to disseminate large amounts of information, but it is really the first time that there is a truly practical way for the recipients of the information to participate in the conversation. In Radio and Television, the only practical feedback a the audience could give was to turn the channel on undesirable programing. The Internet encourages audience participation to not only create feedback, but to contribute content.

Data and More Data

This has led to an explosion in the amount of data, not just on the Internet, but anywhere there is an electronic input, your water meter, the cash register at the corner store, every time your use the GPS Navigation system in your car. Sooner or later, all of that data will wind up on the Internet.

According to IBM, everyday 2.5 quintillion bytes of data are created, so much that 90% of the data in the world was created in the last two years. This is Big Data. By definition, Big Data is any data set that is so large that traditional data management tools are inadequate to handle it.

What Big Data Means and Will Mean

The implications of Big Data are just beginning to be understood. They will be felt across business, politics, science, and even social interaction.

Some of most immediate effects of Big Data are felt in business. Every hour 50 million filing cabinets worth of customer information is collected at the check-out counters of Wal-Mart Stores, approximately 167 times all the information contained in all the books in the Library of Congress. The true value of Big Data will probably be seen in predicting business trends. Amazon CEO Werner Vogels recently pointed out that when mistakes are made in his organization, it is usually because there is insufficient data to back up a suggestion or idea.

We are standing on the shores of a sea of unlimited potential. There are uncharted reefs in that sea as well. There is not time to cautiously dampen our toes, our ship is sailing into the Sea of Big Data. The choice to remain on the shore is beyond us, but as we sail, we can choose whether we are hidden below decks in steerage or on deck, basking in the sunshine.

By Peter Knight

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…