Information Collection: Business Builds Big Data

Information Collection: Business Builds Big Data

In the beginning there was the electronic computer. It was a tool for defending freedom, useful to use in breaking enemy communications codes and crunching equations for the Manhattan Project. Eventually it became the plaything of hobbyists and garage experimenters. In their garages, they eventually cobbled together machines that were useful and practical for real people.

These earliest personal computers were essentially toys until the first “killer apps” were created. These included the earliest forms of computer spreadsheet. A spreadsheet seems a simple thing, and it is for just about any computer. With this simple addition computers became as important to business as they were too scientists and hobbyists, if not more so.

Business Is Information

All business is in the business of collecting information. Information about your customer base is needed to bring them the products they want. Information about your supply chain helps to predict what products you will have to sell. Information about your competitors tells you where and how you need to innovate. It all depends on finding, storing, and interpreting information.

While business was happily expanding and filling their spreadsheets, the hobbyists and scientists were teaching their computers to talk to one another, eventually creating the Internet. Suddenly, we were no longer limited by the information contained in our own computer, we had access to information from around the world.

The Internet is a terrific place to store and share information, but the nature of business information is such that it is not always desirable to share your information with those outside your enterprise. When the Internet learned to store information, and keep it private and secure, it became the Cloud.

Welcome To The Cloud

As business moves its information into the Cloud, the traditional business applications are no longer able to handle the increased load of data. This is the text-book definition of Big Data. One of earliest super-computers outside of Government or Academia was built to handle AT&T’s billing system. Today, Wal-Mart stores handle 1 million transactions every hour, approximately 2.5 petabytes of information.

Big Data is becoming important for business of all sizes. The smallest of local businesses are no longer strictly local. Thanks to the Internet they can easily market to a world-wide client base.

Big Data and business relationships reach beyond the Internet. If the International marketplace was just for the exchange of information and money, the ‘net may be a sufficient tool, but physical goods are exchanged as well. The sprocket manufactured in your home town getting shipped and installed on a machine in Malaysia is a miracle of shipping. When it happens hundreds of thousands of times a day, it involves Big Data.

By Peter Knight

Webinar: How Cloud, Mobility and Analytics are Driving New Approaches to APM

As computing becomes more and more pervasive with the advent of social business, cloud, mobility and big data/analytics – every end-user interaction counts!  Hear Mary share relevant market research data as well and how to keep enterprise IT focused on what matters with this new complexity faced by IT operations.

Joining Mary is OpTier’s Vice President of Corporate Marketing, Linh Ho who will provide some insight into APM best practices as seen from the customers’ perspectives.

Sorry, comments are closed for this post.

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…