Cloud Infographic – Big Data Survey: What Are The Trends?

Cloud Infographic – Big Data Survey: What Are The Trends?

Big Data Survey Infographic FINAL_001

Jaspersoft Big Data Survey Shows Rise in Commitment to Projects and Decline in Confusion

Nearly 1,600 Jaspersoft Community Members Participate in Second Jaspersoft Big Data Survey

San Francisco, February 4, 2014Jaspersoft, the Intelligence Inside applications and business processes, today shared results from its Big Data Survey. Nearly 1,600 Jaspersoft community members responded to the survey on enterprise use of Big Data in corporate decision-making — 60 percent of respondents were application developers.

The follow-up to Jaspersoft’s August 2012 survey, revealed a greater commitment to Big Data projects. While 42 percent reported still being in the process of experimenting or performing general research, 36 percent have a funded Big Data initiative compared to only 15 percent 14 months ago.

What we’re seeing from our community is a better understanding of Big Data and more willingness to commit to projects,” said Brian Gentile, CEO of Jaspersoft. “The survey suggests that experimental Big Data projects are on the rise while funded initiatives continue to increase as the tools and understanding of Big Data mature.”

Of the 56 percent of respondents with Big Data projects, 32 percent are in production or in development while 23 percent are in the planning stage. Of known deployments, 66 percent were on-premises with 34 percent were in the cloud.

The survey reveals that confusion and lack of business justification have decreased as reasons for not pursuing Big Data projects.

Top reasons for “No plans” with Big Data

1. Don’t understand Big Data: 27% — an 47% decrease from August 2012
2. No business justification: 20% — a 56% decrease since August 2012
3. Most data is structured and relational: 33% — a 19% decrease from August 2012
4. Doesn’t apply to my applications: 23% — remained the same as August 2012

Most Popular Data Sources

1. CRM: 40%
2. Financials: 38%
3. e-Commerce: 27%
4. Retail POS: 15%
5. Supply Chain Management: 14%
6. Human Capital Management: 12%
7. Product Lifecycle Management: 11%
8. Support Case Logic: 10%
9. Bug Tracking: 9%
10. Other: 7%

Most Popular Data Stores

1. Relational databases: 56%
2. MongoDB: 23%
3. Analytic databases: 14%
4. Hadoop HDFS: 12%
5. Hive: 4%

Top Big Data Use Cases

1. Customer Analytics (churn, segmentation, etc.): 48%
2. Customer Experience Analytics: 45%
3. Risk Analysis: 37%
4. Threat Analysis: 30%
5. Regulatory Compliance Analysis: 28%
6. Campaign Optimization: 26%
7. Location-based Targeting: 23%
8. Fraud Analysis: 22%
9. Brand Sentiment Analysis: 16%
10. Product Placement Optimization: 16%
11. Other: 9%
12. Drug Discovery: 1%

About the Respondents

The respondents were primarily application developers – 60 percent with 40 percent of the developers working in software, Internet and computer, or the electronics space, followed by financial services (9 percent), and government (8 percent).

About Jaspersoft

Jaspersoft empowers millions of people every day to make better decisions faster by bringing them timely, actionable data inside their apps and business processes. Its embeddable, cost-effective reporting and analytics platform allows anyone to quickly self serve to get the answers they need, while scaling architecturally and economically to reach everyone. Thanks to a community that is hundreds-of-thousands strong, Jaspersoft’s commercial open source software has been downloaded millions of times and is used to create the Intelligence Inside hundreds of thousands of apps and business processes. Jaspersoft is a privately held company with offices around the world. For more information visit http://www.jaspersoft.com and http://community.jaspersoft.com.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data. Despite its popularity, however, VR is still not in the hands of the majority, and…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…