Using Big Data To Prevent World Hunger

Using Big Data To Prevent World Hunger

Using Big Data To Prevent World Hunger

big-data-hunger

Hunger and famine are two of the leading indicators of serious poverty. In October 2013 the Global Hunger Index released its latest report, indicating nineteen countries suffer from levels of hunger that are either ‘alarming’ or ‘extremely alarming’, with one in eight people suffering from chronic undernourishment between 2010 and 2012.

(Image Source:  meunierd / Shutterstock.com)

Helping Farming

Although farmers today produce three times as much food as they did fifty years ago, farmers still have to significantly improve their productivity to help feed a world population of 9 billion in 2050. Leaders of the G8 believe an important step towards solving the problem is to allow farmers, scientists, and entrepreneurs unrestricted access to agricultural big data.

Big data analysis can increase crop yields by helping farmers make better decisions about when to plant, manage and harvest their crops. Beyond broad data sets on topics such as rainfall levels, signs of pests and diseases, and anticipated prices at local markets, there is also the highly specialised and specific data sets such as plant genomics and local weather conditions.

The Climate Corporation operates a cloud-based farming information system that takes weather measurements from 2.5 million locations and combines it with 150 billion soil observations to generate 10 trillion weather simulation data points. This information allows farmers to know information as diverse as when is the best time to spray fields to getting an accurate estimate of the value of fields they may be considering buying.

The end goal is to help improve productivity in Africa, the worst performing agricultural producer. The CGIAR Consortium in France hopes to develop an app which uses all the available data to allow African farmers to identify their local soil type, the planting and harvesting requirements of each specific field, and then direct them to where they can locally purchase the seeds needed.

Predicting Famine

Using big data to aid the battle against hunger isn’t a new idea. The Famine Early Warning System has been in operation for 25 years to help international aid groups predict where famines in remote regions are about to occur and thus target the $1.5 billion of annual food aid from the U.S. Agency for International Development.

The system relies on a blend of social and scientific big data from federal agencies as diverse as NASA, the National Oceanic and Atmospheric Administration, and the Department of Agriculture to create hydrological models, food-economics forecasts, weather and climate simulations, and food-borne illness predictions. The output from these models is increasingly accurate and allows the world’s political leaders respond quickly and effectively in the early stages of a famine.

The Future

What is the future of big data in farming? Is it naïve to believe that data sets alone can solve the issue of world hunger, or are they the developed world’s best hope of fighting famine? Let us know in the comments below.

By Daniel Price

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

View Website
View All Articles

Sorry, comments are closed for this post.

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…