Big Data – The Weird And The Wonderful

Big Data – The Weird And The Wonderful

Big Data – The Weird and The Wonderful

Everyone who reads this site will be aware of how big data is permeating every aspect of our lives; from advertising to health and from travel to urban planning, big data is increasingly relied upon by companies, individuals and governments.

Data doesn’t necessarily have to be useful though, sometimes it can be used just for fun or for odd insights that we wouldn’t ordinarily be privy to. Here we look at some of the more unusual uses of big data around the world.

Death Row Big-Data-Intelligence

The death penalty is a divisive issue. Nonetheless, given its presence in thirty two US states and with sixty percent of the world’s population living in countries where the sentence is routinely used, it remains very much part of the judicial landscape for billions of people.

The US State of Texas has ended the life of 515 inmates since 1982, and in what is potentially the most morbid use of a data set we’ve come across they have faithfully recorded the last words of every one of those 515 prisoners in a publicly accessible data set.

The data includes information as broad as their convicted person’s final verbal and written statements, the date of their execution, their age, and the county in which the execution took place. The data also contains complete offender information such as height, weight, education level, eye colour, and even a photograph.

Be warned, it might make tough viewing for some of our more sensitive readers.

Enron Emails

Enron was a US-based energy, commodities, and services giant that had claimed revenues of $101 billion in 2000 before filing for bankruptcy less than a year later in October 2001. With $63.4 billion of assets it was the largest corporate bankruptcy in American history at the time. Its collapse saw shareholder lose $74 billion and landed Chief Executives Kenneth Lay and Jeffrey Skilling with jail terms of 24 years and 45 years respectively.

During the federal investigation a total of 600,000 emails from 158 high-level executives were collected and categorised for use at the trial. Following the trial a copy of the database was purchased for $10,000 by Andrew McCallum at the University of Massachusetts.

McCallum released the corpus into the public domain and it is now widely regarded as the only publicly available mass collections of real emails that are easily available for study.

The entire database can be downloaded for free and the website also includes a number of research papers and insights that have be published after the emails’ release.

Chess

Chess is one of the world’s most popular sports. There are an estimated 700 million regular players which include two million professionals; those at the pinnacle of the sport can expect to earn in excess of $2 million per year – more than a lot of competitors in more ‘traditional’ sports.

Given the nature of the game it is perfect for data collection and statistical analysis. Games between the world’s best have every move faithfully recorded to enable others to study and learn from their strategies.

If you’re a lover of the game then the good news is that all this data is available for free download. The ‘Chess Million Base’ has a mammoth 2.2 million games available for study, including all major championship games dating back as far as 1970. With forty moves per game on average, the database is predicted to contain almost 90 million individual entries.

By Daniel Price

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

Find out more
View All Articles

Sorry, comments are closed for this post.

Insider Threats and Sensitive Data in the Cloud

Insider Threats and Sensitive Data in the Cloud

The Age of Sensitive Data in the Cloud A recent survey report conducted by the Cloud Security Alliance (CSA) revealed that cloud security had reached a tipping point: 64.9% of respondents (which included IT security professionals from enterprises across all industries and regions) believed that the cloud was as secure or more secure than their…

Utilizing Software Defined Networking (SDN)

Utilizing Software Defined Networking (SDN)

Software Defined Networking Winding down this year, we only have a couple of topics left: SDNs and SDI. Although SDNs are part of a solid SDI, we want to talk directly about it now. Many cloud management tools have the ability to create a virtual network. But creating a true VXLAN would require support of…

Basic Cloud Risk Assessment Tips

Basic Cloud Risk Assessment Tips

Basic Cloud Risk Assessment You should worry about the risks of cloud computing. But don’t get too scared. With a few simple steps you can easily get a basic understanding of your risks in the cloud and even have a good start in managing these risks. If you are a large corporation in a regulated…

Understanding Big Data – Are Big Data Analytics Your Friend or Enemy?

Understanding Big Data – Are Big Data Analytics Your Friend or Enemy?

Understanding Big Data The term “Big Data” is highly reminiscent of terms like “Big Pharma”, and it has a tendency to make consumers and professionals alike a bit nervous. However, whereas Big Pharma refers to large pharmaceuticals companies with market sway and seemingly countless political lobbyists, big data simply refers to the exponentially rapid growth…

Cloud Computing – Know How To PaaS

Cloud Computing – Know How To PaaS

Know How To PaaS The future of enterprise IT is cloud, and the future of cloud is PaaS. Infrastructure is metal, plastic, and silicon. It has kinetic potential, but sits and waits to be animated. Software is ethereal – dynamic, wildly alive, and transformative. Without PaaS, the twain shall never meet. No animation, no dynamism,…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor