Big Data – The Weird And The Wonderful

Big Data – The Weird And The Wonderful

Big Data – The Weird and The Wonderful

Everyone who reads this site will be aware of how big data is permeating every aspect of our lives; from advertising to health and from travel to urban planning, big data is increasingly relied upon by companies, individuals and governments.

Data doesn’t necessarily have to be useful though, sometimes it can be used just for fun or for odd insights that we wouldn’t ordinarily be privy to. Here we look at some of the more unusual uses of big data around the world.

Death Row Big-Data-Intelligence

The death penalty is a divisive issue. Nonetheless, given its presence in thirty two US states and with sixty percent of the world’s population living in countries where the sentence is routinely used, it remains very much part of the judicial landscape for billions of people.

The US State of Texas has ended the life of 515 inmates since 1982, and in what is potentially the most morbid use of a data set we’ve come across they have faithfully recorded the last words of every one of those 515 prisoners in a publicly accessible data set.

The data includes information as broad as their convicted person’s final verbal and written statements, the date of their execution, their age, and the county in which the execution took place. The data also contains complete offender information such as height, weight, education level, eye colour, and even a photograph.

Be warned, it might make tough viewing for some of our more sensitive readers.

Enron Emails

Enron was a US-based energy, commodities, and services giant that had claimed revenues of $101 billion in 2000 before filing for bankruptcy less than a year later in October 2001. With $63.4 billion of assets it was the largest corporate bankruptcy in American history at the time. Its collapse saw shareholder lose $74 billion and landed Chief Executives Kenneth Lay and Jeffrey Skilling with jail terms of 24 years and 45 years respectively.

During the federal investigation a total of 600,000 emails from 158 high-level executives were collected and categorised for use at the trial. Following the trial a copy of the database was purchased for $10,000 by Andrew McCallum at the University of Massachusetts.

McCallum released the corpus into the public domain and it is now widely regarded as the only publicly available mass collections of real emails that are easily available for study.

The entire database can be downloaded for free and the website also includes a number of research papers and insights that have be published after the emails’ release.

Chess

Chess is one of the world’s most popular sports. There are an estimated 700 million regular players which include two million professionals; those at the pinnacle of the sport can expect to earn in excess of $2 million per year – more than a lot of competitors in more ‘traditional’ sports.

Given the nature of the game it is perfect for data collection and statistical analysis. Games between the world’s best have every move faithfully recorded to enable others to study and learn from their strategies.

If you’re a lover of the game then the good news is that all this data is available for free download. The ‘Chess Million Base’ has a mammoth 2.2 million games available for study, including all major championship games dating back as far as 1970. With forty moves per game on average, the database is predicted to contain almost 90 million individual entries.

By Daniel Price

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…