Big Data – The Weird And The Wonderful

Weird and The Wonderful Data

Everyone who reads this site will be aware of how big data is permeating every aspect of our lives; from advertising to health and from travel to urban planning, big data is increasingly relied upon by companies, individuals and governments.

Data doesn’t necessarily have to be useful though, sometimes it can be used just for fun or for odd insights that we wouldn’t ordinarily be privy to. Here we look at some of the more unusual uses of big data around the world.

Death Row 

The death penalty is a divisive issue. Nonetheless, given its presence in thirty two US states and with sixty percent of the world’s population living in countries where the sentence is routinely used, it remains very much part of the judicial landscape for billions of people.

The US State of Texas has ended the life of 515 inmates since 1982, and in what is potentially the most morbid use of a data set we’ve come across they have faithfully recorded the last words of every one of those 515 prisoners in a publicly accessible data set.

The data includes information as broad as their convicted person’s final verbal and written statements, the date of their execution, their age, and the county in which the execution took place. The data also contains complete offender information such as height, weight, education level, eye colour, and even a photograph.

Be warned, it might make tough viewing for some of our more sensitive readers.

Enron Emails

Enron was a US-based energy, commodities, and services giant that had claimed revenues of $101 billion in 2000 before filing for bankruptcy less than a year later in October 2001. With $63.4 billion of assets it was the largest corporate bankruptcy in American history at the time. Its collapse saw shareholder lose $74 billion and landed Chief Executives Kenneth Lay and Jeffrey Skilling with jail terms of 24 years and 45 years respectively.

During the federal investigation a total of 600,000 emails from 158 high-level executives were collected and categorised for use at the trial. Following the trial a copy of the database was purchased for $10,000 by Andrew McCallum at the University of Massachusetts.

McCallum released the corpus into the public domain and it is now widely regarded as the only publicly available mass collections of real emails that are easily available for study.

The entire database can be downloaded for free and the website also includes a number of research papers and insights that have be published after the emails’ release.

Chess

Chess is one of the world’s most popular sports. There are an estimated 700 million regular players which include two million professionals; those at the pinnacle of the sport can expect to earn in excess of $2 million per year – more than a lot of competitors in more ‘traditional’ sports.

Given the nature of the game it is perfect for data collection and statistical analysis. Games between the world’s best have every move faithfully recorded to enable others to study and learn from their strategies.

If you’re a lover of the game then the good news is that all this data is available for free download. The ‘Chess Million Base’ has a mammoth 2.2 million games available for study, including all major championship games dating back as far as 1970. With forty moves per game on average, the database is predicted to contain almost 90 million individual entries.

By Daniel Price

Fahim Kahn

The 5 Biggest Hybrid Cloud Management Challenges—And How to Overcome Them

Hybrid Cloud Management Challenges The benefits of the cloud—reduced costs, greater IT flexibility, and more—are well-established. But now many organizations are moving to hybrid cloud management platforms. While hybrid clouds do offer a greater level ...
Digital Theft

Cross-Site Scripting – Why Is It A Serious Security Threat For Big Data Applications?

Security Threat And Big Data Applications (Updated August 11th, 2020) IBM, Amazon, Google, Yahoo, Microsoft - and the list goes on. All these leading IT enterprises have been affected by Cross-Site Scripting (XSS) attacks in ...
Kayla Matthews

Higher-Ups More Likely to Break Policy, Data Breach Survey Finds

Data Protection Policies In an ideal scenario, the people at the highest levels of an organization would be the most likely to abide by data protection policies. Then, their positive behavior could set an excellent ...
Mark Barrenechea

Security is Job 1: Machines vs. Machines

Digital is redefining cybercrime and cyberwarfare Cyberattacks today are multi-stage, hard to discover and highly targeted. Some security threats are accidental, stemming from unauthorized employee access. As much as 38% of attacks come from internal ...
Meta Data

Data-Driven PPC and The Benefits Of Drilling Down On The Data

Drilling Down On Big Data Running a pay per click campaign for your business, which isn’t driven by detailed metrics, offers no more than the hit-and-hope approach which a billboard in the 80’s may have ...
Staeadfast

Episode 5: How the Pandemic is Changing Business and the Cloud

An Interview with Ed Dryer of Steadfast With the global pandemic wreaking havoc on business and society, everything is changing. Ed Dryer, Senior Technology Strategist at Steadfast Networks, which specializes in Colocation, Managed Infrastructure as ...