Beware The Random Element In Big Data

Big Data Analytics

In 1983, author Isaac Asimov published a remarkable science fiction anthology called Foundation. Its central theme was the use of mathematical models to envision the progress of civilization and to establish appropriate benchmarks for its successful continuance over thousands of years. In essence, the book focused on big data as the driving force behind the biological and political furtherance of humankind, a science that proved remarkably efficient until (spoiler alert!) it was undone by a completely unforeseen and random element: a mutation.

As companies and organizations worldwide scramble to incorporate big data analytics into their commerce strategies, they are reminded constantly of the importance of staying up-to-date with the latest that the numbers can provide: real-time analysis of consumer demand, trends, peaks and means, and using this to shape their game plan. Management is often criticized for being slow to embrace change and for holding back the deployment of new technologies to address a swiftly-changing, consumer-led economy. Yet it is equally important for management to exercise the privilege of the position: to express due concern that the random element must always be factored into an equation for there to be true balance.

Take SQL Injection as an example. This is the act of injecting malicious SQL code into a database by squeezing it into an otherwise innocent form field on, let’s say, a website’s shopping cart page. Normal shoppers recognize the space required for the 16-character credit card number, and fill it in accordingly. But hackers and thieves – the mutation in an otherwise ideal commerce scenario – see this panel as an entry point into which they can place their own destructive code.

Great Power In Numbers

Random elements exist anywhere that data exists. Password security is often compromised by sloppy human behavior – writing passwords down, or using ones that are easily guessed. Data breaches are often caused by careless employees, rather than sophisticated international hacks. These are the mutations that chip away at the sanctity of an otherwise perfect digital system.

With big data, numbers have great power, but outliers and random elements can skew results badly. Something as simple as a Twitter meme gone wrong or a rogue tweet from an employee may be sufficient to destroy a hard-won brand identity.

Recently, a well-known provider of off-site airport parking services was caught short-handed when a freak winter storm deposited two feet of snow over all of the cars parked in its lot. The storm happened over a Saturday night and ended just as planeloads of tourists returned from their sunny vacations, looking for their vehicles at 6:00 a.m. on a Sunday morning.

With only one staff member on duty, the company was forced to go into damage control, dealing with hundreds of frustrated families, along with media coverage. Storms are, of course, a normal part of winter, but their randomness makes the allocation of staff and resources on a quiet weekend something less than a perfect science, regardless of the analytics available.

All of these examples, the snowstorm, the twitter memes and the SQL hacks, conceal a critical lesson that must occupy a space at the strategic table: big data is powerful, and can assist companies in engaging with their customers more efficiently, profitably, and individually. But to be seduced by the data alone – without allowance for the random mutation – leaves a company exposed to the realities of life, which are not always calculable.

For more on this topic, please visit businessvalueexchange.com, sponsored by HP Enterprise Services.

By Steve Prentice

Gilad David Maayan
Azure Storage Pricing Introduction to Azure Storage Services Azure Storage is a set of cloud storage services provided by Microsoft as part of the Azure public cloud. It offers highly scalable object storage, file systems ...
Ray Meiring
Proposal Management Software Benefits Amid the COVID-19 pandemic-induced supply chain and market challenges, 2021 started to course correct, allowing many companies to resume business operations. As a result, request for proposals (RFPs), sales proposals, and ...
Cloudtweaks Comic Ai
How AI Is Important for Businesses Shifting to Remote Work The Coronavirus Pandemic has taught us that organizations must have remote work choices. It is no longer possible to work in a digital environment. The ...
Jen
VoIP and PBX Phone Systems The cloud is already providing businesses with such a range of advanced tools and services, optimizing communication across channels, improving global cooperation, and supporting collaboration between teammates and partners both ...
Alex Tkatch
Best Practices for Designing and Executing a Product Launch Nothing in entrepreneurial life is more exciting, frustrating, time-consuming and uncertain than launching a new product. Creating something new and different can be exhilarating, assuming everything ...
  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.