SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 3 Issue 6, October 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD29145 | Volume – 3 | Issue – 6 | September - October 2019 Page 470
Story of Bigdata and its Applications in Financial Institutions
Phani Bhooshan1, Dr. C. Umashankar2
1Research Scholar, Department of Computer Science and Technology,
Sri Krishnadevaraya University, Anantapur, Andhra Pradesh, India
2Retired Professor, Department of OR&SQC, Rayalaseema University, Kurnool, Andhra Pradesh, India
ABSTRACT
The importance of BigData is indeed nothing new, but being able to manage
data efficiently is just now becoming more attainable. Although data
management has evolved considerably since the 1800’s, advancements made
in recent years that have made the process even more efficient.
Technique of Data mining, is much used in the banking industry, which helps
banks compete in the market and provide the right product to the right
customer. While collecting and combining different sources of data into a
single significant volumetric Golden Source of TRUTH can be achieved by
applying the right combination of tools. In this paper Author introduced
BIGDATA technologies in brief along with its applications.
KEYWORDS: BigData, Finance, Evolution, Data Science
How to cite this paper: Phani Bhooshan |
Dr. C. Umashankar "Story of Bigdata and
its Applications in Financial Institutions"
Published in
International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-6, October
2019, pp.470-473, URL:
https://www.ijtsrd.com/papers/ijtsrd29
145.pdf
Copyright © 2019 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
1. INTRODUCTION
Some Data pundits have mentioned BigData as “large,
overpowering, and tremendous amounts of events.” In the
past, someone said “devastating amounts of information”
while studying bubonic plague, which was ravaging Europe.
During those days, mathematicians had used stats and were
applauded for being the firstpersontointroducingstatistical
data analysis.
The evolution of BigData includes several preliminary steps
for its foundation, and while looking back to 1663 isn’t
necessary for the progress of data volumes today, the point
remains that “BigData” is near term depending on who is
discussing it. BigData to Amazon or Google is very different
than BigData to a medium-sized healthcare institution, but
no less “Big” in the brains of those competing with it.
Foundational steps to the state-of-the-art conception of
BigData involve the development of computers,
smartphones, WWW, and sensors(IoT)equipmenttosupply
data. Credit providing institutions also played a role, by
providing an increasingly large volume of data, and indeed
social media changed the way we think of data in nature and
still evolving new ways. The progress of modern technology
is interwoven with the growth of BigData
1.1. The Foundations of BigData
Day by day increasing Data volume became a problem for
some of western governments in the 18th century. Those
days statisticians estimated it would take eight yearstohold
and analyze the data collected during the 18th-century
census, and also predicted the data from future census
would take more than ten years to understand. In 1881, a
young person named HermanHollerith workingwithcentral
government bureau, created Machine called Hollerith
Tabulating. The invention was using punch cards designed
for utilizing the patterns woven by motorized looms. This
tabulating mechanism reduced ten years of labor into three
months of work.
In 1927, Fritz Pfleumer, an Austrian-German engineer,
invented a means of storing information fascinatingly on
electromagnetic tape. Pfleumer had developed a method for
holding metal strips to cigarettes(tokeepsmokers’lipsfrom
being tarnished by the regular papersaccessibleatthetime),
and determined he could use this procedure to create
electromagnetic strips, which would then be used to
supersede wire recording technology. After
experimentations with a variety of materials available
during those days, he settled on a delicatepaper, barredwith
iron-oxide powder and coated with lacquer, for his patent in
1928.
During World War II, mid-1940’s, Britishers were desperate
to decode Nazi signals, which made them invent a machine
that scanned for patterns in messages intercepted from the
Germans. The device was called Colossus, and scanned 5k
IJTSRD29145
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD29145 | Volume – 3 | Issue – 6 | September - October 2019 Page 471
characters per second, reducing the person-hours from
several weeks to just in hours. JokinglyColossuswasthefirst
data processing machine. In 1945, John Von Neumann put
out a paper on the Electronic Discrete Variable Automatic
Computer, in short (EDVAC), the first “documented”
discussion on program storage, and laid the foundation of
computer architecture today.
It is said these united events prompted the “formal”creation
of the United States’ NSA (National SecurityAgency)in1952,
by President Truman, Staff at theNSAwereassignedthetask
of decrypting communication captured duringtheColdWar.
Computers of that time had progressed to the point where
they could collect and process data, operate independently
and automatically.
2. Big Data and Financial Institutions
Financial institutions are the backbone of any countries
economy's health. And Financial institutions are leading the
adoption of technology preceded by healthcare and
manufacturing companies.
Thus financial institutions have continued to upgrade and
patch according to the latest trends and demands from
auditors and Controllers. Thus Mainstream Financial
institutions enterprise systems became so vast andsofastin
terms of depth and breadth are it’s unimaginable. Thus
creating clusters amongst different systems and repeating
and reusing the information accordingto businessdemands.
Given the latest technological trends, businesses have
determined to combine or merge these legacy systems and
eliminate good old systems.
2.1. Challenges with Legacy Systems
Legacy Systems are suitableforthepurposewhichwerethey
build during their era. However, growing business demand
and past pose a risk. Few of the perils and issues listed
below.
Not prepared for Change: Any changes to the existing
system would require it to stop and pause to supply
patches. This may interrupt business processes and
continuity.
Security of the System: Vulnerability of the system
makes it worst target for cybersecurity and data
breaches a common issue due to which regulators fine
huge sums.
More demanding Customer: Customers like touselatest
gigs and gizmos and may not want to sit on the old
swing chair than a bean bag. i.e., customerslovetoadopt
the most recent trends, i.e., buying things on their
smartphone than useful old websites with lagging
checkouts.
Cos Effective: Legacy software is outdated, and service
providers does not continue to support old
version/technologies. Thus leads to high cost in
maintenance and effectiveness to the organization.
Unknown Dependencies: As the people and systems
move and SME knowledge go along with thesefolks,and
it would become harder for theorganizationtoswitchto
new systems.
Return on Investment: Organizationdoesnotliketoadd
more money to the existing old systems as it costs more
and returns (RoI) from these systems are very low.
The list goes on, and increase organizations pose more risks
with these legacy systems.
3. Organizations Approaches
Once the business has decided to move on with these
growing legacy systems, the company could approve one of
the below mentioned three approaches:
A. Consolidation and Elimination
B. Consolidation and Remediation
C. Rationalization
Before a company can decide on which approach to adopt,
they would have to honestly and accurately understand
enterprize level financial and technological targets for their
business growth.
Figure 3.1 Legacy systems and Interlink
Let’s take an example with three systems, as shown in the
above figure with different technologies exchanging
information across. We are not specific to any technologies;
it could be data, web or messaging or programmatical. We
shall see how each of the approach mentioned would
workout in terms of final systems remain in the target
operating model.
3.1. Consolidation and Elimination
In this method, first and foremost one has to identify
business process and features in each of the system which
are classified as to be consolidated. Another critical aspectis
existing Data in legacy systems and its structures. Does the
old data needs to be migrated as well to the new system.
Once the new system is successfully developed, deployed
and tested with necessary signoffs, old data to be migrated
as well, after few rounds of production parallel running and
gaining user confidence old system would be retired for
good.
Figure 3.2 Retired Legacy systems and BD
This process might involve SME dedicated input and may
cost high at the beginning of adoption. This might work for
more significant enterprises with huge budgets and time.
However, in the long run, this method would give a perfect
Return on Investment(RoI)
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD29145 | Volume – 3 | Issue – 6 | September - October 2019 Page 472
3.2. Consolidation and Remediation
This is NOT inline with a similar approach of (i) where
identifying common aspects is key to the target model. In
this method, we identify loopholes, audit requirements, and
regulatory mandates to be adopted for future growth. Here
future refers to the long term than the short term.
Rather than trying to apply proprietary patches to the
existing system and increasing complexity with more and
more features to be added in resolving business needs,audit
requirements and more demanding new regulatory
requirements to the lagging systems. Some of the
functionality and/or specifications may notbepossibleto be
implemented likes of cybersecurity, data secrecy, and
modern state-of-art drill up/down facilities.
This leads to the consolidation and remediation processand
leads to below target working model fo the sample systems
that we had seen in figure 3.1.
Figure 3.3 Legacy systems and Interlink
In the above final architecture of the systems involved will
have one new system which serves new functionalities
contemplating existing systems. Down the line, these
existing legacy systemsmay beconsideredforEliminationas
a result of moving all the features to the new system.
3.3. Rationalization
This approach is a hybrid of both 3.1 and 3.2 topics. Where
in the best of both the strategies are combined with
upgrading existing systems for future.
Step 1 involves finding out all the features of each of the
system, along with its corresponding data sets. Next
identifying the process to move existing data along with
relevant functions to be implemented in the other system
with limited or low cost-based approach to add these to
other systems.
Figure 3.4 Legacy systems Before and After
In the above systems System’s B’s features are
transferred/implemented into combined System A and D.
Post-implementation togetherSystemA+B+D=A+Dnothing
less if not more.
This approach may be theoretical, but it’s much complicated
and depends on the technologies that have been built into
the legacy systems.
4. BigData Storage Evolution
Technology does not just mean software whichcouldhandle
the system. It means a combination of other attributes ofthe
technological ecosystem. One of the main drivers of the
latest tech trends is ability to store and retrieve data, fuel to
the system. We shall leave early data storage in terms of
punch cards, capacitors, and start from Magnetic to Cloud.
Magnetic storage in 1927 Magnetic Stripes were first
introduced to store data – calledtapes. Thiswas mainstream
data storage a decade, though storage capacity has been
increased to many folds.Inchronological orderinwhichthey
had invented and increased their capacity were tapes,
drums, floppies, and hard disks. Magnetic storage refers to
the way how data has been stored. It uses magnetic
polarities, to represent a zero or one. Even in the current
advanced world some of the organizations still use Tape
storage for cold storage for year as part of Regulatory
requirement to keep data safe for on-demand basis.
Flash storage is non-volatile memory which increases the
performance of the disks to several folds and size has
become a tiny of a figure nail to hold few Gigabytes.
Cloud Data Storage is the latest trend and up ticking by
most advanced technologies. This storage has becomequite
popular in recent years due to its high availability and
mobility and can be Geographical distributed.Otherfeatures
of this storage include but not limited to is scalability, low-
cost based, energy-efficient.
4.1. Applications of BigData
BigData is transforming the entire financial industry and
changing human culture to behavior. As a result of the fast
exchange of information and is challenging how people
trade, listen to music, and work. The following are some
examples of BigData usage:
BigData is being used in healthcare to map disease
outbreaks and test alternative treatments.
NASA uses BigData to explore the universe.
The music industry replaces intuition with BigData
studies.
Commercial Firms use BigData to study customer
behavior and avoid blackouts.
Latest Health Gizmos uses healthmonitoring wearable’s
to track clients' activity and provide insight into their
health.
BigData is being used by cybersecurity to stop
cybercrime.
5. BigData Analytics
Data Visualization techniques are steadily becoming more
popular as an essential method for gaining insights from
BigData. (Graphics are typical, and animation will become
communal. For now, data visualization models are a little
inelegant, and the possibility to use some improvements.)
Some of the most popular andtrendingBigData visualization
tools are listed below:
Domo
Qlik
Tableau
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD29145 | Volume – 3 | Issue – 6 | September - October 2019 Page 473
Sisense
Reltio
6. CONCLUSIONS
To be sure, the Brief History of BigData is not as brief as it
seems. Even though the 17th century didn’t see anywhere
near the Exabyte-level volumes of data that organizations
are contending with today, to those early data pioneers, the
data volumes certainly seemed dauntingatthetime.BigData
is only going to continue to grow, and with it, new
technologies will be developed to collect better, store, and
analyze the data as the world of data-driven transformation
moves forward at ever-higher speeds.
REFERENCES
[1] Deshpande, M. S. P., and D. V. M. Thakare, 2010. Data
mining system and applications: A review. Int. J.
Distrib. Parallel Syst., 1: 32-44.
[2] T. AshaLatha, Naga Lakshmi. N, Improving operational
efficiencies using Big Data for Financial Services,
Volume 18, Issue 4, IOSR Journal of Computer
Engineering (IOSR-JCE), Aug. 2016 PP 75-77.
[3] Big Data and Analytics – Wiley Publication, Seema
Acharya, Subhashini Chellapan
[4] Thomas H. Davenport Jill Dyché, Big Data in Big
Companies, International Institute For Analytics,2013

Contenu connexe

Tendances

Big data overview external
Big data overview externalBig data overview external
Big data overview externalBrett Colbert
 
IRJET- Building a Big Data Provenance with its Applications for Smart Cities
IRJET- Building a Big Data Provenance with its Applications for Smart CitiesIRJET- Building a Big Data Provenance with its Applications for Smart Cities
IRJET- Building a Big Data Provenance with its Applications for Smart CitiesIRJET Journal
 
BIG DATA(PPT)
BIG DATA(PPT)BIG DATA(PPT)
BIG DATA(PPT)josnapv
 
Big data document (basic concepts,3vs,Bigdata vs Smalldata,importance,storage...
Big data document (basic concepts,3vs,Bigdata vs Smalldata,importance,storage...Big data document (basic concepts,3vs,Bigdata vs Smalldata,importance,storage...
Big data document (basic concepts,3vs,Bigdata vs Smalldata,importance,storage...Taniya Fansupkar
 
Big data (word file)
Big data  (word file)Big data  (word file)
Big data (word file)Shahbaz Anjam
 
big data Big Things
big data Big Thingsbig data Big Things
big data Big Thingspateelhs
 
Idc big data whitepaper_final
Idc big data whitepaper_finalIdc big data whitepaper_final
Idc big data whitepaper_finalOsman Circi
 
Ppt for Application of big data
Ppt for Application of big dataPpt for Application of big data
Ppt for Application of big dataPrashant Sharma
 
Artificial Intelligence and Big Data
Artificial Intelligence and Big DataArtificial Intelligence and Big Data
Artificial Intelligence and Big DataHatim EL-QADDOURY
 
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...IJERDJOURNAL
 
06. 9534 14985-1-ed b edit dhyan
06. 9534 14985-1-ed b edit dhyan06. 9534 14985-1-ed b edit dhyan
06. 9534 14985-1-ed b edit dhyanIAESIJEECS
 
Analysis on big data concepts and applications
Analysis on big data concepts and applicationsAnalysis on big data concepts and applications
Analysis on big data concepts and applicationsIJARIIT
 
Use of data science for startups_Sept 2021
Use of data science for startups_Sept 2021Use of data science for startups_Sept 2021
Use of data science for startups_Sept 2021Bohitesh Misra, PMP
 
Big Data Expo 2015 - IBM Outside the comfort zone
Big Data Expo 2015 - IBM Outside the comfort zoneBig Data Expo 2015 - IBM Outside the comfort zone
Big Data Expo 2015 - IBM Outside the comfort zoneBigDataExpo
 

Tendances (20)

Big data unit i
Big data unit iBig data unit i
Big data unit i
 
Big data overview external
Big data overview externalBig data overview external
Big data overview external
 
IRJET- Building a Big Data Provenance with its Applications for Smart Cities
IRJET- Building a Big Data Provenance with its Applications for Smart CitiesIRJET- Building a Big Data Provenance with its Applications for Smart Cities
IRJET- Building a Big Data Provenance with its Applications for Smart Cities
 
BIG DATA(PPT)
BIG DATA(PPT)BIG DATA(PPT)
BIG DATA(PPT)
 
130214 copy
130214   copy130214   copy
130214 copy
 
Big data document (basic concepts,3vs,Bigdata vs Smalldata,importance,storage...
Big data document (basic concepts,3vs,Bigdata vs Smalldata,importance,storage...Big data document (basic concepts,3vs,Bigdata vs Smalldata,importance,storage...
Big data document (basic concepts,3vs,Bigdata vs Smalldata,importance,storage...
 
Big Data Trends
Big Data TrendsBig Data Trends
Big Data Trends
 
Big data (word file)
Big data  (word file)Big data  (word file)
Big data (word file)
 
big data Big Things
big data Big Thingsbig data Big Things
big data Big Things
 
Idc big data whitepaper_final
Idc big data whitepaper_finalIdc big data whitepaper_final
Idc big data whitepaper_final
 
Ppt for Application of big data
Ppt for Application of big dataPpt for Application of big data
Ppt for Application of big data
 
Artificial Intelligence and Big Data
Artificial Intelligence and Big DataArtificial Intelligence and Big Data
Artificial Intelligence and Big Data
 
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
 
06. 9534 14985-1-ed b edit dhyan
06. 9534 14985-1-ed b edit dhyan06. 9534 14985-1-ed b edit dhyan
06. 9534 14985-1-ed b edit dhyan
 
Analysis on big data concepts and applications
Analysis on big data concepts and applicationsAnalysis on big data concepts and applications
Analysis on big data concepts and applications
 
Use of data science for startups_Sept 2021
Use of data science for startups_Sept 2021Use of data science for startups_Sept 2021
Use of data science for startups_Sept 2021
 
Applications of Big Data
Applications of Big DataApplications of Big Data
Applications of Big Data
 
Big Data Challenges faced by Organizations
Big Data Challenges faced by OrganizationsBig Data Challenges faced by Organizations
Big Data Challenges faced by Organizations
 
Big Data Trends
Big Data TrendsBig Data Trends
Big Data Trends
 
Big Data Expo 2015 - IBM Outside the comfort zone
Big Data Expo 2015 - IBM Outside the comfort zoneBig Data Expo 2015 - IBM Outside the comfort zone
Big Data Expo 2015 - IBM Outside the comfort zone
 

Similaire à Story of Bigdata and its Applications in Financial Institutions

CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSISCASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSISIRJET Journal
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkparry prabhu
 
An overview of big data analysis
An overview of big data analysisAn overview of big data analysis
An overview of big data analysisjournalBEEI
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Onyebuchi nosiri
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Onyebuchi nosiri
 
Big Data idea implementation in organizations: potential, roadblocks
Big Data idea implementation in organizations: potential, roadblocksBig Data idea implementation in organizations: potential, roadblocks
Big Data idea implementation in organizations: potential, roadblocksIRJET Journal
 
SWOT of Bigdata Security Using Machine Learning Techniques
SWOT of Bigdata Security Using Machine Learning TechniquesSWOT of Bigdata Security Using Machine Learning Techniques
SWOT of Bigdata Security Using Machine Learning Techniquesijistjournal
 
Big Data Expo 2015 - IBM 5 predictions
Big Data Expo 2015 - IBM 5 predictionsBig Data Expo 2015 - IBM 5 predictions
Big Data Expo 2015 - IBM 5 predictionsBigDataExpo
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Nikhil Dikshit
 
Smart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart dataSmart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart datacaniceconsulting
 
E-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudE-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudIRJET Journal
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...IRJET Journal
 
Introduction to big data – convergences.
Introduction to big data – convergences.Introduction to big data – convergences.
Introduction to big data – convergences.saranya270513
 
Modern data integration | Diyotta
Modern data integration | Diyotta Modern data integration | Diyotta
Modern data integration | Diyotta diyotta
 
QuickView #3 - Big Data
QuickView #3 - Big DataQuickView #3 - Big Data
QuickView #3 - Big DataSonovate
 
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate Oomph! Recruitment
 
DEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIDEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIIJCSEA Journal
 
DEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIDEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIIJCSEA Journal
 
DEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIDEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIIJCSEA Journal
 

Similaire à Story of Bigdata and its Applications in Financial Institutions (20)

CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSISCASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
An overview of big data analysis
An overview of big data analysisAn overview of big data analysis
An overview of big data analysis
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
 
Big Data idea implementation in organizations: potential, roadblocks
Big Data idea implementation in organizations: potential, roadblocksBig Data idea implementation in organizations: potential, roadblocks
Big Data idea implementation in organizations: potential, roadblocks
 
SWOT of Bigdata Security Using Machine Learning Techniques
SWOT of Bigdata Security Using Machine Learning TechniquesSWOT of Bigdata Security Using Machine Learning Techniques
SWOT of Bigdata Security Using Machine Learning Techniques
 
Big Data Expo 2015 - IBM 5 predictions
Big Data Expo 2015 - IBM 5 predictionsBig Data Expo 2015 - IBM 5 predictions
Big Data Expo 2015 - IBM 5 predictions
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015
 
Smart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart dataSmart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart data
 
E-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudE-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure Cloud
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
 
Introduction to big data – convergences.
Introduction to big data – convergences.Introduction to big data – convergences.
Introduction to big data – convergences.
 
Big Data.compressed
Big Data.compressedBig Data.compressed
Big Data.compressed
 
Modern data integration | Diyotta
Modern data integration | Diyotta Modern data integration | Diyotta
Modern data integration | Diyotta
 
QuickView #3 - Big Data
QuickView #3 - Big DataQuickView #3 - Big Data
QuickView #3 - Big Data
 
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate
 
DEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIDEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AI
 
DEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIDEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AI
 
DEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIDEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AI
 

Plus de ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

Plus de ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Dernier

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Dernier (20)

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

Story of Bigdata and its Applications in Financial Institutions

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 3 Issue 6, October 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD29145 | Volume – 3 | Issue – 6 | September - October 2019 Page 470 Story of Bigdata and its Applications in Financial Institutions Phani Bhooshan1, Dr. C. Umashankar2 1Research Scholar, Department of Computer Science and Technology, Sri Krishnadevaraya University, Anantapur, Andhra Pradesh, India 2Retired Professor, Department of OR&SQC, Rayalaseema University, Kurnool, Andhra Pradesh, India ABSTRACT The importance of BigData is indeed nothing new, but being able to manage data efficiently is just now becoming more attainable. Although data management has evolved considerably since the 1800’s, advancements made in recent years that have made the process even more efficient. Technique of Data mining, is much used in the banking industry, which helps banks compete in the market and provide the right product to the right customer. While collecting and combining different sources of data into a single significant volumetric Golden Source of TRUTH can be achieved by applying the right combination of tools. In this paper Author introduced BIGDATA technologies in brief along with its applications. KEYWORDS: BigData, Finance, Evolution, Data Science How to cite this paper: Phani Bhooshan | Dr. C. Umashankar "Story of Bigdata and its Applications in Financial Institutions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-6, October 2019, pp.470-473, URL: https://www.ijtsrd.com/papers/ijtsrd29 145.pdf Copyright © 2019 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) 1. INTRODUCTION Some Data pundits have mentioned BigData as “large, overpowering, and tremendous amounts of events.” In the past, someone said “devastating amounts of information” while studying bubonic plague, which was ravaging Europe. During those days, mathematicians had used stats and were applauded for being the firstpersontointroducingstatistical data analysis. The evolution of BigData includes several preliminary steps for its foundation, and while looking back to 1663 isn’t necessary for the progress of data volumes today, the point remains that “BigData” is near term depending on who is discussing it. BigData to Amazon or Google is very different than BigData to a medium-sized healthcare institution, but no less “Big” in the brains of those competing with it. Foundational steps to the state-of-the-art conception of BigData involve the development of computers, smartphones, WWW, and sensors(IoT)equipmenttosupply data. Credit providing institutions also played a role, by providing an increasingly large volume of data, and indeed social media changed the way we think of data in nature and still evolving new ways. The progress of modern technology is interwoven with the growth of BigData 1.1. The Foundations of BigData Day by day increasing Data volume became a problem for some of western governments in the 18th century. Those days statisticians estimated it would take eight yearstohold and analyze the data collected during the 18th-century census, and also predicted the data from future census would take more than ten years to understand. In 1881, a young person named HermanHollerith workingwithcentral government bureau, created Machine called Hollerith Tabulating. The invention was using punch cards designed for utilizing the patterns woven by motorized looms. This tabulating mechanism reduced ten years of labor into three months of work. In 1927, Fritz Pfleumer, an Austrian-German engineer, invented a means of storing information fascinatingly on electromagnetic tape. Pfleumer had developed a method for holding metal strips to cigarettes(tokeepsmokers’lipsfrom being tarnished by the regular papersaccessibleatthetime), and determined he could use this procedure to create electromagnetic strips, which would then be used to supersede wire recording technology. After experimentations with a variety of materials available during those days, he settled on a delicatepaper, barredwith iron-oxide powder and coated with lacquer, for his patent in 1928. During World War II, mid-1940’s, Britishers were desperate to decode Nazi signals, which made them invent a machine that scanned for patterns in messages intercepted from the Germans. The device was called Colossus, and scanned 5k IJTSRD29145
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD29145 | Volume – 3 | Issue – 6 | September - October 2019 Page 471 characters per second, reducing the person-hours from several weeks to just in hours. JokinglyColossuswasthefirst data processing machine. In 1945, John Von Neumann put out a paper on the Electronic Discrete Variable Automatic Computer, in short (EDVAC), the first “documented” discussion on program storage, and laid the foundation of computer architecture today. It is said these united events prompted the “formal”creation of the United States’ NSA (National SecurityAgency)in1952, by President Truman, Staff at theNSAwereassignedthetask of decrypting communication captured duringtheColdWar. Computers of that time had progressed to the point where they could collect and process data, operate independently and automatically. 2. Big Data and Financial Institutions Financial institutions are the backbone of any countries economy's health. And Financial institutions are leading the adoption of technology preceded by healthcare and manufacturing companies. Thus financial institutions have continued to upgrade and patch according to the latest trends and demands from auditors and Controllers. Thus Mainstream Financial institutions enterprise systems became so vast andsofastin terms of depth and breadth are it’s unimaginable. Thus creating clusters amongst different systems and repeating and reusing the information accordingto businessdemands. Given the latest technological trends, businesses have determined to combine or merge these legacy systems and eliminate good old systems. 2.1. Challenges with Legacy Systems Legacy Systems are suitableforthepurposewhichwerethey build during their era. However, growing business demand and past pose a risk. Few of the perils and issues listed below. Not prepared for Change: Any changes to the existing system would require it to stop and pause to supply patches. This may interrupt business processes and continuity. Security of the System: Vulnerability of the system makes it worst target for cybersecurity and data breaches a common issue due to which regulators fine huge sums. More demanding Customer: Customers like touselatest gigs and gizmos and may not want to sit on the old swing chair than a bean bag. i.e., customerslovetoadopt the most recent trends, i.e., buying things on their smartphone than useful old websites with lagging checkouts. Cos Effective: Legacy software is outdated, and service providers does not continue to support old version/technologies. Thus leads to high cost in maintenance and effectiveness to the organization. Unknown Dependencies: As the people and systems move and SME knowledge go along with thesefolks,and it would become harder for theorganizationtoswitchto new systems. Return on Investment: Organizationdoesnotliketoadd more money to the existing old systems as it costs more and returns (RoI) from these systems are very low. The list goes on, and increase organizations pose more risks with these legacy systems. 3. Organizations Approaches Once the business has decided to move on with these growing legacy systems, the company could approve one of the below mentioned three approaches: A. Consolidation and Elimination B. Consolidation and Remediation C. Rationalization Before a company can decide on which approach to adopt, they would have to honestly and accurately understand enterprize level financial and technological targets for their business growth. Figure 3.1 Legacy systems and Interlink Let’s take an example with three systems, as shown in the above figure with different technologies exchanging information across. We are not specific to any technologies; it could be data, web or messaging or programmatical. We shall see how each of the approach mentioned would workout in terms of final systems remain in the target operating model. 3.1. Consolidation and Elimination In this method, first and foremost one has to identify business process and features in each of the system which are classified as to be consolidated. Another critical aspectis existing Data in legacy systems and its structures. Does the old data needs to be migrated as well to the new system. Once the new system is successfully developed, deployed and tested with necessary signoffs, old data to be migrated as well, after few rounds of production parallel running and gaining user confidence old system would be retired for good. Figure 3.2 Retired Legacy systems and BD This process might involve SME dedicated input and may cost high at the beginning of adoption. This might work for more significant enterprises with huge budgets and time. However, in the long run, this method would give a perfect Return on Investment(RoI)
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD29145 | Volume – 3 | Issue – 6 | September - October 2019 Page 472 3.2. Consolidation and Remediation This is NOT inline with a similar approach of (i) where identifying common aspects is key to the target model. In this method, we identify loopholes, audit requirements, and regulatory mandates to be adopted for future growth. Here future refers to the long term than the short term. Rather than trying to apply proprietary patches to the existing system and increasing complexity with more and more features to be added in resolving business needs,audit requirements and more demanding new regulatory requirements to the lagging systems. Some of the functionality and/or specifications may notbepossibleto be implemented likes of cybersecurity, data secrecy, and modern state-of-art drill up/down facilities. This leads to the consolidation and remediation processand leads to below target working model fo the sample systems that we had seen in figure 3.1. Figure 3.3 Legacy systems and Interlink In the above final architecture of the systems involved will have one new system which serves new functionalities contemplating existing systems. Down the line, these existing legacy systemsmay beconsideredforEliminationas a result of moving all the features to the new system. 3.3. Rationalization This approach is a hybrid of both 3.1 and 3.2 topics. Where in the best of both the strategies are combined with upgrading existing systems for future. Step 1 involves finding out all the features of each of the system, along with its corresponding data sets. Next identifying the process to move existing data along with relevant functions to be implemented in the other system with limited or low cost-based approach to add these to other systems. Figure 3.4 Legacy systems Before and After In the above systems System’s B’s features are transferred/implemented into combined System A and D. Post-implementation togetherSystemA+B+D=A+Dnothing less if not more. This approach may be theoretical, but it’s much complicated and depends on the technologies that have been built into the legacy systems. 4. BigData Storage Evolution Technology does not just mean software whichcouldhandle the system. It means a combination of other attributes ofthe technological ecosystem. One of the main drivers of the latest tech trends is ability to store and retrieve data, fuel to the system. We shall leave early data storage in terms of punch cards, capacitors, and start from Magnetic to Cloud. Magnetic storage in 1927 Magnetic Stripes were first introduced to store data – calledtapes. Thiswas mainstream data storage a decade, though storage capacity has been increased to many folds.Inchronological orderinwhichthey had invented and increased their capacity were tapes, drums, floppies, and hard disks. Magnetic storage refers to the way how data has been stored. It uses magnetic polarities, to represent a zero or one. Even in the current advanced world some of the organizations still use Tape storage for cold storage for year as part of Regulatory requirement to keep data safe for on-demand basis. Flash storage is non-volatile memory which increases the performance of the disks to several folds and size has become a tiny of a figure nail to hold few Gigabytes. Cloud Data Storage is the latest trend and up ticking by most advanced technologies. This storage has becomequite popular in recent years due to its high availability and mobility and can be Geographical distributed.Otherfeatures of this storage include but not limited to is scalability, low- cost based, energy-efficient. 4.1. Applications of BigData BigData is transforming the entire financial industry and changing human culture to behavior. As a result of the fast exchange of information and is challenging how people trade, listen to music, and work. The following are some examples of BigData usage: BigData is being used in healthcare to map disease outbreaks and test alternative treatments. NASA uses BigData to explore the universe. The music industry replaces intuition with BigData studies. Commercial Firms use BigData to study customer behavior and avoid blackouts. Latest Health Gizmos uses healthmonitoring wearable’s to track clients' activity and provide insight into their health. BigData is being used by cybersecurity to stop cybercrime. 5. BigData Analytics Data Visualization techniques are steadily becoming more popular as an essential method for gaining insights from BigData. (Graphics are typical, and animation will become communal. For now, data visualization models are a little inelegant, and the possibility to use some improvements.) Some of the most popular andtrendingBigData visualization tools are listed below: Domo Qlik Tableau
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD29145 | Volume – 3 | Issue – 6 | September - October 2019 Page 473 Sisense Reltio 6. CONCLUSIONS To be sure, the Brief History of BigData is not as brief as it seems. Even though the 17th century didn’t see anywhere near the Exabyte-level volumes of data that organizations are contending with today, to those early data pioneers, the data volumes certainly seemed dauntingatthetime.BigData is only going to continue to grow, and with it, new technologies will be developed to collect better, store, and analyze the data as the world of data-driven transformation moves forward at ever-higher speeds. REFERENCES [1] Deshpande, M. S. P., and D. V. M. Thakare, 2010. Data mining system and applications: A review. Int. J. Distrib. Parallel Syst., 1: 32-44. [2] T. AshaLatha, Naga Lakshmi. N, Improving operational efficiencies using Big Data for Financial Services, Volume 18, Issue 4, IOSR Journal of Computer Engineering (IOSR-JCE), Aug. 2016 PP 75-77. [3] Big Data and Analytics – Wiley Publication, Seema Acharya, Subhashini Chellapan [4] Thomas H. Davenport Jill Dyché, Big Data in Big Companies, International Institute For Analytics,2013