mike connaughton - big data analytics trends
Upload: royal-united-services-institute-for-defence-and-security-studies
Post on 07-May-2015
114 views
DESCRIPTION
This is a presentation delivered by Mike Connaughton, at the STFC Futures / RUSI Conference Series: Data for Security and Resilience 2014TRANSCRIPT
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 121
Big Data Analytics Trends
Mike Connaughton, Director Big Data, EMEAMar 2014
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 122
The Power of Predictive Analytics...
DIVORCE?
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 123 3 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Big Data in Defence
Threat Identification Maintenance &Utilities
Healthcare
Regulation Compliance Cost Analysis& Prediction
Fraud Prevention
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 124
Challenges
Volume, Velocity, Variety, Value
Data Silos
Organisational Culture
Privacy
Personnel
Processes
Front Line Capability
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 125
Three Laws of Prediction...Arthur C Clarke
When a distinguished but elderly scientist states that something is possible, he is almost certainly right. When he states that something is impossible, he is very probably wrong.
The only way of discovering the limits of the possible is to venture a little way past them into the impossible.
Any sufficiently advanced technology is indistinguishable from magic.
Clarke’s Three Laws of Prediction"Hazards of Prophecy: The Failure of Imagination", in Profiles of the Future (1962)
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 126