Analysis of Big Data

Analysis of Big Data

Sabyasachi Pramanik, Samir Kumar Bandyopadhyay
Copyright: © 2023 |Pages: 19
DOI: 10.4018/978-1-7998-9220-5.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In the modern business condition, data being produced in most service associations is estimated in gigabytes or terabytes. On occasion, searching for information in a few terabytes of information can appear to be much the same as scanning for a needle in a sheaf. With the wild use of IT in business forms everywhere throughout the world, organizations as of now have massive measures of data but can't relate the vast majority of it to the creation or survey of corporate methodology. This shows the requirement for intelligent utilization of technology to be ventured in front of others in this gigantically aggressive corporate reality where profit edges are slender and clients are keen for decision.
Chapter Preview
Top

Background

The abstraction, encoding and chronicling of domestic documents and their distribution using data processing machines was originally published by Luhn (1958) (Luhn, H. P., et al., 2021), who used it to explain the abstraction, encoding, and chronicling of internal documents. After, the paradigm shifted and the need to turn simplistic data into usable decision making information became more stress able in the 1980s. The term business intelligence (Pramanik, S., et al., 2021) is often used to describe a number of practices like competition intelligence. The Gartner Group therefore currently prefers an umbrella concept that covers software, technology and system, as well as the best practices to enhance and maximize decision making and efficiency access to and analysis of information. The flow diagram for Business Intelligence and big data are shown below.

Figure 1.

Flow diagram of business intelligence

978-1-7998-9220-5.ch006.f01
Figure 2.

Flow diagram of big data

978-1-7998-9220-5.ch006.f02

Key Terms in this Chapter

CRM: Customer relationship management (CRM) is the process through which a company or other organization manages its contacts with customers, usually by analyzing vast quantities of data.

Business Intelligence: The tactics and technology utilized by businesses for data analysis and management of business data are referred to as business intelligence.

Business Analytics: Company analytics is the set of skills, technology, and processes used to iteratively explore and investigate historical business performance in order to obtain insight and drive business model.

Data Mining: In large amounts of textual or mixed visual and textual data sets, data mining is a process of searching, extracting, and analyzing (that may include) exploring multiple kinds of text graphic patterns (as calligraphic for example), language and literary figures, stylistics, that also includes techniques at the intersection of machine learning, formal linguistics analyses as textual statistics, and database systems.

Big Data: Big data is a discipline that deals with methods for analysing, methodically extracting information from, or otherwise dealing with data volumes that are too massive or complicated for typical data-processing application software to handle.

Machine Learning: Machine learning is the science of computer algorithms which can learn and develop on their own with experience and data. It is considered to be a component of artificial intelligence.

E-Commerce: E-commerce refers to the electronic purchase and sale of goods using online services via the Internet.

ERP: Enterprise resource planning (ERP) is the integrated management of key business activities, which is often done in real time and handled by software and technology.

SQL: SQL is a domain-specific language used in programming and designed for managing data held in a relational database management system, or for stream processing in a relational data stream management system

Security: By restricting others' freedom to act, security provides protection against, or resistance against, possible damage perpetrated by others. Persons and social groupings, objects and institutions, ecosystems, and any other thing or phenomena exposed to undesirable change may all benefit from security.

Complete Chapter List

Search this Book:
Reset