wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Big Data

profile
Jermin Shaikh
Dec 10, 2021
2 Likes
2 Discussions
123 Reads

How big data works

Big data gives you new insights that open up new opportunities and business models. Getting started involves three key actions:

1.  Integrate
Big data brings together data from many disparate sources and applications. Traditional data integration mechanisms, such as extract, transform, and load (ETL) generally aren’t up to the task. It requires new strategies and technologies to analyze big data sets at terabyte, or even petabyte, scale.

During integration, you need to bring in the data, process it, and make sure it’s formatted and available in a form that your business analysts can get started with.

2.  Manage
Big data requires storage. Your storage solution can be in the cloud, on-premises, or both. You can store your data in any form you want and bring your desired processing requirements and necessary process engines to those data sets on an on-demand basis. Many people choose their storage solution according to where their data is currently residing. The cloud is gradually gaining popularity because it supports your current compute requirements and enables you to spin up resources as needed.

3.  Analyze
Your investment in big data pays off when you analyze and act on your data. Get new clarity with a visual analysis of your varied data sets. Explore the data further to make new discoveries. Share your findings with others. Build data models with machine learning and artificial intelligence. Put your data to work.


Comments ()


Sign in

Read Next

Top 5 Tech Innovations of 2018

Blog banner

Internet of Things

Blog banner

Child labour

Blog banner

Memory Management of Operating System(OS)

Blog banner

CRISP-DM Methodology

Blog banner

AI and cyber Security

Blog banner

Process Description

Blog banner

How to Find the Right Therapist For Me?

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

12 Principles of Animation

Blog banner

Consumer to consumer business mode

Blog banner

How social media affect

Blog banner

Life of an army person

Blog banner

MACHINE LEARNING

Blog banner

Operating system

Blog banner

EID UL FITR

Blog banner

Virtual Machine

Blog banner

Virtual machine.

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Toothache at night? What does this mean, and how to cope with it?

Blog banner

Ethical Hacking

Blog banner

?Why Does My Breath Still Smell After Brushing?

Blog banner

Operating System Objectives and Functions

Blog banner

Apache Kafka

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Hacking

Blog banner

Supervised and unsupervised learning

Blog banner

Save Environment

Blog banner

I/O Buffering

Blog banner

What is a Malware ?

Blog banner

Emerging threats in cyber Forensics

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

Caching windows

Blog banner

Importance Of Yoga.

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

Message Passing in OS

Blog banner

IOT Hacking Techniques

Blog banner

Ubiquitous Computing

Blog banner

Cache Memory

Blog banner

Recipe of Paneer Butter Masala

Blog banner

A book review

Blog banner