Featured

Countries’ legal coverage of internet and digital information, a prerequisite.

privacyInternet able and/or virtual companies from social media to ISPs operate and conduct business in a multinational to global realm. Facebook, Twitter, and Google are among the major global internet powered companies. Their scale of operations puts them in comfortable positions where they are able to serve the market at super convenient costs without the need to worry about losses. This ability  attracts a lot of customers to sign up (clicking on the terms and conditions with vague understanding of their implications) to access a lot of the free services, tools and applications they offer.

As a result theses companies have become information banks as the higher the frequency of input and content shared by users make them very susceptible to hacking, data mining, and the companies themselves use the users information intentionally or unintentionally for their gain. Privacy and security issues are already a major concern for users globally. Governments, companies, groups and individuals have over the years been subjected to exposure, allegations, and legal actions for violating these rights to individuals’ freedom of personal privacy and protection over their digital information.

Due to the traversing nature of the internet extending the boundaries of countries with different legal systems and requirements there is no definite international laws governing users rights and freedom to their information when it comes to digital applications therefore the onus is on individual (or groups) of countries to create and promote laws for internet and digital privacy and security.

In New Zealand there  is currently no definitive law but policymakers are working on addressing these issues. The European Union already has its legal and policy directive set on digital privacy. It is envisaged that many will follow suit to address security and privacy issues, from managing them to legal sanctioning through the enforcement of policy directives.

 

Featured

Trump administration’s Silicone Valley visa lockout: Opportunity for others.

donald-trump-executive-orders-silicon-valley

A spate of policy changes since Donald Trump’s presidential inauguration have brought into fruition his campaign promises of making “America great”. Ushering the end of open foreign relationships in terms of trade and diplomacy with its former partner countries and enforcing a closed economy through the enabling of  protectionist policies. Underlying reason for this policy is to give jobs and money back to the American people and bluntly put to get rid of foreigners workers.

Business wise internally within the large American multinationals this decision is having immense negative impacts on their operations. Especially the global tech companies based in Silicone Valley  who rely on a lot of crucial input from their foreign employees for research and development who are also holding important roles in these companies will face an unexpected future and more likely be forced leave as the chances of their visa rejections become a reality.tech3-1489594869-1775

This will be an opportunity for other overseas competing firms and countries to employ these foreign workers and use their knowledge and expertise to enrich themselves. As the battle ground becomes skewed against the U.S tech firms we see the potential for countries like Germany  and China who are now driving policies towards automation and intelligent manufacturing among others and are intensively pursuing tech programs pose a lucrative market as well.

In the age where information is power will this policy be sustained as American global technology companies raise concerns and issues with this policy decision which ultimately threatens to lose their advantage and competitiveness in a an ever changing market.

 

Further Reading:

Ali, D. W. (2017, March 25). Trump US Visa H1B and L1 visa executive order leaked and visa review. Retrieved March 26, 2017, from http://www.workpermit.com/news/trump-us-visa-h1b-and-l1-visa-executive-order-leaked-and-visa-review-20170324

Drange, M. (2017, January 30). Trump’s Proposed Shakeup Of Work-Visa Program Could Leave Silicon Valley Scrambling. Retrieved March 26, 2017, from https://www.forbes.com/sites/mattdrange/2017/01/30/trumps-proposed-shakeup-of-work-visa-program-could-leave-silicon-valley-scrambling/#10622f93a899

Financial Times. (n.d.). Retrieved March 26, 2017, from https://www.ft.com/content/b42f40c2-a6df-11e6-8b69-02899e8bd9d1

Kosoff, M. (2017, January 31). Trump’s Next Executive Order Could Cripple Silicon Valley. Retrieved March 26, 2017, from http://www.vanityfair.com/news/2017/01/trumps-next-executive-order-could-cripple-silicon-valley

Wood, C. (2017, March 04). How will the new high-skilled worker visa rules affect Silicon Valley? Retrieved March 26, 2017, from http://www.csmonitor.com/Technology/2017/0304/How-will-the-new-high-skilled-worker-visa-rules-affect-Silicon-Valley

Made in China 2025

blog_madeinchina2025

China is currently dominating the world by many accounts in terms of its manufacturing, economic and financial prowess. Many companies big and small want a piece of the China pie. Even though the politics and how the government intervenes in the management of its country are to some extent a concern with the highly reported human rights an other international contraventions violations,  the international business community at large are not deterred to doing business in China.

With the inception of the Made In China 2025 program in more recent years, the program aims to bring its manufacturing up a notch by becoming an intelligent manufacturer which means that it is trying shift away from being a copycat manufacturer into an innovative and inventive creator of products by way of research and development of new and innovative technologies alongside its e-business and e-commerce channels. It is engaging in strategic partnerships with its 3 largest online and eCommerce companies Baidu, Alibaba, and Tencent (BAT) to develop and reach its targeted goals in the eCommerce sector which is its largest market segment both locally and globally. Ultimately this program will propel China forward  when it begins to reach its potential.

The United States (China’s number one competitor) is currently imposing protectionist policies on its immigration and foreign trade policies to many of the world economies and its former partner nations.  Will this move by America present an opportunity or threat for China and its Made In China 2025 program?

Aritificial Intelligence – Is the future safe?

As electronic and digital technology advances with the aim to improve and help make our lives easier  I have noticed that it is increasingly progressing from an accessory tool to a basic human essential living requirement. The invasive, fun and essential functionalities of technology with the ubiquitous not forgetting cheaper or mostly free accessibility (free wordpress account 🙂 ) are all but sucking in and gripping  the masses like a vacuum.

Technology has served its purpose helping make our lives easier but has come to the point where cars will be driven autonomously – don’t have to drive! Most of our daily life processes have all been crammed into application and websites where we don’t have to do a lot of work – an access to a smartphone and you’re set for life. Now that the Internet of Things has become operational like everything else before, it will only be a matter of time before the technology becomes really affordable  for us to have  (a short time maybe) with more ease and more functionalities that we won’t have to lift a sweat as everything will be done be done just by commanding and/ or even thinking. Moore’s Law at its best.

This begs the next question Artificial Intelligence!

The first time I came across artificial intelligence or AI, I freaked out because it was through the movie Terminator (I watched all the installments). It was a serious apocalyptic foretaste and man Arnold Schwarzenegger was very convincing in his embodiment of AI  – A powerful military defence program becoming self aware and turning against its creators hence machines against humanity resulting in massive destruction and annihilation of the world with the minority of remnant humans becoming the resistance to  the AI. What about the Matrix movies?

Artificail Intelligence
Enter a caption

Currently with the existing technology, AI will in a matter of years be a fruition as it is  has garnered a lot of attention for political, philosophical and technological reasons. the idea of giving a machine the ability to think an behave like a human is a huge pill to swallow. Among those expressing concerns over AI of its potential threats AI has over humans are Steven Hawking, Elon Musk and Bill Gates to name a few.

For me AI is a very complex engineering feat that requires a lot of ethical considerations on every aspect of its operation . There is science and then there is humanity to consider. The future of AI is on the horizon however are we all confident that is the next best thing for us? Let us not let our instinct of aggression overcome us but think before developing.

Week12: Internet of Things

Internet of Things (IoT)

The internet of things has is bound to radically transform the world through its potential abundance of applications which will inevitably revolutionise the world through different industries. But for people to be able to embrace the technology there has to be a perhaps radical thought process or reimagining the landscape of the present and thinking beyond the unimaginable.

The world is increasingly becoming demanding as needs of citizens are increasing day by day the pressure to provide innovative products to meet these needs is ever-present. Internet of Thing provides this avenue with vocational based technology, data mining, and intelligence and providing almost instant contextual prescriptions thus providing value adding activities.

One observation of the IoT is its ability to provide faster automation and access as viewed through the Industry 4.0 clip from lecture two. The clip also revealed the technology’s superior ability to uniquely identify individual units of production customise products from consumer responsiveness thereby boosting efficiency and cost savings. Or the Google car’s self-driven ability which replaces people’s driving giving them more time and opportunity to concentrate on other activities while travelling. The Nest smart home technology with its energy efficiency functions also reduces energy usage producing sustainability resources and usages

 

Another advantage the IoT’s technology to be able to collect, store and analyse massive amounts of data that it collects and analyses this data therefore augmenting and prompting responses from people. Through the use of sensor, tagging and tracking technology it can be used for public utilities in the form of transportation services. That is responding to estimated times of arrival or departure from a bus stop, the pricing or booking, discount offering and many more. Or in a shop the shopper can is identified and presented options with coupons based on the shoppers historical shopping and browsing history at the shop through a smartphone applications and many more options.

Its superior capability of collecting, analyse, predict and in a single looping action delivers its transformative potential the change the outlook of the world today.

 

Issues

There is so many possibilities with IoT yet these possibilities are not all that positive as there are some externalities that this technology is no exception to. The article on the Fusion Blog (2015) of the light bulb performing a denial of service attack on the smart home because it  was blown it kept sending packets of signals to the main hub for to fix it that eventually the signals completely become a DoS attack completely shutting down the also l the house functions. Even robots were continuously functioning outside their pre-programming parameters. Even from the hypothetical but practical reading about the smart home catching a virus is somehow depicts the complex and intricate nature of the technology itself being interwoven. Finally, the non-disclosure of the technology’s full functionalities becomes a concern when there are mishaps or unknown technological overrides of the system becomes invasive and to an extent places risk on human lives. In this clip and this clip, vehicles’ electronic control units and radio units  are easier to hack and control which are inevitably linked to many of the crucial functions of the vehicle and the implications are very threatening and costly. vehicles linked to the internet via their electronics are at high risks of being hacked and manipulated as explained by the experts.

 

Implications of IoT and the future:

  • Integrated world, in the future all things will be interconnected and able to communicate with each other
  • Increased innovation leads to increased personalising, IoT will enable efficient use of resources to personalise products and services to meet each individuals’ needs
  • Sustainability, IoT be able to utilise resources in a sustainable manner
  • Hi security concerns as hacking, virus and DoS forms of attacks.
  • Lack of privacy since IoT will be reliant on every bit of personal information from citizens to enable it to function effectively
  • High interactivity between machines and humans as the IoT has the potential to augment and prompt human responses unlike internet enabled technology
  • IoT ubiquitous
  • More leisure time as IoT enables to automate normal human functions all around as a consequence humans will have more free time on their hands

 

These are some of the implications I can think of and the future of IoT still remains to be seen as there is more need for more research to establish it future potential and uses.

 

 

References:

Gallagher, S. (2015, August 23). Highway to hack: Why we’re just at the beginning of the auto-hacking era. Retrieved October 09, 2016, from http://arstechnica.com/security/2015/08/highway-to-hack-why-were-just-at-the-beginning-of-the-auto-hacking-era/

The Nightmare on Connected Home Street. (n.d.). Retrieved October 09, 2016, from https://www.wired.com/2014/06/the-nightmare-on-connected-home-street/

  1. (2013, December 05). Industrie 4.0 – The Fourth Industrial Revolution. Retrieved October 09, 2016, from https://www.youtube.com/watch?v=HPRURtORnis
  2. (2014, May 27). A First Drive. Retrieved October 09, 2016, from https://www.youtube.com/watch?v=CqSDWoAhvLU

H. (n.d.). This Guy’s Light Bulb Performed a DoS Attack on His Entire Smart House. Retrieved October 09, 2016, from http://fusion.net/story/55026/this-guys-light-bulb-ddosed-his-entire-smart-house

 

 

 

 

 

Week 11: Technologies for mobile commerce and location-based services

Comment on the recent TechCrunch article “The Future Of The Web Is All About Context”.

The article discusses issues with the internet in the sense it has the ability has the ability to collect and store massive amounts of data but in its essence what is the meaning of data if there is no value gained of the data if it cannot be transformed into meaningful insights that creates value.

It states that the restricted access to data in the form of siloed data stored in social sites creates difficulties in synthesising personal information to find correlations among the very individuals. So when users type a word due to the lack of historical information related to them the web is constraint to producing random results/choices with lesser chance of presenting the right result.

The future lies in context. That is the ability for technology to collect, store, analyse and leverage the data  to produce a more informed result that is in context to the user based on his or her historical experiences that is  prior browsing activities which could be anything.

Since the inception of internet, it has revolutionised the world in many fields and increased the capacity and livelihood of people all over. The exponential growth of technological improvements has given the internet the ability to collect analyse an interpret data with increased intelligence which enables it to make informed predictions or prescriptions at the behest of the user.

 

Identify an additional example of disruptive innovation in connection with mobile commerce use

On line travel agencies have disrupted brick and mortar agents that airlines have cut down on these agencies as the cost advantage, scale and the variety of multifunctional utilities of virtual agents mutually boost the airlines advantages as well. I have chosen the online travel agent Expedia. Expedia has eight global brands which includes Expedia.com, Hotels. Com Hotwire.com, Trivago. Founded in 1996 with its diversified portfolio of businesses engaging in the tourism and hospitality industry it is market leader in in this particular field. The following is the description of the functions and offerings for a person using the Expedia mobile app.

expedia-description

expedia

 

https://play.google.com/store/apps/details?id=com.expedia.bookings

 

http://freepps.top/apps/travel-local/expedia-hotels-flights?gclid=CKGisIqCxs8CFcmVvQodT8QDOw

 

Week 10: MSYS559

Applications of the divide-and-conquer principle mention in the 1st video

On non IT application of the concept there are other social and political, and economical applications of the principle that I have come across. For example in the political sphere, especially in the democratic systems we have a spit on political parties with members who are inclined to the political parties’ policies and ideologies and when the winning party gets into parliament they rule aggressively over the others even though they all want to serve the people and purposes regardless. In military, when the United States invaded Iraq in 2003 to remove the dictatorship there, one of the first thing they did was dismantle the army and their armoury so when the army become fragmented and weak the US were able to spread their rule over the country. Also in the colonial era during the 1800s in the Pacific where I am from originally the colonisers used religion and educated a few indigenous people and then commanded them to organise the rest of the people so that they can control the others.

On the IT front from reading the literature the divide conquer is a complex algorithm paradigm that is used to solve efficient algorithms of all kinds. The divide and conquer rule can be a tool for solving conceptually difficult problems. It performs a way of breaking the problem into sub problems and of combining sub problems to original problems. So dividing and conquer it reduces the problem. The divide and conquer algorithms also make efficient use of memory caches – when a sub-problem is small enough it an all its sub-problems can, in principle be solved with the cache. The same advantage exists with regards to hierarchical storage systems as well as for multi-level cache systems

The core building block of an SOA

According to informIT (2016), the basic construct or building block of SOA is a service. The development or evolution of software engineering has overtime gone from procedural to structure to object oriented to component-based and now service development. Each evolution builds on the previous as illustrated by figure 1 below

Fig 1: Levels of abstraction

cba

Source: InformIT (2016)

What a service is

A service being identified as the fundamental block of an SOA is a logical self-contained business function which serves in the SOA through the following attributes:

Stateless: services of an SOA neither remembers the last thing they were asked to do nor worry about the next thing as services are not dependent on the context or state of other services but only on their functionality. For example on the world wide web where each request from a user or web page or URL results in the requested pages being served but not remembered later by the server when requested later.

Discoverable: A service must be discovered by potential consumers of the service. Services published are exposed by service providers in the SOA directory to be discovered and utilised by consumers

Self-describing: The SOA service interface describes, exposes and provides a point of entry to the service. The interface allows the user to discover and connect to the service without requiring the consumer to understand the technical implementation details.

Composable: SOA services are, by nature, composite. They can be composed from other services and in turn can be combined with other services produce new solutions for business.

Loose coupling: allows the concerns of application features to be separated into independent pieces. This separation of concern provides a mechanism for one service to call another without being tightly bound to it. For instance an account service has open account, authorisation and audit features representing delineations of responsibilities and three separations of concerns.

Governed policy: services are built by contract. Relationships between services are built on SLAs (Service-level agreements) promoting process consistency and reducing complexity

.

 

 Why is the generic model from the first video fits well to an SOA like the one from IBM?

The generic model which is a structured layers based on the divide-and-conquer principle in with a bottom up functionality approach. More similarly is the IBM SOA solution stack with five functional layers of with a bottom up approach. As per the video two of our lecture we see observe that both models operate on a structured layers with functional bottom up oriented.

Fig 2: SOA IBM stackibm

Source: IBM

What SOA has to do with business processes?

Business processes is a choreography or holistic approach which represent the backbone of the business. This dynamic side of the business is realised through the business processes gauging from the literature on SOA and business processes. Again looking at the IBM SOA stack a service orientation can be realised by service compositions which may be interim as and orchestration or choreography and the ability to insert human intervention and running transactions.

What ITIL can do as a tool for SOA management and governance?

ITIL is about creating IT operations and perspective for enterprises ITIL can expose the traditional IT management processes for monitoring and managing SOA applications. To provide an infrastructure capable of handling complex interactions of its services, SOA needs something like ITIL underneath which has ITIL and SOA effort underway.

ITIL enables the complete process to create the service results, to determine the role and responsibility in each process, to complete the rules in each process, and to complete the rules in each process, and to complete the process in overall lifecycle service governance. SOA governance consists of five steps:

  •         Planning
  •         Designing
  •         Implementing
  •         Controlling
  •         Evaluating

These elements and phases are mapped with service strategy, design, transition, operation and continual service improvement.

References:

By Kerrie Holley and Ali Arsanjani.
(n.d.). Informit. Retrieved October 03, 2016, from
http://www.informit.com/articles/article.aspx?p=1663690

By clicking Submit, you agree to
the developerWorks terms of use. (n.d.). SOA terminology overview, Part 1:
Service, architecture, governance, and business terms. Retrieved October 03,
2016, from http://www.ibm.com/developerworks/library/ws-soa-term1/

Divide and conquer algorithms.
(n.d.). Retrieved October 03, 2016, from
https://en.wikipedia.org/wiki/Divide_and_conquer_algorithms

Gruman, G. (2007, March 30). The
ITIL-SOA Connection. Retrieved October 03, 2016, from
http://www.cio.com/article/2439399/itil/the-itil-soa-connection.html

SOA Reference Architecture
Technical Standard : Business Process Layer. (n.d.). Retrieved October 03,
2016, from https://www.opengroup.org/soa/source-book/soa_refarch/busproc.htm

Topic, B. (n.d.). IEEE Xplore
Document – The mapping of interconnected SOA governance and ITIL v3.0. Retrieved
October 03, 2016, from http://ieeexplore.ieee.org/document/6021574/?denied

 

Week 9 Topic: Technological foundations of Business Intelligence (BI) and data warehouses

What Changes Occur in the presence of big fast , possible fast unstructured data

The size of the data is larger than tera and petabytes. The large scale and rise of size makes it difficult to store and analyse using traditional tools and applications. Big data comes from a variety of sources therefore the heterogeneity of this data creates problems for mining and analysing the data.

Finding the right analytical tool with the functionality of managing the a DW architectural system is ongoing  because of its dynamic nature therefore certain applications are developed through open or closed source DI/DW software continually to address this massive volume, velocity and variety of data.

Is the DW structure the same? if not what needs to change to be adapted?

According to Data warehouse architecture (2016),Different data warehousing systems have different structures. Some may have an Operational Data Store, while some may have an  multiple data marts. Some may have a small number of data sources and, while some may have dozens of data sources therefore it is wise to present different layers of data and warehouse architecture rather than discussing the specifics of any one system.

week-9

In general, all data warehouse systems have the above layers.

The structure has been covered by the lecturer in class already but there are or customised tools that organisations have to (out)source or apply in certain phases along the architecture. For example the Hadoop Ecosystem technologies can be applied potentially for the whole architecture. There are other accompanying and relevant applications that also perform the same function or complement Hadoop as well, some are listed below:

 

For the ETL layer  other popular  tools used for its application are :

  • IBM WebSphere Information Integration (Ascential DataStage)
  • Ab Initio
  • Informatica
  • Talend

At the Data presentation level other tools are:

 

In conclusion, it is unavoidable to stress the eminence of the Hadoop ecosystem  for BI,DW, DI and analytics as Hadoop technologies are mostly compatible with other BI technologies including its complementing technologies along each tier of the DW architecture from  Data sourcing to Data presentation (dashboards). Therefore is gaining popularity among many  relevant organisations. Also supporting the observation on the nature of data unstructured data are the three DW models discussed in our lectures and from literature supports the relevant to specific characteristics of data. Because of its open source nature there are a lot of inputs from various talented professionals from different fields in terms of code writing to amplify its ability as the veracity of data evolves with technology.

References

Data Warehouse Architecture. (n.d.). Retrieved September 26, 2016, from http://www.1keydata.com/datawarehousing/data-warehouse-architecture.html

Data Warehousing. (n.d.). Business Intelligence, 45-62. doi:10.1002/9780470753866.ch3

An open source, distributed version control and bug tracking system for Windows, Mac OS X, and Linux. (n.d.). Retrieved September 26, 2016, from http://veracity-scm.com/

 

Smartphone revolutionizing eCommerce in the underdeveloped nations – Papua New Guinea case

Aiyura-Valley-copy

Many of the developing nations are rapidly catching up with the rest of the world especially with the application of internet and digital technologies in terms of communication and business processes.

Undeniably there is a great disparity in terms of infrastructural development and other socio-economic indicators with the developed world but in terms of the knowledge of web associated technologies both  digital and electronics and their applications, the gap is getting smaller with many developing nations.

This phenomenon is largely attributed to the increasing usage of smartphones within these countries. It is not regional phenomena but observed all over the world as countries become connected through mobile coverage progressively to the smartphone age that has upped the level of the masses from communicating to doing other essential tasks of their daily lives like banking, buying and selling and paying for essential services. of course there are negatives associated with this change but for this blog I will only be restricted to the eCommerce aspects.

Papua New Guinea a developing country in the Pacific has not been susceptible to this change. Since the introduction of mobile telecommunication and the opening its doors to competition  within this industry sector has led to cheaper handsets, free sims, free sign ups, low and affordable rates of recharge or top-ups as companies compete for more customers. This has resulted in widespread transfer and/or adoption of mobile phones among the population that they have become an essential personal item for almost all Papua New Guineans. A rough estimation outs about 75% of the population are being subscribers to mobile services providers, 10% have land line telephones while the rest don’t own phones or don’t have access to them.

Before the introduction of smart phones, they used  prepaid deals  for power bills using prepaid recharges via a mobile service provider. Did banking as well on mobile phones but were limited. The introduction of smartphones have more than diversified the functions and enable them to go further in terms of the social media marketing through buy and sell pages setup  via Facebook, paying for TV subscription using mobile accounts to receiving international money transactions through banking apps. Many businesses are now reacting to this large and lucrative market of mobile phone users and are developing apps or forming strategic partnerships with mobile telecommunications companies (telcos) to push their products through this medium. Competition has further squeezed telcos into exercising  business models  based on low prices to achieve economies of scale for stable revenue streams (and profit margins) hence mobile technologies and services will get cheaper in the  future strengthening the development of smartphones  and a lot of eCommerce opportunities.

MSYS 559 Week 8: Big Data

Target Corporation – Big Data Example.

Researching for an example I can across Target Corporation (Target) one of the largest retailers in the world just behind Walmart. Target assigns every customer a Guest ID number, tied to their credit card, name, or email address and uses this information to piece together their shopping history and any demographic information collected from them or from other sources (Hill, 2012). From this background information and context, the data can be analysed to determine who to target for coupons.  Target is continuously experimenting into its big data analytics as it, like everyone, else is fed petabytes of data into its systems every day from its shoppers so its crucial function is to organise the data first before it is able to drive its business intelligence forward. It has been experimenting with a myriad of technologies like robots and video cameras to improve its processes. Below is an overview of its model:

Fig 1: Target Business Model

business-model

Source: Sidhu 2013

 

One very popular story that made Target famous back in 2012 was its successful prediction of a pregnancy. Below is a depiction of Target big data analytics based on the example of prediction of the pregnancy though the use of big data analytics.

Fig 2: Example of Business model toward a possible pregnant shopper

target-buiness-model

Source: Sidhu, 2013

 

 

Google/Nest

Collection of data , cost effectiveness, inefficiencies and optimization are some of the enormous transformation potential the NEST technology is able to deliver for utility provision. Producing exact details for components, machine usage and regulating on a large scale network of home devices to save and apply utilities efficiently gives it imminence as a valuable technological asset in the monetization strategies for both the public and private sectors at large. Its myriad of crucial and potential abilities for property owners and utilities providers will possibly see it as an integral component feature of future dwellings at the same time lifting Google’s big data ability to greater heights.

 

Other implications of Big Data in the future

  • Degradation of moral and ethical views in terms of respecting for other’s privacy and personal boundaries
  • Random government spying and intelligence collection on unsuspecting persons
  • Possible tagging and RFID of humans.
  • Humans becoming too reliant on the technology ( and lazy)
  • Personal customization of products and services
  • Augmented behaviour (prompting and inducing people to respond and react to the signals sent from machines) for example like to pregnancy example from Target

 

Implications

The implications for me personally is threatening because basically the technology in a way is trying to take away that basic human right or freedom to choose. Big data in the future we will take away our ability to think and articulate to determine what we should be choosing or not and we humans will become very reliant in the choices and results provided for us by machines.  This will continually degrade our mental capacity and human rights to make choices for ourselves. At the moment we are running to our computers to do literally all our daily chores so what about big data?

Big Data right term?

Big data is ideally the right term since massive amounts of data are continually streaming into concerned organisations 24/7 365 days of the year and it will get more intense and massive with the Internet of Things reaching its full potential.

 

Viewings/Readings :

https://innovation-engineering.co/tag/big-data

https://corporate.target.com/careers/career-areas/business-intelligence-analytics

http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/#7c10d31734c6

https://www.youtube.com/watch?v=FtzWghAekpw