Prioritizing correlations: Big data is used to tease out correlations. The correlation exists when one variable is linked with another, just because two variables linked doesn’t mean that causative relationship exists between them.
Security: Security is a foremost aspect for every technology. Big data is prone to data breaches. The important information that is provided to some third party may get leaked to customers. Proper encryptions must be made in order to protect the data.
The large growth in data: data is growing faster than the processing power. Large volumes of data are being exploded in past years. We need some new machines to work; otherwise, we will get overrun by data. Large Data centers can solve this problem.
Inconsistency in data collection: Sometimes the tools we use to gather big data sets are imprecise. This will happen when the data is collecting, for example, consider Google search the results of the search on one day will be different from other days, this is mainly due to inconsistency in data collection.
Bibliography: Erpublication.org. (2018). [online] Available at: https://www.erpublication.org/published_paper/IJETR042630.pdf [Accessed 11 Oct. 2018].
Security: Security is a foremost aspect for every technology. Big data is prone to data breaches. The important information that is provided to some third party may get leaked to customers. Proper encryptions must be made in order to protect the data.
The large growth in data: data is growing faster than the processing power. Large volumes of data are being exploded in past years. We need some new machines to work; otherwise, we will get overrun by data. Large Data centers can solve this problem.
Inconsistency in data collection: Sometimes the tools we use to gather big data sets are imprecise. This will happen when the data is collecting, for example, consider Google search the results of the search on one day will be different from other days, this is mainly due to inconsistency in data collection.
No comments:
Post a Comment