SlideShare una empresa de Scribd logo
1 de 23
Intel Confidential — Do Not Forward
Intel Information Technology
Going From Big Data to Big Answers
March 19, 2014
Ajay Chandramouly
@ajayc47
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
Agenda
• Impact and Value of Big Data
• Intel IT Use Cases – Bringing Value of Big Data to the Enterprise
• Call to Action – Bringing Value of Big Data to Your Enterprise
2
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
Big
Data
TEXT
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
Big Data AnalyticsValue
= the “Asset” = the “Action”
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
The Four Pillars Of Big Data
5
Volume
Massive scale and
growth of
unstructured data
• 80%~90% of total data
• Growing 10x~50x
faster than structured
(relational) data
• 10x~100x of traditional
data warehousing
Velocity
Real-time rather
than batch-style
analysis
• Data streamed in,
tortured, and discarded
• Making impact on the
spot rather than after-
the-fact
Variety
Heterogeneity and
variable nature of
Big Data
• Many different forms
(text, document, image,
video, ...)
• No schema or weak
schema
• Inconsistent syntax and
semantics
Variability
Predictive analytics
for future trends
and patterns
• Deep, complex analysis
(machine learning,
statistic modeling,
graph algorithms, …),
versus
• Traditional business
intelligence (querying,
reporting, …)
Big Data augments traditional Business Intelligence
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
BIG DATA
MACHINE
GENERATED
HUMAN
GENERATED
BUSINESS
GENERATED
Edge
Scale Up
Distributed
REQUIRES DIFFERENT APPROACHES
Scale Out
NETWO
RK
STORAGE
COMPUTE
Intel® Optimized Big Data
In-Memory
XDW
MPP
One Size Doesn’t Fit All
LOB
IOT
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
7
Going from Data to Insight and Action
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
Intel IT – What We’re Doing in Big Data
8
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
6,500 IT Employees
59 IT sites globally
150,000 Connected Systems
40,000 Handheld Devices
100,000 Intel Employees
164 Intel Sites across 63 Countries
68 Data Centers
25% reduction with virtualization
inspire employees
IT is business
changing traditional thinking
service reliability
Intel Confidential
99
Intel Confidential – for internal use only
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
IT Leadership
10
Transform
Contribute Value
Deliver Services
“License to Decide”
Strategic Relationship
“Right to Influence”
Collaborative Relationship
“Reason to Exist”
Transactional Relationship
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
Intel IT Vision for Big Data Analytics
11
Priority
We run big data analytics
programs in each of our key
lines of businesses. Also, all
our key strategic initiatives
have a big data component.
Strategy
Implement an internal, cost-
effective big data platform
and in- parallel build the
necessary skill set within
the organization,
Approach
Gradually build business
value through advanced
analytics of big data.
Business Value
The value of our big data
efforts was about USD
$100M in 2012. We expect
that figure to grow 10x by
2014.
IT formed an enterprise Big Data Analytics organization which solves High Value problems
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
Big Data Path to Competitive Advantage
12
SMG
Web usage data
for
Marketing/Camp
aign predictions
(What)
SSG IT
IT Incident
Predictability
Context Aware
Analytics for
LBS
Security
Network
Intrusion
Prediction and
Prevention
Big Data Use
Cases
Tailor-made and Unique Big Data environment based on Intel needs
2011 - 12
• Defined strategy and
implementation plan
•Hadoop Path-finding
• Deployed chosen MPP
platform
• Acquired big data skills
• Deployed 3 big data projects
(3 done)
• Completed big data
distribution evaluation
• Landed internal Hadoop
cluster in Prod
• Implemented Internal
Hadoop Production cluster
2013
• Implement Internal Hadoop Pre-
Production cluster
• Deliver a solid platform for the
first set of use cases.
•Deploy internal 5-6-10 projects on
top of the BI big data platform
•Deploy the qualified Big Data
business use cases
• Deliver business value with this
platform through the use of it.
•Expand Big Data Platforms to
support use case demand.
• Setup BDP as a service with
integration of IT processes.
•Prescriptive guidance for
development and architecture.
•Standardize processes & tools
2014
• Expand IBD platform for the next set of
use cases. Deliver business value
through the use of it.
 Deploy internal 5-6-100 projects on
top of the BI big data platform
• Evolve the IBD platform towards the
next generation Hadoop ecosystem
 Adopt IDH3 with Hadoop 2.0/YARN
 Hbase for storage intensive use cases
 Explore SQL on Hadoop use cases
 Expand Big Data Platforms to support
Enterprise BI use cases.
• Continuous improvement and expansion
of platform, capabilities, guidance,
process and tools.
TMG - POC
Asses feasibility
of Hadoop for
MIDAS as lower
cost solution
HR - POC
Talent
Intelligence
Intel Information Technology
Intel Confidential – for internal use
Intel’s Compound Big Data Platform Components
MPP Platform
 3rd-party solution
 100x faster than traditional systems
 Intel® Xeon® processor E7 family blades scale easily
Intel Distribution Of Hadoop
 Based on Apache Hadoop
 Optimized for Intel® Xeon processors,
SSD and 10GbE
 HBase NoSql DB
 Spark (In-Memory Analytics)
MPP – Massively Parallel Processing
Predictive Analytics Engine
 In house development
 Enables real time, on-going Predictive service
 Intel® Xeon® processor E7 family
Intel Data
Platform:
Analytics Toolkit
Intel Information Technology
Intel Confidential – for internal use
Hadoop Use Cases
Contextual Recommendation Engine: Provides
recommendation engine and analytic capabilities to
acquisition.
Value:
• Provides new, intelligent capabilities and map
management technologies which can be offered as paid
services est. at $1-4m.
Incident Predictability:
Reduces incidents, impact on users and IT
Value:
• Provides 10-30% reduction in number of new incidents
created at estimated cost avoidance of $4m over 2yrs.
Web Data Mining & Customer Insight:
Provides customer and network usage analytics for
Intel.com and customer advertising
Value:
• Provides means to predict and adjust product position
or pricing based on response to marketing campaigns
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
Intel IT Multi Data Warehouse Strategy
15
Big Data is a Part of a Comprehensive BI Strategy
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
Call to Action
16
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
17
People & Skills
CxO Program Manager Project Manager Solutions Architect Data Architect Data Engineer SE/Developer DBA
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
The practice of data-science
• Content assessment, normalization
• Content de-duplication
• Content tagging, taxonomy, folksonomy
• Content harvesting
• Content classification and analytics
• Copyright and attribution management
• Demographic/Customer segmentation
• Web log mining and path analysis
• Scraper, phishing, and fraud detection
• Social media monitoring
• Sentiment/Spam detection
• Recommendation engines
• Digital forensics
• Rich media indexing
• Faceted search and federated search
• Entity recognition and linking
• Personalization
• Ad Optimization
• Retention optimization
• Heterogeneous information architecture
• Reporting & Visual Presentation
• Key-movers – data hub and spoke
• Self organizing networks
• Transitive Relation Mining
• Triangle/Quad closing; triangulation
• Six degrees of separation
• Time series modeling
• Trending analysis
• Predictive modeling
• Surfacing better outcomes, better value from data
• Investigative information seeking, synthesis,
visualization, and discovery
Intel Information Technology
Intel Confidential – for internal use
• Build a cost-effective, versatile Big Data platform. One Size does not fit all.
• Technology is important, but skill sets are essential.
• Ecosystem is more mature than ever. Easier than ever to get started.
Summary
Big data analytics has led to big value across every sector
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
IT @ Intel: Sharing Intel IT Best Practices with the World
20
Learn more about Intel IT’s initiatives at www.intel.com/IT
Or @ajayc47
CIO and IT Perspective
IT White Papers, Audio-Video Blogs
IT-to-IT Community
Intel Confidential — Do Not Forward
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
1 Slide About Hadoop
Hadoop is…
Intel Information Technology
Intel Confidential – for internal use
Intel Information Technology
Intel Confidential – for internal use
Last Slide About Hadoop
23

Más contenido relacionado

La actualidad más candente

Value proposition for big data isv partners 0714
Value proposition for big data isv partners 0714Value proposition for big data isv partners 0714
Value proposition for big data isv partners 0714
Niu Bai
 
Security and governance
Security and governanceSecurity and governance
Security and governance
DataWorks Summit
 
Big data ibm keynote d advani presentation
Big data ibm keynote d advani presentationBig data ibm keynote d advani presentation
Big data ibm keynote d advani presentation
MassTLC
 
Pivotal the new_pivotal_big_data_suite_-_revolutionary_foundation_to_leverage...
Pivotal the new_pivotal_big_data_suite_-_revolutionary_foundation_to_leverage...Pivotal the new_pivotal_big_data_suite_-_revolutionary_foundation_to_leverage...
Pivotal the new_pivotal_big_data_suite_-_revolutionary_foundation_to_leverage...
EMC
 
Open Source Data Management for Industry 4.0
Open Source Data Management for Industry 4.0Open Source Data Management for Industry 4.0
Open Source Data Management for Industry 4.0
DataWorks Summit
 

La actualidad más candente (20)

Big data Introduction by Mohan
Big data Introduction by MohanBig data Introduction by Mohan
Big data Introduction by Mohan
 
TIME SERIES: APPLYING ADVANCED ANALYTICS TO INDUSTRIAL PROCESS DATA
TIME SERIES: APPLYING ADVANCED ANALYTICS TO INDUSTRIAL PROCESS DATATIME SERIES: APPLYING ADVANCED ANALYTICS TO INDUSTRIAL PROCESS DATA
TIME SERIES: APPLYING ADVANCED ANALYTICS TO INDUSTRIAL PROCESS DATA
 
Overview of analytics and big data in practice
Overview of analytics and big data in practiceOverview of analytics and big data in practice
Overview of analytics and big data in practice
 
Value proposition for big data isv partners 0714
Value proposition for big data isv partners 0714Value proposition for big data isv partners 0714
Value proposition for big data isv partners 0714
 
MongoDB IoT City Tour STUTTGART: Hadoop and future data management. By, Cloudera
MongoDB IoT City Tour STUTTGART: Hadoop and future data management. By, ClouderaMongoDB IoT City Tour STUTTGART: Hadoop and future data management. By, Cloudera
MongoDB IoT City Tour STUTTGART: Hadoop and future data management. By, Cloudera
 
Destroying Data Silos
Destroying Data SilosDestroying Data Silos
Destroying Data Silos
 
Hortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your dataHortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your data
 
Contexti / Oracle - Big Data : From Pilot to Production
Contexti / Oracle - Big Data : From Pilot to ProductionContexti / Oracle - Big Data : From Pilot to Production
Contexti / Oracle - Big Data : From Pilot to Production
 
Is your big data journey stalling? Take the Leap with Capgemini and Cloudera
Is your big data journey stalling? Take the Leap with Capgemini and ClouderaIs your big data journey stalling? Take the Leap with Capgemini and Cloudera
Is your big data journey stalling? Take the Leap with Capgemini and Cloudera
 
Security and governance
Security and governanceSecurity and governance
Security and governance
 
Big data ibm keynote d advani presentation
Big data ibm keynote d advani presentationBig data ibm keynote d advani presentation
Big data ibm keynote d advani presentation
 
Pivotal the new_pivotal_big_data_suite_-_revolutionary_foundation_to_leverage...
Pivotal the new_pivotal_big_data_suite_-_revolutionary_foundation_to_leverage...Pivotal the new_pivotal_big_data_suite_-_revolutionary_foundation_to_leverage...
Pivotal the new_pivotal_big_data_suite_-_revolutionary_foundation_to_leverage...
 
Data Discovery and BI - Is there Really a Difference?
Data Discovery and BI - Is there Really a Difference?Data Discovery and BI - Is there Really a Difference?
Data Discovery and BI - Is there Really a Difference?
 
Use dependency injection to get Hadoop *out* of your application code
Use dependency injection to get Hadoop *out* of your application codeUse dependency injection to get Hadoop *out* of your application code
Use dependency injection to get Hadoop *out* of your application code
 
Big Data Solutions Executive Overview
Big Data Solutions Executive OverviewBig Data Solutions Executive Overview
Big Data Solutions Executive Overview
 
The Vortex of Change - Digital Transformation (Presented by Intel)
The Vortex of Change - Digital Transformation (Presented by Intel)The Vortex of Change - Digital Transformation (Presented by Intel)
The Vortex of Change - Digital Transformation (Presented by Intel)
 
Open Source Data Management for Industry 4.0
Open Source Data Management for Industry 4.0Open Source Data Management for Industry 4.0
Open Source Data Management for Industry 4.0
 
Put Alternative Data to Use in Capital Markets

Put Alternative Data to Use in Capital Markets
Put Alternative Data to Use in Capital Markets

Put Alternative Data to Use in Capital Markets

 
The Big Picture: Real-time Data is Defining Intelligent Offers
The Big Picture: Real-time Data is Defining Intelligent OffersThe Big Picture: Real-time Data is Defining Intelligent Offers
The Big Picture: Real-time Data is Defining Intelligent Offers
 
Destroying Data Silos
Destroying Data SilosDestroying Data Silos
Destroying Data Silos
 

Destacado

Q con shanghai2013-[黄舒泉]-[intel it openstack practice]
Q con shanghai2013-[黄舒泉]-[intel it openstack practice]Q con shanghai2013-[黄舒泉]-[intel it openstack practice]
Q con shanghai2013-[黄舒泉]-[intel it openstack practice]
Michael Zhang
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
IBM Security
 

Destacado (12)

Meego의 현재와 미래(2)
Meego의 현재와 미래(2)Meego의 현재와 미래(2)
Meego의 현재와 미래(2)
 
​ Insight Types That Influence Enterprise Decision Makers (Christian Rohrer a...
​ Insight Types That Influence Enterprise Decision Makers (Christian Rohrer a...​ Insight Types That Influence Enterprise Decision Makers (Christian Rohrer a...
​ Insight Types That Influence Enterprise Decision Makers (Christian Rohrer a...
 
SRCONF 2011 (Maayan Zusman)
SRCONF 2011 (Maayan Zusman)SRCONF 2011 (Maayan Zusman)
SRCONF 2011 (Maayan Zusman)
 
Q con shanghai2013-[黄舒泉]-[intel it openstack practice]
Q con shanghai2013-[黄舒泉]-[intel it openstack practice]Q con shanghai2013-[黄舒泉]-[intel it openstack practice]
Q con shanghai2013-[黄舒泉]-[intel it openstack practice]
 
2016 june disruption in enterprise software final
2016 june disruption in enterprise software final2016 june disruption in enterprise software final
2016 june disruption in enterprise software final
 
What is the new data protection regulation GDPR and why should you care? Jesp...
What is the new data protection regulation GDPR and why should you care? Jesp...What is the new data protection regulation GDPR and why should you care? Jesp...
What is the new data protection regulation GDPR and why should you care? Jesp...
 
How to Globalize Editorial Planning
How to Globalize Editorial PlanningHow to Globalize Editorial Planning
How to Globalize Editorial Planning
 
Preparing to the GDPR - the next steps
Preparing to the GDPR - the next stepsPreparing to the GDPR - the next steps
Preparing to the GDPR - the next steps
 
Data breaches, privacy programs and what will change for processors
Data breaches, privacy programs and what will change for processorsData breaches, privacy programs and what will change for processors
Data breaches, privacy programs and what will change for processors
 
Intel Core i7 Processors
Intel Core i7 ProcessorsIntel Core i7 Processors
Intel Core i7 Processors
 
Intel® Xeon® Processor E5-2600 v4 Product Family EAMG
Intel® Xeon® Processor E5-2600 v4 Product Family EAMGIntel® Xeon® Processor E5-2600 v4 Product Family EAMG
Intel® Xeon® Processor E5-2600 v4 Product Family EAMG
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 

Similar a Advanced Analytics: Going From Big Data to Big Answers

Tusker Corporate Profile
Tusker Corporate ProfileTusker Corporate Profile
Tusker Corporate Profile
Prashant Kumar
 

Similar a Advanced Analytics: Going From Big Data to Big Answers (20)

Increase your ROI with Hadoop in Six Months - Presented by Dell, Cloudera and...
Increase your ROI with Hadoop in Six Months - Presented by Dell, Cloudera and...Increase your ROI with Hadoop in Six Months - Presented by Dell, Cloudera and...
Increase your ROI with Hadoop in Six Months - Presented by Dell, Cloudera and...
 
Big Data in Azure
Big Data in AzureBig Data in Azure
Big Data in Azure
 
Cloudian 451-hortonworks - webinar
Cloudian 451-hortonworks - webinarCloudian 451-hortonworks - webinar
Cloudian 451-hortonworks - webinar
 
OC Big Data Monthly Meetup #6 - Session 1 - IBM
OC Big Data Monthly Meetup #6 - Session 1 - IBMOC Big Data Monthly Meetup #6 - Session 1 - IBM
OC Big Data Monthly Meetup #6 - Session 1 - IBM
 
SD Big Data Monthly Meetup #4 - Session 1 - IBM
SD Big Data Monthly Meetup #4 - Session 1 - IBMSD Big Data Monthly Meetup #4 - Session 1 - IBM
SD Big Data Monthly Meetup #4 - Session 1 - IBM
 
IBM Software Day 2013. Smarter analytics and big data. building the next gene...
IBM Software Day 2013. Smarter analytics and big data. building the next gene...IBM Software Day 2013. Smarter analytics and big data. building the next gene...
IBM Software Day 2013. Smarter analytics and big data. building the next gene...
 
Gse uk-cedrinemadera-2018-shared
Gse uk-cedrinemadera-2018-sharedGse uk-cedrinemadera-2018-shared
Gse uk-cedrinemadera-2018-shared
 
AI in the Enterprise at Scale
AI in the Enterprise at ScaleAI in the Enterprise at Scale
AI in the Enterprise at Scale
 
Tusker Corporate Profile
Tusker Corporate ProfileTusker Corporate Profile
Tusker Corporate Profile
 
Big data4businessusers
Big data4businessusersBig data4businessusers
Big data4businessusers
 
Building Confidence in Big Data - IBM Smarter Business 2013
Building Confidence in Big Data - IBM Smarter Business 2013 Building Confidence in Big Data - IBM Smarter Business 2013
Building Confidence in Big Data - IBM Smarter Business 2013
 
Overview - IBM Big Data Platform
Overview - IBM Big Data PlatformOverview - IBM Big Data Platform
Overview - IBM Big Data Platform
 
Big data for Telco: opportunity or threat?
Big data for Telco: opportunity or threat?Big data for Telco: opportunity or threat?
Big data for Telco: opportunity or threat?
 
Internet of Things and Multi-model Data Infrastructure
Internet of Things and Multi-model Data InfrastructureInternet of Things and Multi-model Data Infrastructure
Internet of Things and Multi-model Data Infrastructure
 
Big Data Everywhere Chicago: Platfora - Practices for Customer Analytics on H...
Big Data Everywhere Chicago: Platfora - Practices for Customer Analytics on H...Big Data Everywhere Chicago: Platfora - Practices for Customer Analytics on H...
Big Data Everywhere Chicago: Platfora - Practices for Customer Analytics on H...
 
Pivotal Big Data Roadshow
Pivotal Big Data Roadshow Pivotal Big Data Roadshow
Pivotal Big Data Roadshow
 
Oil and gas big data edition
Oil and gas  big data editionOil and gas  big data edition
Oil and gas big data edition
 
Impala Unlocks Interactive BI on Hadoop
Impala Unlocks Interactive BI on HadoopImpala Unlocks Interactive BI on Hadoop
Impala Unlocks Interactive BI on Hadoop
 
Sudhir Rawat, Sr Techonology Evangelist at Microsoft SQL Business Intelligenc...
Sudhir Rawat, Sr Techonology Evangelist at Microsoft SQL Business Intelligenc...Sudhir Rawat, Sr Techonology Evangelist at Microsoft SQL Business Intelligenc...
Sudhir Rawat, Sr Techonology Evangelist at Microsoft SQL Business Intelligenc...
 
ADV Slides: What the Aspiring or New Data Scientist Needs to Know About the E...
ADV Slides: What the Aspiring or New Data Scientist Needs to Know About the E...ADV Slides: What the Aspiring or New Data Scientist Needs to Know About the E...
ADV Slides: What the Aspiring or New Data Scientist Needs to Know About the E...
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Advanced Analytics: Going From Big Data to Big Answers

  • 1. Intel Confidential — Do Not Forward Intel Information Technology Going From Big Data to Big Answers March 19, 2014 Ajay Chandramouly @ajayc47
  • 2. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use Agenda • Impact and Value of Big Data • Intel IT Use Cases – Bringing Value of Big Data to the Enterprise • Call to Action – Bringing Value of Big Data to Your Enterprise 2
  • 3. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use Big Data TEXT
  • 4. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use Big Data AnalyticsValue = the “Asset” = the “Action”
  • 5. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use The Four Pillars Of Big Data 5 Volume Massive scale and growth of unstructured data • 80%~90% of total data • Growing 10x~50x faster than structured (relational) data • 10x~100x of traditional data warehousing Velocity Real-time rather than batch-style analysis • Data streamed in, tortured, and discarded • Making impact on the spot rather than after- the-fact Variety Heterogeneity and variable nature of Big Data • Many different forms (text, document, image, video, ...) • No schema or weak schema • Inconsistent syntax and semantics Variability Predictive analytics for future trends and patterns • Deep, complex analysis (machine learning, statistic modeling, graph algorithms, …), versus • Traditional business intelligence (querying, reporting, …) Big Data augments traditional Business Intelligence
  • 6. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use BIG DATA MACHINE GENERATED HUMAN GENERATED BUSINESS GENERATED Edge Scale Up Distributed REQUIRES DIFFERENT APPROACHES Scale Out NETWO RK STORAGE COMPUTE Intel® Optimized Big Data In-Memory XDW MPP One Size Doesn’t Fit All LOB IOT
  • 7. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use 7 Going from Data to Insight and Action
  • 8. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use Intel IT – What We’re Doing in Big Data 8
  • 9. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use 6,500 IT Employees 59 IT sites globally 150,000 Connected Systems 40,000 Handheld Devices 100,000 Intel Employees 164 Intel Sites across 63 Countries 68 Data Centers 25% reduction with virtualization inspire employees IT is business changing traditional thinking service reliability Intel Confidential 99 Intel Confidential – for internal use only
  • 10. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use IT Leadership 10 Transform Contribute Value Deliver Services “License to Decide” Strategic Relationship “Right to Influence” Collaborative Relationship “Reason to Exist” Transactional Relationship
  • 11. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use Intel IT Vision for Big Data Analytics 11 Priority We run big data analytics programs in each of our key lines of businesses. Also, all our key strategic initiatives have a big data component. Strategy Implement an internal, cost- effective big data platform and in- parallel build the necessary skill set within the organization, Approach Gradually build business value through advanced analytics of big data. Business Value The value of our big data efforts was about USD $100M in 2012. We expect that figure to grow 10x by 2014. IT formed an enterprise Big Data Analytics organization which solves High Value problems
  • 12. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use Big Data Path to Competitive Advantage 12 SMG Web usage data for Marketing/Camp aign predictions (What) SSG IT IT Incident Predictability Context Aware Analytics for LBS Security Network Intrusion Prediction and Prevention Big Data Use Cases Tailor-made and Unique Big Data environment based on Intel needs 2011 - 12 • Defined strategy and implementation plan •Hadoop Path-finding • Deployed chosen MPP platform • Acquired big data skills • Deployed 3 big data projects (3 done) • Completed big data distribution evaluation • Landed internal Hadoop cluster in Prod • Implemented Internal Hadoop Production cluster 2013 • Implement Internal Hadoop Pre- Production cluster • Deliver a solid platform for the first set of use cases. •Deploy internal 5-6-10 projects on top of the BI big data platform •Deploy the qualified Big Data business use cases • Deliver business value with this platform through the use of it. •Expand Big Data Platforms to support use case demand. • Setup BDP as a service with integration of IT processes. •Prescriptive guidance for development and architecture. •Standardize processes & tools 2014 • Expand IBD platform for the next set of use cases. Deliver business value through the use of it.  Deploy internal 5-6-100 projects on top of the BI big data platform • Evolve the IBD platform towards the next generation Hadoop ecosystem  Adopt IDH3 with Hadoop 2.0/YARN  Hbase for storage intensive use cases  Explore SQL on Hadoop use cases  Expand Big Data Platforms to support Enterprise BI use cases. • Continuous improvement and expansion of platform, capabilities, guidance, process and tools. TMG - POC Asses feasibility of Hadoop for MIDAS as lower cost solution HR - POC Talent Intelligence
  • 13. Intel Information Technology Intel Confidential – for internal use Intel’s Compound Big Data Platform Components MPP Platform  3rd-party solution  100x faster than traditional systems  Intel® Xeon® processor E7 family blades scale easily Intel Distribution Of Hadoop  Based on Apache Hadoop  Optimized for Intel® Xeon processors, SSD and 10GbE  HBase NoSql DB  Spark (In-Memory Analytics) MPP – Massively Parallel Processing Predictive Analytics Engine  In house development  Enables real time, on-going Predictive service  Intel® Xeon® processor E7 family Intel Data Platform: Analytics Toolkit
  • 14. Intel Information Technology Intel Confidential – for internal use Hadoop Use Cases Contextual Recommendation Engine: Provides recommendation engine and analytic capabilities to acquisition. Value: • Provides new, intelligent capabilities and map management technologies which can be offered as paid services est. at $1-4m. Incident Predictability: Reduces incidents, impact on users and IT Value: • Provides 10-30% reduction in number of new incidents created at estimated cost avoidance of $4m over 2yrs. Web Data Mining & Customer Insight: Provides customer and network usage analytics for Intel.com and customer advertising Value: • Provides means to predict and adjust product position or pricing based on response to marketing campaigns
  • 15. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use Intel IT Multi Data Warehouse Strategy 15 Big Data is a Part of a Comprehensive BI Strategy
  • 16. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use Call to Action 16
  • 17. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use 17 People & Skills CxO Program Manager Project Manager Solutions Architect Data Architect Data Engineer SE/Developer DBA
  • 18. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use The practice of data-science • Content assessment, normalization • Content de-duplication • Content tagging, taxonomy, folksonomy • Content harvesting • Content classification and analytics • Copyright and attribution management • Demographic/Customer segmentation • Web log mining and path analysis • Scraper, phishing, and fraud detection • Social media monitoring • Sentiment/Spam detection • Recommendation engines • Digital forensics • Rich media indexing • Faceted search and federated search • Entity recognition and linking • Personalization • Ad Optimization • Retention optimization • Heterogeneous information architecture • Reporting & Visual Presentation • Key-movers – data hub and spoke • Self organizing networks • Transitive Relation Mining • Triangle/Quad closing; triangulation • Six degrees of separation • Time series modeling • Trending analysis • Predictive modeling • Surfacing better outcomes, better value from data • Investigative information seeking, synthesis, visualization, and discovery
  • 19. Intel Information Technology Intel Confidential – for internal use • Build a cost-effective, versatile Big Data platform. One Size does not fit all. • Technology is important, but skill sets are essential. • Ecosystem is more mature than ever. Easier than ever to get started. Summary Big data analytics has led to big value across every sector
  • 20. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use IT @ Intel: Sharing Intel IT Best Practices with the World 20 Learn more about Intel IT’s initiatives at www.intel.com/IT Or @ajayc47 CIO and IT Perspective IT White Papers, Audio-Video Blogs IT-to-IT Community
  • 21. Intel Confidential — Do Not Forward
  • 22. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use 1 Slide About Hadoop Hadoop is…
  • 23. Intel Information Technology Intel Confidential – for internal use Intel Information Technology Intel Confidential – for internal use Last Slide About Hadoop 23