Learn about the latest market trends and technology innovations in supply chain from Lora Cecere, CEO and founder, Supply Chain Insights, and glean lessons learned and key takeaways from practitioner Elliott Wolf, director of analytics at Lineage Logistics.
Data: Structure Structured and Unstructured
Database Structures Relational to Relational and non-relational (lakes, streams and clouds)
Rules: Signature based Predictive, Adaptive, Cognitive
Multi workload
Machine learning
SQL
No individual record is particularly valuable, but having every record opens the door to extreme value.
This sector generates data from a multitude of sources, from instrumented production machinery (process control), to supply chain management systems, to systems that monitor the performance of products that have already been sold (e.g., during a single cross-country flight, a Boeing 737 generates 240 terabytes of data). And the amount of data generated will continue to grow exponentially. The number of RFID tags sold globally is projected to rise from 12 million in 2011 to 209 billion in 2021. IT systems installed along the value chain to monitor the extended enterprise are creating additional stores of increasingly complex data, which currently tends to reside only in the IT system where it is generated. Manufacturers will also begin to combine data from different systems including, for example, computer-aided design, computer-aided engineering, computer-aided manufacturing, collaborative product development management, and digital manufacturing, and across organizational boundaries in, for instance, end-to-end supply chain data.
30-70% Drop in the price of MEMS sensors in past five years – McKinsey Research
Diverse data types – from intermittent sensor readings of temperature and pressure to real-time location data or streaming live videos for video analytics
Given the flexible, scalable nature of cloud-based infrastructure and the fact that machine data often originates off premises, we expect a lot of IoT data to be stored and processed in the cloud. The ideal
IoT data platform can be deployed either on premise or in a public, hybrid, or private cloud environment. It should be possible to administer the platform via both a web-based interface and API calls.
Gateways collects, aggregates, and optionally processes the data generated by the devices. The gateway can also accept and route commands sent from the backend to the respective device. Gateway is responsible for authenticating and authorizing the devices to participate in the workflow. It ensures secure communication between the devices and the centralized command center. The gateway is capable of dealing with multiple protocols and data formats.
Every Hadoop platform lets you store unlimited data, and access it in a variety of ways. YARN, for example, is a core part of the platform, and a commodity among vendors.
At Cloudera, we make Hadoop fast, easy, and secure so you can focus on business results and less on the technology.
Let’s talk more about an agile, iterative approach…Goal is to exploit the technical underpinning the big data platform – A platform that allows flexibility in capture and interpretation.
So question is, how best to employ this? Continuous iteration.
These are the 3 key steps to being agile.
Collect, Create and Manage: Figure out what data you have and what data you need. Tag it so only the right people can see it.
Collect
Collect the familiar, the new, the never seen, the always dropped.
No need to worry up front on how to use, so just start using – make it available to any and all frameworks.
Document upfront to make downstream and future analysis easier.
Understand that quality can be built iteratively, too.
Create
Find the gaps, no matter the type, as you learn more.
Integration can come with iterations, so focus on what value new sources can bring.
Don’t forget that your business creates lots of data outside the data warehouse.
B2B contracts means be explicit about capturing and/or asking, delivering and using data
Explore and Analyze: Now you have many tools hitting the same dataset. Continue to add new tools and new applications and watch the value grow.Start with somewhat limited scope – a single dataset – for a team, and get familiar, go deep. Enrich your data. Get experience and momentum. Build grassroots advocacy.
Understand the data and its usage better, find the probable linkages to other data sets a (identify resolution) – lay down the groundwork for future. Extend enrichment.
Fuse data sets (and possibly even teams?) together to find intersections, correlations. To uncover the really “unknown unknowns.” Move from enriched to refined to derived data (latter is data that would exist without the former; wholly new yet separate and distinct from its predecessors)
Operationalize: Move data closer to users so they can impact the business. Launch embedded, smart applications to deliver insights to customers and business users.
Operationalize
Bring data and insight to all workflows in the business. Integrate into the very decision-making, at every step. Take advantage of the longitudinal analytics afforded by the platform: past, present, and future-looking analytics, simultaneously. Data is brought to and sought by those who use it, simultaneously.
When we think of business risks, there are many areas that affect business risks. Some of the key areas are cybersecurity, fraud and compliance. Identifying cybersecurity risk, preventing fraud and meeting compliance requirements help mitigate risks within the organization.
Let’s dive into one of the key areas that affect business risk - Cybersecurity