Analyzes the customers choice and preferences

Assignment Help Computer Engineering
Reference no: EM133241070

Read and analyze the items carefully, then evaluate how big data impacts their decision making and strategy.

Question 1. Netflix implements data analytics models to discover customer behavior and buying patterns. Then, using this information it recommends movies and TV shows to their customers. That is, it analyzes the customer's choice and preferences and suggests shows and movies accordingly.

According to Netflix, around 75% of viewer activity is based on personalized recommendations. Netflix generally collects data, which is enough to create a detailed profile of its subscribers or customers. This profile helps them to know their customers better and in the growth of the business.

Question 2. Google uses Big data to optimize and refine its core search and ad-serving algorithms. And Google continually develops new products and services that have Big data algorithms.

Google optimized its search engine to collect the data from us as we browse the Web and show suggestions according to our preferences and interests.

Question 3. LinkedIn is mainly for professional networking. It generally uses Big data to develop product offerings such as people you may know, who have viewed your profile, jobs you may be interested in, and more.

LinkedIn uses complex algorithms, analyzes the profiles, and suggests opportunities according to qualifications and interests. As the network grows moment by moment, LinkedIn's rich trove of information also grows more detailed and comprehensive.

Question 4. Walmart is using Big data for analyzing the robust information flowing throughout its operations. Big data helps to gain a real-time view of workflow across its pharmacy, distribution centers, and stores.

Big data is helping Walmart analyze the transportation route for a supply chain, optimizing the pricing, and thus acting as a key to enhancing customer experiences.

Question 5. Uber is the first choice for people around the world when they think of moving people and making deliveries. It uses the personal data of the user to closely monitor which features of the service are mostly used, to analyze usage patterns, and to determine where the services should be more focused.

Uber focuses on the supply and demand of the services due to which the prices of the services provided change. Therefore one of Uber's biggest uses of data is surge pricing. For instance, if you are running late for an appointment and you book a cab in a crowded place then you must be ready to pay twice the amount.

Reference no: EM133241070

Questions Cloud

Catastrophic nuclear event : During a catastrophic nuclear event, taking large supplements of potassium iodide can potentially lessen the effects of those exposed to contaminated air
Design a time algorithm that takes as input : COM 4555 Cuauhtémoc University Design a O(n)-time algorithm that takes as input a length-n array of integers and an integer
Describe the features of the park that you would like to see : Write two paragraphs (about 100 -150 words each, or 200-300 words in total) to describe the features of the park that you would like to see
Supply chain management for health care organizations. : Analyze best practice in supply chain management for health care organizations. What are greatest strengths and opportunities in supply chain management
Analyzes the customers choice and preferences : BA 634 University of Texas analyzes the customer's choice and preferences and suggests shows and movies accordingly
Does licorice cause hypertension : The licorice discussed here is legitimate, unmodified licorice from the licorice plant, which contains glycyrrhizinic destructive.
Write the five benefits of the cloud computing : University Of Central Missouri Write the five benefits of the Cloud Computing based IT service model. Explain each benefit with a clear example.
Encode the four-byte utf-8 representation : STUDIES 02670-24 Denver Center for International Studies Encode the four-byte UTF-8 representation for the emoji that looks like a bone as a bytes object
Identify occurrence of the theme : As you listen, you will notice that the piece has one theme (music idea) that repeats over and over again. Here is the theme played at the beginning of the piec

Reviews

Write a Review

Computer Engineering Questions & Answers

  How are css, dhtml and xml associated

Find out an article or a resource about CSS, DHTML or XML. Include the URL of the original article or resource and summarize it.

  What types of information can get posted to social media

What types of information can get posted to social media websites (Facebook, Instagram, etc.) that could be a source for a criminal to hack.

  What do the results mean for each decision tree

COMP.7212 Artificial Intelligence Techniques-Toi Ohomai Institute of Technology New Zealand-What do the results mean for each decision tree?

  What implications does this present to you as a programmer

It is therefore possible for a program, thinking a memory location holds a piece of data when it actually holds a program instruction, to accidentally (or on purpose) modify itself. What implications does this present to you as a programmer?

  Determine the negative effects on an investigation

Justify the necessity of validating data acquisition and determine the negative effects on an investigation if this step is not performed.

  How do you calculate the extended price for the item

How do you calculate the extended price for the item (quantity to buy times unit price)? How do you print it to the screen?

  Describe your experiences and recommendations for protection

Describe your experiences and recommendations for protection regarding Viruses, Adware, phishing schemes, and spyware.

  Describe the three goals of cryptography

Describe the three goals of cryptography, Draw a table showing if hashing and data signature meet the goals of cryptography

  Discuss the scope of a cloud computing audit

Describe in 500 words discuss the scope of a cloud computing audit for your business. Cite your sources. Write in essay format not in bulleted.

  Create the definition of the function

Write down the definition of the function template moveNthFront that takes as a parameter a queue and a positive integer, n. The function moves the nth element of the queue to the front.

  What are the levels of physical security

With 200-400 words,atleast 2 references and also in apa format. What are levels of physical security and how do they differ in the amount of security needed?

  Explore storage quality of service

IT 278 Purdue Global University Using hyper -v, explore storage quality of service and how it should be deployed on a large network where many machines

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd