Describe data flows in your company

Assignment Help Computer Engineering
Reference no: EM132218440 , Length: word count : 750

Assignment: Big data systems enterprise deployment, integration, scalability and security issues

In view of the need to handle increasingly larger amounts of data and to better cope with the ensuing big data V-characteristics (Volume, Velocity, Variety, Veracity etc.), several large organisations have begun migrating their standard legacy Enterprise Data Warehouse (EDW) systems to Big-Data-Driven-Enterprise (BDDE) schemes, which subsume the EDW.

Many of these schemes utilise the Hadoop ecosystem supported by a variety of additional data mining and business analytics sub-systems. In this Assignment, you will look at how big organisations migrate from standard EDW to BDDE schemes (that incorporate the EDW) and will investigate the key issues that often have to be dealt with in such migrations.

To complete this Assignment:

Complete out the following tasks:

1. Describe a real or an imaginary company that you want to transform to the BDDE type (you can also use your current employment company as an example, if applicable). Select the industry sector and your particular business activity. Your company's operations must include a Web presence-you must define what service this Web presence provides to its customers and additionally explain how data will be used and collected.

2. Describe data flows in your company. Identify where you will use data collected from the Web and other sources of information such as sell statistics, user activity or social media data. Describe how you plan to integrate new types of big data with current EDW data workflows that primarily use relational data. Do not forget about operational aspects such as data backups and, if applicable, long-term data storage. Data provenance may be needed in addition to regular activity and communication logs.

3. Select a suitable platform for general big data management (e.g. in-house or cloud based infrastructure) and Big Data Management System (BDMS) platform with vendor (e.g. Hadoop supplied by Cloudera CDH, AWS EMR or HortonWorks). You should provide sufficient detail about the BDMS components and tools that you intend to use within the BDDE scheme.

4. Provide suggestions for how you will address security and privacy issues when managing your customer data, and your company's data. Again, do not forget about regular backups and secure backup storage for the BDDE.

5. Define a data management policy, including data protection and access control. Briefly address a majority of the CSA top ten security and privacy challenges.

6. Suggest what big data analytics and visualization methods you will use, including specific commercial tools and platforms.

• Submit a report containing your responses for tasks 1 - 6 written up as an "EDW-to-BDDE Migration Plan" for the specified company.

• Your report should address the issues raised in a reasonably concise and practical manner.

For all Assignments (unless stated otherwise):

Your document should have 750-1,000 words (not including the list of works cited), but it is the quality of the answer that matters, not the number of words.

Reference no: EM132218440

Questions Cloud

What type of survey method the researcher could use : AFE135: What are the two main variables the researcher should consider collecting data for the purpose of the above analysis and why?
Disadvantages of constructing versus purchasing assets : Imagine you are the senior accountant in the fixed assets department of your organization. Management is assessing the benefits of self-constructing.
Describe experiences with mass media : Describe one or two (1-2) experiences with mass media (movies or television) that affected you positively or negatively, explaining when, how, and why.
What would a utilitarian say is the right action : What would a utilitarian say is the right action in each of the cases? Give the reasoning by referring to Chapter 3 of the textbook, especially John Stuart.
Describe data flows in your company : Identify where you will use data collected from the Web and other sources of information such as sell statistics, user activity or social media data.
Discuss the moral reasoning involved in addressing : This symposium is a chance for you to discuss together the ethical issues and questions that the video raises, your own response to those issues.
Discuss some of the approaches to cybercrime : Discuss some of the approaches to cybercrime that are taken by both the Hong Kong and Singapore governments.
Define important characteristic of communities and biomes : Biodiversity is an important characteristic of communities and biomes. Efforts to preserve biodiversity, though intended to reduce human influence.
What are some of the groups that need accounting information : What are some of the groups that need accounting information? What kind of accounting information do they need? Why? Think of a company you've done business.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd