Do you agree that billie should try to better coordinate

Assignment Help Computer Network Security
Reference no: EM132083387

New Analytics Talent Assignment

Billie Morris is the BI Director at Love You, a large manufacturer and distributor of upscale cosmetics products for women.

Love You sells directly to department and beauty product specialty stores, who then sell the products to consumers. While at Love You, Billie and her staff have implemented an enterprise data warehouse, an effective reporting system, dashboards, and several analytical applications.

Over the last two years, Billie has seen the hiring of people with advanced analytical skills (i.e., data scientists) into the various business units. For example, marketing hired a person with a PhD in statistics to develop forecasting models and is in the process of hiring another person with advanced skills to do social media analytics.

Finance hired a PhD in econometrics to develop corporate forecasting models. People have joked that they are popping up like mushrooms after a heavy rain.

The managers in these business units are very pleased with the results they are getting from the use of advanced analytics. Billie sees great value in bringing these people and skills into Love You, but is concerned that there is the need for some structure around them and their work.

For example, one of them is using SAS Enterprise Miner, another one R, and a third an open-source data mining product. She knows that one product won't meet everyone's needs, but does everyone need a different product? The money isn't coming out of her budget, but still ....

However, she is being impacted by their needs for data. One of chewing up considerable cpu time in the warehouse and another is always requesting downloads, sometimes for data that is not easily supplied. And surely, there must be some best practices that can be shared.

Billie needs advice on how to proceed.

Do you agree that Billie should try to better coordinate the use of advanced analytics in Love You?

Reference no: EM132083387

Questions Cloud

Perform a volumetrics analysis for the holiday travel : Assume that the DBMS that will be used to implement the system requires 35% overhead to be factored into the estimates.
Compute the weighted average cost of capital : Compute the Weighted average cost of capital (WACC) assuming the firms cost of debt is 4% and the firms cost of equity is 13.3%.
Computation of diluted eps : Cumulative Preferred Stock (Total par $200,000), Convertible to 20,000 common shares - Stock Options to purchase 12,000 Common Shares at $31 per share
Equity and the rest by long term debt : Compute the percentage of the firm that is financed by debt provided that the firms assets of $9 million are financed by $5 million in Equity and the rest.
Do you agree that billie should try to better coordinate : Billie Morris is the BI Director at Love You, a large manufacturer and distributor of upscale cosmetics products for women.
What is the yield to maturity : A bond that sell for 952 and matures is 1 year. The coupon rate is 10% paid annually and the bonds maturity value is 1000. What is the yield to maturity?
Show how you get the ciphertext from the plaintext : Show how you get the ciphertext from the plaintext through XORing the round keys, performing the substitutions, and the permutations.
What is the wacc : The current tax rate that applies to the firm is 30%. What is the WACC?
What are the major risks in network security : Network security is one of the most important aspects if not the most important in relation to a company security.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd