Reference no: EM133520956 , Length: word count:2000
Introduction to Business Analytics
Case Study
Assessment Description
Part A: Case Study Analysis (700 words, 10 marks)
Instructions: Read the following two case studies. For each case study, briefly describe:
a) The industry to which analytics has been applied
b) A potential and meaningful business problem to be solved
c) The type of analytics used, and how it was used to address that potential and meaningful business problem
d) The main challenge(s) of using this type of analytics to achieve your business objective (from part b)
e) Recommendations regarding how to be assist stakeholders with adapting these applications for their business.
1. How data analytics helped a firm save significantly
2. Merck's Manufacturing Data and Analytics Platform Triples Performance and Reduces Data Costs
Part B: The Role of Analytics in Solving Business Problems
Instructions: Describe two different types of analytics (from Workshop 1) and evaluate how each could be used as part of a solution to a business problem with reference to ONE real-world case study of your own choosing for one type of analytics and a SECOND real-world case study of your choosing for the second type of analytics.
You will need to conduct independent research and consult resources provided in the subject.
Part C: Developing and Sourcing Analytics Capabilities
Instructions: You are the Chief Analytics Officer for a large multinational corporation in the communications sector with operations that span India, Nepal, China, Taiwan, The Philippines and Singapore
The organization is undergoing significant transformations; it is scaling back operations in existing low revenue segments and ramping up investments in next generation products and services - 5G, cloud computing and Software as a Service (SaaS).
The business is keen to develop its data and analytics capabilities. This includes using technology for product innovation and for developing a large contingent of knowledge workers.
To prepare management for these changes, you have been asked review Accenture's report (see link below) and publish a short report of your own that addresses the following key points:
1. How do we best ingrain analytics into the organisation's decision-making processes?
2. How do we organize and coordinate analytics capabilities across the organization?
3. How should we source, train and deploy analytics talent?
Compare the file sizes of the two archives
: Log on to your regular user account on server1, execute the tar command to create a gzip-compressed archive of the /etc directory.
|
What might be some consequences of neglecting basic security
: What might be some consequences of neglecting basic security protection mechanisms in social networking applications? Ironically, according to the article
|
Write a brief report about the article
: Select a topic covered in this module. Go to the SANS website (), locate the Reading Room, and find an article that relates to your selected topic.
|
How the key vaults can be used to encrypt both data
: Explain two recommendations for how the key vaults can be used to encrypt both data at rest and data in transit.
|
Role of analytics in solving business problems
: How should we source, train and deploy analytics talent and Describe two different types of analytics (from Workshop 1) and evaluate how each could be used
|
Apply your knowledge to develop a security program
: Apply your knowledge to develop a security program, identify goals, objectives, and metrics, and make the necessary modifications to the system security plans.
|
How the paper relates to cybersecurity technology
: The contribution the paper makes to the research body of knowledge to the Cybersecurity community and an assessment of the validity of the research.
|
Compute the ratios for the four most recent quarters
: Using these sites, you will compute the ratios for the four most recent quarters of your chosen company.
|
Differences between the systems development life cycle
: Discuss the differences between the systems development life cycle (SDLC) and the security life cycle. Include in your discussion both management
|