Integrating Legacy and Modern Infrastructure in an SDA-Based Platform
A Service Dominant Architecture operationalizes concepts from service science in an architectural blueprint for the implementation of a service platform. Within two-speed IT, a service platform can be implemented on top of a legacy infrastructure, adding important complementary capabilities to legacy IT.
Digital Transformation & Innovation Bootcamp: April 8-10
Cutter Consortium’s Digital Transformation & Innovation Bootcamp is designed to help executive teams upend the reflex thinking that prevents essential change, take a fresh and creative look at opportunities, and dive deeply into what they need to do to succeed. Cutter Consortium Fellow, Professor Karim Lakhani will guide participants through a two-day examination of how digital innovation is transforming our business landscape on April 8-10, 2018.
The Modern Healthcare Data Warehouse: Sensor Data Meets Traditional Health Information
Mobile, wearable devices support noninvasive, biometric monitoring. They are generating a wealth of data detailing important indicators of the user’s health, ranging from heart rate, respiration, and temperature to perspiration, gait, blood sugar levels, balance, grip, and more. Incorporation of data from sensor-enabled devices with other health and medical information adds a real-time capability to healthcare that has been lacking in all but the more complex medical device monitoring applications to date.
Proactive and Reactive: Taking on Technical Debt
In this Advisor, we will look at some of the proactive and reactive recommendations for dealing with vendor-created technical debt.
Why Market Structure Matters
Having a market structure that supports and encourages diversification of risks is key to avoiding systemic risks not only to national economies, but to the global economy as well.
Blockchain Rising, Part VII: Most Viable Use Cases
This Executive Update examines the use cases surveyed organizations indicate as being most viable for applying blockchain technology.
Blockchain Rising, Part VII: Most Viable Use Cases
This Executive Update examines the use cases surveyed organizations indicate as being most viable for applying blockchain technology.
Business Leadership in Data Science Requires EA Support
Data science is essential in extracting value from big data but it is not sufficient. It makes use of technical, management, and business analysis skills. Data science also deals with the enterprise architecture (EA) of the organization. Astute leadership is essential and an imperative for value extraction from big data.
Fog Computing: A New Space Between Data and the Cloud
Giti Javidi, Ehsan Sheybani, and Lila Rajabion present a convincing argument for redistributing the cloud. They suggest that the cost and time associated with transmitting data to the cloud, processing it there, and returning the results back to the IoT devices are critical. Fog computing both enhances and complements the cloud by bringing the processing closer to a cluster of IoT devices, resulting in faster analytics.
Fog Computing: A New Space Between Data and the Cloud
Giti Javidi, Ehsan Sheybani, and Lila Rajabion present a convincing argument for redistributing the cloud. They suggest that the cost and time associated with transmitting data to the cloud, processing it there, and returning the results back to the IoT devices are critical. Fog computing both enhances and complements the cloud by bringing the processing closer to a cluster of IoT devices, resulting in faster analytics.
Using Simple Analytics in a Real-Time Environment
Matthew Ganis and Frank Coloccia eloquently explain that analytics is not a perfect science. Indeed, the authors judiciously argue that analytics is more an art than a science. They demonstrate their analytical approach with a direct and practical example of using Twitter data in real time to understand the sentiments (positive or negative) of trade show participants and to gain insights from them.
Swarm Intelligence for Web Document Classification
Clustering large amounts of unstructured data into relatively smaller chunks based on some similarity is at the crux of unstructured data analytics. Here’s where “swarm intelligence” can play a role — an application that drives neural networks for clustering unstructured data. The authors offer an excellent example of swarm intelligence via a model that learns to classify Web documents. We can easily apply this same algorithm to business, medicine, defense, and supply chains, to name a few other areas.
Swarm Intelligence for Web Document Classification
Clustering large amounts of unstructured data into relatively smaller chunks based on some similarity is at the crux of unstructured data analytics. Here’s where “swarm intelligence” can play a role — an application that drives neural networks for clustering unstructured data. The authors offer an excellent example of swarm intelligence via a model that learns to classify Web documents. We can easily apply this same algorithm to business, medicine, defense, and supply chains, to name a few other areas.
Microsegmentation: Securing IaaS in the Big Data Era
The authors focus on the challenges of security in the Agile deployment of big data applications in the cloud. Security issues can make or break the deployment of otherwise complete solutions in the cloud. The authors begin by introducing the topic of “microsegmentation” — which allows “public cloud-based infrastructure as a service (IaaS) providers to offer software-centric or software-only solutions.” The value of this discussion to business lies in the opportunity to quickly deploy secure models for end-user consumption.
Microsegmentation: Securing IaaS in the Big Data Era
The authors focus on the challenges of security in the Agile deployment of big data applications in the cloud. Security issues can make or break the deployment of otherwise complete solutions in the cloud. The authors begin by introducing the topic of “microsegmentation” — which allows “public cloud-based infrastructure as a service (IaaS) providers to offer software-centric or software-only solutions.” The value of this discussion to business lies in the opportunity to quickly deploy secure models for end-user consumption.
Discovering the Right Questions in Big Data: The Colored de Bruijn Graph Approach
This article touches upon a crucial challenge in the big data space: identifying the right questions for it. As data continues to explode, not only are businesses struggling to find answers to business questions, they often cannot even determine what questions to ask of their data. The authors discuss a practical experiment on classifying genetic data using a colored de Bruijn graph and show the application of this technique in the business world.
Discovering the Right Questions in Big Data: The Colored de Bruijn Graph Approach
This article touches upon a crucial challenge in the big data space: identifying the right questions for it. As data continues to explode, not only are businesses struggling to find answers to business questions, they often cannot even determine what questions to ask of their data. The authors discuss a practical experiment on classifying genetic data using a colored de Bruijn graph and show the application of this technique in the business world.
IIoT Applications in Oil and Gas
It is now possible to search on the Web for “IoT use cases in [industrial sector __ ]” and find links to hundreds of case studies and white papers. Of course, these should sometimes be taken with a grain of salt. In general, however, published case studies (especially when an end-user company is named) present some good evidence of an area in which the IIoT shows solid potential.
Compliments to the CHEF: A Cognitive and Heuristics-Based Emergent Financial Management Tool
Andrew Guitarte describes the paradigm of big data analysis and how it “shifts from manual to automated, dependent to autonomous, isolated to context-aware, product-driven to needs-based, batch to real-time, and static to streaming.” This paradigm shift is important especially in the context of automated wealth advisory services where the organization of otherwise unstructured data is vital. His article takes us into the realms of business capability architecture (BCA) and presents a cognitive and heuristics-based emergent financial management (aka CHEF) tool that can be used effectively in emergent decision-making processes of bank employees, shareholders, and their customers.
The Alpha and the Omega: Big Data and Higher Education
Vince Kellen sheds light on the significant impact of big data in his domain of expertise: education. He then examines how universities can use big data to improve teaching and learning and describes the challenges involved. He concludes by offering suggestions for strategy development as universities incrementally apply big data to their core enterprise, education.
The Alpha and the Omega: Big Data and Higher Education
Vince Kellen sheds light on the significant impact of big data in his domain of expertise: education. He then examines how universities can use big data to improve teaching and learning and describes the challenges involved. He concludes by offering suggestions for strategy development as universities incrementally apply big data to their core enterprise, education.
Prescriptive Analytics: A Game Changer for Business
Santhosh Ravindran and Fiona Nah explore utilizing prescriptive analytics to enhance business processes, focusing on ML algorithms. While clarifying how “the foresight offered by prescriptive analytics enables organizations to make major decisions in a short time frame with greater accuracy,” Ravindran and Nah rightfully direct our attention on the importance of embedding such analytics carefully and iteratively within business processes.
Prescriptive Analytics: A Game Changer for Business
Santhosh Ravindran and Fiona Nah explore utilizing prescriptive analytics to enhance business processes, focusing on ML algorithms. While clarifying how “the foresight offered by prescriptive analytics enables organizations to make major decisions in a short time frame with greater accuracy,” Ravindran and Nah rightfully direct our attention on the importance of embedding such analytics carefully and iteratively within business processes.
Why Machine Learning Is Crucial to Effective Utilization of Big Data
The authors offer some insightful thoughts on how machine learning can help extract value from big data. The authors begin their discussion by “illustrating the limitations of current methods and human intellect across the 4 Vs (volume, velocity, variety, and veracity)” and the barriers that can block the extraction of the 5th V (value). Their article further highlights some excellent ML use cases at cutting-edge companies.
Why Machine Learning Is Crucial to Effective Utilization of Big Data
The authors offer some insightful thoughts on how machine learning can help extract value from big data. The authors begin their discussion by “illustrating the limitations of current methods and human intellect across the 4 Vs (volume, velocity, variety, and veracity)” and the barriers that can block the extraction of the 5th V (value). Their article further highlights some excellent ML use cases at cutting-edge companies.


