We know data is omnipresent in our world; that’s no secret. By now, most are familiar with the “Vs” of big data – volume, variety, velocity and veracity. Organizations are finding innovative ways to harness big data for competitive advantage. But if you stop and think about it, what we are really
The telecommunications industry has dealt with big data for years, for example tracking individual wires into peoples’ homes and places of business. Detailed billing to track time and duration of each telephone call, even for local billing in the 1980s, introduced a huge influx of data to manage
Recently, various publications including the Times of India, the Wall Street Journal, Reuters and CNET (just to name a few) have been abuzz with news of IBM’s partnership with international automotive supplier Continental. On September 10, at the Frankfurt International Motor Show, IBM and
And the winner is..... InfoSphere Streams!
IBM has been around for a long time, in fact over 100 years. Throughout the decades, IBM has changed the way we live, work and play. Radically new innovations have transformed our world. For example, IBM’s hierarchical database was invented for the Apollo
During a recent conference, I had the privilege of speaking with clients from many different organizations about their big data challenges. Most were very excited and just starting down the path of harnessing its power. Tempering this excitement was a concern about the complexity of big data
IBM data scientists break big data into four dimensions: volume, variety, velocity and veracity. This infographic explains and gives examples of each.
For additional context, please refer to the infographic Extracting business value from the 4 V's of big data.
Explore the IBM Data and AI portfolio
Data management has undergone significant change ever since the introduction of online transaction processing systems (OLTP) some 50 years ago. The level of change during this period, however, has not been uniform. There have been times when data management technologies and products became
"Data in motion" is one of the key aspects of big data. Being able to harness and use data in real time as it flows through sensors and systems has many applications, from improving call-center operations to preventing manufacturing malfunctions. Watch as Roger Rea, product manager of Infosphere
Big data is a new natural resource. Like other natural resources, big data needs to be successfully mined, refined and delivered in order to create value.
Organizations first need to mine big data through Exploration. Exploration is finding, connecting and understanding the value of all available
We’ve got a new zone on developerWorks, dedicated to big data and to architects and developers looking to build analytics applications to derive insight from that data. It turns out developerWorks was already covering big data to some extent, just not in a classic developerWorks “zone” format. And
Big data has its discontents. The backlash is a necessary reality-check in an otherwise vibrant arena. Often in this industry, when a technology is vogue, the hype can interfere with rational decision making, both among users and among solution providers.
Big data tends to focus on extreme scale.
The University of California, Los Angeles (UCLA), announced their work to develop a bedside early-warning system for brain pressure in traumatic brain injury patients. At the core of this system is InfoSphere Streams, which can ingest and analyze, in real-time, huge volumes of fast-moving data –
The UCLA Department of Neurosurgery analyzes brain wave data to predict the rise of deadly brain pressure as part of a National Institute of Neurological Disorders and Stroke study. Knowing in advance that brain pressure could potentially rise in TBI patients gives doctors more time to prevent
Cyberspace is today’s new battleground, and cyber security continues to be a top imperative for both enterprises and governments. This is where big data comes in. IBM® Security QRadar® uses big data capabilities to help keep pace with advanced threats and prevent attacks before they happen. It