Business Intelligence vs Data Analytics

Other than the fact that the title of the course contains both Business Intelligence AND Data Analytics, these two concepts seem like separate things, right?

Well that’s what this week’s discussion is going to find out.

While we won’t address data visualization in depth in this course, data visualization is never very far from any discussion of data analytics, so I’d like everyone (ALL students, not just the initial post group) to get acquainted with Google’s Ngram Viewer: https://books.google.com/ngrams.

Basically the Ngram Viewer allows you to see a graph of the occurrence of a given word or phrase over a specified period of years in the entire corpus of books contained in the Google Books collection.  You can also enter several words or phrases to compare the evolution of usage over time.  The default (sample) ngram on the day I visited was a comparison of

Albert Einstein,Sherlock Holmes,Frankenstein

which resulted in

Your tasks and the discussion topic(s) this week:

1. ALL students should use Ngram and try various combinations of

  • business intelligence,
  • data analytics,
  • data science.

You  might try allied terms like

  • data analysis,
  • big data.

Be sure to change the years, you’ll definitely want to include through to the current year and I think you’ll quickly find that years before 1900 (sometimes later) don’t show much.  Think about what the graph is showing you in terms of the usage of these various terms.  Be aware that even if you enter the current year, Ngram may change that year depending on the data available (currently, it seems to ‘default’ to 2008 as the most recent year available).

2. INITIAL POST GROUP: in addition to the Ngram exercise, members of the initial post group should also conduct a web search for definitions of at least business intelligence and data analytics.  I’m sure you’ll find more than a few sites willing to compare the two.   The topic this week:

Compare and contrast the terms business intelligence and data analytics.  That is, how are they similar, how are they different?

You should include in your initial post a brief discussion of the Ngram findings AND a brief discussion of your search for definitions.

Information Governance for E-Mail

We learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation? Support with references and do your usual critical review 

Cryptography – PCA

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

· You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Course : Cryptography

Position: Software Developer

2 pages

report

   

Possible Computer Security Research Project Topic

Topic : Quantum Computers – Impact on Encryption

Here is a list of deliverables:

Include a short paragraph describing project and how you intend to research it.

  • final project report.

Submit final project materials.

  • 500-700       word, double spaced, written in APA format, showing sources and a       bibliography
  • a brief abstract describing final project.
  • Ppt with      10-15 slides