Professional Documents
Culture Documents
PLACEMENT DOSSIER
SPECIALISATIONS
Business Analytics
Information Management
1
Clique: The IT & Analytics Club of IMNU
Table of Contents
Section-1: IT & Administration .............................................................................................................. 3
Cloud computing ................................................................................................................................ 3
Green Computing ............................................................................................................................. 13
Quantum Computing ........................................................................................................................ 17
Metaverse ......................................................................................................................................... 21
Section-2: Current Technology ............................................................................................................. 25
Blockchain ........................................................................................................................................ 25
Internet of Things (IOT) ................................................................................................................... 27
Artificial Intelligence (AI) ................................................................................................................ 28
Augmented Reality ........................................................................................................................... 29
Virtual Reality .................................................................................................................................. 30
Cloud Computing ............................................................................................................................. 32
Cyber Security .................................................................................................................................. 33
Section-3: Application Of Current Technology .................................................................................... 35
Application of Internet of Things ..................................................................................................... 35
Application of Virtual Reality .......................................................................................................... 36
Application of Augmented Reality ................................................................................................... 37
Application of Artificial Intelligence................................................................................................ 38
Application of Block chain Technology ........................................................................................... 41
Section-4: Data Ethics & Security ........................................................................................................ 44
Data Ethics........................................................................................................................................ 44
Data Security .................................................................................................................................... 45
Section-5: Data Analysis....................................................................................................................... 47
Basics of Data Analysis .................................................................................................................... 47
Types of Data.................................................................................................................................... 48
Data Mining ...................................................................................................................................... 49
Data Cleaning ................................................................................................................................... 50
Descriptive Analysis ......................................................................................................................... 51
Predictive Analytics.......................................................................................................................... 53
Prescriptive Analysis ........................................................................................................................ 55
Data Visualisation............................................................................................................................. 56
Data Storytelling ............................................................................................................................... 59
2
Clique: The IT & Analytics Club of IMNU
Cloud computing
Cloud computing is the on-demand delivery of IT resources over the Internet with pay-as-you-
go pricing. Instead of buying, owning, and maintaining physical data centres and servers, you
can access technology services, such as computing power, storage, and databases, on an as-
needed basis from a cloud provider like Amazon Web Services (AWS).
3
Clique: The IT & Analytics Club of IMNU
multiple physical locations with just a few clicks. Putting applications in closer proximity to
end users reduces latency and improves their experience.
4
Clique: The IT & Analytics Club of IMNU
Examples: One of the best examples of SAAS-based products is Stream native and Atlassian.
They enable the business to organize and process the data with good execution speed. Atlassian
offers a more workflow-based solution. Other examples of SAAS Applications are Salesforce,
HubSpot, stack, etc.
Types of Cloud
There are the following 4 types of cloud that you can deploy according to the organization's
needs-
Public Cloud
Public cloud is open to all to store and access information via the Internet using the pay-per-
usage method. In public cloud, computing resources are managed and operated by the Cloud
Service Provider (CSP).
Example: Amazon elastic compute cloud (EC2), IBM Smart Cloud Enterprise, Microsoft,
Google App Engine, Windows Azure Services Platform.
Private Cloud
Based on the location and management, National Institute of Standards and Technology (NIST)
divide private cloud into the following two parts-
Hybrid Cloud
Hybrid Cloud is a combination of the public cloud and the private cloud. we can say:
Hybrid cloud is partially secure because the services which are running on the public cloud can
be accessed by anyone, while the services which are running on a private cloud can be accessed
only by the organization's users.
Example: Google Application Suite (Gmail, Google Apps, and Google Drive), Office 365
(MS Office on the Web and One Drive), Amazon Web Services.
5
Clique: The IT & Analytics Club of IMNU
Community Cloud
6
Clique: The IT & Analytics Club of IMNU
Examples: Popular examples of image editing cloud applications are Fotor and Adobe creative
cloud.
Antivirus Application:
In addition, antivirus and support services are offered by the cloud services. It aids in enhancing
the system's efficient operation. Users of cloud antivirus software can perform routine system
maintenance. They enable you to recognise and then eliminate threats brought on by viruses
and malware. Such features are advantageous to end users in a number of ways because they
are readily available. These services are provided without charge. They identify the danger and
report it to the cloud's data centre, which assists in providing the end users with a solution.
Examples: Popular examples of Cloud antivirus software include Kaspersky endpoint
protection and Sophos endpoint protection.
Entertainment Applications:
Multi-cloud strategies are offered by cloud service providers. It facilitates communication
between entertainment applications and the intended audience. Online gaming and
entertainment services are included.
Examples: Google stadia, it is a cloud gaming service that provides a video gaming experience
at 4K resolution and within 60 frames. Project Atlas is one of the top examples of cloud
entertainment apps. These apps help online gamers establish an instant and smooth connection
and experience a smooth virtual gaming environment.
7
Clique: The IT & Analytics Club of IMNU
Meeting Applications:
Virtual servers are a common feature of cloud computing services that facilitate on-site meeting
spaces. They provide meeting applications, including video conferencing. Users of these cloud
computing applications can start virtual meetings. Both personal and professional needs may
justify starting this. Users of the services can quickly connect with others thanks to the services.
Additionally, they provide presentation sharing and screen sharing capabilities to foster
collaboration.
Examples: Zoom and GoTo meetings are some of the key applications of cloud-based meeting
applications. They offer smooth video conferencing and cloud-based presentation services.
Presentation Applications:
There are specific cloud-based applications that help the end-users to create formal
presentations. They also provide storage space to keep new and existing formal presentations.
These apps also enable the end-users to access their presentations from anywhere globally.
Examples: Slide Rocket is one of the premier cloud computing applications. It helps end-users
to draft and customize formal presentations
8
Clique: The IT & Analytics Club of IMNU
GPS Applications:
Offering GPS-enabled services to end users is a crucial development in cloud computing
services. Real-time navigation services are made easier with the aid of the GPS. The acronym
GPS refers to the global positioning system. The users of this application use an internet
connection to obtain guidance on the directions shown on the map, which aids in locating
locations.
Examples: The top examples of cloud-based GPS services constitutes Google maps and Yahoo
maps. These are open source and free-to-use applications. GPS-based services are used by
millions of people across the globe.
Accounting Applications:
A new cloud-based accounting tool is available to assist businesses and organisations with
accounting-related tasks. These programmes assist end users in managing profit and loss
statements in real time by allowing them to track expenses in real time.
Examples: One of the best examples of cloud-based accounting applications is Outright. Some
other examples are Zoho books and Kash flow.
Management Applications:
Applications for project management give users the ability to take notes right away and send
them to different stakeholders. Stakeholders' access to prepared notes that have been saved in
one location for reference when assigning tasks helps project management. Both
complimentary and complementary features are offered for these. A one-time subscription fee
must be paid before the user can use the premium features. The needs of the user's personal
and professional lives can be met by these programmes.
Example: The cloud services also provide management-related applications such as Evernote.
E-commerce Applications:
C Additionally, loud computing services have made significant progress in providing
ecommerce services. There are many cloud-based e-commerce applications that support the
ecommerce industry's need for streamlined and accessible business operations. These
programmes include dynamic tracking features that aid in the order tracking procedures. It
keeps track of the status of both the delivered and received orders. Knowing the tracking costs,
order refund rate, and business damage rate also aids business owners. With the aid of these
applications, business owners can track their inventory with a great deal less time and effort.
In terms of managing such applications, there are no upfront costs.
9
Clique: The IT & Analytics Club of IMNU
10
Clique: The IT & Analytics Club of IMNU
the need to have physical stores. Additionally, cloud computing offers big data analytics that
helps in driving the analysis of big raw data. This helps organizations to make decisions on a
quickly basis and focuses on the insights shared from cloud services.
Examples: Examples of cloud-based big data solutions are driven by Hana, Hadoop, Apache,
etc.
11
Clique: The IT & Analytics Club of IMNU
Examples:
Cloud computing ensures secure transactions and smooth customer experience in banks.
Hosting over the internet with the help of web apps ensures better speed and service to the
users. Payment Gateways, digital wallets, online fund transfer, and secure online payments are
among the best examples of the cloud computing service. Cloud ensures the secure and unified
customer experience. Updating the payments is quite very easy through cloud computing.
Use Cases in Banking:
12
Clique: The IT & Analytics Club of IMNU
Green Computing
Green computing, also known as green technology, is the use of computers and other
computing devices and equipment in energy-efficient and eco-friendly ways. Organizations
that use green computing methods often deploy energy-efficient central processing units
(CPUs), servers, peripherals and power systems. They also focus on reducing resource use and
properly disposing of physical and electronic waste (e-waste)
1. Smart technology - Organizations can use internet of things sensors and artificial
intelligence (AI) monitoring tools to collect and analyze information about the data
center and create a power usage model. AI-powered tools can also autonomously
manage heating, cooling, and power in the data center.
2. Upgrade and rearrange the data center - Older equipment often uses more energy
and puts out more heat than newer devices. Hot and cold aisle setups can be used to
group assets based on energy consumption and temperature, optimizing heating,
ventilation and air conditioning (HVAC) efficiency.
3. Power down - CPUs and peripherals can be powered down and turned off during
extended periods of inactivity. Power up energy-intensive peripherals, such as laser
printers, only when needed.
4. Virtualization - Virtualization is installing virtual infrastructure that allows several
operating systems and applications to sum on a lesser number of servers, helping to
reduce overall energy used for data centers.
5. Cooling Innovation - Cooling is an extremely important process in modern data
centers. Cooling systems of server rooms ensure appropriate operation conditions to IT
systems, such as servers and data storage, but, on the other side, they consume a lot of
energy.
13
Clique: The IT & Analytics Club of IMNU
For the promotion of green computing, the below four approaches are utilized
1. Green Use – Reducing the power usage of computers and its periphery subsystems and
using them in an eco-friendly manner. Also adopting virtualization reducing the need
of energy.
2. Green Disposal – Recycling and reusing existing equipment, properly disposing the
wasted IT/computing materials, electronic equipment etc.
3. Green Design – Designing energy efficient as well as effective systems which have a
minimal impact on the green environment.
4. Green manufacturing – Manufacturing Biodegradable materials, also manufacturing
long usable, recyclable products and reducing wastage during manufacturing process.
14
Clique: The IT & Analytics Club of IMNU
The figure shows a green big data analytics process where storage and processing resources
reside on clouds and can be requested on demand. Cloud computing technology provides the
15
Clique: The IT & Analytics Club of IMNU
basis for green big data analytics as the optimum resource utilization with reduced energy
consumption. Currently, major big data sources and consumers are social networks, healthcare,
industries, commerce, and business enterprises.
An overall analysis of the state-of-the-art in green computing shows that the green algorithms
and protocols are reaching a high level of maturity, and significant efficiencies are possible.
The strength of green computing solutions lies in their diversity, with consideration of low-
level processor, memory, and network components for system optimization alongside greedy
and evolutionary heuristics. However, again, this must coincide with robust and intelligent
strategies that consider the overall performance energy trade-offs in terms of multi-objective
optimization.
Current companies which are using some of the ideologies mentioned above are as
follows:
1. Dell – Dell is keen to decrease the energy requirements of its data centres and hardware
and has been working to reduce its environmental impact. The company has been one
of the leading innovators in the tech sector when it comes to packaging and recycling
and in 2014 the company launched its ‘2020 Legacy of Good’ plan. In the plan, the
company has set goals to reduce greenhouse gas emissions from its facilities and
logistics operations, as well as reducing the energy intensity of its product portfolio by
80%. The company has set a few other environmentally friendly goals, but only time
will tell if they can achieve them.
2. IBM – IBM has been one of the ‘green’ leaders in tech for several years, dating back to
1967 when it issued its first policy on environmental affairs. Big Blue states on its
website that they will: "Use development and manufacturing processes that do not
adversely affect the environment, including developing and improving operations and
technologies to minimize waste, prevent air, water, and other pollution, minimize health
and safety risks, and dispose of waste safely and responsibly." The company is very
open about its achievements and failings when it comes to its environmental policy, for
example detailing its hazardous waste performances.
16
Clique: The IT & Analytics Club of IMNU
Quantum Computing
The quantum in "quantum computing" refers to the quantum mechanics that the system uses to
calculate outputs. In physics, a quantum is the smallest possible discrete unit of any physical
property. It usually refers to properties of atomic or subatomic particles, such as electrons,
neutrinos and photons.
Quantum computers harness the unique behaviour of quantum physics—such as superposition,
entanglement and quantum interference—and apply it to computing. This introduces new
concepts to traditional programming methods.
Qubits
As we explore in our open step on qubits, traditional computers are built on bits. These bits
(short for binary digits) are the basic units of information in computing, where two distinct
configurations can be measured. They can be thought of as on or off, up or down, or, as encoded
in binary, as either 0s or 1s.
In quantum computing, quantum bits or qubits form the basics of how these computers work.
These qubits can be made from quantum-mechanical systems that can have two states. For
example, the spin of an electron can be measured as up or down, or a single photon is either
vertically or horizontally polarised.
Superposition
Unlike traditional computing bits, which can be either 0s or 1s, qubits can exist as either 0s or
1s, or a mix of both simultaneously. This phenomenon, known as a state of superposition,
means that all combinations of information can exist at once.
When qubits are combined together, this ability to hold all possible configurations of
information at once means that complex problems can be represented far easier than with
traditional computing methods.
17
Clique: The IT & Analytics Club of IMNU
Entanglement
Another key part of quantum computing is the quantum effect known as entanglement. Put
simply, this phenomenon creates a correlation between two qubits. As such, when two or more
qubits are entangled, a change to one can impact the others.
Quantum computing algorithms are based on this principle, allowing complex problems to be
solved far quicker than would otherwise be possible.
When scientists and engineers encounter difficult problems, they turn to supercomputers. These
are very large classical computers, often with thousands of classical CPU and GPU cores.
However, even supercomputers struggle to solve certain kinds of problems. If a supercomputer
gets stumped, that's probably because the big classical machine was asked to solve a problem
with a high degree of complexity. When classical computers fail, it's often due to complexity.
Complex problems are problems with lots of variables interacting in complicated ways.
Modeling the behavior of individual atoms in a molecule is a complex problem, because of all
the different electrons interacting with one another. Sorting out the ideal routes for a few
hundred tankers in a global shipping network is complex too.
Quantum simulation
Quantum computers work exceptionally well for modelling other quantum systems because
they use quantum phenomena in their computation. This means that they can handle the
complexity and ambiguity of systems that would overload classical computers. Examples of
quantum systems that we can model include photosynthesis, superconductivity and complex
molecular formations.
Cryptography
Classical cryptography—such as the Rivest–Shamir–Adleman (RSA) algorithm that is widely
used to secure data transmission—relies on the intractability of problems such as integer
factorisation or discrete logarithms. Many of these problems can be solved more efficiently
using quantum computers.
Optimisation
Optimisation is the process of finding the best solution to a problem given its desired outcome
and constraints. In science and industry, critical decisions are made based on factors such as
cost, quality and production time—all of which can be optimised. By running quantum-inspired
optimisation algorithms on classical computers, we can find solutions that were previously
18
Clique: The IT & Analytics Club of IMNU
impossible. This helps us find better ways to manage complex systems such as traffic flows,
airplane gate assignments, package deliveries and energy storage.
Quantum machine learning
Machine learning on classical computers is revolutionising the world of science and business.
However, training machine learning models comes with a high computational cost and that has
hindered the scope and development of the field. To speed up progress in this area, we are
exploring ways to devise and implement quantum software that enables faster machine
learning.
19
Clique: The IT & Analytics Club of IMNU
After knowing about the basic of quantum computing, let’s dive into some real sector
usage of quantum computing:
1. Finance – Quantum-Computing use cases in finance are a bit further in the future, and
the advantages of possible short-term uses are speculative. However, it can be believed
that the most promising use cases of quantum computing in finance are in portfolio and
risk management. For example, efficiently quantum-optimized loan portfolios that
focus on collateral could allow lenders to improve their offerings, possibly lowering
interest rates and freeing up capital. It is early—and complicated—to estimate the value
potential of quantum computing–enhanced collateral management, but as of 2021, the
global lending market stands at $6.9 trillion, which suggests significant potential impact
from quantum optimization.
3. Automotive – The automotive industry can benefit from quantum computing in its
R&D, product design, supply-chain management, production, and mobility and traffic
management. The technology could, for example, be applied to decrease manufacturing
process–related costs and shorten cycle times by optimizing elements such as path
planning in complex multirobot processes (the path a robot follows to complete a task)
including welding, gluing, and painting. Even a 2 to 5 percent productivity gain—in the
context of an industry that spends $500 billion per year on manufacturing costs—would
create $10 billion to $25 billion of value per year.
20
Clique: The IT & Analytics Club of IMNU
Metaverse
The metaverse is a virtual universe that extends the physical world's dimensions. Consider it a
hyper-realistic video game. Its purpose is to replicate what people already do on a daily basis,
such as socialising, shopping, and attending concerts. It recreates the real world in a virtual
environment in which users can interact with spaces, objects, and other individuals.
Additionally, the metaverse will be a vast industrial workspace. Before implementing their
equipment in the real world, manufacturing companies can test "digital twins" of their
machinery in the metaverse. The design can then be modified or enhanced prior to construction,
saving time and resources.
High-quality virtual reality, which allows users to interact with different elements as they
would in the real world, is essential to the development of the metaverse. The implementation
of the metaverse will be closely tied to the advancement of augmented reality technology.
Notably, the metaverse will not be a single platform, but rather a collection of interconnected
websites. You can freely move between platforms while maintaining the same avatars and
digital objects, similar to how Internet users today navigate between websites.
Pros of Metaverse:
1) Connecting the world and negating physical distance
The most notable benefit of the metaverse would be that it completely eliminates geographical
barriers. As soon as you enter the virtual world, your physical location becomes irrelevant and
you are no longer constrained by it.
2) Immersive experience
Consider the metaverse to be a 3D upgrade to traditional internet usage. A more immersive
way to experience the various aspects of the Internet and everything it has to offer.
3) Better Social Interactions online
During the Covid quarantine, the only way to communicate with other humans was via the
internet, despite its lack of interactivity.
Social media is likely the most popular term of the past decade. Facebook (Meta )
and Twitter are dependent on the social aspect of the Internet. They will
undoubtedly benefit from the upgrade to a virtua l environment in three
dimensions.
21
Clique: The IT & Analytics Club of IMNU
Similar to how social media has contributed to the creation of numer ous business
opportunities and spawned a new form of marketing and advertising on its
platforms, the metaverse will likely p rovide even more opportunities.
Learning and education were impacted by the Covid pan demic, as more than 90
percent of students were unable to continue their studies and we were forced to
find alternative methods to resume education. This is when online learning using
platforms such as Zoom became the norm. The metaverse will make learning more
accessible than ever before.
Cons of Metaverse:
1) Cybercrime
Cybercrime is a significant issue that has plagued the Int ernet since its inception.
Governments have spent millions of dollars and years combating it, thereby
enhancing the security of our current internet systems.
One disadvantage of bringing everyone so close together and fusing the various
cultures of the world into one is the loss of the world's beautiful cultural diversity.
If people spend the majority of their time in the metave rse, they will no longer
feel connected to their immediate society and will not feel the need to embrace
their local or regional culture.
3) Addiction Problems
Like gaming, addiction can become a problem. Some argue that ther e is a greater
risk of addiction in the metaverse because you are completely immersed in a
virtual world. Aside from physical necessities such as eating and sleeping, you do
not need to leave your VR setup.
The ease with which you can lose track of time while in the metaverse is a major
concern for many individuals. As your senses are effectively disabled, or to put it
another way, they are linked to the virtual world rather than the real world.
22
Clique: The IT & Analytics Club of IMNU
Internet privacy has always been a concern, with many users unaware that their
information is collected and sold to advertisers, among other things.
6) Virtual Bullying
The internet is notoriously hostile, and strangers tend to be cruel and intolerant of
individuals' differences. Malicious behaviour toward others can be observed in all
areas of the Internet, including social media and video games.
According to Bloomberg, the global economic value of the metaverse cou ld reach
$800 billion by 2024. It should come as no surprise that the metaverse will have a
significant impact on digital media and ecommerce, given that it is likely to be the
future of the Internet.
It is difficult to predict how much disruption the meta verse will cause, but there
is no doubt that it will pave the way for new and innovative ways of doing things.
Therefore, marketers must be at the forefront of its development.
Some aspects of "traditional" digital advertising may be carried over into the
metaverse, but there will also be entirely new dynamics where user experience
will play a central role.
Tim Sweeney, the founder of Epic Games, believes that games will play a crucial
role in the metaverse. The future of gaming will feature less display ad vertising
and a greater emphasis on exciting, engaging experiences.
With the evolution of the metaverse, brands will be req uired to reconsider their
products, services, and advertising strategies. There is no better time than now to
adapt to this new reality so that you are prepared to take advantage of the
metaverse and remain ahead of the competition
23
Clique: The IT & Analytics Club of IMNU
rebranded itself as Meta, and CEO Mark Zuckerberg declared his ambition to “help bring the
metaverse to life.” A month later, Microsoft said that its proposed acquisition of gaming giant
Activision provided “building blocks for the metaverse.”
24
Clique: The IT & Analytics Club of IMNU
Blockchain
Blockchain, sometimes referred to as Distributed Ledger Technology (DLT) is a database that
stores encrypted blocks of data then chains them together to form a chronological single-
source-of-truth for the data. The asset is decentralized, allowing full real-time access and
transparency to the public.
• Blocks
Every chain consists of multiple blocks and each block has three basic elements:
➢ The data in the block a 32-bit whole number called a nonce. The nonce is randomly
generated when a block is created, which then generates a block header hash.
➢ The hash is a 256-bit number wedded to the nonce. It must start with a huge number
of zeroes (i.e., be extremely small).
➢ When the first block of a chain is created, a nonce generates the cryptographic hash.
The data in the block is considered signed and forever tied to the nonce and hash
unless it is mined.
• Miners
➢ Miners create new blocks on the chain through a process called mining.
➢ Miners use special software to solve the incredibly complex math problem of
finding a nonce that generates an accepted hash. Because the nonce is only 32 bits and
the hash is 256, there are roughly four billion possible nonce-hash combinations that
must be mined before the right one is found. When that happens, miners are said to
have found the "golden nonce" and their block is added to the chain.
➢ When a block is successfully mined, the change is accepted by all of the nodes on the
network and the miner is rewarded financially.
25
Clique: The IT & Analytics Club of IMNU
• Nodes
➢ Nodes can be any kind of electronic device that maintains copies of the blockchain
and keeps the network functioning.
➢ Every node has its own copy of the blockchain and the network must algorithmically
approve any newly mined block for the chain to be updated, trusted and verified.
Since blockchains are transparent, every action in the ledger can be easily checked
and viewed. Each participant is given a unique alphanumeric identification
number that shows their transactions.
Example
Banks and financial firms provide loans to individuals and businesses in times of need — it
is an essential facet of the financial industry. But there are inefficiencies in the structure like
biases of the lender while giving out the loan, exhausting KYC processes and long waiting
periods. Blockchain technology could remove these inefficiencies.
In the normal lending process, a middleman is necessary to facilitate the loan, its approval,
and disbursal. But using blockchain smart contract technology, the process can be made
seamless. A smart contract is a piece of code that executes itself after certain conditions
within the contract are met.
The lender and seeker can agree to fair and feasible terms like proof-of-funds and payment
planning using smart contracts. These contracts will then validate and record transactions
without any bank or middleman, leading to a faster verification of the loan seeker and more
immediate loan disbursement.
26
Clique: The IT & Analytics Club of IMNU
The term IoT, or Internet of Things, refers to the collective network of connected devices and
the technology that facilitates communication between devices and the cloud, as well as
between the devices themselves. The Internet of Things integrates everyday “things” with the
internet. An IoT ecosystem consists of web-enabled smart devices that use embedded
systems, such as processors, sensors and communication hardware, to collect, send and act on
data they acquire from their environments. IoT devices share the sensor data they collect by
connecting to an IoT gateway or other edge device where data is either sent to the cloud to be
analysed or analysed locally.
The internet of things helps people live and work smarter, as well as gain complete control
over their lives. In addition to offering smart devices to automate homes, IoT is essential to
business. IoT provides businesses with a real-time look into how their systems really work,
delivering insights into everything from the performance of machines to supply chain and
logistics operations.IoT enables companies to automate processes and reduce labor costs. It
also cuts down on waste and improves service delivery, making it less expensive to
manufacture and deliver goods, as well as offering transparency into customer transactions.
As such, IoT is one of the most important technologies of everyday life, and it will continue
to pick up steam as more businesses realize the potential of connected devices to keep them
competitive.
Example
Home automation is one of the best examples of IoT. Smart homes or IoT-based home
automation systems are becoming popular day by day. In a smart home, consumer electronic
gadgets such as lights, fans, air-conditioners, etc. can be connected to each other via the
internet. This interconnection enables the user to operate these devices from a distance. A smart
home is capable of lighting control, energy management, expansion, and remote access.
Currently, this application of IoT is not utilized at a large scale because the installation cost is
too high, which makes it difficult for a majority of people to afford it. However, home
automation holds quite a promising future.
27
Clique: The IT & Analytics Club of IMNU
AI makes it possible for machines to learn from experience, adjust to new inputs and perform
human-like tasks. Most AI examples that you hear about today – from chess-playing
computers to self-driving cars – rely heavily on deep learning and natural language
processing. Using these technologies, computers can be trained to accomplish specific tasks
by processing large amounts of data and recognizing patterns in the data.
Example
We might have used navigation services or others to find our way through at some point in our
lives. For many, it is part of their daily lives. Whether using maps for navigation or using a
taxi-hire service like Uber, you are using AI-enabled services to travel from one place to
another.
Google, Apple, and many other navigation-related service providers utilize AI to interpret the
scores of information being received and provide you with information that helps in navigation
and get live traffic updates, allowing you to commute more efficiently.
28
Clique: The IT & Analytics Club of IMNU
Augmented Reality
Augmented reality (AR) is an enhanced version of the real physical world that is achieved
through the use of digital visual elements, sound, or other sensory stimuli delivered via
technology. One of augmented reality’s primary goals is to highlight specific features of the
physical world, increase understanding of those features, and derive smart and accessible
insight that can be applied to real-world applications.
AR is the integration of digital information with the user’s environment in real time. Unlike
virtual reality, which creates a totally artificial environment, augmented reality uses the
existing environment and overlays new information on top of it.
Example
App Aside from furniture with fun names that you need to assemble yourself and cheap
Swedish meatballs, IKEA is also known in the tech world as one of the first companies to use
augmented reality well.
The retailer begins experiencing augmented reality back in 2012, when shoppers could use
the app to see how tables and shelves would look in various places around your house. IKEA
is taking it a step further with its IKEA Place app, which now allows you select anything
from the store’s catalogue and see how it will look to scale anywhere in your house. This is
an extremely helpful tool for people who are wondering if a certain piece of furniture will fit
in a tight space, or if the colour of their prospective purchase will match the motif of the
room.
29
Clique: The IT & Analytics Club of IMNU
Virtual Reality
Virtual Reality (VR) is a computer-generated environment with scenes and objects that
appear to be real, making the user feel they are immersed in their surroundings. This
environment is perceived through a device known as a Virtual Reality headset. VR allows us
to immerse ourselves in video games as if we were one of the characters, learn how to
perform heart surgery or improve the quality of sports training to maximize performance.
Example
VR in Sport
VR is revolutionising the sports industry for players, coaches and viewers. Virtual reality can
be used by coaches and players to train more efficiently across a range of sports, as they are
30
Clique: The IT & Analytics Club of IMNU
able to watch and experience certain situations repeatedly and can improve each time.
Essentially, it’s used as a training aid to help measure athletic performance and analyse
technique. Some say it can also be used to improve athletes' cognitive abilities when injured,
as it allows them to experience gameplay scenarios virtually. Similarly, VR has also been used
to enhance the viewer’s experience of a sporting event. Broadcasters are now streaming live
games in virtual reality and preparing to one day sell virtual tickets to live games so that anyone
from anywhere in the world can ‘attend’ any sports event. Potentially, this could also allow for
those who cannot afford to spend money on attending live sports events to feel included as they
can enjoy the same experience remotely, either for free or at a lesser cost.
31
Clique: The IT & Analytics Club of IMNU
Cloud Computing
Cloud computing refers to the use of hosted services, such as data storage, servers, databases,
networking, and software over the internet. The data is stored on physical servers, which are
maintained by a cloud service provider. Computer system resources, especially data storage
and computing power, are available on-demand, without direct management by the user in
cloud computing. Instead of storing files on a storage device or hard drive, a user can save
them on cloud, making it possible to access the files from anywhere, as long as they have
access to the web. The services hosted on cloud can be broadly divided into infrastructure-as-
a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS). Based on the
deployment model, cloud can also be classified as public, private, and hybrid cloud.
Further, cloud can be divided into two different layers, namely, front-end and back-end. The
layer with which users interact is called the front-end layer. This layer enables a user to
access the data that has been stored in cloud through cloud computing software. The layer
made up of software and hardware, i.e., the computers, servers, central servers, and
databases, is the back-end layer. This layer is the primary component of cloud and is entirely
responsible for storing information securely. To ensure seamless connectivity between
devices linked via cloud computing, the central servers use a software called middleware that
acts as a bridge between the database and applications.
Example
Cloud can be used for storage of files. The advantage is an easy backup. They automatically
synchronize the files from the desktop. Dropbox allowing users to access files and storage up
to 1 terabyte of free storage. Social Networking platform requires a powerful hosting to
manage and store data in real-time. Cloud-based communication provides click-to-call
capabilities from social networking sites, access to the Instant messaging system.
32
Clique: The IT & Analytics Club of IMNU
Cyber Security
Also known as information technology (IT) security, cybersecurity measures are designed to
combat threats against networked systems and applications, whether those threats originate
from inside or outside of an organization. A strong cybersecurity strategy has layers of
protection to defend against cybercrime, including cyber-attacks that attempt to access,
change, or destroy data; extort money from users or the organization; or aim to disrupt
normal business operations.
The term applies in a variety of contexts, from business to mobile computing, and can be
divided into a few common categories-
➢ Information security- It protects the integrity and privacy of data, both in storage
and in transit.
➢ Operational security- It includes the processes and decisions for handling and
protecting data assets. The permissions users have when accessing a network and the
procedures that determine how and where data may be stored or shared all fall under
this umbrella.
Example
Password Attacks
Back in August of 2021, the Canada Revenue Agency was a victim of a password cyber-attack,
whereas their online systems were shut down for several days, and over 5000 accounts were
compromised! This was due to the technique called credential stuffing. This is where the
33
Clique: The IT & Analytics Club of IMNU
hackers buy or steal users’ passwords from other sources and data breaches, and they use those
passwords to try to log into the CRA accounts. This can be a huge problem, especially if users
use the same password across multiple platforms.
34
Clique: The IT & Analytics Club of IMNU
Pharmaceutical Industry:
Smart Agriculture:
35
Clique: The IT & Analytics Club of IMNU
1) Healthcare: Virtual reality (VR) creates a space where people can learn and develop
in actual, outdoor settings. Specialists who need to carry out extremely precise
operations can practise with VR without having to deal with an emergency.
Additionally, practitioners who need to familiarize themselves with the hospital
setting can do so without added stress and also the technology is used in cognitive
behavior therapy, which gives patients with phobias and anxieties a safe environment
in which to work through their issues.
2) Entertainment: One of the first sectors to adopt VR was the entertainment sector,
which continues to be one of its best uses today. You can see that virtual reality (VR)
is widely used in the online and/or console gaming industries. Similar to this, virtual
reality (VR) is being implemented in theatres and theme parks to simulate movie-like
adventures and enable visitors to experience their preferred cinematic masterpieces.
4) Education:
Even though it's thought that the education sector adopts new trends and technologies
rather slowly, virtual reality has already shown a lot of promise. For grownups, it
means that any industry can offer its workers professional training. However, VR is
a component of educational games, field trips, and general world exploration for
younger students.
5) Digital Marketing: Even though the majority of people dislike commercials, seeing
how a product is used up close can be both entertaining and educational. Virtual
reality has many uses in digital marketing. Retailers, for instance, can display
products to prospective customers in their homes. Alternatively, charities could
develop more sympathetic messaging for political issues.
36
Clique: The IT & Analytics Club of IMNU
AR Glass:
Another type of transparent wearable device is AR Smart Glasses. Another type of
transparent wearable device is the AR Smart Glasses. They come in a variety of designs,
sizes, and shapes, but all are used to enhance reality. According to the assessment report of
MARKET Research Future, the market for AR Smart Glasses has shown a compound
annual growth rate of 13% as per the type Monocular or Binocular since 2017. The main
factor driving this rise in demand is that these glasses allow users of all ages to view real-
world scenes as well as virtual information, such as three-dimensional images, animations,
videos, etc.
Medical Field: AR is effective at providing a variety of methods that can manage patients'
complex medical conditions and organize the data of various types of surgery. With all of
this, the general public can benefit greatly from appropriate treatments that calm their minds
and remove all of the toxins from their bodies. Medical imaging is one such application of
AR in the medical industry. In order to provide medical benefits to their patients by carefully
examining their body parts, the surgeons, neurologists, or chemotherapists perform various
types of diagnosis in this. It could either be your heart, lungs, brain, or ear.
Mobile:
You can now see in real life what you wonder or have been wondering about for a very long
time thanks to AR, which has pushed the limits of your mobile devices! Mobile applications
utilizing augmented reality technology have made it possible to do everything from measure
the length and width of a kitchen table to design the environment based on your interest in
various pieces of furniture in the real world.
37
Clique: The IT & Analytics Club of IMNU
1. AI Application in E-Commerce:
AI-powered Assistants: Virtual shopping assistants and chatbots help improve the user
experience while shopping online. Natural Language Processing is used to make the
conversation sound as human and personal as possible. Moreover, these assistants can have
real-time engagement with your customers. Did you know that on amazon.com, soon, customer
service could be handled by chatbots?
Fraud Prevention: Credit card frauds and fake reviews are two of the most significant issues
that E-Commerce companies deal with. By considering the usage patterns, AI can help reduce
the possibility of credit card frauds taking place. Many customers prefer to buy a product or
service based on customer reviews. AI can help identify and handle fake reviews.
38
Clique: The IT & Analytics Club of IMNU
39
Clique: The IT & Analytics Club of IMNU
profiles, and resumes to provide recruiters an understanding of the talent pool they must choose
from.
40
Clique: The IT & Analytics Club of IMNU
Currency:
Blockchain forms the bedrock for cryptocurrencies like Bitcoin. The U.S. dollar is controlled
by the Federal Reserve. Under this central authority system, a user’s data and currency are
technically at the whim of their bank or government. If a user’s bank is hacked, the client’s
private information is at risk. If the client’s bank collapses or the client lives in a country with
an unstable government, the value of their currency may be at risk. In 2008, several failing
banks were bailed out—partially using taxpayer money. These are the worries out of which
Bitcoin was first conceived and developed.
By spreading its operations across a network of computers, blockchain allows Bitcoin and other
cryptocurrencies to operate without the need for a central authority. This not only reduces risk
but also eliminates many of the processing and transaction fees. It can also give those in
countries with unstable currencies or financial infrastructures a more stable currency with more
applications and a wider network of individuals and institutions with whom they can do
business, both domestically and internationally.
Using cryptocurrency wallets for savings accounts or as a means of payment is especially
profound for those who have no state identification. Some countries may be war-torn or have
governments that lack any real infrastructure to provide identification. Citizens of such
41
Clique: The IT & Analytics Club of IMNU
countries may not have access to savings or brokerage accounts—and, therefore, no way to
safely store wealth.
Healthcare:
Healthcare providers can leverage blockchain to securely store their patients’ medical records.
When a medical record is generated and signed, it can be written into the blockchain, which
provides patients with the proof and confidence that the record cannot be changed. These
personal health records could be encoded and stored on the blockchain with a private key, so
that they are only accessible by certain individuals, thereby ensuring privacy.
Property Records:
If you have ever spent time in your local Recorder’s Office, you will know that the process of
recording property rights is both burdensome and inefficient. Today, a physical deed must be
delivered to a government employee at the local recording office, where it is manually entered
into the county’s central database and public index. In the case of a property dispute, claims to
the property must be reconciled with the public index.
This process is not just costly and time-consuming—it is also prone to human error, where each
inaccuracy makes tracking property ownership less efficient. Blockchain has the potential to
eliminate the need for scanning documents and tracking down physical files in a local recording
office. If property ownership is stored and verified on the blockchain, owners can trust that
their deed is accurate and permanently recorded.
In war-torn countries or areas that have little to no government or financial infrastructure, and
certainly no Recorder’s Office, it can be nearly impossible to prove ownership of a property.
If a group of people living in such an area is able to leverage blockchain, then transparent and
clear time lines of property ownership could be established.
Smart Contracts:
A smart contract is a computer code that can be built into the blockchain to facilitate, verify,
or negotiate a contract agreement. Smart contracts operate under a set of conditions to which
users agree. When those conditions are met, the terms of the agreement are automatically
carried out.
Say, for example, that a potential tenant would like to lease an apartment using a smart contract.
The landlord agrees to give the tenant the door code to the apartment as soon as the tenant pays
the security deposit. Both the tenant and the landlord would send their respective portions of
the deal to the smart contract, which would hold onto and automatically exchange the door
code for the security deposit on the date when the lease begins. If the landlord doesn’t supply
the door code by the lease date, then the smart contract refunds the security deposit. This would
42
Clique: The IT & Analytics Club of IMNU
eliminate the fees and processes typically associated with the use of a notary, a third-party
mediator, or attorneys.
Supply Chains:
As in the IBM Food Trust example, suppliers can use blockchain to record the origins of
materials that they have purchased. This would allow companies to verify the authenticity of
not only their products but also common labels such as “Organic,” “Local,” and “Fair Trade.”
As reported by Forbes, the food industry is increasingly adopting the use of blockchain to track
the path and safety of food throughout the farm-to-user journey.
Voting:
As mentioned above, block chain could be used to facilitate a modern voting system. Voting
with block chain carries the potential to eliminate election fraud and boost voter turnout, as
was tested in the November 2018 midterm elections in West Virginia.5 Using block chain in
this way would make votes nearly impossible to tamper with. The blockchain protocol would
also maintain transparency in the electoral process, reducing the personnel needed to conduct
an election and providing officials with nearly instant results. This would eliminate the need
for recounts or any real concern that fraud might threaten the election.
43
Clique: The IT & Analytics Club of IMNU
Data Ethics
• Trust
• Fair Practices
• Data Privacy Compliance
44
Clique: The IT & Analytics Club of IMNU
Data Security
Data security is the practice of protecting digital information from unauthorized access,
corruption, or theft throughout its entire lifecycle. It’s a concept that encompasses every aspect
of information security from the physical security of hardware and storage devices to
administrative and access controls, as well as the logical security of software applications. It
also includes organizational policies and procedures.
When properly implemented, robust data security strategies will protect an organization’s
information assets against cybercriminal activities, but they also guard against insider threats
and human error, which remains among the leading causes of data breaches today. Data
security involves deploying tools and technologies that enhance the organization’s visibility
into where its critical data resides and how it is used. Ideally, these tools should be able to apply
protections like encryption, data masking, and redaction of sensitive files, and should automate
reporting to streamline audits and adhere to regulatory requirements.
Digital transformation is profoundly altering every aspect of how today’s businesses operate
and compete. The sheer volume of data that enterprises create, manipulate, and store is
growing, and drives a greater need for data governance. In addition, computing environments
are more complex than they once were, routinely spanning the public cloud, the enterprise data
centre, and numerous edge devices ranging from Internet of Things (IoT) sensors to robots and
remote servers. This complexity creates an expanded attack surface that’s more challenging to
monitor and secure.
45
Clique: The IT & Analytics Club of IMNU
• Data discovery and classification tools: Sensitive information can reside in structured
and unstructured data repositories including databases, data warehouses, big data
platforms, and cloud environments. Data discovery and classification solutions
automate the process of identifying sensitive information, as well as assessing and
remediating vulnerabilities.
• Data and file activity monitoring: File activity monitoring tools analyze data usage
patterns, enabling security teams to see who is accessing data, spot anomalies, and
identify risks. Dynamic blocking and alerting can also be implemented for abnormal
activity patterns.
• Vulnerability assessment and risk analysis tools: These solutions ease the process of
detecting and mitigating vulnerabilities such as out-of-date software,
misconfigurations, or weak passwords, and can also identify data sources at greatest
risk of exposure.
• Automated compliance reporting: Comprehensive data protection solutions with
automated reporting capabilities can provide a centralized repository for enterprise-
wide compliance audit trails.
46
Clique: The IT & Analytics Club of IMNU
Data analysis is a process of inspecting, cleansing, transforming, and modelling data with the
goal of discovering useful information, informing conclusions, and supporting decision-
making. In today's business world, data analysis plays a role in making decisions more
scientific and helping businesses operate more effectively.
Accounting: Public accounting firms use statistical sampling procedures when conducting
audits for their clients. For instance, suppose an accounting firm wants to determine whether
the amount of accounts receivable shown on a client’s balance sheet fairly represents the actual
amount of accounts receivable. Usually the large number of individual accounts receivable
makes reviewing and validating every account too time-consuming and expensive. As common
practice in such situations, the audit staff selects a subset of the accounts called a sample. After
reviewing the accuracy of the sampled accounts, the auditors draw a conclusion as to whether
the accounts receivable amount shown on the client’s balance sheet is acceptable.
Finance: Financial analysts use a variety of statistical information to guide their investment
recommendations. In the case of stocks, analysts review financial data such as price/earnings
ratios and dividend yields. By comparing the information for an individual stock with
information about the stock market averages, an analyst can begin to draw a conclusion as to
whether the stock is a good investment. For example, The Wall Street Journal (March 19, 2012)
reported that the average dividend yield for the S&P 500 companies was 2.2%. Microsoft
showed a dividend yield of 2.42%. In this case, the statistical information on dividend yield
indicates a higher dividend yield for Microsoft than the average dividend yield for the S&P
500 companies. This and other information about Microsoft would help the analyst make an
informed buy, sell, or hold recommendation for Microsoft stock.
Marketing: Electronic scanners at retail checkout counters collect data for a variety of
marketing research applications. For example, data suppliers such as ACNielsen and
Information Resources, Inc., purchase point-of-sale scanner data from grocery stores, process
the data, and then sell statistical summaries of the data to manufacturers. Manufacturers spend
hundreds of thousands of dollars per product category to obtain this type of scanner data.
Manufacturers also purchase data and statistical summaries on promotional activities such as
special pricing and the use of in-store displays. Brand managers can review the scanner
statistics and the promotional activity statistics to gain a better understanding of the relationship
47
Clique: The IT & Analytics Club of IMNU
between promotional activities and sales. Such analyses often prove helpful in establishing
future marketing strategies for the various products.
Types of Data
48
Clique: The IT & Analytics Club of IMNU
Data Mining
Data mining, also known as knowledge discovery in data (KDD), is the process of uncovering
patterns and other valuable information from large data sets. Given the evolution of data
warehousing technology and the growth of big data, adoption of data mining techniques has
rapidly accelerated over the last couple of decades, assisting companies by transforming their
raw data into useful knowledge. Data mining has improved organizational decision-making
through insightful data analyses.
Data mining process:
Data mining usually consists of four main steps: setting objectives, data gathering and
preparation, applying data mining algorithms, and evaluating results.
1. Set the business objectives: Data scientists and business stakeholders need to work
together to define the business problem, which helps inform the data questions and
parameters for a given project.
2. Data preparation: Once the scope of the problem is defined, it is easier to identify
which set of data will help answer the pertinent questions to the business. Once the
relevant data is collected, the data will be cleaned an additional step may be taken to
reduce the number of dimensions as too many features can slow down any subsequent
computation.
3. Model building and pattern mining: Depending on the type of analysis, investigate
any interesting data relationships, such as sequential patterns, association rules, or
correlations. While high frequency patterns have broader applications, sometimes the
deviations in the data can be more interesting, highlighting areas of potential fraud.
4. Evaluation of results and implementation of knowledge: Once the data is
aggregated, the results need to be evaluated and interpreted. When finalizing results,
they should be valid, novel, useful, and understandable. When this criteria is met,
organizations can use this knowledge to implement new strategies, achieving their
intended objectives.
Data mining works by using various algorithms and techniques to turn large volumes of data
into useful information. The most common ones are:
Association rules: An association rule is a rule-based method for finding relationships between
variables in a given dataset.
Neural networks: Primarily leveraged for deep learning algorithms, neural networks process
training data by mimicking the interconnectivity of the human brain through layers of nodes.
Decision tree: This data mining technique uses classification or regression methods to classify
or predict potential outcomes based on a set of decisions.
K- Nearest neighbour (KNN): K-nearest neighbour, also known as the KNN algorithm, is a
non-parametric algorithm that classifies data points based on their proximity and association
to other available data.
49
Clique: The IT & Analytics Club of IMNU
Data Cleaning
Data cleaning is the process of fixing or removing incorrect, corrupted, incorrectly formatted,
duplicate, or incomplete data within a dataset. When combining multiple data sources, there
are many opportunities for data to be duplicated or mislabelled. If data is incorrect, outcomes
and algorithms are unreliable, even though they may look correct. While the techniques used
for data cleaning may vary according to the types of data the company stores, but we can follow
these basic steps to map out a framework for the organization.
Step 1: Remove duplicate or irrelevant observations:
Remove unwanted observations from your dataset, including duplicate observations or
irrelevant observations. De-duplication is one of the largest areas to be considered in this
process. Irrelevant observations are when you notice observations that do not fit into the
specific problem you are trying to analyse. For example, if you want to analyse data regarding
millennial customers, but your dataset includes older generations, you might remove those
irrelevant observations. This can make analysis more efficient and minimize distraction from
your primary target—as well as creating a more manageable and more performant dataset.
Step 2: Fix structural errors:
Structural errors are when you measure or transfer data and notice strange naming conventions,
typos, or incorrect capitalization. These inconsistencies can cause mislabelled categories or
classes. For example, you may find “N/A” and “Not Applicable” both appear, but they should
be analysed as the same category.
Step 3: Filter unwanted outliers:
Often, there will be one-off observations where, at a glance, they do not appear to fit within the
data you are analysing. If you have a legitimate reason to remove an outlier, like improper data-
entry, doing so will help the performance of the data you are working with. If an outlier proves
to be irrelevant for analysis or is a mistake, consider removing it.
Step 4: Handle missing data:
You can’t ignore missing data because many algorithms will not accept missing values. There
are a couple of ways to deal with missing data. As a first option, you can drop observations that
have missing values, but doing this will drop or lose information, so be mindful of this before
you remove it. As a second option, you can input missing values based on other observations;
again, there is an opportunity to lose integrity of the data because you may be operating from
assumptions and not actual observations. As a third option, you might alter the way the data is
used to effectively navigate null values.
50
Clique: The IT & Analytics Club of IMNU
Descriptive Analysis
Measures of Location:
• Mean: Perhaps the most important measure of location is the mean, or average value,
for a variable.
• Weighted Mean: The mean that is computed by giving each observation a weight that
reflects its relative importance.
• Median: The median is another measure of central location. The median is the value in
the middle when the data are arranged in ascending order.
• Geometric Mean: The geometric mean is a measure of location that is calculated by
finding the nth root of the product of n values.
• Mode: The mode is the value that occurs with greatest frequency.
• Percentiles: A percentile provides information about how the data are spread over the
interval from the smallest value to the largest value.
• Quartiles: It is often desirable to divide data into four parts, with each part containing
approximately one-fourth, or 25% of the observations.
Measures of Variability:
• Range: The simplest measure of variability is the range. Range is the difference of
largest and smallest value.
• Interquartile Range: A measure of variability that overcomes the dependency on
extreme values is the interquartile range (IQR)
• Variance: The variance is a measure of variability that utilizes all the data. The
variance is based on the difference between the value of each observation and the mean.
• Standard Deviation: The standard deviation is defined to be the positive square root
of the variance.
• Coefficient of Variation: In some situations we may be interested in a descriptive
statistic that indicates how large the standard deviation is relative to the mean. This
measure is called the coefficient of variation and is usually expressed as a percentage.
Distribution Shape:
• Skewness: A measure of the shape of a data distribution. Data skewed to the left result
in negative skewness; a symmetric data distribution results in zero skewness; and data
skewed to the right result in positive skewness.
Five-Number Summary:
51
Clique: The IT & Analytics Club of IMNU
52
Clique: The IT & Analytics Club of IMNU
Predictive Analytics
The term predictive analytics refers to the use of statistics and modelling techniques to make
predictions about future outcomes and performance. Predictive analytics looks at current and
historical data patterns to determine if those patterns are likely to emerge again.
Predictive analytics is a form of technology that makes predictions about certain unknowns in
the future. It draws on a series of techniques to make these determinations, including artificial
intelligence (AI), data mining, machine learning, modelling, and statistics.
53
Clique: The IT & Analytics Club of IMNU
5. Lasso Regression: As with ridge regression, the lasso (Least Absolute Shrinkage and
Selection Operator) technique penalizes the absolute magnitude of the regression coefficient.
Additionally, the lasso regression technique employs variable selection, which leads to the
shrinkage of coefficient values to absolute zero.
6. Bayesian Linear Regression: Bayesian linear regression is a form of regression analysis
technique used in machine learning that uses Bayes’ theorem to calculate the regression
coefficients’ values. Rather than determining the least-squares, this technique determines the
features’ posterior distribution. As a result, the approach outperforms ordinary linear regression
in terms of stability.
54
Clique: The IT & Analytics Club of IMNU
Prescriptive Analysis
Prescriptive analytics not only anticipates what will happen and when it will happen, but also
why it will happen. Further, prescriptive analytics suggests decision options on how to take
advantage of a future opportunity or mitigate a future risk and shows the implication of each
decision option. Prescriptive analytics can continually take in new data to re-predict and re-
prescribe, thus automatically improving prediction accuracy and prescribing better decision
options. Prescriptive analytics ingests hybrid data, a combination of structured (numbers,
categories) and unstructured data (videos, images, sounds, texts), and business rules to predict
what lies ahead and to prescribe how to take advantage of this predicted future without
compromising other priorities.
Marketing and sales: Marketing and sales agencies have access to large amounts of customer
data that can help them to determine optimal marketing strategies, such as what types of
products pair well together and how to price products. Prescriptive analytics allows marketers
and sales staff to become more precise with their campaigns and customer outreach, as they no
longer have to act simply on intuition and experience.
Transportation industry: Cost-effective delivery is essential for success and profitability in
the package delivery and transportation industry. Minimizing energy usage through better route
planning and solving logistical issues such as incorrect shipping locations can save time and
money. Shippers produce massive amounts of data. Rather than employing armies of analysts
and dispatchers to decide how to best operate, these businesses can automate and build
prescriptive models to provide recommendations.
Financial markets: Quantitative researchers and traders use statistical modeling to try to
maximize returns. Financial firms can use similar techniques to manage risk and profitability.
For example, financial firms can build algorithms to churn through historical trading data to
measure risks of trades. The resulting analytics can help them decide how to size positions,
how to hedge them, or whether to place trades at all. Additionally, these firms can use models
to reduce transaction costs by figuring out how and when to best place their trades.
55
Clique: The IT & Analytics Club of IMNU
Data Visualisation
The graphical display of information and data is known as data visualisation. Data visualisation
tools, which include visual components like as charts, graphs, and maps, make it easy to view
and comprehend trends, outliers, and patterns in data. Data visualisation tools and technologies
are critical in the Big Data age for analysing huge volumes of data and making data-driven
choices.
“Visualization gives you answers to questions you didn’t know you had.”
56
Clique: The IT & Analytics Club of IMNU
1. Power BI: Power BI allows users to analyse and interpret data both on-premise and in
the cloud. Power BI allows you to effortlessly and securely create and share
customizable dashboards and interactive results with colleagues and organizations.
2. Tableau: Tableau, the world's most popular contemporary analytics software, assists
people and businesses in becoming more data-driven. Tableau is a highly effective and
rapidly expanding data visualisation application used in the Business Intelligence
Industry. It aids in the simplification of raw data into a relatively clear manner. Tableau
assists in the creation of data that can be comprehended by experts at all levels of a
business. Non-technical people can easily develop customised dashboards. The Tableau
application analyses data quickly and generates representations in the form of
dashboards and workbooks.
The best Tableau software features include:
➢ Blending of Data
➢ Real-time evaluation
➢ Data collaboration
The best part about Tableau software is that it doesn't require any technical or
programming knowledge to use. The tool has piqued the curiosity of people from many
sectors, including business, researchers, and various industries.
57
Clique: The IT & Analytics Club of IMNU
3. Plotly: Plotly is a data visualization tool for making interactive graphs, charts, and
maps. You can also use Plotly to visualize a dataset and then share the URL to that
visualization with your audience via social media or your blog. Plotly graphs are
interactive and have a unique URL, making them easy to share. By hovering over data
points and examining information about them, readers may learn how you generated
them. Readers may also examine all of the data interactively rather than deciphering
your code, making it ideal for sharing both interactive graphs and datasets with your
audience. Plotly also includes a broad library of open-source visualization types,
allowing you to select from a wide range of plots and maps.
58
Clique: The IT & Analytics Club of IMNU
Data Storytelling
Data storytelling is the capacity to effectively explain insights from a dataset using narratives
and visuals. It may be used to contextualise data findings and motivate your audience to take
action.
The three essential components of data storytelling:
Storyboarding: To begin, when your analysts begin developing their data story, storyboarding
should be a critical component of the process.
Visualization of data: Following that, you want your analysts to share their data findings with
the rest of the company.
Narrative of data: A verbal or written narrative, also called a storyline, is used to communicate
insights gleaned from data, the context surrounding it, and actions you recommend and aim to
inspire in your audience.
59