Feeds

Biz prof disses Big Data as a fetish for info hoarders

Not a good model for success, says doc

3 Big data security analytics techniques

HPC blog When it comes to Big Data, I’m as geeked out as the next guy – if not a little more so. For the last three years or so, I’ve been telling anyone who will listen (and plenty of people who won’t) that Big Data and enterprise analytics are the "next big thing" both in business and computing. Today, it’s widely accepted that Big Data is going to make big changes to our world.

But not everyone is on the bus. Or if they’re on the bus, they’re not entirely sure that it’s headed in the right direction. An article in Datanami summarises an MIT Technology Review interview with Dr Peter Fader, co-director of the Wharton School of Business, in which the good doctor tosses cold water on some of the most hallowed Big Data precepts.

Dr Fader (and the interviewer, to be fair) also coins the terms "data fetish" and "data fetishist" to describe the belief that people and organisations need to capture and hold on to every scrap of data, just in case it might be important down the road. (I recently completed a Big Data survey in which a large proportion of respondents said they intend to keep their data “forever”. Great news for the tech industry, for sure.)

Even though I’m a big proponent of Big Data, I found myself nodding in agreement throughout the summary and the full interview (available here). Dr Feder makes some great points that cut through much of the hype surrounding the trend.

What rang particularly true was his comparison of those who rely on Big Data to technical stock analysts. They’re the guys who predict future stock prices based exclusively on past price moves. They use cool terms like "Head and Shoulders", "Abandoned Baby", and "Dark Cloud Cover" along with TRIN, TRIX, and ADX to describe price and market behavior.

The problem is that their analyses don’t work. Or, more accurately, they don’t predict individual stock moves any better than random chance. Their models don’t take into account the fundamental reasons why a stock moves up or down – bad management, bad products, etc.

Dr Fader makes the point that today’s data scientists are exactly the same as the stock chart jockeys. They simply look at loads and loads of data, fit some patterns to it, and then start making decisions based on that model. He predicts that the resulting success will not only be lower than expected but, as he puts it, "surprisingly low". ®

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.