SlideShare a Scribd company logo
1 of 35
Kuncoro Wastuwibowo
Chair, IEEE Indonesia Section
Jakarta, 15 October 2014
IEEE is the world's largest professional association dedicated to advancing
technological innovation and excellence for the benefit of humanity. IEEE
and its members inspire a global community through IEEE's highly cited
publications, conferences, technology standards, and professional and
educational activities.
IEEE has
 more than 425,000 members in
more than 160 countries;
 more than 116,000 Student
members;
 333 Sections in 10 geographic
regions worldwide;
 2,195 Chapters that unite local
members with similar technical
interests;
 2,354 student branches at
colleges and universities;
 800 student branch chapters of
IEEE technical societies;
IEEE
 has 38 Societies and 7 technical Councils
representing the wide range of IEEE technical
interests;
 has more than 3 million documents in the IEEE
Xplore Digital Library, with more than 8 million
downloads each month;
 has more than 1,400 standards and projects under
development;
 publishes more than 148 transactions, journals, and
magazines;
 sponsors more than 1,300 conferences in 80
countries while:
 publishing more than 1,200 conference proceedings
via IEEE Xplore.
Board ofDirectors
MEMBERS
Educational
Activities Board
Professional
Activities Board
Publications
Activities Board
Regional
Activities Board
Standards
Activities Board
Technical
Activities Board
MEMBERS
Board of Directors Assembly
PSPB IEEE-USA
Standards Assoc.EAB
MGA TAB Executive Comm.
Regions & Sections Societies & Councils Staff & Society Exec.
Directors
Chapters
Internet
2.0
Internet
3.0
Total Experience
Services
Context-aware
Applications
Internet of Things
Big Data &
Analytics
Smart Applications
Wisdom of
Crowds
Mash-up
Applications
User-Generated
Content
“Business
Intelligence
”
Data
Discovery
Things We Know
Things We Don’t Know
Questions We Ask
Questions We Don’t Ask
Science &
Technology• Search for Extra-
Terrestrial Intelligence
(SETI)
• Genome projects
• CERN’s Large Hadron
Collider
• The Square Kilometer
Telescope Array
• Social Genome
Business &
Community• Consolidation of
government data
holdings
• Consumer profile
databases
• Customer relationship
management
• Social Media
• Sensor data
Sensing Data
Cyberspace
Physical Space
Actionable
Information
Ubiquitous
Internet
Device
Provider
3rd Party
Context
Enabler
Context
Provider
Service
Platform
Provider
Content
Provider
User
Network
Provider
Service
Provider
Platform
Provider
Context Platform
Context Data
Context Data
Context Data
Context
Context-Aware Services
Google Search
•User’s interest
•User’s behaviour
Google Mail
•User’s profile
•User’s behaviour & schedule
•User’s relation
•(Even for Mac & iOS users)
Google+
•User’s relation
•User’s behaviour
Google Maps
•User’s location
•User’s interest
Youtube
•User’s interest
•User’s network capacity
Chrome
•User’s behaviour
•User’s interest
•(Even for Mac users)
Android
•User’s device
•User’s location
•User’s behaviour
•User’s application usage
Google Docs
•User’s business
•User’s schedule
Google Translate
•User’s business
•User’s interest
Google Playstore
•Guess it!
Google Scholar
•Guess it!
Google Drive
•Guess it!
Google
• Google Search
• Google Now
• Google Glass
Apple
• Siri
• Apple Watch
• iPhoto (autometically
managed with time,
location, event)
• Health
Target
customers by
capturing useful
information
about them
Identify more
effective
product
promotions and
create offers
targeted to
specific
customers.
Predict the risk
of each
customer going
to other
companies and
then identify
actions likely to
keep them
loyal.
Improve
efficiency by
reducing
unused
capacity or
unnecessary
duplication
WHY?
Organizations leveraging analytics will have a greater competitive
advantage. Those that don’t will lag behind their peers.
Big data analytics is valuable to many companies but has been too
complex and expensive for smaller businesses. This is beginning to
change.
Suvola
• Integrated systems
using hardware
and software from
selected vendors
to allow smaller
organizations buy
simpler, more
affordable all-in-
one systems for
which the seller
provides
maintenance and
support.
Big Vendors
• IBM
• Oracle
• SAP
• SAS
Start-ups
• QlickTech
• Tableau Software
• Tidemark
Uptime
Sotware
Continuui
ty
Right
Scale
Amazo
n
Cloudy
n
Cloud
Vertical
Newvem
BigML
Insights
One
Splunk
Storm
Rack
space
Cloudabilit
y
The Internet will enhance global connectivity, fostering
more planetary relationships and less ignorance.
The IoT, artificial intelligence, and big data will provide more
awareness of the world and our own behavior.
Augmented reality and wearable devices will monitor and
give quick feedback on daily life (for example, to enhance
personal health).
Political awareness and action will be facilitated. More
peaceful change and public uprisings will emerge.
Internet will diminish the meaning of borders, and new
“nations” of those with shared interests may emerge.
 Dangerous divides between haves and have-nots may expand, resulting
in resentment and possible violence.
 Abuses and abusers will “evolve and scale.” Human nature isn’t changing;
laziness, bullying, stalking, stupidity, pornography, dirty tricks, and crime
will continue, and those who practice them have new capacity to make life
miserable for others.
 Pressured by these changes, governments and corporations will try to
assert power—and at times succeed—as they invoke security and cultural
norms.
 People will continue—sometimes grudgingly—to make tradeoffs, favoring
convenience and perceived immediate gains over privacy. Privacy will
become something only the upscale enjoy.
 Humans and their current organizations may not respond quickly enough
to challenges presented by complex networks.
 Most people haven’t yet noticed the profound changes today’s
communications networks are already bringing about; these networks will
be even more disruptive in the future.
Encryption isn’t a perfect solution for securing big data, but it
could be a valuable component in a comprehensive privacy
solution.
Third parties would create various privacy profiles for
consumers who would then select a profile such that data
holders would be required to differentiate the way they use
data based on each consumer’s selection.
Anonymisation and de-identification have limited relevance
because data points linked to one another tend to take on
other identifiable attributes.
Deletion and non-retention policies aren’t effective means of
protecting individual privacy.
The focus should be on the actual uses of big data and not
so much on its collection and analysis.
To avoid obsolescence, policies and regulations should
be stated in terms of intended outcomes and not embed
particular technological solutions.
The Government should strengthen its research in privacy-
related technologies.
There should be more education and training opportunities
concerning privacy protection.
The Government should take the lead by adopting policies
that stimulate the use of practical privacy-protecting
technologies that exist today.
Kuncoro Wastuwibowo
Chair
IEEE Indonesia Section
info@IEEE.web.id
http://IEEE.web.id
@IEEEIndonesia
IEEE Indonesia Section
info@IEEE.web.id
http://IEEE.web.id
@IEEEIndonesia
 Brian M. Gaff, Heather Egan Sussman, Jennifer Geetter, Privacy and Big
Data, IEEE Computer, June 2014
 George F. Hurlburt, Jeffrey Voas, Big Data, Networked Worlds, IEEE
Computer, April 2014
 Jason Kolb & Jeremy Kolb, The Big Data Revolution, Applied Data Labs
Inc 2013.
 Neal Leavitt, Bringing Big Analytics to the Masses, IEEE Computer,
January 2013
 Niklas Elmqvist & Pourang Irani, Ubiquitous Analytics: Interacting with
Big Data Anywhere, Anytime, IEEE Computer, April 2013
 Pew Research Center, Digital Life in 2025, March 2014
 President’s Council of Advisors on Science and Technology, Report to
the President: Big Data and Privacy – A Technological Perspective,
May 2014.
 Xiaomeng Yi, Fangming Liu, Jiangchuan Liu, and Hai Jin, Building a
Network Highway for Big Data: Architecture and Challenges, IEEE
Network, July/August 2014
 Yin Zhang, Min Chen, Shiwen Mao, Long Hu, and Victor C. M. Leung,
CAP: Community Activity Prediction Based on Big Data Analysis,

More Related Content

What's hot

Top 10 trends in Education Technology for 2016
Top 10 trends in Education Technology for 2016Top 10 trends in Education Technology for 2016
Top 10 trends in Education Technology for 2016karima1
 
Ieee Xtreme Md Telecon August 2009
Ieee Xtreme   Md Telecon August 2009Ieee Xtreme   Md Telecon August 2009
Ieee Xtreme Md Telecon August 2009Elizabeth Johnston
 
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Cisco Mobility
 
Challenges for Mobile Learning in Security and Defense Organizations
Challenges for Mobile Learning in Security and Defense OrganizationsChallenges for Mobile Learning in Security and Defense Organizations
Challenges for Mobile Learning in Security and Defense OrganizationsChristian Glahn
 
Kentaro 2009 02 11 CooperaciĂłN Toyama
Kentaro 2009 02 11 CooperaciĂłN   ToyamaKentaro 2009 02 11 CooperaciĂłN   Toyama
Kentaro 2009 02 11 CooperaciĂłN ToyamaCOOPERACION 2.0 2009
 
IRJET- Secure Architecture for Mobile Cloud based Learning
IRJET-  	  Secure Architecture for Mobile Cloud based LearningIRJET-  	  Secure Architecture for Mobile Cloud based Learning
IRJET- Secure Architecture for Mobile Cloud based LearningIRJET Journal
 
IEEE COMPUTE EDITION-1
IEEE COMPUTE EDITION-1IEEE COMPUTE EDITION-1
IEEE COMPUTE EDITION-1Maitri Vaghela
 
Punahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyPunahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyCisco Mobility
 
Ieee UoM SB newsletter 2013
Ieee UoM SB newsletter 2013Ieee UoM SB newsletter 2013
Ieee UoM SB newsletter 2013Tharindu Ranasinghe
 
IEEE an OUTLOOK
IEEE an OUTLOOKIEEE an OUTLOOK
IEEE an OUTLOOKMathankumar S
 
26857 superconductivity cover (new)
26857 superconductivity cover (new) 26857 superconductivity cover (new)
26857 superconductivity cover (new) Karen Flores
 
What is IEEE? {IEEE-ZC}
What is IEEE? {IEEE-ZC}What is IEEE? {IEEE-ZC}
What is IEEE? {IEEE-ZC}Mohamed Elsayed
 
Cloud and Ubiquitous Computing in Today's Era of Tera
Cloud and Ubiquitous Computing in Today's Era of TeraCloud and Ubiquitous Computing in Today's Era of Tera
Cloud and Ubiquitous Computing in Today's Era of TeraArief Gunawan
 

What's hot (14)

Top 10 trends in Education Technology for 2016
Top 10 trends in Education Technology for 2016Top 10 trends in Education Technology for 2016
Top 10 trends in Education Technology for 2016
 
Ieee Xtreme Md Telecon August 2009
Ieee Xtreme   Md Telecon August 2009Ieee Xtreme   Md Telecon August 2009
Ieee Xtreme Md Telecon August 2009
 
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
 
Challenges for Mobile Learning in Security and Defense Organizations
Challenges for Mobile Learning in Security and Defense OrganizationsChallenges for Mobile Learning in Security and Defense Organizations
Challenges for Mobile Learning in Security and Defense Organizations
 
Kentaro 2009 02 11 CooperaciĂłN Toyama
Kentaro 2009 02 11 CooperaciĂłN   ToyamaKentaro 2009 02 11 CooperaciĂłN   Toyama
Kentaro 2009 02 11 CooperaciĂłN Toyama
 
IRJET- Secure Architecture for Mobile Cloud based Learning
IRJET-  	  Secure Architecture for Mobile Cloud based LearningIRJET-  	  Secure Architecture for Mobile Cloud based Learning
IRJET- Secure Architecture for Mobile Cloud based Learning
 
IEEE COMPUTE EDITION-1
IEEE COMPUTE EDITION-1IEEE COMPUTE EDITION-1
IEEE COMPUTE EDITION-1
 
Punahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyPunahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case study
 
1 sky
1 sky1 sky
1 sky
 
Ieee UoM SB newsletter 2013
Ieee UoM SB newsletter 2013Ieee UoM SB newsletter 2013
Ieee UoM SB newsletter 2013
 
IEEE an OUTLOOK
IEEE an OUTLOOKIEEE an OUTLOOK
IEEE an OUTLOOK
 
26857 superconductivity cover (new)
26857 superconductivity cover (new) 26857 superconductivity cover (new)
26857 superconductivity cover (new)
 
What is IEEE? {IEEE-ZC}
What is IEEE? {IEEE-ZC}What is IEEE? {IEEE-ZC}
What is IEEE? {IEEE-ZC}
 
Cloud and Ubiquitous Computing in Today's Era of Tera
Cloud and Ubiquitous Computing in Today's Era of TeraCloud and Ubiquitous Computing in Today's Era of Tera
Cloud and Ubiquitous Computing in Today's Era of Tera
 

Viewers also liked

Impact of Spatial Correlation towards the Performance of MIMO Downlink Transm...
Impact of Spatial Correlation towards the Performance of MIMO Downlink Transm...Impact of Spatial Correlation towards the Performance of MIMO Downlink Transm...
Impact of Spatial Correlation towards the Performance of MIMO Downlink Transm...Rosdiadee Nordin
 
Blogging: Personal Publishing
Blogging: Personal PublishingBlogging: Personal Publishing
Blogging: Personal PublishingKuncoro Wastuwibowo
 
Green-Aware Network: Keynote Speech for NEST-UI
Green-Aware Network: Keynote Speech for NEST-UIGreen-Aware Network: Keynote Speech for NEST-UI
Green-Aware Network: Keynote Speech for NEST-UIKuncoro Wastuwibowo
 
Developing a Comprehensive Carrier Ethernet Business Portfolio
Developing a Comprehensive Carrier Ethernet Business PortfolioDeveloping a Comprehensive Carrier Ethernet Business Portfolio
Developing a Comprehensive Carrier Ethernet Business PortfolioKuncoro Wastuwibowo
 
Energy Efficient Cellular Base Stations based on the Characteristics of Ma...
   Energy Efficient Cellular Base Stations based on the Characteristics of Ma...   Energy Efficient Cellular Base Stations based on the Characteristics of Ma...
Energy Efficient Cellular Base Stations based on the Characteristics of Ma...Rosdiadee Nordin
 
Converged Digital Ecosystem
Converged Digital EcosystemConverged Digital Ecosystem
Converged Digital EcosystemKuncoro Wastuwibowo
 
Web ontology language (owl)
Web ontology language (owl)Web ontology language (owl)
Web ontology language (owl)Ameer Sameer
 
Internet of Things: Current Trends & Future Directions in Malaysia
Internet of Things: Current Trends & Future Directions in MalaysiaInternet of Things: Current Trends & Future Directions in Malaysia
Internet of Things: Current Trends & Future Directions in MalaysiaRosdiadee Nordin
 
Ubiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware ServicesUbiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware ServicesKuncoro Wastuwibowo
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networksAmeer Sameer
 
Implementation of Wireless Channel Model in MATLAB: Simplified
Implementation of Wireless Channel Model in MATLAB: SimplifiedImplementation of Wireless Channel Model in MATLAB: Simplified
Implementation of Wireless Channel Model in MATLAB: SimplifiedRosdiadee Nordin
 
Cognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesCognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesKuncoro Wastuwibowo
 
Simulating communication systems with MATLAB: An introduction
Simulating communication systems with MATLAB: An introductionSimulating communication systems with MATLAB: An introduction
Simulating communication systems with MATLAB: An introductionAniruddha Chandra
 
Wireless Channel Modeling - MATLAB Simulation Approach
Wireless Channel Modeling - MATLAB Simulation ApproachWireless Channel Modeling - MATLAB Simulation Approach
Wireless Channel Modeling - MATLAB Simulation ApproachJayamohan Govindaraj
 
4G Mobile Network & Applications
4G Mobile Network & Applications4G Mobile Network & Applications
4G Mobile Network & ApplicationsKuncoro Wastuwibowo
 

Viewers also liked (20)

Impact of Spatial Correlation towards the Performance of MIMO Downlink Transm...
Impact of Spatial Correlation towards the Performance of MIMO Downlink Transm...Impact of Spatial Correlation towards the Performance of MIMO Downlink Transm...
Impact of Spatial Correlation towards the Performance of MIMO Downlink Transm...
 
Blogging: Personal Publishing
Blogging: Personal PublishingBlogging: Personal Publishing
Blogging: Personal Publishing
 
Green-Aware Network: Keynote Speech for NEST-UI
Green-Aware Network: Keynote Speech for NEST-UIGreen-Aware Network: Keynote Speech for NEST-UI
Green-Aware Network: Keynote Speech for NEST-UI
 
Developing a Comprehensive Carrier Ethernet Business Portfolio
Developing a Comprehensive Carrier Ethernet Business PortfolioDeveloping a Comprehensive Carrier Ethernet Business Portfolio
Developing a Comprehensive Carrier Ethernet Business Portfolio
 
On Tweeting
On TweetingOn Tweeting
On Tweeting
 
Energy Efficient Cellular Base Stations based on the Characteristics of Ma...
   Energy Efficient Cellular Base Stations based on the Characteristics of Ma...   Energy Efficient Cellular Base Stations based on the Characteristics of Ma...
Energy Efficient Cellular Base Stations based on the Characteristics of Ma...
 
IPTV Codec & Packeting
IPTV Codec & PacketingIPTV Codec & Packeting
IPTV Codec & Packeting
 
Converged Digital Ecosystem
Converged Digital EcosystemConverged Digital Ecosystem
Converged Digital Ecosystem
 
Web ontology language (owl)
Web ontology language (owl)Web ontology language (owl)
Web ontology language (owl)
 
Digital TV, IPTV
Digital TV, IPTVDigital TV, IPTV
Digital TV, IPTV
 
New Convergence
New ConvergenceNew Convergence
New Convergence
 
Internet of Things: Current Trends & Future Directions in Malaysia
Internet of Things: Current Trends & Future Directions in MalaysiaInternet of Things: Current Trends & Future Directions in Malaysia
Internet of Things: Current Trends & Future Directions in Malaysia
 
Ubiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware ServicesUbiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware Services
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
27. cognitive radio
27. cognitive radio27. cognitive radio
27. cognitive radio
 
Implementation of Wireless Channel Model in MATLAB: Simplified
Implementation of Wireless Channel Model in MATLAB: SimplifiedImplementation of Wireless Channel Model in MATLAB: Simplified
Implementation of Wireless Channel Model in MATLAB: Simplified
 
Cognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesCognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main Issues
 
Simulating communication systems with MATLAB: An introduction
Simulating communication systems with MATLAB: An introductionSimulating communication systems with MATLAB: An introduction
Simulating communication systems with MATLAB: An introduction
 
Wireless Channel Modeling - MATLAB Simulation Approach
Wireless Channel Modeling - MATLAB Simulation ApproachWireless Channel Modeling - MATLAB Simulation Approach
Wireless Channel Modeling - MATLAB Simulation Approach
 
4G Mobile Network & Applications
4G Mobile Network & Applications4G Mobile Network & Applications
4G Mobile Network & Applications
 

Similar to Big Data: Opportunity & Challenges

Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...ijtsrd
 
Data science general
Data science generalData science general
Data science generalMichael Mathews
 
KM2.0: Knowledge, Creativity and Innovation
KM2.0: Knowledge, Creativity and InnovationKM2.0: Knowledge, Creativity and Innovation
KM2.0: Knowledge, Creativity and InnovationMYRA School of Business
 
Social Machines of Scholarly Collaboration
Social Machines of Scholarly CollaborationSocial Machines of Scholarly Collaboration
Social Machines of Scholarly CollaborationDavid De Roure
 
Open for business_dalberg
Open for business_dalbergOpen for business_dalberg
Open for business_dalbergVictor Gridnev
 
New and Emerging Forms of Data
New and Emerging Forms of DataNew and Emerging Forms of Data
New and Emerging Forms of DataDavid De Roure
 
Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016suresh sood
 
Data Science For Social Good: Tackling the Challenge of Homelessness
Data Science For Social Good: Tackling the Challenge of HomelessnessData Science For Social Good: Tackling the Challenge of Homelessness
Data Science For Social Good: Tackling the Challenge of HomelessnessAnita Luthra
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
The New e-Science (Bangalore Edition)
The New e-Science (Bangalore Edition)The New e-Science (Bangalore Edition)
The New e-Science (Bangalore Edition)David De Roure
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxPallawiBulakh1
 
FORCE11: Creating a data and tools ecosystem
FORCE11:  Creating a data and tools ecosystemFORCE11:  Creating a data and tools ecosystem
FORCE11: Creating a data and tools ecosystemMaryann Martone
 
This assignment has two goals  1) have students increase their unde.docx
This assignment has two goals  1) have students increase their unde.docxThis assignment has two goals  1) have students increase their unde.docx
This assignment has two goals  1) have students increase their unde.docxdunningblair
 
IRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET Journal
 

Similar to Big Data: Opportunity & Challenges (20)

Twist
TwistTwist
Twist
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
 
Data science general
Data science generalData science general
Data science general
 
KM2.0: Knowledge, Creativity and Innovation
KM2.0: Knowledge, Creativity and InnovationKM2.0: Knowledge, Creativity and Innovation
KM2.0: Knowledge, Creativity and Innovation
 
Challenge of Technology Mediated Social Participation
Challenge of Technology Mediated Social ParticipationChallenge of Technology Mediated Social Participation
Challenge of Technology Mediated Social Participation
 
Ethics in Technology Handout
Ethics in Technology HandoutEthics in Technology Handout
Ethics in Technology Handout
 
Social Machines of Scholarly Collaboration
Social Machines of Scholarly CollaborationSocial Machines of Scholarly Collaboration
Social Machines of Scholarly Collaboration
 
Open for business_dalberg
Open for business_dalbergOpen for business_dalberg
Open for business_dalberg
 
New and Emerging Forms of Data
New and Emerging Forms of DataNew and Emerging Forms of Data
New and Emerging Forms of Data
 
Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016
 
Copyright Technology 101
Copyright Technology 101Copyright Technology 101
Copyright Technology 101
 
Data Science For Social Good: Tackling the Challenge of Homelessness
Data Science For Social Good: Tackling the Challenge of HomelessnessData Science For Social Good: Tackling the Challenge of Homelessness
Data Science For Social Good: Tackling the Challenge of Homelessness
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
The New e-Science (Bangalore Edition)
The New e-Science (Bangalore Edition)The New e-Science (Bangalore Edition)
The New e-Science (Bangalore Edition)
 
Knowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of ThingsKnowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of Things
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptx
 
FORCE11: Creating a data and tools ecosystem
FORCE11:  Creating a data and tools ecosystemFORCE11:  Creating a data and tools ecosystem
FORCE11: Creating a data and tools ecosystem
 
This assignment has two goals  1) have students increase their unde.docx
This assignment has two goals  1) have students increase their unde.docxThis assignment has two goals  1) have students increase their unde.docx
This assignment has two goals  1) have students increase their unde.docx
 
IRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AI
 

More from Kuncoro Wastuwibowo

From Telkom for IYCE Award Candidates
From Telkom for IYCE Award CandidatesFrom Telkom for IYCE Award Candidates
From Telkom for IYCE Award CandidatesKuncoro Wastuwibowo
 
Global Communications Newsletter, September 2010
Global Communications Newsletter, September 2010Global Communications Newsletter, September 2010
Global Communications Newsletter, September 2010Kuncoro Wastuwibowo
 
Nostalgia 2008: Intro to Web 2.0
Nostalgia 2008: Intro to Web 2.0Nostalgia 2008: Intro to Web 2.0
Nostalgia 2008: Intro to Web 2.0Kuncoro Wastuwibowo
 
WiMAX II (IEEE 802.16m) as 4G Mobile Candidate
WiMAX II (IEEE 802.16m) as 4G Mobile CandidateWiMAX II (IEEE 802.16m) as 4G Mobile Candidate
WiMAX II (IEEE 802.16m) as 4G Mobile CandidateKuncoro Wastuwibowo
 
4G Mobile Opportunities & Challenges in Indonesia
4G Mobile Opportunities & Challenges in Indonesia4G Mobile Opportunities & Challenges in Indonesia
4G Mobile Opportunities & Challenges in IndonesiaKuncoro Wastuwibowo
 

More from Kuncoro Wastuwibowo (6)

From Telkom for IYCE Award Candidates
From Telkom for IYCE Award CandidatesFrom Telkom for IYCE Award Candidates
From Telkom for IYCE Award Candidates
 
Global Communications Newsletter, September 2010
Global Communications Newsletter, September 2010Global Communications Newsletter, September 2010
Global Communications Newsletter, September 2010
 
Santri Indigo 2010
Santri Indigo 2010Santri Indigo 2010
Santri Indigo 2010
 
Nostalgia 2008: Intro to Web 2.0
Nostalgia 2008: Intro to Web 2.0Nostalgia 2008: Intro to Web 2.0
Nostalgia 2008: Intro to Web 2.0
 
WiMAX II (IEEE 802.16m) as 4G Mobile Candidate
WiMAX II (IEEE 802.16m) as 4G Mobile CandidateWiMAX II (IEEE 802.16m) as 4G Mobile Candidate
WiMAX II (IEEE 802.16m) as 4G Mobile Candidate
 
4G Mobile Opportunities & Challenges in Indonesia
4G Mobile Opportunities & Challenges in Indonesia4G Mobile Opportunities & Challenges in Indonesia
4G Mobile Opportunities & Challenges in Indonesia
 

Recently uploaded

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoĂŁo Esperancinha
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 

Recently uploaded (20)

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 

Big Data: Opportunity & Challenges

  • 1. Kuncoro Wastuwibowo Chair, IEEE Indonesia Section Jakarta, 15 October 2014
  • 2. IEEE is the world's largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity. IEEE and its members inspire a global community through IEEE's highly cited publications, conferences, technology standards, and professional and educational activities.
  • 3. IEEE has  more than 425,000 members in more than 160 countries;  more than 116,000 Student members;  333 Sections in 10 geographic regions worldwide;  2,195 Chapters that unite local members with similar technical interests;  2,354 student branches at colleges and universities;  800 student branch chapters of IEEE technical societies; IEEE  has 38 Societies and 7 technical Councils representing the wide range of IEEE technical interests;  has more than 3 million documents in the IEEE Xplore Digital Library, with more than 8 million downloads each month;  has more than 1,400 standards and projects under development;  publishes more than 148 transactions, journals, and magazines;  sponsors more than 1,300 conferences in 80 countries while:  publishing more than 1,200 conference proceedings via IEEE Xplore.
  • 4. Board ofDirectors MEMBERS Educational Activities Board Professional Activities Board Publications Activities Board Regional Activities Board Standards Activities Board Technical Activities Board MEMBERS Board of Directors Assembly PSPB IEEE-USA Standards Assoc.EAB MGA TAB Executive Comm. Regions & Sections Societies & Councils Staff & Society Exec. Directors Chapters
  • 5.
  • 6. Internet 2.0 Internet 3.0 Total Experience Services Context-aware Applications Internet of Things Big Data & Analytics Smart Applications Wisdom of Crowds Mash-up Applications User-Generated Content
  • 7.
  • 8. “Business Intelligence ” Data Discovery Things We Know Things We Don’t Know Questions We Ask Questions We Don’t Ask
  • 9.
  • 10. Science & Technology• Search for Extra- Terrestrial Intelligence (SETI) • Genome projects • CERN’s Large Hadron Collider • The Square Kilometer Telescope Array • Social Genome Business & Community• Consolidation of government data holdings • Consumer profile databases • Customer relationship management • Social Media • Sensor data
  • 11.
  • 12.
  • 14.
  • 16. Google Search •User’s interest •User’s behaviour Google Mail •User’s profile •User’s behaviour & schedule •User’s relation •(Even for Mac & iOS users) Google+ •User’s relation •User’s behaviour Google Maps •User’s location •User’s interest Youtube •User’s interest •User’s network capacity Chrome •User’s behaviour •User’s interest •(Even for Mac users) Android •User’s device •User’s location •User’s behaviour •User’s application usage Google Docs •User’s business •User’s schedule Google Translate •User’s business •User’s interest Google Playstore •Guess it! Google Scholar •Guess it! Google Drive •Guess it!
  • 17. Google • Google Search • Google Now • Google Glass Apple • Siri • Apple Watch • iPhoto (autometically managed with time, location, event) • Health
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Target customers by capturing useful information about them Identify more effective product promotions and create offers targeted to specific customers. Predict the risk of each customer going to other companies and then identify actions likely to keep them loyal. Improve efficiency by reducing unused capacity or unnecessary duplication WHY? Organizations leveraging analytics will have a greater competitive advantage. Those that don’t will lag behind their peers.
  • 25. Big data analytics is valuable to many companies but has been too complex and expensive for smaller businesses. This is beginning to change.
  • 26. Suvola • Integrated systems using hardware and software from selected vendors to allow smaller organizations buy simpler, more affordable all-in- one systems for which the seller provides maintenance and support. Big Vendors • IBM • Oracle • SAP • SAS Start-ups • QlickTech • Tableau Software • Tidemark
  • 28.
  • 29. The Internet will enhance global connectivity, fostering more planetary relationships and less ignorance. The IoT, artificial intelligence, and big data will provide more awareness of the world and our own behavior. Augmented reality and wearable devices will monitor and give quick feedback on daily life (for example, to enhance personal health). Political awareness and action will be facilitated. More peaceful change and public uprisings will emerge. Internet will diminish the meaning of borders, and new “nations” of those with shared interests may emerge.
  • 30.  Dangerous divides between haves and have-nots may expand, resulting in resentment and possible violence.  Abuses and abusers will “evolve and scale.” Human nature isn’t changing; laziness, bullying, stalking, stupidity, pornography, dirty tricks, and crime will continue, and those who practice them have new capacity to make life miserable for others.  Pressured by these changes, governments and corporations will try to assert power—and at times succeed—as they invoke security and cultural norms.  People will continue—sometimes grudgingly—to make tradeoffs, favoring convenience and perceived immediate gains over privacy. Privacy will become something only the upscale enjoy.  Humans and their current organizations may not respond quickly enough to challenges presented by complex networks.  Most people haven’t yet noticed the profound changes today’s communications networks are already bringing about; these networks will be even more disruptive in the future.
  • 31. Encryption isn’t a perfect solution for securing big data, but it could be a valuable component in a comprehensive privacy solution. Third parties would create various privacy profiles for consumers who would then select a profile such that data holders would be required to differentiate the way they use data based on each consumer’s selection. Anonymisation and de-identification have limited relevance because data points linked to one another tend to take on other identifiable attributes. Deletion and non-retention policies aren’t effective means of protecting individual privacy.
  • 32. The focus should be on the actual uses of big data and not so much on its collection and analysis. To avoid obsolescence, policies and regulations should be stated in terms of intended outcomes and not embed particular technological solutions. The Government should strengthen its research in privacy- related technologies. There should be more education and training opportunities concerning privacy protection. The Government should take the lead by adopting policies that stimulate the use of practical privacy-protecting technologies that exist today.
  • 33. Kuncoro Wastuwibowo Chair IEEE Indonesia Section info@IEEE.web.id http://IEEE.web.id @IEEEIndonesia
  • 35.  Brian M. Gaff, Heather Egan Sussman, Jennifer Geetter, Privacy and Big Data, IEEE Computer, June 2014  George F. Hurlburt, Jeffrey Voas, Big Data, Networked Worlds, IEEE Computer, April 2014  Jason Kolb & Jeremy Kolb, The Big Data Revolution, Applied Data Labs Inc 2013.  Neal Leavitt, Bringing Big Analytics to the Masses, IEEE Computer, January 2013  Niklas Elmqvist & Pourang Irani, Ubiquitous Analytics: Interacting with Big Data Anywhere, Anytime, IEEE Computer, April 2013  Pew Research Center, Digital Life in 2025, March 2014  President’s Council of Advisors on Science and Technology, Report to the President: Big Data and Privacy – A Technological Perspective, May 2014.  Xiaomeng Yi, Fangming Liu, Jiangchuan Liu, and Hai Jin, Building a Network Highway for Big Data: Architecture and Challenges, IEEE Network, July/August 2014  Yin Zhang, Min Chen, Shiwen Mao, Long Hu, and Victor C. M. Leung, CAP: Community Activity Prediction Based on Big Data Analysis,

Editor's Notes

  1. PSPB= Publication Services and Products Board