...Lecture on Big Data Guest Speaker Simon Trang Research Member at DFG RTG 1703 and Chair of Information Management Göttingen University, Germany 2014 The City City of Göttingen • Founded in the Middle Ages • True geographical center of Germany • 130,000 residents Chair of Information Management Lecture on Big Data at Macquarie University 2 2 The University Georg-August-Universität Göttingen (founded in 1737) • • • • One of nine Excellence Universities in Germany 13 faculties, 180 institutes 26,300 students (2013) 11.6% students from abroad (new entrants: approximately 20%) • 13,000 employees (including hospital and medical school), including 420 professors • 115 programs of study from A as in Agricultural Science to Z as in Zoology are offered (73 bachelor / 22 master programs) Chair of Information Management Lecture on Big Data at Macquarie University 3 “The Göttingen Nobel Prize Wonder” Over 40 Nobel prize winners have lived, studied, and/or lived, studied or/and researched 41 Prize researched at the University of Göttingen, among them… at the University of Göttingen, among them… • • • • • • • • • • • • • • Max von Laue, Physics, 1914 Max von Laue, physics, 1914 Max Planck, physics, 1918 Max Planck, Physics, 1918 Werner Heisenberg, physics, 1932 Werner Heisenberg, Physics, 1932 Otto Hahn, chemistry 1944 Otto Hahn, Chemistry 1944 Max Born, physics, 1954 Max Born, Physics, 1954 Manfred Eigen, chemistry, 1967 Manfred Eigen, Chemistry, 1967 Erwin...
Words: 1847 - Pages: 8
...Resources focus on the recruiting, selecting, training, compensating, appraising, and developing. Globalization is a big impact on the ever changing role of Human Resources. Companies in the United States are competing against international markets and fending off foreign competitors' attempts to gain purchase on their home soil. For today’s workforce employee skills, flexibility, efficiency and excellence, have become an important part of an environment that is constantly adapting to new changes. Technology is another impact that is playing a big role in helping organizations get ahead of competitors by becoming a high- performance work system. In the rapidly changing environment of technology today customers are increasing demands for higher quality products and employees are looking for flexible work schedules and employers are trying to find new ways for people to display their creativity and work on their interpersonal skills. In Human Resources whoever has the better technology will usually...
Words: 852 - Pages: 4
...Cloud computing is a new way of delivering computing resources, not a new technology. Computing services ranging from data storage and processing to software, such as email handling, are now available instantly, commitment-free and on-demand. Since we are in a time of belt-tightening, this new economic model for computing has found fertile ground and is seeing massive global investment. According to IDC’s analysis, the worldwide forecast for cloud services in 2009 will be in the order of $17.4bn (1). The estimation for 2013 amounts to $44.2bn, with the European market ranging from €971m in 2008 to €6,005m in 2013 (2). The key conclusion of this paper is that the cloud’s economies of scale and flexibility are both a friend and a foe from a security point of view. The massive concentrations of resources and data present a more attractive target to attackers, but cloud-based defences can be more robust, scalable and cost-effective. This paper allows an informed assessment of the security risks and benefits of using cloud computing - providing security guidance for potential and existing users of cloud computing. The security assessment is based on three use-case scenarios: 1) SME migration to cloud computing services, 2) the impact of cloud computing on service resilience, 3) cloud computing in e-Government (e.g., eHealth). The new economic model has also driven technical change in terms of: Scale: commoditisation and the drive towards economic efficiency have led to massive...
Words: 756 - Pages: 4
...Technology; friend or foe? There was certainly a time that the use of computer generated technology would have been a welcome relief to most crime scene investigators. The value of accuracy, eliminating most human error had value beyond words. Enter: technology that is as much a friend as it is a criminal. Technology and the brilliance it is made up of is only as good as the person utilizing it. On the flip side, it can also be as bad; incredibly harmful at best. When a crime has been committed, in this day in age, a computer is often the accomplice. That being said, the sooner the evidence within the computer accomplice is collected by the attending computer forensics specialists, the more likely the data that has been accessed, even if deleted, is remaining evidence on the computer; whether only in part or true to form detail. The longer the forensic team takes to collect this invaluable data, the more likely it is that the computer will overwrite key pieces of evidence, which would ultimately result in the prosecution or release of a potential criminal mind. Even partial data is extracted from the hard drive of the accomplice computer; it can still be very much useful in a prosecution, as partial data is also admissible in court today (Krehel, 2011). Securing the hard drive in the exact manner in which the computer has been found is absolutely vital to any forensic expert hoping to do their job with attention to detail and accuracy. This can be done by duplicating or...
Words: 691 - Pages: 3
...Brain Disorders Traumatic Brain injury: Is an injury also known as TBI, a form of acquired brain injury, occurs when a sudden trauma causes damage to the brain. Causes: TBI can be caused by the head suddenly and violently hitting an object, or when an object pierces the skull and enters brain tissue. Symptoms: Symptoms of a TBI can be mild, moderate, or severe, depending on the extent of the damage to the brain. A person with a mild TBI may remain conscious or may experience a loss of consciousness for a few seconds or minutes. Other symptoms of mild TBI include headache, confusion, lightheadedness, dizziness, blurred vision or tired eyes, a change in sleep patterns, or thinking. A person with a moderate or severe TBI may show these same symptoms, but may also have a headache that gets worse or does not go away, dilation of one or both pupils of the eyes, and slurred speech. Parts of the brain affected: Traumatic brain injury damages the area of the brain that was affected by the head suddenly hitting an object. Learning Disability: It’s a disorder that affects the ability to understand or use spoken or written language. Causes: No one's exactly sure what causes learning disabilities. But researchers do have some theories as to why they develop, including: Genetic influences, Brain development, and Environmental impacts. Symptoms: There is no one sign that shows a person has a learning disability. Experts look for a noticeable difference between...
Words: 1701 - Pages: 7
...Information Technology Acts Marnie Trahan BIS/220 August 9, 2012 Mona Ristow Information Technology Acts In the 20th century everything is accessible to the people of the world through the worldwide web. Anything a person wants to find can search it online and if he or she cannot find it someone online can find it for the individual for a price. Everything in a person’s life is not as private as he or she thought it was; personal cell phones are not even off limits to privacy. I do not give out my cell phone number unless I know the person but recently I have been getting calls from phone numbers not even in my area code. The callers have the nerve to leave messages on my voicemail. Most of the voice messages left are recordings from machines. They are pre-recorded telemarketers leaving me messages about how my name popped up in their computers, so at this point I hit the delete button and I do not know what they called for. I am unsure about how these telemarketers got a personal cell phone number; I thought cell phone numbers were unpublished or unlisted. When I have tried looking up a cell phone number on the Internet the website usually wants me to pay for access to see the owner of the cell number’s information. So how do telemarketers get such easy access? The advances in information technology today have allowed the easy access to the individual’s personal lives and cell phones. A person orders something from a website he or she has to provide the website...
Words: 841 - Pages: 4
...Gadgets are friends or foe? Although there is no debating over both the usefulness and convienency of modern technology as such, different studies show that when it comes to general happiness, modern technology is not a factor. And while we all welcome the breakthroughs constantly being made in medicine for example, modern technology’s effect on human relations is still questionable at best. I think it is becoming quite obvious that the privileges provided for us by today’s science and technology are corrupting our minds in terms of pure human emotions and honest communication. There are studies which show that the more time people spend communicating online, the less desire they have to communicate verbally. Handwritten letters for one have already been largely replaced with e-mails, people talk on the phone and via MSN and other social networking sites daily, without actually seeing each other face to face for months or even years. They might think that modern technology helps them stay acquainted but what it might really be doing is tearing them further apart. Different studies have shown that despite all of the modern technology that surrounds us, we as humans are not happier than we used to be. As a matter of fact, we are actually not even as happy as we used to be. According to studies, the happiest country in the world appears to be Bhutan, which has very little or rather no modern technology at all. This clearly shows that people do not need all the latest gadgets...
Words: 692 - Pages: 3
...that mankind has developed society and created a better world. We could say that technology is the sum total of instrumentally useful culturally-transmissible information. Technology is a word used to collectively describe or portray the advancements, abilities, creations, undertakings, views, and knowledge of a singular group of persons: we as human-kind. When there is talk about the relationships between technology and humanity, it is evident that we have to deal with the interrelations between some very complex phenomena. Technology, science, society or systems of societies, and systems of rights of a universal nature. The discovery and development of a large number of powerful energy sources-coal, petroleum, electricity etc. have enabled humanity to conquer the barriers of nature. All this has facilitates the growth of fast modes of transport, which in turn has transformed the world into a global village. In the “old days”, we used phones for talking to each other. That was it. Not for texting. Not for browsing the web. And not for playing Angry Birds (a nightmare, I know). In the past, technology was a bonus, not a necessity. We did not rely on technology to get from point A to point B. We did not rely on technology to tell us the phone number of the local bar. And we surely didn’t rely on technology for entertainment. Today, however, this is far from true. We absolutely need technology. Without it, our society would crumble at its’ feet, where it stands right now...
Words: 874 - Pages: 4
...THE PROBLEM AND ITS BACKGROUND INTRODUCTION Modern life is associated with amenities and luxuries that people enjoy the convenience, this include appliances, personal; gadgetry, high rise condominiums, hotels recreation centers, furniture and fixtures. Mass production techniques and practices paved the way for availability of such goods that are affordable it manly, the advent of new materials like plastic and vinyl provided the convenience that was unheard of in the past. People now live in concrete structures, through modern fabrication method: building components can be assembled imp matter of days. Provision of interior decorations is relatively done easily by widespread use of synthetic materials for carpeting and upholstery. This new trend of modern life poses a hazard to the lives of building occupants by the nature of its physical composition. Majority of these items, which are in common use, are combustibles or hazardous materials that catches fire easily. Fire is an agent of chemical change. Uncontrolled, it can wreak havoc to many people, maiming, killing and wasting hundreds olives. It can easily convert valuable asset to ash or smoldering heap of useless objects. Man has attempted to tame fire. However, due to apathy, ignorance and neglect, fire remained to be on of mankind’s greatest cursed. Notwithstanding the huge magnitude of destruction brought about by fire, it has contributed much for man to make inroads in terms of progress and...
Words: 1102 - Pages: 5
...Political Socialization is the process which we develop our political values and opinions according to the term discussed in class. There are many forms of political socialization that can influence a person’s opinion or value about something. Everyone does not have the same value and opinions as others do because we were all raised different. There are also many influences of political socialization. Friends, neighbors, and other peers influence political socialization. Two major influences of political socialization are family and school. Family and school have been an influence that we have seen from early childhood and the media has acted as agent of political socialization. Family is one of the two most important influences on political...
Words: 868 - Pages: 4
...interesting article written by Ryan Subong that talks about the positive and negatives effects of the internet. The internet has changed humanity no doubt about it. Some people might use it to learn new things that will positively further their knowledge, while others choose to commit frowned upon acts, and corrupt themselves. Pornographic material easily accessible to any curious child or teen with internet access can lead them down the path of corruption. Pornographic material and similar explicit content available on the internet tend to degrade humanity. Almost any song or movie you can think of can easily be pirated from the internet, making protecting copyright almost impossible. Albert Einstein once said “I fear the day that technology will surpass our human interaction. The world will have a generation of idiots”, this quote is so precise, and it scares me. The internet is a great place for one to learn how to write an essay, but also the perfect place for someone to plagiarize someone else’s. Plagiarism and pirating copyrighted material cause very negative outcomes, this could ruin one’s reputation, or even worst, get them locked up in federal prison with 500,000 dollars bail (Pirating). P2P sharing sites like thepiratesbay, and kissasstorrents have successfully been taken down by the CIA, they are slowly cracking down on such websites while they remain lenient on the pornography websites corrupting our youth. With pornography being easily accessible and only a couple...
Words: 453 - Pages: 2
...2015-2016” (Submitted by Ernest John S.J. Arreza of Grade 9 Nationalism) Chapter 1 (The Problem and its Background) Introduction: Development in technology brings us many benefits today. One of these things is the computer gaming. Computer gaming is one of the most prominent activities done by teenagers today. Many people said that “they play these games just for fun and relaxation”. But they don’t know the effects of computer games to their academic performance. These games according to some researchers to researchers have benefits, because it enables the mind of the player to be more active. But also these games had bad effects on the Academic Performance of the students, because it might cause computer addiction. Today many Grade 9 students of Divine Light Academy Las Piñas are excellent at playing computer games. But I am sad to see that there are only three level honors out of hundreds of students this first quarter. “Education is the most powerful weapon which you can choose to change the world” – Nelson Mandela, this quotation is very true, because without education there would be no government today. That is why it is necessary to conduct a research about this topic because computer gaming is both a friend and a foe of education. The computer gaming industry is now over 30 years old. In that time computer technology has improved at a geometric rate. The promised of computer games as teachers was clearly recognized in the 1980’s. In the following years researchers...
Words: 683 - Pages: 3
...Report on Google Glass limitations Introduction Our latest product Google Glass has absolved the beta phase. As a result of that we got a lot of feedback, which will help us to improve our product. The task of our team is to forecast the Google Glass’ potential for longevity. In order to that it was my job to analyze the limitations by itself and even to work the social hurdles out. Over the last weeks we gathered lots of ideas for improvements from our 10.000 “Explorers”. Findings To start with the technological impression, there is to say that the technological level is very low. Countless flaws led to nine updates since the release of the beta version, which means much effort for our customers to keep at the best available technology. Another point is that the software seems to be quite poorly sophisticated. It is neither possible to edit photos nor to upload them to Instagram. The directory includes only 10 contacts while it has very weak capabilities anyway. Besides that there are struggles with the voice control while talking in loud areas what makes our Google Glass useless in such a situation. Furthermore many consumers have complained about the weak battery, which only runs about 2 hours or 45 minutes of recording. Consequently our product is not made for workaday life. In comparison to conventional glasses our product does not have hinges at the earpieces. Therefore it does not fit into a pocket what makes it quite bulky and difficult to handle. According...
Words: 808 - Pages: 4
...RADIO FREQUENCY IDENTIFICATION Introduction RFID is a technology which enables detecting and identifying objects using electromagnetic radio waves. This is processed through exchange of information between a reader and a tag being attached to the object that includes the data associated with the object. This can be used to detect and classify vehicles, animals, patients, shipment goods and airline baggage. [1] RFID technology involves two main components, they are transponders which are also known as tags or labels, contain the relevant information about the object and other the interrogators, also known as readers or transceivers, that extract the data from the tags. These tags can be passive or active tags. Passive tags use the energy from the EM radiation of the reader for its processing, where as active tags receive power from an internal battery for its processing and communication with the reader. An integrated electronic circuit is embedded in tags for storage and processing operations and an antenna that transmits and receives the RF signal. [2] Figure : components of RFID Source : http://www.docstoc.com/docs/17328767/Draft-SP800-98 The tags used in RFID are enabled with read-write operations, with a large storage capacity. Data can be modified any number of times. Tag and reader act as two way radio communication in which each antenna carries the modulation and demodulation of RF signals, with operation frequency ranges from low frequency to UHF. As radio...
Words: 939 - Pages: 4
...Most Americans sent to Vietnam were chosen by the draft. The Selective Service System, as it was called, favored the middle and upper classes. College students could avoid service, as could those in “critical” occupations, such as teachers and engineers. As the war escalated, the draft was changed so that some students were called up through a lottery system. Still, those who knew the medical requirements might be able to produce a doctor’s affidavit certifying a weak knee, flat feet, or bad eyes—all grounds for flunking the physical. Of the 1200 men in Harvard’s class of 1970, only 56 served in the military, and only 2 of them in V The poorest and least educated were also likely to escape service, because the Armed Forces Qualification Test and the physical often screened them out. Thus the sons of blue-collar America were most likely to accept Uncle Sam’s letter of induction. Once in uniform, the sons of Hispanic and black Americans who had fewer skills were more often assigned to combat duty. The draft also made it a relatively young man’s war. The average age of soldiers serving in Vietnam was 19, compared with the average of 26 for World War II. Most American infantry came to Vietnam ready and willing to fight. But physical and psychological hardships took their toll. An American search-and-destroy mission would fight its way into a Communist-controlled hamlet, clear and burn it, and move on—only to be ordered back days or weeks later because the enemy had moved in again...
Words: 802 - Pages: 4