Business Information Systems AssignmentPlace Your Order Now
How Does Our System Work?
It will take just three steps and two minutes to place your order
Submit your Question
Fill in the order form with all your instructions. Click submit then complete payment for your order.
Best Writer Assigned
We review your order's requirements to determine the most suited writer for it. We then assign it.
Calculate the price of your order
Business Information Systems Essay
Business Information Systems Paper
- Define big data and describe the technologies for managing and analyzing it.
Big data refers to large amounts of information that is computed to bring out patterns or relationships between phenomena. There are different technologies for managing and analyzing big data. Artificial intelligence is among the methods of managing and analyzing data. Machines are fitted with artificial neural networks which utilize many algorithm layers for data analysis. Block chain technology can be utilized in the process (Li 120). It ensures that once information is programmed into a computer it cannot undergo changes.
- Share with the class any technologies you have personally utilized or experienced in previous jobs or projects.
I have experienced block chain technology in my projects. For instance, I have dealt with Bitcoins which utilize block chain technology. The technology is secure and can feature in sensitive issues like digital banking. It can also apply in areas like healthcare. When it comes to Bitcoin, ledgers are distributed to offer opportunities for the analysis of data (Zhang et al. 1927). The technology kept my money safe and it is the first way in which I experienced big data management technology.
- How would or have you used big data to obtain key information?
If I would have to obtain information using big data, I would use certain techniques. Distributed storage would have been my preferred method. Here, I would replicate data in different files. The undertaking could guarantee quick access due to low latency. The method is safe since data can be easily managed (Li 270). The data can be accessed from different computers that are part of a network.
- If you have used technologies to obtain information, what information did you collect?
I have used distributed storage to obtain information. The method was used in peer network data stores. I collected information from other people’s computers which were used as storage nodes. The network’s design allowed me to access information without problems (Li 275). My node was on the group’s network and I had the privilege of receiving service..............GET A PLAGIARISM FREE COPY