Professional Documents
Culture Documents
266d17e2-ce85-41e4-979e-3be972a27f75
266d17e2-ce85-41e4-979e-3be972a27f75
266d17e2-ce85-41e4-979e-3be972a27f75
1. Listening:
practice active listening – pay close attention to what others are saying and
clarify
2. Conciseness:
Convey your message in as few words as possible. Do not use filler words and get
straight
to the point. Rambling will cause the listener to tune out or be unsure of what you
are
talking about. Avoid speaking excessively and do not use words that may confuse
the
audience.
3. Body language:
It is important to practice good body language, use eye contact, utilize hand gestures, and
watch the tone of the voice when communicating with others. A relaxed body stance with
a friendly tone will aid in making you look approachable by others.
Eye contact is important in communication – look the person in the eye to indicate that
you
are focused on the conversation. But make sure to not stare at the person as it can make
4. Confidence:
Be confident in what you say and in your communication interactions with others. Being
confident can be as easy as maintaining eye contact, maintaining a relaxed body stance,
and talking with concision. Try not to make statements sound like questions and
avoid
5. Open-mindedness:
In situations where you disagree with what someone else has to say, whether it be with an
rather than simply try to get your message across. Respect the opinion of others and
never
38
NEP - 2020
6. Respect:
Respecting what others have to say and acknowledging them is an important
aspect of
communication. Being respectful can be as simple as paying attention to what they have
to
say, using the person’ s name, and not being distracted. By respecting others, the
other
person will feel appreciated, which will lead to a more honest and productive
conversation.
the
right one. For example, communicating in person about serious matters (layoffs,
salary
changes, etc.) is more appropriate than sending an email regarding the matter.
6. Respect:
communication. Being respectful can be as simple as paying attention to what they have
to
say, using the person’ s name, and not being distracted. By respecting others, the
other
person will feel appreciated, which will lead to a more honest and productive
conversation.
right one. For example, communicating in person about serious matters (layoffs,
salary
changes, etc.) is more appropriate than sending an email regarding the matter
Data Collection: Data is the core of Big Data Analytics. It is the gathering of data from
different sources such as the customers’ comments, surveys, sensors, social media,
and so on.
Data Cleaning (Data Preprocessing): The next step is to process this information. It
often requires some cleaning. This entails the replacement of missing data, the
correction of inaccuracies, and the removal of duplicates.
Data Processing: After that we will be working on the data processing. This process
contains such important stages as writing, structuring, and formatting of data in a way it
will be usable for the analysis.
Data Analysis: Data analysis is being done by means of statistical, mathematical, and
machine learning methods to get out the most important findings from the processed
data.
Data Visualization: Data analysis usually is presented in visual form, for illustration –
charts, graphs and interactive dashboards.
Data Storage and Management: The stored and managed analyzed data is of utmost
importance. It is like digital scrapbooking. May be you would want to go back to those
lessons in the long run, therefore, how you store them has great importance.
1. Apache Storm
Apache Storm is a real-time distributed tool for processing data streams. It is written in
Java
1. Apache Storm
Apache Storm is a real-time distributed tool for processing data streams. It is written in
Java
Spark: Think of Spark as the super-fast data chef. Netflix uses it to quickly analyze what
you watch and recommend your next binge-worthy show.
NoSQL Databases: NoSQL databases, like MongoDB, are like digital filing cabinets that
Airbnb uses to store your booking details and user data.
Tableau: Tableau is like an artist that turns data into beautiful pictures.
Python and R: Python and R are like magic tools for data scientists. They use these
languages to solve tricky problems.
Disadvantages or Challenges of Big data analytics
Data Overload: Consider Twitter, where approximately 6,000 tweets are posted
every second. The challenge is sifting through this avalanche of data to find valuable
insights.
Data Quality: If the input data is inaccurate or incomplete, the insights generated
by Big Data Analytics can be flawed. For example, incorrect sensor readings could
lead to wrong conclusions in weather forecasting.
Privacy Concerns: With the vast amount of personal data used, like in
Facebook’ s ad targeting, there’ s a fine line between providing personalized
experiences and infringing on privacy.
Security Risks: With cyber threats increasing, safeguarding sensitive data
becomes crucial. For instance, banks use Big Data Analytics to detect fraudulent
activities, but they must also protect this information from breaches.
Costs: Implementing and maintaining Big Data Analytics systems can be
expensive. Airlines like Delta use analytics to optimize flight schedules, but they
need to ensure that the benefits outweigh the costs.
1. Descriptive Analytics
This summarizes past data into a form that people can easily read. This helps in creating
reports, like a company’ s revenue, profit, sales, and so on. Also, it helps in the tabulation
of social media metrics.
2. Diagnostic Analytics
This is done to understand what caused a problem in the first place. Techniques like
drill-down, data mining, and data recovery are all examples. Organizations use diagnostic
analytics because they provide an in-depth insight into a particular problem.
3. Predictive Analytics
This type of analytics looks into the historical and present data to make predictions of the
future. Predictive analytics uses data mining, AI, and machine learning to analyze current
data and make predictions about the future. It works on predicting customer trends,
market trends, and so on.
4. Prescriptive Analytics
3. Smart Traffic System: Data about the condition of the traffic of different road,
collected through camera kept beside the road, at entry and exit point of the city,
GPS device placed in the vehicle (Ola, Uber cab, etc.). All such data are analyzed and
jam-free or less jam way, less time taking ways are recommended.
4. Secure Air Traffic System: At various places of flight (like propeller etc) sensors
present. These sensors capture data like the speed of flight, moisture, temperature,
other environmental condition. Based on such data analysis, an environmental
parameter within flight are set up and varied.
5. Auto Driving Car: Big data analysis helps drive a car without human interpretation.
In the various spot of car camera, a sensor placed, that gather data like the size of
the surrounding car, obstacle, distance from those, etc. These data are being
analyzed, then various calculation like how many angles to rotate, what should be
speed, when to stop, etc carried out.
The Different Types of Cybersecurity
1. Network Security
Most attacks occur over the network, and network security solutions are designed to
identify and block these attacks. These solutions include data and access controls such
as Data Loss Prevention (DLP), IAM (Identity Access Management), NAC (Network
Access Control), and NGFW (Next-Generation Firewall) application controls to enforce
safe web use policies.
2. Cloud Security
3Endpoint Security
With endpoint security, companies can secure end-user devices such as desktops and
laptops with data and network security controls, advanced threat prevention such as
anti-phishing and anti-ransomware, and technologies that provide forensics such as
endpoint detection and response (EDR) solutions.
Mobile security
Mobile security prevents these attacks and secures the operating systems and devices
from rooting and jailbreaking. When included with an MDM (Mobile Device Management)
solution, this enables enterprises to ensure only compliant mobile devices have access to
corporate assets.
IoT security
IoT security protects these devices with discovery and classification of the connected
devices, auto-segmentation to control network activities, and using IPS as a virtual patch
to prevent exploits against vulnerable IoT devices. In some cases, the firmware of the
device can also be augmented with small agents to prevent exploits and runtime attacks.
Applications of Cybersecurity:
DDoS security: DDoS stands for Distributed Denial for Service attack. In this
digital attack, the attacker uses multiple numbers of devices to keep the web server
engaged in accepting the requests sent by him from the multiple devices. It creates
fake website traffic on the server.
Web Firewall: A web application server-based firewall gets applied on a large
area network and it checks all the incoming and outgoing traffic on the server and it
automatically tracks and removes fake and malicious website traffic.
Bots: Nowadays, many hackers and attackers use bots to cause multiple device
traffic on the server to make it crash. Cybersecurity helps to deal with identifying
fake users i.e. bots and make them log out of their sessions so they don’ t affect
the experience of the normal users.
Antivirus and Antimalware: Cybersecurity is used to develop Antivirus and
Antimalware software for preventing all the digital attacks on the computer and
protecting these devices from data breaches, digital attacks, and unauthorized
attacks from hackers. It also helps in maintaining network security and firewall
systems for all the connected devices on the network.
Threat management systems: Cybersecurity helps to deal with digital threats
and attacks on computer systems. It identifies different points of vulnerabilities and
bugs in the system that can be used by hackers and attackers to defy with it and it
automatically optimizes all the defects in it with the ability to improve in
performance issues.
benefits of cloud
Reduced costs: Maintaining IT systems requires big outlays of capital, something that
cloud helps reduce. By using the resources provided by the cloud provider, businesses
avoid the need to purchase expensive infrastructure, substantially reducing their
expenditure.
Scalability: Cloud allows organizations to grow their users from merely a few to
thousands in a very short time. Depending on the need, a business can scale their storage
needs up or down, allowing organizations to be flexible.
Flexibility and collaboration: Since the data on cloud can be accessed directly via the
internet, it gives employees the ability to work from anywhere, anytime.
Business continuity: Cloud safely stores and protects your data in the event of an outage
or crisis. This makes it easier to resume work once the systems are up and running again.
Competitive edge: Cloud takes care of various business aspects, such as maintaining the
IT infrastructure, licensing software, or training personnel to manage your data.
Disadvantages
Downtime: Almost every cloud user will tell you that outages tops their list of cloud
computing challengesOpens a new window . At times, cloud service providers may get
overwhelmed due to the huge number of clients they provide services to each day.
Internet connection dependency: A user may not be able to access the data on cloud
without a good internet connection and a compatible device.
Security risks: Even if your cloud service provider promises you that they have the most
reliable security certifications, there’ s always a chance of losing your data.
Limited access: A user may have minimal control since the cloud service provider owns
and manages the infrastructure.
Private cloud
In a private cloud, the computing services are offered over a private IT network for the
dedicated use of a single organization. Also termed internal, enterprise, or corporate
cloud, a private cloud is usually managed via internal resources and is not accessible to
anyone outside the organization.
Public cloud
Public cloud refers to computing services offered by third-party providers over the internet.
Unlike private cloud, the services on public cloud are available to anyone who wants to
use or purchase them. These services could be free or sold on-demand, where users only
have to pay per usage for the CPU cycles, storage, or bandwidth they consume.
Hybrid cloud
Hybrid cloud uses a combination of public and private cloud features. The “ best of both
worlds” cloud model allows a shift of workloads between private and public clouds as
the computing and cost requirements change. When the demand for computing and
processing fluctuates, hybrid cloudOpens a new window allows businesses to scale their
on-premises infrastructure up to the public cloud to handle the overflow while ensuring
that no third-party data centers have access to their data.
Industrial IoT (IIoT) refers to smart devices used in manufacturing, retail, health, and other enterprises
to create business efficiencies. Industrial devices, from sensors to equipment, give business owners
detailed, real-time data that can be used to improve business processes. They provide insights on
supply chain management, logistics, human resource, and production – decreasing costs and
increasing revenue streams.
People and homes. People make direct use of IoT devices through technology
that can be worn, such as smartwatches and fitness trackers, and devices that
help make receiving and collecting information possible in real time.
Cities. The combined uses of different IoT devices can cover urban and public
areas. IoT devices can gather data from and affect its environment to help
manage the various aspects of city governance, such as traffic control,
resource management, and public safety.