If you don't know what big data is, then 2013 must have a word for you to remember big data, is it a card house? Double, a prism door or Snowden? Don't worry, you can find the answer by analyzing the data.
Tags: card house
--"Little Times" did you read it? Or did you see it? Or did you read it?
The American video web site Netflix's "Solitaire House" was a big success this year, and the show was based on big data. Now the show has become a classic case of large data, and its success has made people aware of the value of data analysis to film and television creation, including the script, the director, the choice of actors, as well as filming, post-production and marketing.
If a large number of users press pause here, this may be the legendary "urine point", when users get together to choose "Fast forward", indicating "boring here, this kind of plot less use later"; When the user repeatedly watch a plot, it explains "here is very moving, later can add play".
And a small age, which also uses big data, has also been hot in the country. "Small Time" long before the investment, the production side of the same name of the original online clicks, users and other key data research, analysis of the film's core and audience. In the end, only 20 million of the cost of the "small age" in exchange for nearly 500 million of the box office. If the return on investment is calculated, it may be the most profitable Chinese film of the year.
But not everyone is bullish on the model. Dream Factory CEO Katzenberg said, "Film creation can not rely solely on data analysis, to rely on creativity." "Sohu Video chief operating Officer Chun said," for the domestic film and television market, the full use of large data to determine the content is not feasible, not too much myth big data. "In this respect, China Strategy film and television related people also agree," big data like a nautical chart, film and television company is a ship, if the nautical chart is not allowed, we have experienced captain. ”
You can hate "The Little times", but you must not ignore its pattern.
Key words: Prism door
Leaders of the world say the pressure is Alexander.
Global public opinion supercharged as former US CIA employee Gordon Snowden unveiled the American Prism program. Snowden, who worked for the NSA, said the NSA and the FBI had a secret project code-named "Prism" that tracked millions of of Americans ' phone calls and internet records.
As events continue to be exposed, 9 Internet giants, including Microsoft, Yahoo, Google and Apple, are involved. From heads of state to daily meeting records, from Europe to Latin America, from traditional allies to partners, even the United Nations Development Programme, the United Nations Children's Fund and other countries and institutions are the United States surveillance coverage.
In the internet age, a lot of people's behavior will leave traces, and large data technology is just to collect and collate this data provides the possibility. But access to data can be accompanied by privacy issues. The temptation to get data from the Big data outlook is much greater than that of people who care about privacy.
"Prism Gate" provides a model for people to reflect on personal privacy and public security in the era of large data.
Key words: Hotel open room information was leaked
Do you dare to open a room after this?
Black Cloud Network October 5 public reports show that, such as home, Han Court, 7 days, Greentree Inn and other well-known chain hotels all or part of the use of the Hui Tatsu hotel Wi-Fi management and certification system. And the Hui Tatsu station in the server real-time storage of these hotel customer information, including name, ID number, open room date, room number and other privacy information.
When guests connect to these hotels Wi-Fi access, they will be required to authenticate through the Web page. But this certification is not through the hotel's server, but at the Hui Tatsu Station server completed. Because the system design flaw, the customer entered the name, room number, ID card number and other information, in the process of uploading to the server may be stolen.
It is understood that after the site entered the name of the database will be able to have all the names of the same person's personal data, including ID number, e-mail, mobile phone number and the date of registration and so on. If you enter the ID number, you can directly find the person's open room information.
The site is currently inaccessible, but the disclosure of personal information has become a reality.
Key words: Double xi.
-Did you join the fun this year?
35 billion turnover, 152 million parcel volume, this is the "Double 11" Day Cat created shopping miracle.
And last year "double 11" express by the people are different, this year, "Double 11" on the day there are many netizens in micro-bo, micro-letter Sun has received the package. And the foundation behind these changes is big data. Due to the wide application of large data analysis, this year "double 11" logistics overall speed up.
Early in the "Double 11" early days, the cat will be the Electronic Business platform logistics data to the full open to the business, to guide the full preparation of business. In addition, the cat logistics data according to the location of promotional venues, different commodity categories, analysis of transactions and path efficiency, the proposal to store goods, and then according to the historical distribution of merchandise sales area to guide the merchant to carry out the front branch warehouse.
"Double 11" period, the rookie network to logistics enterprises and businesses to provide a new data radar, the whole process of monitoring the courier station, administrative districts and service outlets, in order to carry out the wrong peak shipments and transport to deploy. Considering last year's "Double 11" part of the region due to rain and snow weather affected the distribution, this year rookie network data radar with the meteorological Department to achieve the National expressway weather Real-time forecast, the relevant information at the same time open to businesses, so that businesses in abnormal weather to develop marketing contingency plans.
From the rookie network, the National Post Office and the 13 major logistics companies of the linkage information, this year, "Double 11" of the logistics Transfer station to improve the processing capacity, some logistics companies 11th early morning two hours of package volume has exceeded last year "double 11" total. The National Post Office monitoring information shows that this year, "Double 11" all day express enterprises to deal with 6000多万件 Express, is last year, "double 11" peak 35 million pieces 1.7 times times, to achieve this year express daily processing volume of more than twice times.
Courier Savage Sorting still, but this year is indeed faster than last year!
Key words: Mouse Barn
"Tiger" "Fly" to fight!
Recently, the Securities and Futures Commission has been investigating a group of fund managers suspected to be in a rat storehouse.
"Big Data" is the key weapon that makes "rat" nowhere to hide. The regulatory layer uses large data technology to sort out the information of investors ' huge amount of transactions, accounts and capital flows, digging out the related information behind the data, and discovering abnormal accounts by comparing the data. For example, each fund company has stock trading details, the regulatory department uses monitoring data to search for a number of transactions similar to the suspicious accounts, and then through artificial screening, positioning behind the operator.
Big data is now playing an increasingly powerful role in regulation compared with the old rat barn, which is largely reported. For example, a stock has a big short-term gain, or due to a major positive suspension, generally based on the previous day's volume screening of the top 500 institutions or individual investors, the exchange every night will be screened, the suspect account will be longitudinal view of suspicious behavior, thus locking suspects, and large data makes all this easy.
It is understood that through large data to find suspicion, but also through the bank transfer, trade traces, call records and other aspects of comprehensive investigation. For example, the former Star fund manager, Li Xuli, was given a 3 million bonus to transfer to his wife's She Sheme account and then to the Yeu Pengjin account he controlled, thus providing a breach of the case.
An unprecedented crackdown on "rat silos" is taking advantage of the "big Data" monitoring system.
Key words: Big Data national strategy
This thing really pays attention!
"Prism Gate" and the United States "big Data strategy" has the inevitable link. In March 2012, the Obama administration elevated the "Big Data Strategy" to the highest national policy, thinking that big data is the "new oil" of the future, and that the possession and control of data is another core capability of the country beyond the Lu Quan, sea and air rights.
In 2013, several academicians suggested to the senior level that China should develop a national strategy for large data and make top-level design in terms of development objectives, development principles and key technologies. The main contents include: Building large data research platform, integrating innovative resources, implementing "Special Plan", breaking through key technology, constructing large data benign ecological environment, formulating supporting policy, forming industry Alliance, making industry standard, constructing large data industry chain, promoting effective grafting of innovation chain and industry chain.
"While we are aware of the importance of large data and do not really raise it to a national strategic level, we urgently need to develop large data development plans at the national level and to raise large data into national strategies," one academician said in the report. ”
Authorities said the authorities are actively studying the big Data national strategy or will be put on the agenda.