Reduce business efficiency: technology is not always the solution
There is a tendency in developers today to consider IT as a solution to the complex challenges of companies or industries. Confidential terms are implemented in accordance with SOX rules and numerous other rules (can be found in utility software functions). The future manages a series of applications that place on the tiny shoulders of RFID chips. If only the health care center, heavy industry manufacturers and other atheists are high-tech followers, the price will decrease, quality will increase. and industries that often encounter troublesome problems will be more stable.
Yes, but that's just a level. It is funny to assume that any vertical or horizontal process can be advanced, but only needed for each technology. If you are FedEx, do you provide customers with real-time information in each transit service package that is in fact extremely important? Better yet, you should at least be an expert in goods distribution. If you are Dell, do you apply a range of automated and effective services, considering it a key to success? Building a reliable computer with the latest functions is better.
Technology initiatives are often an important factor that allows and helps businesses navigate their companies, creating significant changes. But rarely technology is done alone without accompanying other companions. Sometimes applying the wrong technology also causes disruption and waste of your time and money.
In an effort to try to use the data-mining method to stem the terrorists, the US government is working on putting a lot of money and human resources into technology policy. Art but still not achieved as desired. Two analysts Jim Harper of Cato Academy and Jeff Jonas Jeff of IBM have debated this issue.
Predictive analysis means running the exploited data (specialized data: historical data) according to mathematical algorithms to determine trends, models and predict future results. Previously, in 2004, the US Department of Finance conducted a total of 199 projects using intelligent analysis software to track terrorist traces. Eight of them violate both private data fields such as personal information provided by many sources. Currently, the US Security Office (NSA) has stated that it is continuing to implement the phone-tapping program of millions of Americans to create a huge database that helps NSA carry out distributed activities. Accumulated according to the model, seeking traces of terror. No one knows how many employees are released for this campaign, but in fact Cognos, IBM, Teradata and other companies and consultants are also working with the government.
Harper and Jonas (principal analyst and data mining hardware "core" in IBM's Entity Analytic Solutions Group) agreed and said that data mining is useful when determining the buying habits of customers and financial frauds. They said: if you are trying to increase the rate of attracting consumers, such as in an advertising campaign, data mining can at least help you increase by 5%; Although it is not very high, it is enough. However, data mining to detect some of the possible names of terrorism among hundreds of millions of people requires several times more accuracy, but the current technology is not yet met. Remember that " often terrorists never leave too many signs or appear at sufficient frequency to make accurate predictive models ." For example, register analysis often causes errors of up to 90% and results returned after the analysis process to predict terrorism are often " useless and potentially harmful ".
Data mining has been legalized in the US, but there are also certain limitations. In Richmond (Valensia), police are only allowed to analyze data to determine the likelihood that a crime may appear in a particular area with a certain time. Thus, the commander can direct the exact location and time for his staff to operate. " There is no harm in deploying a mandatory task in a certain area according to certain steps ," Harper said. " It will only be harmful to put someone into a suspicion of 'involvement in a terrorist plan' ."
We cannot deny the extremely important role of technology in life as well as in business.But choosing technology so that it is accurate and effective is not important, especially in the era of rapidly changing technology like the current storm.Technology abuse - very easy, but effective or not, is not known.The US government uses sophisticated techniques with the help of information technology giants that can exploit the data of people without difficulty, but the downside of it (infringing on their own interests private) is causing many grievances among millions of US residents.Careful consideration before making a decision to upgrade new technology is always recommended by experts.
- Desalination Technology - Solution for water crisis
- Seagate launches a new storage solution
- More and more CIOs come to BI
- Ebay consider selling Skype
- VPro platform helps reduce 7% - 95% of maintenance costs
- Waste water treatment by flotation tank
- Microsoft chose FPT as the first strategic partner in Southeast Asia
- Solution to effectively handle oil-contaminated bilge water
- Nanotechnology helps increase thermal efficiency
- Scientific innovations that improve agricultural production efficiency
- What's inside the price of
- Vietnam's bio-oil technology is highly appreciated