Welcome!

Related Topics: @BigDataExpo, @CloudExpo, @ThingsExpo

@BigDataExpo: Blog Feed Post

Whose Data Is It? | @CloudExpo #IoT #AI #ML #DL #M2M #BigData #Analytics

It now seems that sports, in this case the NBA, are breaking new ground with another data analytics topic: who owns the data?

Many times, sports have been at the leading edge of data analytics.  The book “Moneyball” was one of the first popular books to bring the basic concepts behind data analytics and data science to the general audience.  Fantasy leagues, sabermetrics and even games like “Strat-O-Matic” baseball and basketball provided an introduction into basic statistical concepts.

And it now seems that sports, in this case the National Basketball Association (NBA), are breaking new ground with another data analytics topic: who owns the data?  The National Basketball Players Association recently banned NBA teams from using a player’s wearable data in contract negotiations or other transactions (see “NBA Bans Teams From Using Wearable Data In Contract Negotiations”).

Maybe after the bitter fights professional and college athletes had about their “likeness” being used for advertising and promotions (think College Hoops 2K8), the players association wanted to get ahead of the curve on the data ownership issue.  If that’s the case, then that’s a very smart move – and a very telling move.  It brings to light a very interesting question:  who owns the personal data coming off wearables and other “intelligent” devices, and when and how can that personal data be used?

It’s easy to imagine how the NBA owners, agents and coaches could use the wearables data.  But there is already a plethora of data available on player performance.  Do I really need wearables data to tell me that Carmelo Anthony (over-rated New York Knicks forward) doesn’t hustle back on defense (or maybe even play defense)?  I can just look at some basic statistics to uncover that insight (see Table 1)

Offensive Real Plus-Minus

Defensive Real Plus-Minus

Carmelo Anthony, New York Knicks 2.18 -1.84
League Rank #35 out of 445 #403 out of 445

Table 1:  Source: http://www.espn.com/nba/statistics/rpm/_/sort/ORPM

From Table 1, we can see that Carmelo Anthony ranks #35 out of 445 NBA players for offensive effectiveness; however, he only ranks #403 out of 445 players on defensive effectiveness.  Again, I don’t need to see wearables data to understand where during the game Carmelo Anthony is putting his effort and hustle[1].  Plus there are other ways to get much of the same performance and effort data, such as video analytics.

Wearables data could be very beneficial to teams and players by scientifically flagging when a player is gassed and needs a rest, or whose body might be breaking down and needs to take a game off.  Wearables data could be used to create personalized training programs that optimize an individual athlete’s strength, endurance and agility capabilities.  Wearables data could be used to minimize training injuries and speed injury recovery.  The number of ways that wearables data, especially combined with in-game performance numbers and other external sources such as weather (temperatures, humidity, precipitation), social media and location data, could improve individual athlete as well as team performance is only being scratched.

By the way, check out the twitter account https://twitter.com/strong_science for examples as to how leading edge sports teams and athletes are combining data and analytics to achieve superior player development and in-game performance.

So Who Owns the Nest Data?
In order to take this conversation to the next level, I wanted to get a feel for the privacy statements that shield our personal information from being exploited for nefarious uses.  So I checked out a sample Privacy Policy.  And given the growing explosion of in-home Internet of Things (IOT) devices, I thought I’d start with the industry leader in home-based sensors and devices…Google Nest.

Just imagine all the insights that Google Nest could glean from having sensors placed throughout your house.  Here are just a few examples of the types of insights that Nest could glean from that data:

  • How many people live in the house?
  • When those people are typically home during the week?
  • When those people are typically home during the weekend or holidays?
  • When do they typically go to bed?
  • When do they typically get up in the morning?
  • Is there movement during the sleep period and if so, when and where is that movement?
  • When are the residents on vacation? When do they typically go on vacation?  How long are they typically gone while on vacation?
  • Do they take weekends away from the home (like ski weekends) and does that correlate to any holidays or
  • Does the time away from the home correlate to turning down the heat?
  • And more!

Boy, the Google Nest could know an awful lot about your home living patterns and tendencies.  That could be quite dangerous if all that were to get into the wrong hands.  So let’s see how Google Nest is protecting our personal and residence data via their privacy policy.

Here is the Google Nest Privacy Policy:

Device Usage information: If you are logged into your Nest account, we record the IP address you visit our website from, and if you have a Nest device or other connected device, we record adjustments you make to the product through the website interface. We store this data along with your email address, information about your Nest device, data collected directly by the device, a history of your device settings, and any other information we have collected about your use of Nest products and services. See our Privacy Statement for Nest Products and Services to learn more about the usage information collected through our products.

Okay, so not much comfort here that my personal data is being protected and won’t be used for whatever purpose Google decides.  But here is what I found even more concerning, selecting the “See our Privacy Statement for Nest Products and Services” link took me right back to this statement.  Yea, a circular reference to a privacy statement that says nothing about how they are going to protect your information.  If you have a Nest device and are not concerned, well I got a bridge in San Francisco to sell you…

Summary
As IOT devices continue to invade our homes, cars, work areas, shopping malls, movie theaters, coffee shops, grocery stores, sporting arenas, concert halls and airports, the multitude of different organizations that “own” that data will only become more confusing.  And while that data has great potential to do good for the individual, it also has the potential for much bad as well.  This issue is only going to grow as IOT continues its meteoritic growth in all aspects of our lives.  Read a few privacy policies and you will soon realize that the only thing that separates good from bad is only a few words in a paper-thin privacy policy.

And that should scare you.

[1] Real Plus-Minus (RPM) Real Plus-Minus is meant to be predictive.  RPM can help coaches (and agents) differentiate between players who have been consistently good (and will likely keep being good) and players who are merely going through a hot streak (and will likely regress to their mean).

The post Whose Data is it? appeared first on InFocus Blog | Dell EMC Services.

More Stories By William Schmarzo

Bill Schmarzo, author of “Big Data: Understanding How Data Powers Big Business”, is responsible for setting the strategy and defining the Big Data service line offerings and capabilities for the EMC Global Services organization. As part of Bill’s CTO charter, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He’s written several white papers, avid blogger and is a frequent speaker on the use of Big Data and advanced analytics to power organization’s key business initiatives. He also teaches the “Big Data MBA” at the University of San Francisco School of Management.

Bill has nearly three decades of experience in data warehousing, BI and analytics. Bill authored EMC’s Vision Workshop methodology that links an organization’s strategic business initiatives with their supporting data and analytic requirements, and co-authored with Ralph Kimball a series of articles on analytic applications. Bill has served on The Data Warehouse Institute’s faculty as the head of the analytic applications curriculum.

Previously, Bill was the Vice President of Advertiser Analytics at Yahoo and the Vice President of Analytic Applications at Business Objects.

Latest Stories
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
Wooed by the promise of faster innovation, lower TCO, and greater agility, businesses of every shape and size have embraced the cloud at every layer of the IT stack – from apps to file sharing to infrastructure. The typical organization currently uses more than a dozen sanctioned cloud apps and will shift more than half of all workloads to the cloud by 2018. Such cloud investments have delivered measurable benefits. But they’ve also resulted in some unintended side-effects: complexity and risk. ...
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engaged. Old habits die hard, but like most waterfall software projects, most waterfall-style Agile adoption efforts fail to produce the results desired. The problem is that to get the results they want, they have to ch...
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend 21st Cloud Expo October 31 - November 2, 2017, at the Santa Clara Convention Center, CA, and June 12-14, 2018, at the Javits Center in New York City, NY, and learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, Doug Vanderweide, an instructor at Linux Academy, discussed why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers wit...
The taxi industry never saw Uber coming. Startups are a threat to incumbents like never before, and a major enabler for startups is that they are instantly “cloud ready.” If innovation moves at the pace of IT, then your company is in trouble. Why? Because your data center will not keep up with frenetic pace AWS, Microsoft and Google are rolling out new capabilities. In his session at 20th Cloud Expo, Don Browning, VP of Cloud Architecture at Turner, posited that disruption is inevitable for comp...
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations might...
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
When growing capacity and power in the data center, the architectural trade-offs between server scale-up vs. scale-out continue to be debated. Both approaches are valid: scale-out adds multiple, smaller servers running in a distributed computing model, while scale-up adds fewer, more powerful servers that are capable of running larger workloads. It’s worth noting that there are additional, unique advantages that scale-up architectures offer. One big advantage is large memory and compute capacity...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists discussed...
Cloud applications are seeing a deluge of requests to support the exploding advanced analytics market. “Open analytics” is the emerging strategy to deliver that data through an open data access layer, in the cloud, to be directly consumed by external analytics tools and popular programming languages. An increasing number of data engineers and data scientists use a variety of platforms and advanced analytics languages such as SAS, R, Python and Java, as well as frameworks such as Hadoop and Spark...