Big data and its impact on IT consultancy
This paper discusses some of the areas which encompass big data and its adoption within Information Technology (IT) consultancy and professional practice. Among the issues that are highlighted in this paper are the relation of big data and its relevancy to IT consulting practice, why big data is inc...
| Main Authors: | Mohamed, Habab, Md Hasim, Nur Nadiah, Zangirova, Alfiya, Ibrahim, Jamaludin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Research Publish Journals
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/53508/ http://irep.iium.edu.my/53508/1/2016-Big%20Data%20and%20Its%20Impact%20on%20IT%20Consultancy-3245.pdf |
Similar Items
The effect of web-based social networking on consultancy
by: Shaikh, Humaiz, et al.
Published: (2019)
by: Shaikh, Humaiz, et al.
Published: (2019)
SmartCrowd: novel approach to big crowd management using mobile cloud computing
by: Ali, Mohammed Fazil, et al.
Published: (2015)
by: Ali, Mohammed Fazil, et al.
Published: (2015)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Metrics for computing performance of data center for instigating Energy Efficient Data center
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
Ethical communication in IT project from an Islamic perspective
by: Nizam, Mohamed, et al.
Published: (2012)
by: Nizam, Mohamed, et al.
Published: (2012)
Calculus and its applications in scale-free networks
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
Energy efficiency in virtualized data center
by: Karamat Khan, Tehmina, et al.
Published: (2018)
by: Karamat Khan, Tehmina, et al.
Published: (2018)
How IT can enhance professional practice with regards to smart-phones and social networks?
by: Hassan, Nuradin Ibrahim, et al.
Published: (2016)
by: Hassan, Nuradin Ibrahim, et al.
Published: (2016)
Prevalence of mobile usage among university students: a case study of International Islamic University Malaysia
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
The future of data privacy and security concerns in
Internet of things
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
Using biometric techniques to secure online student assessment: Comparative study
by: Ibrahim, Jamaludin, et al.
Published: (2011)
by: Ibrahim, Jamaludin, et al.
Published: (2011)
Implementation of server virualization to build energy efficient data centers
by: Uddin, Mueen, et al.
Published: (2014)
by: Uddin, Mueen, et al.
Published: (2014)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
Using lexical ontology for semi-automatic logical data warehouse design
by: Mior Nazri, Mior Nasir, et al.
Published: (2010)
by: Mior Nazri, Mior Nasir, et al.
Published: (2010)
Power usage effectiveness metrics to measure efficiency and performance of data centers
by: Uddin, Mueen, et al.
Published: (2014)
by: Uddin, Mueen, et al.
Published: (2014)
Application of GIS-planning decision support system in predicting development impact assessment
by: Asmawi, M. Zainora, et al.
Published: (2011)
by: Asmawi, M. Zainora, et al.
Published: (2011)
Critical infrastructure protection of ICT in Muslim world
by: Abdulrahman Ali, Sami Mohammed, et al.
Published: (2016)
by: Abdulrahman Ali, Sami Mohammed, et al.
Published: (2016)
Mobile agent based multi-layer security framework for cloud data centers
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Detecting change from social networks using temporal analysis of email data
by: Nusratullah, Kajal, et al.
Published: (2018)
by: Nusratullah, Kajal, et al.
Published: (2018)
Application service delivery in the modern virtualized data center-improving reliability and scalability
by: Raza, A, et al.
Published: (2016)
by: Raza, A, et al.
Published: (2016)
Increasing the runs in compressed data using a dedicated move to front algorithm
by: Al-Khayyat, Kamal A., et al.
Published: (2019)
by: Al-Khayyat, Kamal A., et al.
Published: (2019)
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
by: Islam, Thouhedul, et al.
Published: (2017)
by: Islam, Thouhedul, et al.
Published: (2017)
Cyber risk management for wireless communication in organization
by: Mutakin, Darul, et al.
Published: (2016)
by: Mutakin, Darul, et al.
Published: (2016)
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
A hybrid method using kinect depth and color data stream for hand blobs segmentation
by: Karbasi, Mostafa, et al.
Published: (2017)
by: Karbasi, Mostafa, et al.
Published: (2017)
Measuring the impact of service quality in telecommunication services of Pakistan: a conceptual framework
by: Rind, M. Malook, et al.
Published: (2015)
by: Rind, M. Malook, et al.
Published: (2015)
Gateway sink placement for sensor node grid distribution in LoRa smart city networks
by: Zainal, Nur Aishah, et al.
Published: (2018)
by: Zainal, Nur Aishah, et al.
Published: (2018)
Literature Survey on Enhancement of MOM for Intelligent Cross-Platform Communications in Service Oriented Architecture
by: Muhamad Ibrahim, Najhan
Published: (2018)
by: Muhamad Ibrahim, Najhan
Published: (2018)
Mathematical modeling using coordination mechanisms for multi-agent systems in service oriented architecture
by: Muhamad Ibrahim, Najhan
Published: (2019)
by: Muhamad Ibrahim, Najhan
Published: (2019)
A comprehensive comparative study of MOM for adaptive interoperability communications in service oriented architecture
by: Muhamad Ibrahim, Najhan, et al.
Published: (2019)
by: Muhamad Ibrahim, Najhan, et al.
Published: (2019)
New estimates of single photon parameters for satellite-based QKD
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Fiber and free-space practical decoy state QKD for both BB84
and SARG04 protocols
by: Ali, Sellami, et al.
Published: (2010)
by: Ali, Sellami, et al.
Published: (2010)
A novel scheme of binding update no sense drop BCE in LMA
by: Geaiger, Mohamed, et al.
Published: (2014)
by: Geaiger, Mohamed, et al.
Published: (2014)
Visualization of job availability based on text analytics localization approach
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019)
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019)
The design of a speech delay screening mobile application for Malaysian parents
by: Mohammed, Siti Asma, et al.
Published: (2019)
by: Mohammed, Siti Asma, et al.
Published: (2019)
Introducing autonomy in internet of things
by: Ashraf , Qazi Mamoon, et al.
Published: (2015)
by: Ashraf , Qazi Mamoon, et al.
Published: (2015)
Wireless energy harvesting for portable devices using split ring resonator
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
Influence of travel and tour website on tourist behaviour to determine destination in Malaysia among IIUM students in Pagoh, Johor.
by: Borahan, Nur Saiful Amree, et al.
Published: (2020)
by: Borahan, Nur Saiful Amree, et al.
Published: (2020)
Similar Items
-
The effect of web-based social networking on consultancy
by: Shaikh, Humaiz, et al.
Published: (2019) -
SmartCrowd: novel approach to big crowd management using mobile cloud computing
by: Ali, Mohammed Fazil, et al.
Published: (2015) -
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015) -
Metrics for computing performance of data center for instigating Energy Efficient Data center
by: Shah, Asadullah
Published: (2014) -
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)