Browse Definitions :
Definition

smart data

Smart data is digital information that is formatted so it can be acted upon at the collection point before being sent to a downstream analytics platform for further data consolidation and analytics. The term smart data is often associated with the Internet of Things (IoT) and the data that smart sensors embedded in physical objects produce.

The label smart is directly related to a data entry point being intelligent enough to make some types of decisions on incoming data immediately, without requiring processing power from a centralized system. In the past, most analytics was done with batch processing. Data was collected according to schedule, converted to a desired state, put into a database and processed on an hourly, overnight or weekly basis. A drawback of this approach is that by the time the data is analyzed, it’s already old. In contrast, smart data analytics programming (also called streaming analytics) monitors data at the source, captures events that are exceptions, assesses them, makes a decision and shares the output -- all within a specific window of time consisting of seconds or fractions of a second.

A self-driving car, for example, can’t afford to wait for data to be sent up to the cloud and output to be sent back. It requires data gathered through sensors to be smart, so the data can be immediately analyzed by the automobile’s processors and outputs can immediately be sent to actuators that control the car’s brakes and steering wheel. If the data is not in a form that can be analyzed as soon as processors receive it, the consequences can be deadly.

Data scientists, business analysts, IT managers, marketing professionals and manufacturers are also experimenting with how to use edge computing and smart data devices to bring in more revenue, improve decision-making processes and spot problems before equipment fails.

Applications of smart data
Applications of smart data

This was last updated in December 2016

Continue Reading About smart data

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • multifactor authentication (MFA)

    Multifactor authentication (MFA) is a security technology that requires more than one method of authentication from independent ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close