Making Data Scientists More Productive

The ability to harness data to solve critical business challenges is an essential skill for every organisation today. 
There are two primary roles responsible for this function, data scientists and data analysts, comprising over 200 million users worldwide. 
 
Unfortunately, these people spend the majority of their time performing tasks that are not core to their high value responsibilities, such as finding data, preparing data, and optimising data for their analysis. As with many high value roles, complementary specialised roles emerge that allow each participant to be as efficient as possible. 
 
Consider healthcare, for example, where doctors work with nurses, allied health professionals, physician’s assistants, office managers, and other roles to maximise the time each doctor practices medicine. Today our data scientists and data analysts are more like doctors who perform many of these functions themselves. 
 
We are fairly early in our evolution of roles to fulfill the end to end process of data analytics, and there is still tremendous opportunity to improve efficiency with better specialisation of roles. 
 
We can see the emergence of a new role: the data curator.
 
If we look at all the different roles involved in data analytics, we can first rationalise responsibilities based on the larger organizations of IT and the business. At present. there are individuals who reside in IT, data engineers and data custodians, as well as those who sit in the business, data analysts and data scientists. In 2018 we will increasingly see data curators, a new role within the business that focuses on bridging the worlds of business and IT in terms of data analytics. 
 
Let’s take a look at these roles and their responsibilities:
 
• Data scientists use tools like Python and R to build models that provide predictions, recommendations, and visualisations based on data inputs. They work within the business and rely on IT to provision their data.
• Data analysts use BI tools to develop visualisations, reports, and dashboards that help to tell a story about business data. They work within the business and rely on IT to provide access to data from different applications and systems.
• Data custodians are responsible for defining and documenting technical controls that safeguard the data across many different systems. They work within IT using security access controls and data management tools to standardise provenance and access to the data.
• Data engineers have a deep understanding of the systems and infrastructure that generate and store the business data. They work in SQL, Python, Java, and other languages to query, transform, aggregate, and move data between systems for different end user needs. They work within IT.
• Data curators sit within the business, using self-service data platforms to curate data for different analytical tasks, to allocate computational resources for accelerating data analysis, to add semantic meaning to a data catalog, to accelerate high-value datasets, to blend datasets together, and to organise project areas for teams of data analysts and data scientists to work together more effectively. 
 
Data analysts and data scientists understand the meaning of the data, but they rely on IT to source the data they need, and to apply and changes necessary to reshape and transform the data for their needs. 
 
More often than not, these individuals find themselves waiting on IT to perform these tasks, and they take matters into their own hands, making copies of the data that are no longer governed by the central controls of the organisation. More importantly, it means these high value individuals are not performing the work that is essential to their role.
 
As companies embrace more of a self-service model for their data scientists and data analysts, they are using data curators to make these individuals more productive and more impactful to the business. 
 
Data curators streamline the process of sourcing, organising, and accelerating data for analysis. They know the data and understand the analytical workloads better than data engineering since they are closer to the business units. 
 
The data curator has a good understanding of the types of systems that store the data, and the types of tools that can be used for processing the data, even if they are not practitioners of these technologies themselves. They have up-to-date knowledge about datasets, their provenance, and what data curation is needed.  They also understand the different types of analysis that need to be performed on specific datasets, as well as the expectations in terms of latency and availability set by diverse business users.
 
By working with data engineers, data custodians, data analysts, and data scientists, the data curator develops a deep understanding of how data is used by the business, and how IT applies technology to make the data available. 
Data curators are making data analysts and data scientists more productive by allowing them to focus on what they do best. 
 
Information- Management
 
You Might Also Read:
 
Data Scientists Remain Top Of ‘most wanted’ Employees:
 
What Makes A Data Scientist?:
 
« India’s Political Parties Fighting A Cyberwar
Google’s AutoML Offers Machine Learning Models Without Having To Code »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Renaissance

Renaissance

Renaissance is Ireland's premier value added distributor of IT security solutions and a leading independent provider of business continuity consultancy.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

Cyber DriveWare

Cyber DriveWare

DriveWare analyzes new traffic in the I/O layer and blocks malware and cyber attacks which organizations have no means to protect against.

HYAS Infosec

HYAS Infosec

HYAS is a highly skilled information security firm developing the next generation of information security technology.

BlueVoyant

BlueVoyant

BlueVoyant's Cyber Defense Platform is security operations platform that provides real-time threat monitoring for networks, endpoints, and supply chains.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

Sikur

Sikur

Sikur have developed a communication platform that sets new boundaries for corporate privacy and security.

Cryptovision

Cryptovision

Cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and solutions for secure electronic identities.

Segusoft

Segusoft

With its encryption platform SEGULINK, Segusoft provides standard software for companies to securely transfer files and messages.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

DatChat

DatChat

DatChat Inc. is a blockchain, cybersecurity, and social media company that focuses on protecting privacy on our devices and also protecting our information after we have shared it with others.

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

Campus cyber

Campus cyber

A project initiated by the President of the Republic, the Cyber Campus is the totem site of cybersecurity that brings together the main national and international players in the field.

8com

8com

8com is an established Managed Security Service Provider (MSSP) with over 75 employees and customers in over 40 countries.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.