Making Data Scientists More Productive

The ability to harness data to solve critical business challenges is an essential skill for every organisation today. 
There are two primary roles responsible for this function, data scientists and data analysts, comprising over 200 million users worldwide. 
 
Unfortunately, these people spend the majority of their time performing tasks that are not core to their high value responsibilities, such as finding data, preparing data, and optimising data for their analysis. As with many high value roles, complementary specialised roles emerge that allow each participant to be as efficient as possible. 
 
Consider healthcare, for example, where doctors work with nurses, allied health professionals, physician’s assistants, office managers, and other roles to maximise the time each doctor practices medicine. Today our data scientists and data analysts are more like doctors who perform many of these functions themselves. 
 
We are fairly early in our evolution of roles to fulfill the end to end process of data analytics, and there is still tremendous opportunity to improve efficiency with better specialisation of roles. 
 
We can see the emergence of a new role: the data curator.
 
If we look at all the different roles involved in data analytics, we can first rationalise responsibilities based on the larger organizations of IT and the business. At present. there are individuals who reside in IT, data engineers and data custodians, as well as those who sit in the business, data analysts and data scientists. In 2018 we will increasingly see data curators, a new role within the business that focuses on bridging the worlds of business and IT in terms of data analytics. 
 
Let’s take a look at these roles and their responsibilities:
 
• Data scientists use tools like Python and R to build models that provide predictions, recommendations, and visualisations based on data inputs. They work within the business and rely on IT to provision their data.
• Data analysts use BI tools to develop visualisations, reports, and dashboards that help to tell a story about business data. They work within the business and rely on IT to provide access to data from different applications and systems.
• Data custodians are responsible for defining and documenting technical controls that safeguard the data across many different systems. They work within IT using security access controls and data management tools to standardise provenance and access to the data.
• Data engineers have a deep understanding of the systems and infrastructure that generate and store the business data. They work in SQL, Python, Java, and other languages to query, transform, aggregate, and move data between systems for different end user needs. They work within IT.
• Data curators sit within the business, using self-service data platforms to curate data for different analytical tasks, to allocate computational resources for accelerating data analysis, to add semantic meaning to a data catalog, to accelerate high-value datasets, to blend datasets together, and to organise project areas for teams of data analysts and data scientists to work together more effectively. 
 
Data analysts and data scientists understand the meaning of the data, but they rely on IT to source the data they need, and to apply and changes necessary to reshape and transform the data for their needs. 
 
More often than not, these individuals find themselves waiting on IT to perform these tasks, and they take matters into their own hands, making copies of the data that are no longer governed by the central controls of the organisation. More importantly, it means these high value individuals are not performing the work that is essential to their role.
 
As companies embrace more of a self-service model for their data scientists and data analysts, they are using data curators to make these individuals more productive and more impactful to the business. 
 
Data curators streamline the process of sourcing, organising, and accelerating data for analysis. They know the data and understand the analytical workloads better than data engineering since they are closer to the business units. 
 
The data curator has a good understanding of the types of systems that store the data, and the types of tools that can be used for processing the data, even if they are not practitioners of these technologies themselves. They have up-to-date knowledge about datasets, their provenance, and what data curation is needed.  They also understand the different types of analysis that need to be performed on specific datasets, as well as the expectations in terms of latency and availability set by diverse business users.
 
By working with data engineers, data custodians, data analysts, and data scientists, the data curator develops a deep understanding of how data is used by the business, and how IT applies technology to make the data available. 
Data curators are making data analysts and data scientists more productive by allowing them to focus on what they do best. 
 
Information- Management
 
You Might Also Read:
 
Data Scientists Remain Top Of ‘most wanted’ Employees:
 
What Makes A Data Scientist?:
 
« India’s Political Parties Fighting A Cyberwar
Google’s AutoML Offers Machine Learning Models Without Having To Code »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Skybox Security

Skybox Security

Skybox combines firewall and network device data with vulnerability and threat intelligence, putting security decisions in your unique network context.

HCL Technologies

HCL Technologies

HCL offer an integrated portfolio of products, solutions and services built around Digital, IoT, Cloud, Automation, Cybersecurity, Analytics, Infrastructure Management and Engineering Services.

UNIDIR Cyber Policy Portal

UNIDIR Cyber Policy Portal

The UNIDIR Cyber Policy Portal is an online reference tool that maps the cybersecurity and cybersecurity-related policy landscape.

Civic Technologies

Civic Technologies

Civic’s Secure Identity Platform (SIP) uses a verified identity for multi-factor authentication on web and mobile apps without the need for usernames or passwords.

African Cyber Security

African Cyber Security

African Cyber Security and it's partners, have the expertise and skills to provide holistic solutions for companies, institutions and government.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

SecureLogix

SecureLogix

SecureLogix deliver a unified voice network security and call verification solution. Protect against call attacks & fraud.

Onclave Networks

Onclave Networks

Onclave Networks is a global cybersecurity leader, transforming the future of securing all IT/OT devices and systems.

Char49

Char49

Char49 specialize in Penetration Testing, Red Team Assessment, Social Engineering and Security Research.

stackArmor

stackArmor

stackArmor specializes in compliance and security-focused solutions delivered using our Agile Cloud Transformation (ACT) methodology.

Avalanchio Technologies

Avalanchio Technologies

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL or SQL.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

Comcast Technology Solutions (CTS)

Comcast Technology Solutions (CTS)

Comcast Technology Solutions delivers proven technologies for global video, media, communications, data applications, and cybersecurity & compliance.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

SIEM Xpert

SIEM Xpert

SIEM Xpert is a leader in Cyber Security Trainings and services since 2015.

Canary Technology Solutions (Canary IT)

Canary Technology Solutions (Canary IT)

A Cloud, Cyber Security, Retail Solutions and Managed IT Services provider for over 25 years, we safeguard and revolutionise business through technology and foresight.