Making Data Scientists More Productive

The ability to harness data to solve critical business challenges is an essential skill for every organisation today. 
There are two primary roles responsible for this function, data scientists and data analysts, comprising over 200 million users worldwide. 
 
Unfortunately, these people spend the majority of their time performing tasks that are not core to their high value responsibilities, such as finding data, preparing data, and optimising data for their analysis. As with many high value roles, complementary specialised roles emerge that allow each participant to be as efficient as possible. 
 
Consider healthcare, for example, where doctors work with nurses, allied health professionals, physician’s assistants, office managers, and other roles to maximise the time each doctor practices medicine. Today our data scientists and data analysts are more like doctors who perform many of these functions themselves. 
 
We are fairly early in our evolution of roles to fulfill the end to end process of data analytics, and there is still tremendous opportunity to improve efficiency with better specialisation of roles. 
 
We can see the emergence of a new role: the data curator.
 
If we look at all the different roles involved in data analytics, we can first rationalise responsibilities based on the larger organizations of IT and the business. At present. there are individuals who reside in IT, data engineers and data custodians, as well as those who sit in the business, data analysts and data scientists. In 2018 we will increasingly see data curators, a new role within the business that focuses on bridging the worlds of business and IT in terms of data analytics. 
 
Let’s take a look at these roles and their responsibilities:
 
• Data scientists use tools like Python and R to build models that provide predictions, recommendations, and visualisations based on data inputs. They work within the business and rely on IT to provision their data.
• Data analysts use BI tools to develop visualisations, reports, and dashboards that help to tell a story about business data. They work within the business and rely on IT to provide access to data from different applications and systems.
• Data custodians are responsible for defining and documenting technical controls that safeguard the data across many different systems. They work within IT using security access controls and data management tools to standardise provenance and access to the data.
• Data engineers have a deep understanding of the systems and infrastructure that generate and store the business data. They work in SQL, Python, Java, and other languages to query, transform, aggregate, and move data between systems for different end user needs. They work within IT.
• Data curators sit within the business, using self-service data platforms to curate data for different analytical tasks, to allocate computational resources for accelerating data analysis, to add semantic meaning to a data catalog, to accelerate high-value datasets, to blend datasets together, and to organise project areas for teams of data analysts and data scientists to work together more effectively. 
 
Data analysts and data scientists understand the meaning of the data, but they rely on IT to source the data they need, and to apply and changes necessary to reshape and transform the data for their needs. 
 
More often than not, these individuals find themselves waiting on IT to perform these tasks, and they take matters into their own hands, making copies of the data that are no longer governed by the central controls of the organisation. More importantly, it means these high value individuals are not performing the work that is essential to their role.
 
As companies embrace more of a self-service model for their data scientists and data analysts, they are using data curators to make these individuals more productive and more impactful to the business. 
 
Data curators streamline the process of sourcing, organising, and accelerating data for analysis. They know the data and understand the analytical workloads better than data engineering since they are closer to the business units. 
 
The data curator has a good understanding of the types of systems that store the data, and the types of tools that can be used for processing the data, even if they are not practitioners of these technologies themselves. They have up-to-date knowledge about datasets, their provenance, and what data curation is needed.  They also understand the different types of analysis that need to be performed on specific datasets, as well as the expectations in terms of latency and availability set by diverse business users.
 
By working with data engineers, data custodians, data analysts, and data scientists, the data curator develops a deep understanding of how data is used by the business, and how IT applies technology to make the data available. 
Data curators are making data analysts and data scientists more productive by allowing them to focus on what they do best. 
 
Information- Management
 
You Might Also Read:
 
Data Scientists Remain Top Of ‘most wanted’ Employees:
 
What Makes A Data Scientist?:
 
« India’s Political Parties Fighting A Cyberwar
Google’s AutoML Offers Machine Learning Models Without Having To Code »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Security IT Summit

Security IT Summit

The Security IT Summit is a unique one-day event which allows senior IT & Cyber security professionals to meet with innovative and competitive suppliers to the industry.

KPN

KPN

KPN is a leading supplier of ICT services including Cyber Security, Identity & Privacy, Secure Communications and Business Continuity.

Forter

Forter

Forter provides new generation fraud prevention to meet the challenges faced by modern enterprise e-commerce.

SEWORKS

SEWORKS

SEWORKS provides offensive and defensive app security that ensures mobile and web apps are safe from dangerous hacking threats.

Cybero

Cybero

Cybero offers professional corporate cybersecurity training tailored to your business requirements.

Very Good Security (VGS)

Very Good Security (VGS)

VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.

Sweepatic

Sweepatic

The Sweepatic reconnaissance platform discovers and analyses all internet facing assets and their exposure to risk.

URS Certification

URS Certification

United Registrar of Systems (URS Certification) is an independent certification body operating in more than 30 countries within the multinational URS Holdings.

Cingo Solutions

Cingo Solutions

Cingo Solutions is a Managed Detection & Response company providing specialized data security services.

Center for Education & Research in Information Assurance & Security (CERIAS)

Center for Education & Research in Information Assurance & Security (CERIAS)

CERIAS is one of the world’s leading centers for research and education in areas of information and cyber security.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

SecureStream Technologies

SecureStream Technologies

SecureStream Technologies have built the IoT SafetyNet - the Network Security Analytics platform to Eliminate Security Threats, Guarantee Privacy, Ensure Compliance, Simply & Easily.

Saporo

Saporo

Saporo helps organizations increase their cyber-resistance. Continuously map your attack surface and get the recommendations you need to make your organization more resistant to attacks.

Airiam

Airiam

Airiam provides cybersecurity, managed IT, consulting, incident response, and digital transformation services so you can focus on what matters most.

Omantel Innovation Labs

Omantel Innovation Labs

The Omantel Innovation Labs is a platform to enable startups and innovators to develop and commercialize solutions within selected technology verticals including cybersecurity.

Leaf IT

Leaf IT

Leaf IT are a pioneering cloud-first MSP, dedicated to helping businesses in the UK and Ireland. We focus on delivering tangible results for our clients through IT transformation.