The Big Data Paradigm Shift. Insight Through Automation
|
|
|
- Anabel Daniel
- 10 years ago
- Views:
Transcription
1 The Big Data Paradigm Shift Insight Through Automation
2 Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc. All rights reserved worldwide. 2
3 The Problem Exabytes Data is growing at an unprecedented rate Less than 1% of data is analyzed Fold growth from 2010 to Source: IDC s Digital Universe Study, sponsored by EMC, December Emcien, Inc. All rights reserved worldwide. 3
4 Old Paradigm: Manually Intensive Analysis Unpredictable Slow Expensive Collect Analyze Report 2013 Emcien, Inc. All rights reserved worldwide. 4
5 New Paradigm: Automation of Analysis PREDICTABLE FAST ECONOMICAL Collect Solve Review & Act 2013 Emcien, Inc. All rights reserved worldwide. 5
6 Emcien s Unique Value Proposition Emcien s automatic pattern-detection platform delivers timely mission critical insights from data Automated analysis for fast, predictable, accurate insight Applicable across all data types: Structured & Unstructured data, Text or Numeric Algorithms designed to solve business problems 2013 Emcien, Inc. All rights reserved worldwide. 6
7 Types of Data: Structured, Unstructured, Static, Streaming Machine Data Network log files Social, Blogs, Newsfeeds Data Click stream data Marketing Data Sales Data Corporate Data 2013 Emcien, Inc. All rights reserved worldwide. 7
8 Limitations of Current Solutions Manually Intensive Very slow and unreliable Search or query based Visualization as a means for discovery High error Only certain data types Numerical analysis only Text only, NLP methods, very high set up cost Data staging Streaming data and recent analysis At-rest data and historic analysis Lack of Scalability Current approaches focus too much on storage methods 2013 Emcien, Inc. All rights reserved worldwide. 8
9 Another View of the Big Data Stack Our Focus Value Layer Sectors Analysis Layer Use Cases (Industry specific or cross industry) Banking Insurance Manufacturing Retail Internet Telco Intel/Security Healthcare Algorithms and Analytics Infrastructure Processor Storage Data Click stream Machine Data Corporate Data 2013 Emcien, Inc. All rights reserved worldwide. 9
10 How Does Our Solution Work? Big Data problems need graph analysis Framework for analyzing relationships Highly scalable representation Data values Tokens Graph Tokens are linked if they occur together Unstructured Structured Closed CARS Americana Flashter, Inc 01/01/ Emcien, Inc. All rights reserved worldwide. 10
11 Algorithms Solve to Extract Patterns Algorithms surface the highly relevant dependencies Defocus the redundant/noise to surface the signal 2013 Emcien, Inc. All rights reserved worldwide. 11
12 Data Patterns That Reveal The Insight Algorithms designed to reveal graph constructs that solve a business problem Solving a Graph Problem Loosely Federated Communities Cliques People Network Substitute Nodes Results in Solving a Business Problem - Reveals groups that behave similarly - Reveals dimensions that bind the group - Impossible to detect in a typical querying system - Highly correlated elements - Optimal query that would lead to insight - Reveals influence network of individual - Highly predictive for adoption behaviors - Nodes that behave very similarly - ID theft or product substitutes 2013 Emcien, Inc. All rights reserved worldwide. 12
13 Algorithms Are Highly Scalable For Big Data Traditional Data Storage: Linear growth with transactions Very large storage requirements are Increases response time Graph Data Storage: Size of total number of entities E.g. Store has 500,000 items graph has 500,000 nodes Weights updated with transactions Delivers a global view of the data Emcien, Inc. All rights reserved worldwide. 13
14 Speed of Data Answers Access Time vs. Processing Speed Traditional Data Storage: Graph Data Storage: Limit is query speed In-memory, hadoop cluster approaches Highly dimensional data is a problem Unstructured content is a problem All results are Pre-computed (like Google) Pre-computing speed: 50K trans/sec compute on 1-core 8GB RAM system Speed of response is access time 2013 Emcien, Inc. All rights reserved worldwide. 14
15 The Business Problems We Solve Across Different Types of Data Automatically Extract Dependencies Web click-stream - Reveal click patterns & market segments Sales data - Reveal consumption patterns and propensity Clinical trials - extract hypothesis for testing Social Patterns & People Network Marketing - Reveal conversation patterns, people communities For Intel - Reveal bad actors based on conversation patterns Surprising Streaming Content Machine Network traffic Reveal network intrusion Sales transactions Reveal fraud based on unusual patterns Entity Resolution / Cleansing Patterns automatically clusters similar entities. Example credit card transactions, insurance claims with varying merchant names 2013 Emcien, Inc. All rights reserved worldwide. 15
16 Intel Case Study (1/4) Cyber Threat Monitoring with Open Source Data Customer Overview And Current Situation Federal agency is failing to keep up with the activity and data in open source Open Source (social, IRC, blogs, etc.) are a key source of communication for underworld Link analysis leads to people of interest network which is key for intelligence Customer Objective Federal agency requires fast methods to process high volume open source data Need automated methods to highlight conversations of interest Need automated link analysis to focus on people of interest Fast and continuous data processing to keep up with the speed of crime 2013 Emcien, Inc. All rights reserved worldwide. 16
17 Intel Case Study (2/4) Layers of Analysis for Cyber Threat Monitoring Influential people are ranked based on conversation relevance z People Graph: Seeds to Reveal network of People of Interest Bomb attack next week Helicopter ready for take-off Tanks turn on crowd Pattern Detection to Isolate Conversations of Interest Open Source Photos meta data Chat rooms Twitter Social Streams s Maps/ geo -location Data Silos 2013 Emcien, Inc. All rights reserved worldwide
18 Intel Case Study (3/4) Cyber Threat Monitoring with Open Source Data Influential people ranked based on conversations Overview 250,000 Accounts Over 1,000,000 Connections Highly relevant People of Interest network 2013 Emcien, Inc. All rights reserved worldwide. 18
19 Intel Case Study (4/4) Cyber Threat Monitoring with Open Source Data The silent signal Automatically detecting a sleeper cell Overview 250,000 Accounts Analyzed Over 1,000,000 Connections 1 Account of Interest 2013 Emcien, Inc. All rights reserved worldwide. 19
20 Network Traffic Log Files (1/6) Revealing Patterns In Machine-to-Machine Data Customer Overview Research Institute has thousands of users on their network Must provide controlled safe access for the internal working labs and the outside network Control illegal intrusions, malicious malware and illegal data transmissions Customer Objective Automate Process of Intrusion Detection Scan streaming machine-to-machine log file output Detect surprising/interesting anomalies/beacons Automatically send short list of top ranked questions to ask of the data into existing tools (such as CA, Sumologic, Splunk, etc.) 2013 Emcien, Inc. All rights reserved worldwide. 20
21 Network Traffic Log Files (2/6) Example Use Cases Example Use Cases 1. Summarize and Rank Log File data based on Surprising flow patterns 2. Determine Machine network based on flow patterns. Rank Machines based on their influence in the network 3. Detect communities of machines based on how they talk to each other 2013 Emcien, Inc. All rights reserved worldwide. 21
22 Network Traffic Log Files (3/6) Reveal Surprising Patterns In Network flow Data Network Log Data Surprising network activity within the data flow 2013 Emcien, Inc. All rights reserved worldwide. 22
23 Network Traffic Log Files (4/6) Ranked Summary of Surprising Events Full Log File Details Big Data Example data size: 1,000 transactions/sec Emcien Scout Last 24 hours Last 6 hours CA, Sumologic, Splunk 4 Last 30 mins Top Surprising Clusters 2013 Emcien, Inc. All rights reserved worldwide. 23
24 Network Traffic Log Files (5/6) Most Influential Nodes on network Audience size for each machine Emcien Scout Most influential machines on the network based on communication patterns 2013 Emcien, Inc. All rights reserved worldwide. 24
25 Network Traffic Log Files (6/6) Machine Communities based on how they talk Lab A Lab B Physical Connections Lab A Lab B Machine Communication Communities Emcien, Inc. All rights reserved worldwide. 25
26 Intel Case Study (1/6) Reveal Conversation Patterns & Network of Actors in Data Customer Overview And Current Situation Federal agency is failing to keep up with the activity and data in Too much data and current tools are manually intensive Customer Objective Federal agency requires fast methods to process high volume of data Need automated methods to highlight conversations of interest Need automated link analysis to focus on people of interest based on s Fast and continuous data processing to keep up with the speed of crime 2013 Emcien, Inc. All rights reserved worldwide. 26
27 Intel Case Study (2/6) Automatic Data Collectors Content extracted from s Addresses extracted and linked Text Summary Content Data EmcienScout Extraction Program People Network Analysis Addresses And Phone nums 2013 Emcien, Inc. All rights reserved worldwide. 27
28 Intel Case Study (3/6) Automatic Extraction Extracts all Addresses in Header AND Body To & From addresses extracted Messages extracted, each word tokenized and connected into graph. We are working to gather as much information as possible. We are working to gather 2013 Emcien, Inc. All rights reserved worldwide. 28
29 Intel Case Study (4/6) Automatic Summarization Summarize content from s to better understand group conversations 2013 Emcien, Inc. All rights reserved worldwide. 29
30 Intel Case Study (5/6) People Graph (1/2) Program extracts To/From addresses and phone numbers from suspects account Newly created contacts file is loaded into Scout People Graph Large complex graph is created using s and phone number connections Emcien, Inc. All rights reserved worldwide. 30
31 Intel Case Study (6/6) Algorithm Computes People Graph (2/2) Initial bad actor seed accounts ( s addresses or phone numbers) are selected or entered Ranked List of other accounts that are likely involved with seed accounts based on their connections Emcien, Inc. All rights reserved worldwide. 31
32 How Emcien Fits Into Your Ecosystem Feed downstream systems with data output Production Servers API UI UI for Analyst who wants to review results Sales Trans Bank Trans Insurance Claims Pattern Detection Platform Compressed Graph Data Representation Social Media News / Blogs s / Chat Server Logs Web logs Security Logs Structured Data Unstructured Data Unstructured (Machine Data) 2013 Emcien, Inc. All rights reserved worldwide. 32
33 Questions?
34 Types of Data Many types of Data Structured, Unstructured Text, Numeric, Machine In many states Static (slow batch) Streaming or fast batch Marketing Data Sales Data Corporate Data Social, Blogs, Newsfeeds Data Machine Data Network log files Click stream data 2013 Emcien, Inc. All rights reserved worldwide. 34
35 Limitations of Current Solutions Manually Intensive: Very slow and unreliable Search or query based Visualization as a means for discovery High error Limitation based on data types Numerical analysis only Text only, NLP methods, very high set up cost Limitation based on data staging Streaming data and recent analysis At-rest data and Historic analysis Scalability Current approaches focus too much on storage methods 2013 Emcien, Inc. All rights reserved worldwide. 35
Hortonworks & SAS. Analytics everywhere. Page 1. Hortonworks Inc. 2011 2014. All Rights Reserved
Hortonworks & SAS Analytics everywhere. Page 1 A change in focus. A shift in Advertising From mass branding A shift in Financial Services From Educated Investing A shift in Healthcare From mass treatment
Transforming the Telecoms Business using Big Data and Analytics
Transforming the Telecoms Business using Big Data and Analytics Event: ICT Forum for HR Professionals Venue: Meikles Hotel, Harare, Zimbabwe Date: 19 th 21 st August 2015 AFRALTI 1 Objectives Describe
BIG DATA & ANALYTICS. Transforming the business and driving revenue through big data and analytics
BIG DATA & ANALYTICS Transforming the business and driving revenue through big data and analytics Collection, storage and extraction of business value from data generated from a variety of sources are
Beyond Watson: The Business Implications of Big Data
Beyond Watson: The Business Implications of Big Data Shankar Venkataraman IBM Program Director, STSM, Big Data August 10, 2011 The World is Changing and Becoming More INSTRUMENTED INTERCONNECTED INTELLIGENT
Big Data & Analytics: Your concise guide (note the irony) Wednesday 27th November 2013
Big Data & Analytics: Your concise guide (note the irony) Wednesday 27th November 2013 Housekeeping 1. Any questions coming out of today s presentation can be discussed in the bar this evening 2. OCF is
Anatomy of Cyber Threats, Vulnerabilities, and Attacks
Anatomy of Cyber Threats, Vulnerabilities, and Attacks ACTIONABLE THREAT INTELLIGENCE FROM ONTOLOGY-BASED ANALYTICS 1 Anatomy of Cyber Threats, Vulnerabilities, and Attacks Copyright 2015 Recorded Future,
Hadoop Beyond Hype: Complex Adaptive Systems Conference Nov 16, 2012. Viswa Sharma Solutions Architect Tata Consultancy Services
Hadoop Beyond Hype: Complex Adaptive Systems Conference Nov 16, 2012 Viswa Sharma Solutions Architect Tata Consultancy Services 1 Agenda What is Hadoop Why Hadoop? The Net Generation is here Sizing the
How To Make Sense Of Data With Altilia
HOW TO MAKE SENSE OF BIG DATA TO BETTER DRIVE BUSINESS PROCESSES, IMPROVE DECISION-MAKING, AND SUCCESSFULLY COMPETE IN TODAY S MARKETS. ALTILIA turns Big Data into Smart Data and enables businesses to
The session is about to commence. Please switch your phone to silent!
The session is about to commence. Please switch your phone to silent! 1 Defend with Confidence Against Advanced Threats Nicholas Chia SE Manager, SEA RSA 2 TRUST? Years to earn, seconds to break 3 Market
Hur hanterar vi utmaningar inom området - Big Data. Jan Östling Enterprise Technologies Intel Corporation, NER
Hur hanterar vi utmaningar inom området - Big Data Jan Östling Enterprise Technologies Intel Corporation, NER Legal Disclaimers All products, computer systems, dates, and figures specified are preliminary
Using Tableau Software with Hortonworks Data Platform
Using Tableau Software with Hortonworks Data Platform September 2013 2013 Hortonworks Inc. http:// Modern businesses need to manage vast amounts of data, and in many cases they have accumulated this data
THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.
THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from
Mastering Big Data. Steve Hoskin, VP and Chief Architect INFORMATICA MDM. October 2015
Mastering Big Data Steve Hoskin, VP and Chief Architect INFORMATICA MDM October 2015 Agenda About Big Data MDM and Big Data The Importance of Relationships Big Data Use Cases About Big Data Big Data is
Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined
Niara Security Intelligence Threat Discovery and Incident Investigation Reimagined Niara enables Compromised user discovery Malicious insider discovery Threat hunting Incident investigation Overview In
Big Data. White Paper. Big Data Executive Overview WP-BD-10312014-01. Jafar Shunnar & Dan Raver. Page 1 Last Updated 11-10-2014
White Paper Big Data Executive Overview WP-BD-10312014-01 By Jafar Shunnar & Dan Raver Page 1 Last Updated 11-10-2014 Table of Contents Section 01 Big Data Facts Page 3-4 Section 02 What is Big Data? Page
Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.
Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference
Oracle Big Data Building A Big Data Management System
Oracle Big Building A Big Management System Copyright 2015, Oracle and/or its affiliates. All rights reserved. Effi Psychogiou ECEMEA Big Product Director May, 2015 Safe Harbor Statement The following
Managing Big Data with Hadoop & Vertica. A look at integration between the Cloudera distribution for Hadoop and the Vertica Analytic Database
Managing Big Data with Hadoop & Vertica A look at integration between the Cloudera distribution for Hadoop and the Vertica Analytic Database Copyright Vertica Systems, Inc. October 2009 Cloudera and Vertica
SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.
SECURITY MEETS BIG DATA Achieve Effectiveness And Efficiency 1 IN 2010 THE DIGITAL UNIVERSE WAS 1.2 ZETTABYTES 1,000,000,000,000,000,000,000 Zetta Exa Peta Tera Giga Mega Kilo Byte Source: 2010 IDC Digital
5 Keys to Unlocking the Big Data Analytics Puzzle. Anurag Tandon Director, Product Marketing March 26, 2014
5 Keys to Unlocking the Big Data Analytics Puzzle Anurag Tandon Director, Product Marketing March 26, 2014 1 A Little About Us A global footprint. A proven innovator. A leader in enterprise analytics for
PLATFORA INTERACTIVE, IN-MEMORY BUSINESS INTELLIGENCE FOR HADOOP
PLATFORA INTERACTIVE, IN-MEMORY BUSINESS INTELLIGENCE FOR HADOOP Your business is swimming in data, and your business analysts want to use it to answer the questions of today and tomorrow. YOU LOOK TO
Separating Signal from Noise: Taking Threat Intelligence to the Next Level
SESSION ID: SPO2-T09 Separating Signal from Noise: Taking Threat Intelligence to the Next Level Doron Shiloach X-Force Product Manager IBM @doronshiloach Agenda Threat Intelligence Overview Current Challenges
AGENDA. What is BIG DATA? What is Hadoop? Why Microsoft? The Microsoft BIG DATA story. Our BIG DATA Roadmap. Hadoop PDW
AGENDA What is BIG DATA? What is Hadoop? Why Microsoft? The Microsoft BIG DATA story Hadoop PDW Our BIG DATA Roadmap BIG DATA? Volume 59% growth in annual WW information 1.2M Zetabytes (10 21 bytes) this
How To Make Data Streaming A Real Time Intelligence
REAL-TIME OPERATIONAL INTELLIGENCE Competitive advantage from unstructured, high-velocity log and machine Big Data 2 SQLstream: Our s-streaming products unlock the value of high-velocity unstructured log
A New Era Of Analytic
Penang egovernment Seminar 2014 A New Era Of Analytic Megat Anuar Idris Head, Project Delivery, Business Analytics & Big Data Agenda Overview of Big Data Case Studies on Big Data Big Data Technology Readiness
Ramesh Bhashyam Teradata Fellow Teradata Corporation [email protected]
Challenges of Handling Big Data Ramesh Bhashyam Teradata Fellow Teradata Corporation [email protected] Trend Too much information is a storage issue, certainly, but too much information is also
How To Handle Big Data With A Data Scientist
III Big Data Technologies Today, new technologies make it possible to realize value from Big Data. Big data technologies can replace highly customized, expensive legacy systems with a standard solution
The Future of Data Management
The Future of Data Management with Hadoop and the Enterprise Data Hub Amr Awadallah (@awadallah) Cofounder and CTO Cloudera Snapshot Founded 2008, by former employees of Employees Today ~ 800 World Class
Big Data for Big Value @ Intel
Big Data for Big Value @ Intel Moty Fania, PE Big data Analytics Assaf Araki, Sr. Arch. Big data Analytics Advanced Analytics team @ Intel IT Corporate ownership of advanced analytics Team charter Solve
Embedded inside the database. No need for Hadoop or customcode. True real-time analytics done per transaction and in aggregate. On-the-fly linking IP
Operates more like a search engine than a database Scoring and ranking IP allows for fuzzy searching Best-result candidate sets returned Contextual analytics to correctly disambiguate entities Embedded
An Oracle White Paper November 2010. Leveraging Massively Parallel Processing in an Oracle Environment for Big Data Analytics
An Oracle White Paper November 2010 Leveraging Massively Parallel Processing in an Oracle Environment for Big Data Analytics 1 Introduction New applications such as web searches, recommendation engines,
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
Big Data Integration: A Buyer's Guide
SEPTEMBER 2013 Buyer s Guide to Big Data Integration Sponsored by Contents Introduction 1 Challenges of Big Data Integration: New and Old 1 What You Need for Big Data Integration 3 Preferred Technology
Detect & Investigate Threats. OVERVIEW
Detect & Investigate Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics Enterprise-wide
Fight fire with fire when protecting sensitive data
Fight fire with fire when protecting sensitive data White paper by Yaniv Avidan published: January 2016 In an era when both routine and non-routine tasks are automated such as having a diagnostic capsule
BIG DATA ANALYTICS REFERENCE ARCHITECTURES AND CASE STUDIES
BIG DATA ANALYTICS REFERENCE ARCHITECTURES AND CASE STUDIES Relational vs. Non-Relational Architecture Relational Non-Relational Rational Predictable Traditional Agile Flexible Modern 2 Agenda Big Data
A Scalable Data Transformation Framework using the Hadoop Ecosystem
A Scalable Data Transformation Framework using the Hadoop Ecosystem Raj Nair Director Data Platform Kiru Pakkirisamy CTO AGENDA About Penton and Serendio Inc Data Processing at Penton PoC Use Case Functional
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
Apigee Insights Increase marketing effectiveness and customer satisfaction with API-driven adaptive apps
White provides GRASP-powered big data predictive analytics that increases marketing effectiveness and customer satisfaction with API-driven adaptive apps that anticipate, learn, and adapt to deliver contextual,
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
Big Data Use Cases Update
Big Data Use Cases Update Sanat Joshi Industry Solutions Manufacturing Industries Business Unit 1 Data Explosion Web & social networks experienced it first Infographic by Go-gulf.com 2 Number Of Connected
Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.
Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention. I m not going to get more money. I m not going to get more cops. I have
locuz.com Big Data Services
locuz.com Big Data Services Big Data At Locuz, we help the enterprise move from being a data-limited to a data-driven one, thereby enabling smarter, faster decisions that result in better business outcome.
Unlocking the Intelligence in. Big Data. Ron Kasabian General Manager Big Data Solutions Intel Corporation
Unlocking the Intelligence in Big Data Ron Kasabian General Manager Big Data Solutions Intel Corporation Volume & Type of Data What s Driving Big Data? 10X Data growth by 2016 90% unstructured 1 Lower
Are You Ready for Big Data?
Are You Ready for Big Data? Jim Gallo National Director, Business Analytics April 10, 2013 Agenda What is Big Data? How do you leverage Big Data in your company? How do you prepare for a Big Data initiative?
Big Data in Telecom value chain. Presented by: Gurjot S Sandhu Director Sales Xalted Information Systems Pvt. Ltd.
Big Data in Telecom value chain Presented by: Gurjot S Sandhu Director Sales Xalted Information Systems Pvt. Ltd. Analyzing Big Picture Big Data to CSPs Traditional Analytics vs Big Data Approach Traditional
Big Data Analytics. with EMC Greenplum and Hadoop. Big Data Analytics. Ofir Manor Pre Sales Technical Architect EMC Greenplum
Big Data Analytics with EMC Greenplum and Hadoop Big Data Analytics with EMC Greenplum and Hadoop Ofir Manor Pre Sales Technical Architect EMC Greenplum 1 Big Data and the Data Warehouse Potential All
W H I T E P A P E R. Deriving Intelligence from Large Data Using Hadoop and Applying Analytics. Abstract
W H I T E P A P E R Deriving Intelligence from Large Data Using Hadoop and Applying Analytics Abstract This white paper is focused on discussing the challenges facing large scale data processing and the
The webinar will begin shortly
The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security
Understanding Your Customer Journey by Extending Adobe Analytics with Big Data
SOLUTION BRIEF Understanding Your Customer Journey by Extending Adobe Analytics with Big Data Business Challenge Today s digital marketing teams are overwhelmed by the volume and variety of customer interaction
Big Data and Analytics: Challenges and Opportunities
Big Data and Analytics: Challenges and Opportunities Dr. Amin Beheshti Lecturer and Senior Research Associate University of New South Wales, Australia (Service Oriented Computing Group, CSE) Talk: Sharif
Discover & Investigate Advanced Threats. OVERVIEW
Discover & Investigate Advanced Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics
White Paper. How Streaming Data Analytics Enables Real-Time Decisions
White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats
Leveraging Machine Data to Deliver New Insights for Business Analytics
Copyright 2015 Splunk Inc. Leveraging Machine Data to Deliver New Insights for Business Analytics Rahul Deshmukh Director, Solutions Marketing Jason Fedota Regional Sales Manager Safe Harbor Statement
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
The Rise of Industrial Big Data. Brian Courtney General Manager Industrial Data Intelligence
The Rise of Industrial Big Data Brian Courtney General Manager Industrial Data Intelligence Agenda Introduction Big Data for the industrial sector Case in point: Big data saves millions at GE Energy Seeking
Are You Ready for Big Data?
Are You Ready for Big Data? Jim Gallo National Director, Business Analytics February 11, 2013 Agenda What is Big Data? How do you leverage Big Data in your company? How do you prepare for a Big Data initiative?
Big Data: What You Should Know. Mark Child Research Manager - Software IDC CEMA
Big Data: What You Should Know Mark Child Research Manager - Software IDC CEMA Agenda Market Dynamics Defining Big Data Technology Trends Information and Intelligence Market Realities Future Applications
Addressing Open Source Big Data, Hadoop, and MapReduce limitations
Addressing Open Source Big Data, Hadoop, and MapReduce limitations 1 Agenda What is Big Data / Hadoop? Limitations of the existing hadoop distributions Going enterprise with Hadoop 2 How Big are Data?
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop
ISSN: 2454-2377, October 2015 Big Data and Hadoop Simmi Bagga 1 Satinder Kaur 2 1 Assistant Professor, Sant Hira Dass Kanya MahaVidyalaya, Kala Sanghian, Distt Kpt. INDIA E-mail: [email protected]
White Paper: Leveraging Web Intelligence to Enhance Cyber Security
White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence
Big Data Are You Ready? Thomas Kyte http://asktom.oracle.com
Big Data Are You Ready? Thomas Kyte http://asktom.oracle.com The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
Data Loss Prevention with Platfora Big Data Analytics
WHITE PAPER Data Loss Prevention with Platfora Big Data Analytics 2014 Platfora, Inc. platfora.com WHITE PAPER Overview Around the world, public and private institutions store massive amounts of data:
Evolution Of Cyber Threats & Defense Approaches
Evolution Of Cyber Threats & Defense Approaches Antony Abraham IT Architect, Information Security, State Farm Kevin McIntyre Tech Lead, Information Security, State Farm Agenda About State Farm Evolution
TUT NoSQL Seminar (Oracle) Big Data
Timo Raitalaakso +358 40 848 0148 [email protected] TUT NoSQL Seminar (Oracle) Big Data 11.12.2012 Timo Raitalaakso MSc 2000 Work: Solita since 2001 Senior Database Specialist Oracle ACE 2012 Blog: http://rafudb.blogspot.com
The Enterprise Data Hub and The Modern Information Architecture
The Enterprise Data Hub and The Modern Information Architecture Dr. Amr Awadallah CTO & Co-Founder, Cloudera Twitter: @awadallah 1 2013 Cloudera, Inc. All rights reserved. Cloudera Overview The Leader
How does Big Data disrupt the technology ecosystem of the public cloud?
How does Big Data disrupt the technology ecosystem of the public cloud? Copyright 2012 IDC. Reproduction is forbidden unless authorized. All rights reserved. Agenda Market trends 2020 Vision Introduce
Big Data Are You Ready? Jorge Plascencia Solution Architect Manager
Big Data Are You Ready? Jorge Plascencia Solution Architect Manager Big Data: The Datafication Of Everything Thoughts Devices Processes Thoughts Things Processes Run the Business Organize data to do something
Data Refinery with Big Data Aspects
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data
Evolution from Big Data to Smart Data
Evolution from Big Data to Smart Data Information is Exploding 120 HOURS VIDEO UPLOADED TO YOUTUBE 50,000 APPS DOWNLOADED 204 MILLION E-MAILS EVERY MINUTE EVERY DAY Intel Corporation 2015 The Data is Changing
5 Big Data Use Cases to Understand Your Customer Journey CUSTOMER ANALYTICS EBOOK
5 Big Data Use Cases to Understand Your Customer Journey CUSTOMER ANALYTICS EBOOK CUSTOMER JOURNEY Technology is radically transforming the customer journey. Today s customers are more empowered and connected
IBM Big Data in Government
IBM Big in Government Turning big data into smarter decisions Deepak Mohapatra Sr. Consultant Government IBM Software Group [email protected] The Big Paradigm Shift 2 Big Creates A Challenge And an
End to End Solution to Accelerate Data Warehouse Optimization. Franco Flore Alliance Sales Director - APJ
End to End Solution to Accelerate Data Warehouse Optimization Franco Flore Alliance Sales Director - APJ Big Data Is Driving Key Business Initiatives Increase profitability, innovation, customer satisfaction,
Chapter 6 - Enhancing Business Intelligence Using Information Systems
Chapter 6 - Enhancing Business Intelligence Using Information Systems Managers need high-quality and timely information to support decision making Copyright 2014 Pearson Education, Inc. 1 Chapter 6 Learning
Understanding the Value of In-Memory in the IT Landscape
February 2012 Understing the Value of In-Memory in Sponsored by QlikView Contents The Many Faces of In-Memory 1 The Meaning of In-Memory 2 The Data Analysis Value Chain Your Goals 3 Mapping Vendors to
Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study
Six Days in the Network Security Trenches at SC14 A Cray Graph Analytics Case Study WP-NetworkSecurity-0315 www.cray.com Table of Contents Introduction... 3 Analytics Mission and Source Data... 3 Analytics
WHITE PAPER: THREAT INTELLIGENCE RANKING
WHITE PAPER: THREAT INTELLIGENCE RANKING SEPTEMBER 2015 2 HOW WELL DO YOU KNOW YOUR THREAT DATA? HOW THREAT INTELLIGENCE FEED MODELING CAN SAVE MONEY AND PREVENT BREACHES Who are the bad guys? What makes
HDP Hadoop From concept to deployment.
HDP Hadoop From concept to deployment. Ankur Gupta Senior Solutions Engineer Rackspace: Page 41 27 th Jan 2015 Where are you in your Hadoop Journey? A. Researching our options B. Currently evaluating some
Big Data & Analytics. The. Deal. About. Jacob Büchler [email protected] Cand. Polit. IBM Denmark, Solution Exec. 2013 IBM Corporation
The Big Data & Analytics Deal About Jacob Büchler [email protected] Cand. Polit. IBM Denmark, Solution Exec. 1 Big Data is All Data from Everywhere Big Data Is Becoming The Next Natural Resource We
Predictive Analytics: Turn Information into Insights
Predictive Analytics: Turn Information into Insights Pallav Nuwal Business Manager; Predictive Analytics, India-South Asia [email protected] +91.9820330224 Agenda IBM Predictive Analytics portfolio
IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Many enterprise organizations claim that they already
Big Data-Challenges and Opportunities
Big Data-Challenges and Opportunities White paper - August 2014 User Acceptance Tests Test Case Execution Quality Definition Test Design Test Plan Test Case Development Table of Contents Introduction 1
DATAMEER WHITE PAPER. Beyond BI. Big Data Analytic Use Cases
DATAMEER WHITE PAPER Beyond BI Big Data Analytic Use Cases This white paper discusses the types and characteristics of big data analytics use cases, how they differ from traditional business intelligence
IDC MaturityScape Benchmark: Big Data and Analytics in Government. Adelaide O Brien Research Director IDC Government Insights June 20, 2014
IDC MaturityScape Benchmark: Big Data and Analytics in Government Adelaide O Brien Research Director IDC Government Insights June 20, 2014 IDC MaturityScape Benchmark: Big Data and Analytics in Government
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
Big Data and Analytics: Getting Started with ArcGIS. Mike Park Erik Hoel
Big Data and Analytics: Getting Started with ArcGIS Mike Park Erik Hoel Agenda Overview of big data Distributed computation User experience Data management Big data What is it? Big Data is a loosely defined
Big data platform for IoT Cloud Analytics. Chen Admati, Advanced Analytics, Intel
Big data platform for IoT Cloud Analytics Chen Admati, Advanced Analytics, Intel Agenda IoT @ Intel End-to-End offering Analytics vision Big data platform for IoT Cloud Analytics Platform Capabilities
Architecting for Big Data Analytics and Beyond: A New Framework for Business Intelligence and Data Warehousing
Architecting for Big Data Analytics and Beyond: A New Framework for Business Intelligence and Data Warehousing Wayne W. Eckerson Director of Research, TechTarget Founder, BI Leadership Forum Business Analytics
