Welcome!

Java IoT Authors: Elizabeth White, Zakia Bouachraoui, Liz McMillan, Yeshim Deniz, Pat Romanski

Related Topics: @DXWorldExpo, Java IoT, @CloudExpo

@DXWorldExpo: Blog Feed Post

Looking for a Little 'Big Data' Clarity? By @_RyanOConnor | @BigDataExpo #BigData

Some data collection can actually be about as painful as trying to use a lawn mower to win the Daytona 500

Time to Put Some Big Data Misconceptions to Rest
by Ryan O'Connor

As a recent graduate, and now professor in the University of Connecticut's Business Analytics and Project Management masters program, I have a lot of conversations surrounding the topic of "Big Data" and questions such as, "What does that term actually mean?"

Big Data is a fairly new topic and what seems to be an elusive term for many. Conversations are important to help bring clarity to Big Data, as well as generate ideas about how we can shape, not only what it is, but also the future of where it's going.

Not that it's surprising, nor is it anyone's fault necessarily, but I have found quite a few misconceptions surrounding the topic. One of the biggest misconceptions I have run into, which would be scary if it were true, is that "Big Data" is easy to gather and use. This thought-process could easily lead people to believe in one of the most prevalent "concerns" with Big Data and that is that someone is always spying on them.

Let's Get Something Straight...
To set the record straight, and on behalf of everyone who has worked with large datasets, Big Data is far from being easy. As far as collecting data is concerned, it comes with a broad spectrum of problems.

Some data collection can actually be about as painful as trying to use a lawn mower to win the Daytona 500. For other data, it's like driving a rocket ship through the Daytona 500 (although it sounds like you'd win because of the speed), which means it's almost impossible to steer and if you don't manage it right you're probably going to crash. Finding the right balance is tough. Just like in real life, not everyone can own a racecar - a tool that has been engineered and perfected over time in order to hopefully win the race - or in this case have the adequate knowledge and tools to successfully navigate through all the data.

Here at Hurricane Labs, for example, our team (which includes technical folks, data scientists, interns, and more) works with Big Data in order to help organizations and enterprises who don't have the tools or aren't sure how to "win the race" on their own. We enable a better way to take control of the massive amounts of security noise zooming around and steer it in a direction that provides contextual structure and intelligent visibility.

A Popular Example Where Data Collection Comes in Handy
Back to the explanation about the ways of data collection and usage... Although this isn't the most exciting, one example most can relate to is the very popular form of identity theft: having your credit or debit card numbers stolen.

If you're an active participant on the internet, then it's likely you or someone you know has experienced this. According to enlightenme.com, "As of 2010, it is estimated that 11.1 million adults are affected by identity theft each year." This number has likely only risen with the growth of the web and there are also additions, such as the monumental data breaches at companies like Home Depot, Target, and Sony that have taken place since then.

Even if you personally haven't had this happen, for someone who has, you should ask them the question, "How did you KNOW it was stolen?" Most of the time they will tell you they were notified by their bank. Most banks take this type of criminal activity seriously and are vigilant about it. The reason the bank is able to notify someone that their card number has been stolen, is because of Big Data.

Fraudulent usage is often one of the problems that can be detected through the use of Big Data. Banks don't have people sitting there watching everything you buy, just like companies aren't hiring one person to watch every single move you make. These would be inefficient methods. Instead, organizations that are keeping track of abnormal activity are utilizing Big Data to do so.

Sometimes it helps to understand Big Data if you draw a parallel. When you go to deposit $100 at the bank, the teller won't put it in a physical box for you to withdraw from the next time you go there. Your bank will take your $100 and put it into a giant vault with the rest of the money. A similar thing takes place with the company recording you spending $4 at the drug store. That record will go into a giant database and sit there until it is called upon for duty. Sadly for that lonely little record, most of the time it will never be needed. But when engineered and perfected systems (like the race cars in the Daytona 500) run and compare it with other purchases, it becomes very powerful and can keep you safe.

Effectively Utilizing Big Data for a Stronger Security Defense
There is a lot that has gone into a company that reaches a point where they are able to make great predictions about your usage and communicate to you to keep you safe. It requires teams of people, time to implement and run, and ongoing modifications and tuning to keep things accurate and effective - and, of course, to provide proper protection for your privacy.

Like I said, Big Data is not easy, but with the right people, goals, tactics and time, it can majorly impact and shape the way a lot of our world works.

Read the original blog entry...

More Stories By Hurricane Labs

Christina O’Neill has been working in the information security field for 3 years. She is a board member for the Northern Ohio InfraGard Members Alliance and a committee member for the Information Security Summit, a conference held once a year for information security and physical security professionals.

IoT & Smart Cities Stories
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
DXWorldEXPO LLC announced today that Telecom Reseller has been named "Media Sponsor" of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, will provide an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life ...