Inner: Big Data – 3 Vs (volume, velocity and variety) and advantages


Big data and Cloud services are hot IT words in these days. Big data and cloud computing are different technical terms in the world of technology and broad in their

big_data

Big Data

meanings and functions. In this rapidly growing age of internet, almost every sector i.e. medical, arts, science, and banking encounters with Big Data management.

Big Data is a word used when information is in the large volume and is difficult to process with traditional database method or using on hand database management tool.Big data might be in Petabytes and exabytes. IBM, HP, and oracle are leading Big Data Management providers.

Whereas cloud computing is a technique to bind all resources of computing under one roof. To know more about Cloud computing you can refer “an overview of Cloud computing and services”. Cloud computing services are just perfect to manage and process of Big Data to discover useful information. Newer data processing Framework called Hadoop uses google cloud services. Input data is processed by Big Data system and is wide spread.

Many questions arise when we overhear about Big Data like Why use big data rather than tradition data analysis? What is the difference between them? What is Big Data analysis? Here, I like to share information about Big Data and tried to clarify it in this article.

Big Data Analytics is a process of examining large amount of data to unlock hidden and useful information about competitor. Gartner analyst Doug Laney introduced the 3Vs concept in a 2001 to analyze Big Data, which are Volume, Velocity, and Variety. We can say that these three V’s defines big Data. They are also helpful to understand the nature of information and available software platforms.

Volume: In Big Data Analytics, Volume represents the amount of Data stored in a big_datastructure or nonstructural way. It might be archive data, facebook or any other massive information. It is a primary attribute of data. Most of data are unstructured data.

Velocity: Generally velocity means frequency of data delivery or frequency of data generation. In other words velocity is the speed, at which the data is created, stored, analyze and displayed. For example live cricket streaming, velocity means streaming data coming with any kind of sensors. It will be in any form like video camera which captures specific faces from crowd, in big data age data is created in real –time or near real-time. There are many data generated in a day and stored in data warehouse, but through web log and click-stream, data is processed down in small amount. A big data provider provides a mixture of the data with customer relevant data and analyzes it.

Variety: Big data variety defines various forms of data like structured, numeric data are traditional data and unstructured documents includes email, audio, video, and financial transactions. It is not easy to arrange and make it meaningful. 

So, what accomplishment is done by organizations with Big Data? Answer of this question is real big and complex, because cloud computing has limited services types, which suppose to handle large amount of structured or unstructured data.

Advantages of using big data with cloud services:

  • Manage Data in Better way: Data will be managed in a better way when you opt for big data management with cloud computing. A big data provider facilitates consumers with abstracted technical layer means allowing to just operating the functionality without knowing technical steps.
  • Benefits of Speed and scalability: An organization gets benefits like speed and scalability of cloud storage from Cloud service providers. It lets analyze massive data sets of organization without any hardware requirement configuration or hosting the data internally, second way is when department seems that it will need to process Big data, then it uses big data technologies, which abstracts complexity in processing massive data.
  • Visualization of Data: The end user of organization can visualize the data as they can access the chart, infographics, reports of it. Data visualization tools present Big Data in Readable charts, Graphs, and reports. You can model and predict consumer’s behavior by integrating and structuring all the data across blogs, forums and social media platforms and help to cut off competition.
  • Revenue Opportunities: if an enterprise deals with Big Data analytics, it creates revenue opportunities because of making and using powerful modules for trends and markets.
  • Security of information: With the use of real time Big Data analytics tools, an enterprise can map its data and can detect sensitive information for example credit card information.
  • Overcome Maintenance cost: Generally, an organization has to buy much technical equipment according to their requirement, and need to maintain them. Big Data tools allow cutting down, unpractical and costly maintenance. Big Data tools can spot failing grid devices and predict when they will give out, thus, cost effective replacement is possible for utilize equipments.
  • Helping with Health care: Data analytics tools helps to decode human genome in moments, and allow predicting and curing diseases as per DNA pattern. We can see many wearable devices and smart watches in these days, which are able to predict health related information. Big Data analysis helps to monitor in developments of epidemics and disease surge.

O’Reilly explores and covers big data analytics and updates; you can catch it on strata.oreilly.com .

Big data conference will be held at three places between month of May and December 2014. It will unlock many questions and provide more light on Big Data and analysis techniques.

Posted in IT, Technology | Tagged , , , , , , , | Leave a comment

Interview With Bob Rudis and Jay Jacobs, Authors of “Data Driven Security”


Bob Rudis and jay Jacobs have wide experience in the field of information security & IT Risk Management. In their book “Data Driven Security” they explore practices and principles of data analysis and visualization.

Following is an interview with Mr.Bob and Jay Jacobs about the book and sharing  experiences.

Q.   What inspired you to write a book on Data Security?

Fundamentally, it was the desire to help our profession (information security) move from protoscience (h/t to @alexhutton for the original use of the term in an infosec context) to a bona-fide, data-driven field. Sure, many aspects of information security involved working with data and making decisions with data, but we tend to operate like the fields of chemistry and electricity did prior to the mid-eighteenth century. We hoped that by introducing the tools & techniques that “data scientists” in other fields use and covering the core concepts of data analysis & visualization we would help other professionals take their security programs and research further and faster than before. Secretly, Bob is also hoping that he never sees a pie chart in an information security vendor report or dashboard ever again as a result of the book.

Q.   Tell us about your book “Data driven security” in brief.

Data-Driven Security takes folks on a journey through the concepts, practices and principles of data analysis and visualization by looking through an information security lens. We set a historical stage for how modern statistical practices elevated other professions then use data that should be familiar to information security professionals to provide a comprehensive overview of how to apply those practices within our discipline. We focus quite a bit on R, which is a language created by and for data analysts. We also view the book as a “gateway drug” for each of the concepts we present. If a practitioner develops an affinity for statistics from the sections that cover those topics, we show where to go for more information. The same is true for machine learning or developing interactive visualizations.

Q.  What has been the biggest challenge to secure data (information) and                 how Would we overcome it?

Wow. That’s a fairly big question, but I think I can sum it up in one word: complexity. It’s almost trivial to secure small quantities of information on a single system. When you interconnect systems and networks, layering applications, transactions and business processes you start to increase the complexity of the solution almost exponentially. That’s one reason we felt compelled to help folks understand how to break down problems scientifically and use data in ways they never have before to both gain visibility and make better choices in how to protect and defend their information assets.

 Q.   As having experience in the field of Information security & IT                                 Risk Management what you see the future of data networks?

I seem them growing more diverse, distributed, complex and, well, perhaps the best word to use is “unruly”. There are definite comparisons between performing risk analysis in fields like meteorology and epidemiology and doing so in information security. The phenomena in those fields are difficult to predict and dissect. Both weather systems and the spread of disease involve complex interactions across a wide and diverse spectrum and you can definitely see the parallels. Cloud computing, mobile computing and the blurring of what is personal & corporate all pose significant challenges now and when you factor the emergence of and convergence with the “internet of things”, the “rise of the drones” and the advent of non-internet network fabrics, data will behave just like water and flow into all the places that let it. Our challenge will be to ensure we help organizations develop the capability to have data be aware of where it’s flowing and only let it be used in the ways it was designed to be (and where it should be allowed to be used).

 Q.  Tell us about the different Data tools used for Data security in Brief.

I’ll focus this answer on the tools used for data analysis & visualization within the context of “security data”. For “normal- and medium-sized data” (i.e. not “big data”) most of the tools are at hand. R, Python and Excel are all good at dealing with data of a manageable size and traditional databases and operating systems are fully capable of handling data management tasks. Rather than give a laundry list, though, I would encourage security professionals to keep a keen eye on organizations like Etsy, Netflix and Bit.ly to learn how to look at data in new and interesting ways and also at the tools they develop, use and provide openly to the community. We’ve spent far too long as an industry navel gazing at our own creations and we’ll only start solving real problems by blending capabilities, techniques and tools from other disciplines/industries.

Q.  What was the hardest part of writing your book?

The schedule! Jay & I worked really well together and developed a great collaborative system using github, but we were on a very tight delivery schedule from June through November of 2013. In fact, I believe we spoke more to each other every day than we did to our respective families. I think I can also say “getting past the table of contents” as, perhaps, the other hard part. It took a few false starts before we came up with a chapter framework that resonated with both us and Wiley. We’re really pleased with the result.

 Q.   Can you share a little about your current work or projects?

Jay just finished up ~3 months of intense work on analytics behind the Verizon Data Breach Investigations Report (which is coming out soon!). I’ve been overseeing cross-sector “data projects” (best I can say for the moment) with the Advanced Cyber Security Center and working with my internal data science team on designing internal projects for the upcoming year.

Outside of work, Jay & I maintain a companion (to the book) blog and podcast at http://datadrivensecurity.info/ where we expand on topics from the book and try to highlight the excellent work being done by visionaries and pioneers in our field.

Q.   Say few words for our readers?

We hope that we’ve helped encourage folks to take a peek into the world of security data science and would really encourage all of your readers to at least start down that journey even part of the way. A big piece of advice is to add a few of the non-security resources we feature in the book (and on the site) into their RSS-feed, Twitter stream and podcast rotation to see what those outside our field are doing and find something that really interests them. Finally, I’d encourage folks to find questions to ask, find data to answer them and develop the skills necessary to find answers scientifically and tell great stories visually.

Posted in Technology, Web Security | Tagged , , , , , | Leave a comment

5 top challenges in Mobile Cloud Computing


Mobile cloud computing (MCC) is a technique that allows to use built resources like applications and it is hosted by cloud computing. Mobile cloud computing uses cloud to data storage, processing, and other thorough operations like Google Maps, mobile Email and some navigation application. However, these applications are using SaaS (Software as a Service) model of cloud computing.

From my previous article outlined reasons why mobile computing raises states about benefits of mobile computing. However, what extend mobile computing gives facility and what about security of personal or organizational information? Will it prove beneficial all the way? These questions are bigger especially for an organization. This post is going to take a look at mobile cloud computing challenges.

mbl_cld_cmptg

Following are that issues in mobile cloud computing.

  1.  Low bandwidth: This is one of the big issues in mobile cloud computing (MCC) that need to be tackled. Mobile cloud use radio waves which are limited as compare to wired network. Available wavelength is distributed in different mobile devices. So, it has been three times slower in accessing speed as compared to wired network
  2. Security and Privacy: Remain privacy is a major challenging issue in mobile cloud computing. It is harder to manage threats on mobile devices as compared to desktop devices because in a wireless network there are more chances of absence of the information from the network.
  3. Service Availability: connection is another major threat in cloud computing. Users often find complaints like transportation crowding, breakdown of network, out of coverage. Sometimes customers get a low frequency signal, which affects the access speed and storage facility.
  4. Alteration of Networks: Mobile cloud computing is used in different operating system driven platform like android, Apple ios, and Windows Phone. So it has to be compatible with different platforms .The performance of different mobile platform network is managed by the IRNA (Intelligent Radio Network Access) technique.
  5. Limited Energy source: Mobile devices are generally less powerful and consume more energy. Mobile cloud computing increases battery usage of mobile devices which become an important issue. Devices should have long life battery to access applications and other operations. When the size of altered code is small, the offloading consumes more energy than local processing. Some organizations try to find ways to overcome this problem.

Cloud computing and mobile devices give efficiency and accessibility but with the security risk if not proper implemented. A fast growing market of Mobile Device management (MDM) manages resources of mobile devices on cloud within the enterprise. We can say that future of technology is a combination of Cloud and Mobile.

Posted in Technology, Web Security | Tagged , , , , , | 1 Comment

How secure is Bitcoin Cryptocurrency


Cryptocurrency is a digital currency that uses cryptography for security; it makes easy to transfer funds between Internet users. Bitcoin is the first Cryptocurrency introduced in early 2009. Since then many cryptocurrencies have been developed and traded in the market but bitcoin captures public attention in 2012 because of its high cryptographic security.Bitcoin

Bitcoin allows users to process the transaction in a very efficient and inexpensive manner.  Second major facility is that you can receive and make payments on Bitcoin network with little or no fees so there is no need to open any account. Bitcoin stores in digital wallet and can easily transfer through computer or smart devices e.g. Smartphone, laptop or PDA, by entering the recipients’ address and amount of payment.  Many wallets can obtain the recipients address by scanning QR code or NFC (Near Field communication).

From the security perspective, it starts with block chain, and primary chain block called genesis block. Each block contains a hash – a cryptographic string data from the previous blocks, so origin block is strongly responsible for identify every genuine bitcoin. It is the most powerful innovation because it eliminates chance to spend double.

Main security threat in Bitcoin is its uncontrolled exchange that stores Cryptocurrency. Bitcoin exchange was hacked in Hongkong, Czech Republic. The attackers used social engineering tactics to unveil Bitcoin network. Attackers had stolen over $1 million in two attacks in the month of late October and November2013 respectively. They arranged cloud server that hosted input.io’s infrastructure, which is responsible for bitcoin wallet and quick payment.

In further, transaction made by the user is inevitable and buyers cannot recover their funds. So damage can happen to buyers, so it is good to store bitcoin offline. Besides some security threats, there are cons of Bitcoin like the one it is too volatile, as web shops would have to adjust their price almost daily.

It is untraceable, so consumers do not need to be afraid of tracing by government or any outsider. It encourages illegal business. People can buy or sell illegal items on the Internet. If your credit card is hacked or stolen, then it is difficult to recover your money. There is no tactic to recover theft or hacked Bitcoin.

Bitcoin has to wait until some security vulnerabilities are cleared. Besides cyber criminals, it proves beneficial if it becomes safer.  Many entrepreneurs accept Bitcoin in last six months. It has a bright future, but we should overcome bitcoin errors and protect it from hacking.

Posted in Technology, Web Security | Tagged , , , , , | 4 Comments

5 Reasons why you should start using mobile computing


Mobile computing technology is communication through mobile devices with use of intranet. A sales manager gets a sales order over mobile device is an example of mobile computing. Because of its efficiency like accessibility, cloud storage facility makes hike in mobile computing.

Let’s take a look at reasons behind claim of Mobile computing.

  1.  Powerful mobile devices and networks: In earlier days phones were slow in terms of speed, now Smartphone comes with advancement of processing speed, more internal storage capacity with wireless technology that allows users to fast download and data access over network.3G and 4G technologies increase the accessing speed.

    Mobile_computing

    Mobile_computing

  2.  Integrated Applications: Devices need applications in order to perform given task, for example throughout process of print a document it needs application like MS office to open, read and print document. These days mobile devices supports many applications and many smart phone comes with preinstalled applications as iTunes in iPhone, google play in android operated phones.

Some use of different applications in organizations:

  • View upcoming events and tasks so employees of the organization manage the activity          well and thus they could be top in the industry.
  • Manage and access information of the partner in business and contact details.
  • Can get the information about the inventory, product list, sales and purchase cost and information about stocks.

3. Cloud Transformation: Some organizations uses cloud computing services like SaaS (software as a Service) and Haas (Hardware as a Service) that adds convenience of employees to share or access applications and store information on mobile devices. It is called mobile cloud computing which combines mobile development and cloud computing.

4. Advantage of mobility: mobility makes particular person or organizations more   responsive. Mobility gives location flexibility for communicate, access, store and share the information from anywhere increases the productivity and thus save the time as compare earlier days. It saves time spend on travelling. Now a days audio and video streaming go on mobile computing. Users can get access of wide range of movies, music with use of high speed data connection.

5. Interactive Public Display: NFC (Near Field communication) is advanced prototyping mobile technology that links mobiles with other display.

It can attract customer’s attention and also transforms the customer’s experience.

A customer gets the information effortlessly.

In addition NFC (Near Field Communication) helps customers to find information about products, can help users with time management, employee tracking and customer satisfaction and ease at use.

Devices_revenue

Devices_revenue

Graph demonstrates revenues of different devices in past years.

Mobile computing not just stops here but just starts as we see its rapid growth to meet at the end. Developing in mobile computing is ongoing as advancement in IT sector and wireless technology. Many organizations already use mobile computing to meet competitive edge.

Posted in Technology | Tagged , , , , , | Leave a comment

Artificial intelligence a next gen technology


It is quite difficult to write about AI (artificial intelligence) because it is huge area and we all know that every matter has positive and negative side. As being technologist, I am on the positive side when AI helps humans in medical and some expert system area. There are 1.1 million robots working in the world. The softwares usage like LISP and Prolog program refers to artificial intelligence.AI Technology

There are many inventions and researches have been made in the application area of artificial intelligence like robotics, scheduled system, Data mining, expert systems, and speech reorganization.  Many companies make humanoid robots like Honda’s asimo and HPR-4 from kawada industries and NAO. Many of us have seen the robots in Hollywood movies like the terminator movie series. Researching and developing robot is a latest technology in news in artificial intelligence.

So, what is the impact in different areas of artificial intelligence? Well, the answer is quite broad because AI influences many areas like accounting, economy, social and it covers an expert system. There are many benefits against the barrier. AI system does not have emotions and cannot take a decision individually, for example a smart gun, which cannot decide whom to shoot. Before shooting, it works according to the actions or the instructions.

Negative effects of artificial intelligence

If the use of artificial technology increase, then human would become idle, human life is around their jobs and businesses. It can change the human being habits.

Every country’s economy depends on both the humanity and consumerism whereas artificial intelligence do not put earnings back in to the economy.

Artificial intelligence does not have yet powerful memory capacity as compared to human beings. It does not memorize quickly and cannot take actions rapidly.

Positive effects of artificial intelligence

Besides negative impact, there are also positive impacts of the artifiartifi_intellicial intelligence on different areas.

It can be used in expert systems like military operations, medical science, education where human cannot get into the deep.

AI programs now recognize human speech through speech reorganization programs. This program is useful for the disabled person to operate their applications with voice.

AI can be used in teaching programs that can give user a human touch to understand the functionality of the different applications. Students get additional help from the AI tutor.

Medical science, AI is useful for the curing the disease that is hard for the human and helps in-patient examination to produce better results.

Military operations it would be helpful to detect and also defuse bomb and thus reduce the adversity.

Currently research on Artificial intelligence and humanoid robots is on peak; many companies made humanoid robots with expanded tasks and tend to commercialize it. Therefore, the question is whether Artificial intelligence is good or bad and how it will, influence humanity is a major question. If the use of humanoid robots increase, then it will be good to use them like an expert system. However, only future will tell whether humanoid robots will rule over humanity or not. Will it be beneficial or dangerous to human is really a worth considering subject.

Posted in Technology | Tagged , , , , , , | Leave a comment

An overview of Cloud computing and services


Cloud computing seems debatable subject because you may get different answers from different experts about Cloud Computing, we can see it everywhere in computing world, Cloud computing is a real time computing that integrates all the different resources of computers under one roof, it can be any form like software, hardware or information.

People use cloud services in one or another way. Many Cloud computing services are available in these days like IBM’s SmartCloud, google compute cloud and TCS offered cloud services. As per recent scenario we can categorize cloud computing in three ways in the form of use and specification that Private cloud, Public cloud and Hybrid loud.

There are three components to make the cloud computing solution over the internet.

1. Data center
2. Client computers
3. Distributed servers

Data center
Data center is a collection of servers where the application that you subscribe is stored and at other side the world, you connect via internet. Virtualizing server is now growing trend in the cloud computing means you can have many servers for the installed applications under the one physical server. Data center requires some conditional environment like electricity, temperature, space and security.
We all know that IBM, Google have their own data centers.

Client computers
Client computers are nothing but are user’s desk; it would be a tablet, Mobile Phone, laptop or desktop computer.

Client computer falls under different categories like thin client, thick client and mobile client.

Thin client computers are small in sizes that have no physical hard device storage but they allow the server to do all thing. It is also called diskless nodes.

Thick (Fat) client computers need the storage space so it is not available for the public climate.

cloud_computing

cloud_computing view

It is a regular computer user which uses internet browsers through Firefox or internet explorer to connect the cloud.

A Mobile client includes users that use the Smartphone or PDA like Microsoft windows phone, blackberry, or android operated phones.

Distributed Servers (cloud Servers)

Distributed servers give the option flexibility and security though situated far away from the client. For example, one website causes failure service but still accessible because it is added to another server on the network and it requires no physical devices. Distributed servers are located geographically on different places.

Services

Term Service is used in the way which cloud computing provide the usability of it.

  • Software as a service (SaaS)
  • Platform as a service (Paas)
  • Hardware as a service (Haas)

Software as a service (SaaS): This service provides an access of one application to thousand of computers on the network means user do not need to install and configure the software but cloud service provider will do that, Users have to only pay and use it through the client server. Facebook, Google Apps and Microsoft office 365 are examples of SaaS.

Platform as a service (Paas): Platform as a service provides different platform of operating system, programming languages execution, database and web server etc., force.com, Google App Engine and Microsoft Azure are examples of PaaS.

Hardware as a service (Haas): Haas offers hardware licensing requirement in managed or grid computing. There is no need to invest in hardware furthermore. This service allow user to use distinct service like Storage Space, CPU Cycles or Memory through the internet. There are many providers of Haas. Organizations have to pay as per the usage of the hardware resource.

Pros of the cloud computing is as under:

  • Cost Effective: it is a main advantage of using the cloud computing. Cloud computing is much cheaper than other networks because there is no need for physical devices, servers, employees and maintenance.
  • Availability: cloud computing provides the facility to reach the end users so it is been accessible and easy to modify the content in the sense of documents and files. In other word you may access any information from anywhere beyond geographic location once you registered.
  • Backup and recovery: Data recovery and backup is also a main advantage of the cloud computing. It is easy to take a backup and restoring using the cloud computing service other than traditional method.
  • Huge storage: storing information in cloud computing gives huge storage capability, so there is no need to do work about the data capacity or to increasing current space in the storage.
  • Auto software integration: cloud computing automatically integrate your applications and information through data integration server. So it’s been easy to access the information from one account.

Cons of Cloud Computing:

  • Security Issues: When you register and submit sensitive information on the server that means you are providing details to cloud network service provider. Therefore, it is good to check for the service provider regarding to secure storage of information before registering to service.
  • Vulnerability of the data: Storing information on cloud could make your company’s information vulnerable because there is less security on the internet network, so it would be a chance for external hacker to hack your account.
  • Technical problems: Cloud computing face many outages and technical issues in spite of high standard maintenance and you need good internet connection. You often meet problems related to network and connectivity.

As use of internet network has been increasing rapidly, Cloud computing constantly developing in services areas in order to convenient the service to the organizations and lots of things to do though there are many challenges like security,technical outages but one should accept the importance of the cloud computing. Hybrid Cloud is an example of this evolution. Hybrid cloud is advance computer clouding which aimed to better manage the resources over public and private cloud.

Posted in IT, Technology | Tagged , , , , | 3 Comments