Big Data 1/6

in #business8 years ago (edited)

Welcome to the first entry about the big data, I hope to subscribe, interact and give you Resteem. Thanks @ javf1016

A technological concept that has been created in recent years in the future of BIG DATA, beyond being associated with a large database, aims to search, analyze millions of records and generate patterns in data for Oriented In decision making within a company. The use of all real-time operations on the large amount of information that accumulates every second, lead us to think about factors such as the privacy of information, the truthfulness of such information and have become challenges of the day in the Day The business community, betting on strengthening the area of ​​security.

As every system BIG DATA is developed to avoid failures in its construction, but since we are in the real world, we know that there will always be something that ends up violating our data, think of the following how many backdoors can exist in hundreds of lines of code, now In thousands, but not only in newly created code, we remember that code reuse is used by several companies, so there would be many more lines which could leave some door open; Now think of the following we are prepared for all those situations that we present ourselves, most likely not, few companies have a decision tree that meets all the challenges that arise every day in the management of a system.

It is a great responsibility to handle the vast amount of data, but we must be aware that we will live with it, a subject such as the democratization of data that are regulated by national and international data protection regulations, HIPAA, PCI DSS, the European Data Protection General Regulations, among others, leads us to think that each one makes its own protocols, seeing this we know intuitively that not only knowledge is enough but innovation, focused thinking change is linked, changing our Perception of the environment leading us to want not only to evolve but also to revolutionize the world of data.

The next chapter aims to show that security, even though it is made up of layers, we have many more tools, processes, developments focused on strengthening our defensive armament; Will show how many companies have developed their own methods and products to be able to cope with the evolutionary development of the procurement, analysis of the growing amount of data.
Topics such as machine learning, adaptive defense, network traffic, Honeypots, are the daily bread when adopting BIG DATA within our companies.

Coin Marketplace

STEEM 0.21
TRX 0.20
JST 0.034
BTC 90497.28
ETH 3136.30
USDT 1.00
SBD 2.97