Page 17 - Building Big Data Applications
P. 17

Chapter 1   Big Data introduction  11


                    but around acquiring all the raw data and then using that for discovery and
                    finally reporting.
                  7. Artificial Intelligence is the new realm of intelligence that will be built for all en-
                    terprises. The intelligence is derived from both trained and untrained data sets.
                    The artificial intelligence algorithms will be implemented across the entire data
                    ecosystem, ranging from raw data to analytics databases. The algorithms can be
                    opensource or enterprise or vendor provided. The implementation includes con-
                    cepts including blockchain, robotic process automation, and lightweight data de-
                    livery systems.
                  8. Machine learning refers to an ecosystem of analytics and actions built on system
                    outcomes from machines. These machines work 24/7/365 and can process data in
                    continuum, which requires a series of algorithms, processes, code, analytics,
                    action-driven outcomes, and no human interference. Work taking place for more
                    than 25 years in this area has led to outcomes such as IBM Watson; TensorFlow,
                    an open source library for numeric computation; Bayesian networks; hidden
                    Markov model (HMM) algorithms; and Decision theory and Utility theory models
                    of Web 3.0 processing. This field is the advancement of artificial intelligence algo-
                    rithms and has more research and advancement published by Apache Software
                    Foundation, Google, IBM, and many universities.
                  9. Smart everything
                     a. Smart thermostatsdThe arrival of smart thermostats represents a very exciting
                       and powerful Internet of Things technology. For example, based on the choices
                       you make for controlling temperature, lighting, and timing inside your home,
                       you can use your smartphone or tablet to control these home environment
                       conditions from anywhere in the world. This capability has created much
                       excitement in the consumer market. Millions of homes now have these devices
                       installed. But what about the data part of this solution? To be able to do this
                       smart thermostat magic, the device needs to be permanently connected to the
                       Internet, not only to accommodate access, but more importantly to continu-
                       ously send information to the power company or device manufacturer or both.
                       Hence, the fear of the unknown: if anybody can get access to these devices and
                       obtain your credentials from the stream of data, imagine what can happen
                       next. Not only is identifying user preferences possible, someone hacking into
                       the smart thermostat can monitor your presence in the home, break in when
                       youarenot there or worse. Once someone has access to the network, theft of
                       data can occur that possibly leads to other kinds of damage. Is this solution
                       really that insecure? The answer is no. But ongoing work in the area of data
                       governance and data privacy attempts to address the gaps in security that can
                       cause concern. To help minimize these concerns, the underlying security of
                       the data needs to be well managed.
                    b. Smart carsdElectric automobiles manufactured by Tesla Motors and Nissan,
                       for example, are touted for being purely electrically driven thanks to the
   12   13   14   15   16   17   18   19   20   21   22