Page 18 - Building Big Data Applications
P. 18

12 Building Big Data Applications


                    amount of computerization and logistics that make driving them an easy task.
                    Similar smart car development efforts are underway with the Google driverless
                    car experiments and testing and research at BMW, Mercedes Benz, and other
                    auto manufacturers. All this smart car technology is fantastic and thought pro-
                    voking, but smart cars have the capability to continuously communicate
                    informationdthe condition of the vehicle and geographic coordinates of its
                    locationdto the manufacturer and possibly the dealer where the car was pur-
                    chased. This capability can induce worrydmore so over whether the trans-
                    mission data is hack proof, for example, than whether the transmission is
                    mechanically safe. And this concern is for good reason. If a transmission is
                    intercepted, actions such as passing incorrect algorithms to the engine that
                    may increase speed or cause a breakdown or an accident in a driverless vehicle
                    are possible. Hacking into a smart car can also result in other disruptions such
                    as changing the navigation system’s map views. This fear of the unknown from
                    smart car technology tends to be more with driverless cars than electric cars.
                    Nevertheless, how can hacking smart cars be avoided? No set of regulations for
                    this data and its security exist in the auto industry, and unfortunately rules are
                    being created after the fact.
                  c. Smart health monitoringdRemote monitoring of patients has become a new and
                    advanced form of healthcare management. This solution benefits hospitals and
                    healthcare providers, but it also creates additional problems for data management
                    and privacy regulators. Monitored patients wear a smart device that is connected
                    to the Internet so that the device can transmit data to a hospital, healthcare pro-
                    vider or third-party organization that provides data collection and on-call services
                    for the hospital or provider. Although the data collected by a smart, wearable de-
                    vice generally is not specific to any single patient, enough data from these devices
                    exists that can be hacked, for example, to obtain credentials for logging into the
                    network. And once the network is compromised by a rogue login, consequences
                    can be disastrous. For now, the situation with remote monitoring of patients is
                    fairly well controlled, but security needs to be enhanced and upgraded for future
                    implementations as the number of patients requiring remote monitoring in-
                    creases. As demonstrated in the previous examples, electronic health record data
                    requires enhanced management and governance.
             10. Infrastructure for the enterprise will include Big Data platforms of Hadoop and
                 NoSQL. The ecosystem design will not be successful without the new platforms
                 and these platforms have provided extreme success in many industry situations.


             Big Data applicationsdprocessing data

             The processing of Big Data applications requires a step-by-step approach:
   13   14   15   16   17   18   19   20   21   22   23