Page 18 - Building Big Data Applications
P. 18
12 Building Big Data Applications
amount of computerization and logistics that make driving them an easy task.
Similar smart car development efforts are underway with the Google driverless
car experiments and testing and research at BMW, Mercedes Benz, and other
auto manufacturers. All this smart car technology is fantastic and thought pro-
voking, but smart cars have the capability to continuously communicate
informationdthe condition of the vehicle and geographic coordinates of its
locationdto the manufacturer and possibly the dealer where the car was pur-
chased. This capability can induce worrydmore so over whether the trans-
mission data is hack proof, for example, than whether the transmission is
mechanically safe. And this concern is for good reason. If a transmission is
intercepted, actions such as passing incorrect algorithms to the engine that
may increase speed or cause a breakdown or an accident in a driverless vehicle
are possible. Hacking into a smart car can also result in other disruptions such
as changing the navigation system’s map views. This fear of the unknown from
smart car technology tends to be more with driverless cars than electric cars.
Nevertheless, how can hacking smart cars be avoided? No set of regulations for
this data and its security exist in the auto industry, and unfortunately rules are
being created after the fact.
c. Smart health monitoringdRemote monitoring of patients has become a new and
advanced form of healthcare management. This solution benefits hospitals and
healthcare providers, but it also creates additional problems for data management
and privacy regulators. Monitored patients wear a smart device that is connected
to the Internet so that the device can transmit data to a hospital, healthcare pro-
vider or third-party organization that provides data collection and on-call services
for the hospital or provider. Although the data collected by a smart, wearable de-
vice generally is not specific to any single patient, enough data from these devices
exists that can be hacked, for example, to obtain credentials for logging into the
network. And once the network is compromised by a rogue login, consequences
can be disastrous. For now, the situation with remote monitoring of patients is
fairly well controlled, but security needs to be enhanced and upgraded for future
implementations as the number of patients requiring remote monitoring in-
creases. As demonstrated in the previous examples, electronic health record data
requires enhanced management and governance.
10. Infrastructure for the enterprise will include Big Data platforms of Hadoop and
NoSQL. The ecosystem design will not be successful without the new platforms
and these platforms have provided extreme success in many industry situations.
Big Data applicationsdprocessing data
The processing of Big Data applications requires a step-by-step approach: