Category: summer2017

Palantir - Big Data Possibly Helped Catch Bin Laden

by on July 28, 2017 1:29 am
Palantir Technologies, a Palo Alto headquartered big data analytics company, is rumored to have possibly helped in tracking down Osama bin Laden [1]. Although no concrete sources have confirmed this rumor, it is well known that one of Palantir’s main products, called Gotham, is used by counterterrorism analysts at numerous US government agencies. They sold… Read more Palantir - Big Data Possibly Helped Catch Bin Laden

How is artificial intelligence used in social consumer apps?

by on July 27, 2017 11:33 pm
Artificial intelligence refers to “a broad set of methods, algorithms and technologies that make software ‘smart’ in a way that may seem human-like to an outside observer” (Lynne Parker, director of the division of Information and Intelligent Systems for the National Science Foundation). The buzzword Artificial Intelligence is actually an umbrella for many other concepts… Read more How is artificial intelligence used in social consumer apps?

Big Data Mining in Medicine

by on July 27, 2017 11:03 pm
One of the main themes of last Friday’s lecture was big data and its impact across numerous different industries. In today’s blog post, I’d like to focus on how big data and the associated process’ impact on the healthcare industry. A phrase commonly interchanged with big data is data mining. In an article by Jennifer… Read more Big Data Mining in Medicine

Big Data in the Cloud

by on July 27, 2017 10:27 pm
So you have decided that you’re ready to implement a big data solution and you plan to do it in the cloud. How will you choose what’s best for your organization? With all of the hoopla around big data, NoSQL and the like, this blog will provide some background and a review of the options… Read more Big Data in the Cloud

Enterprise Network Firewalls: Main Players and Comparisons

by on July 27, 2017 9:18 pm
As network security grows in importance for companies of all sizes, network firewalls are in hot demand for small and medium businesses (SMBs) as well as enterprises. Gartner publishes an annual magic quadrant report for enterprise firewall providers, giving a quadrant ranking as well as analyzing each one’s respective strengths and weaknesses. What are the… Read more Enterprise Network Firewalls: Main Players and Comparisons

Sensor Data and Mars-Drilling

by on July 27, 2017 7:47 pm
Introduction Drilling is anticipated be an important activity in the future exploration of Mars. Its primary motivation will be to allow the exploration of the subsurface of Mars, in particular to search for, and eventually study, life on Mars. The scientific value by acquiring in situ samples for analysis is one of the primarily objective… Read more Sensor Data and Mars-Drilling

Supporting Edge Computing and IoT with Modular Data Centers

by on July 27, 2017 7:37 pm
  Living on the Edge The increase in sophisticated Internet of Things (IoT) devices is pushing cloud computing to the edge, literally.  Currently all of the major cloud providers such a Amazon (AWS), Microsoft (Azure), and Google Cloud Platform operate in huge hyperscale data centers.  These facilities are hundreds of thousands of square feet, and … Read more Supporting Edge Computing and IoT with Modular Data Centers

Validity and Veracity

by on July 27, 2017 7:03 pm
Simon Chan’s discussion on the advantages and disadvantages to startups and incumbents was very interesting. I’d like to explore this further in the context of the disadvantages to incumbents in terms of the usefulness of their available data and in the advantages to incumbents in terms of their data volume. First, the disadvantages. A 2016… Read more Validity and Veracity

Big Data and healthcare

by on July 27, 2017 2:01 pm
Data is being generated at a rapidly growing pace. IBM claims that 90% of the data in the world has been generated in the last two years, or in other words, 2.5 quintillion bytes of data are created every day [1]. This data holds a lot of value for many different industries, as it contains… Read more Big Data and healthcare

CyberSecurity through the eyes of a hacker

by on July 27, 2017 11:53 am
Hackers are targeting what companies value the most: their intellectual property, their customer data, and their reputation. Attacks are growing more sophisticated and more damaging. What these attacks reveal is that cyber-security efforts have failed and fixing this will require security officers, IT teams and company boards. Companies need to address this issue but with… Read more CyberSecurity through the eyes of a hacker