Search
Register

Emerging tech

Decoding Data Lakes

|

 Those familiar with the Business Intelligence space will know of the role of a Data Warehouse. A data warehouse accumulates data from multiple sources, with the objective of providing analytics that drive business decisions.  In today’s world of big data, we have started hearing a lot about data lakes. Data lakes, like a data warehouse, is a storage repository for vast amount of data.  So, then, is a data lake a different implementation of the data warehouse?  In fact, it is quite different. The term data lakes was coined by James Dixon, former CTO of Pentaho.  According to Dixon, data warehousing led to information silos, which could be overcome by data lakes. The data lake metaphor emerged because ‘lakes’ are a great concept to explain one of the basic principles of big data – the...

The top 10 characteristics needed by leaders to adapt to changing technology- AI and YOU

|

There may be various reasons for resistance to AI within your organization. This resistance leads to slower adoption, reluctance to fully uncover the true potential of the human-machine collaboration or even no adoption of technology at all.   Leaders must ensure they have compelling, meaningful answers to burning questions, strategize and plan well in advance and also begin by first developing characteristics that will aid in their own ability to adopt AI at the leadership level.   The top 10 characteristics defining your ability to adopt AI are: Adaptability– The ability of the organization to keep pace with new developments in AI must be kept at a close watch. Applicability- Successful AI innovation depends on how well it is applied to a given business context. Data Mana...

Edge Computing: Part II – Cost & security, Standards, Technical

|

This is the second part of a two-part blog on the questions raised during an Edge Computing Webinar that NASSCOM hosted on Apr 16, 2020. Since many questions from the attendees were unanswered, the panellist have made an effort to address these offline. This post covers the questions on Cost & security, Standards, Technical aspects of edge. Part I of the post can be accessed here: Use cases, Start-ups, Go-To-Market   COST & SECURITY “In comparison with Cloud, Edge computing is expensive in terms of hardware & infra management” – what is your point of view? The edge computing is expensive in terms of hardware and infra, but you need to look at it holistically. You must consider the cost associated with the network traffic, if you are to process all the gathered ...

The 10 Most Successful Cryptocurrency Business Models Of Today

|

There are tons of million crypto-based small businesses running around the world, and 6,43,000 more are started every month. So if you’ve got a cryptocurrency or blockchain business idea and you want to stand out from the crowd and succeed, you better have a unique value proposition, diverse revenue streams, and loads of creativity. To inspire you, we’ve rounded up 10 unique business models that have proven their model works. From healthcare to fintech, these companies are rethinking revenue and creating compelling value for parties on both sides of the transaction. The crypto business model is at the core of any successful startup because no matter how cool an idea is or how unique something may seem, a startup must have a new way of making money that is worthy enough for future investmen...

The Key to Building Data Pipelines for Machine Learning: Support for Multiple Engines

|

As a consumer of goods and services, you experience the results of machine learning (ML) whenever the institutions you rely on use ML processes to run their operations. You may receive a text message from a bank requiring verification after the bank has paused a credit card transaction. Or, an online travel site may send you an email that offers personalized accommodations for your next personal or business trip. The work that happens behind the scenes to facilitate these experiences can be difficult to fully realize or appreciate. An important portion of that work is done by the data engineering teams that build the data pipelines to help train and deploy those ML models. Once focused on building pipelines to support traditional data warehouses, today’s data engineering teams now build mo...

Unlocking the Power of BIG DATA !

|

 “Data is a precious thing and will last longer than the systems themselves.” –  Tim Berners-Lee, Inventor of the World Wide Web” Big Data is the need of today’s hour. The use of Big Data is becoming common these days by the companies to outperform their peers. We are currently in a data-driven economy where no organization can survive without analyzing the current and future trends. It helps the organizations to combine and analyze the industry data. There are ample of information that companies have about the products, services, buyers and suppliers, consumer preferences which can be put together to analyze. So it is rightly said by Napoleon Bonaparte, “War is 90% information.” Let’s see how much true it is. Big Data can serve to deliver benefits in various domains- Insurance – As big da...

Securing the Internet of Things with Intrusion Detection Systems

|

With the Internet of Things becoming mainstream and the ubiquity of wireless networks around us, IDC has predicted that there will be 41.6 billion connected IoT devices by 2025. With the immense benefits that the connected world brings to the consumers, it is also inviting attackers to continuously identify new exploits and hit techniques designed to circumvent the security around the IoT networks. It is thus imperative to secure the IoT Networks considering the quantitative loss that it could bring to the industry and consumers. According to a study by MarketWatch, over the next five years, the Internet of Things (IoT) Security market will register a 32.5% CAGR in terms of revenue, the global market size will reach US$ 35900 million by 2024, from US$ 6630 million in 2019. There are a plet...

Edge Computing: Part I – Use cases, start-ups, GTM

|

Post releasing its whitepaper “Edge Computing-Towards A More Distributed Future” in Dec-2019, NASSCOM conducted a webinar on this topic on Apr 16, 2020 wherein the panellist covered topics on use cases of edge, deployment & post deployment challenges, technologies shaping edge computing, business opportunities, monetising edge, talent, etc. We had close to 700 registrations for this webinar and while the panellists were able to address a few questions during the Q&A, we could not cover many due to paucity of time. The panellists felt a lot of these questions important enough and so they have taken time out to share their responses. I have consolidated these responses and am posting them in two parts: Part I: Will cover questions on Use cases, Start-ups, Go-To-Market Part II: Cost &...

Competing in the Age of AI

|

How machine intelligence is changing the rules of business and what should companies do to stay on top?  Artificial intelligence (AI) is a branch of computer science that makes it possible for machines to learn from experience, adjust to new inputs and perform human-like tasks. According to IDC, Companies are forecast to spend $98 billion on AI, globally in 2023. This stems from the fact that more and more businesses continue to invest in projects that utilise the capabilities of AI software and platforms. For example, most companies have turned to chatbots or automated customer service agents for their customer services. In the current scenario, the world is grappling with a global pandemic, the COVID-19. This has forced most of the countries into lockdown and changed the way businesses f...

Key Properties of Endpoint Security Solutions

|

For decades, organizations had considered the antivirus to be the best (and probably the only) solution for securing endpoints. Although antivirus solutions indeed help detect and remove malware, they fall short when it comes to tackling new-age security loopholes. Moreover, legacy solutions can also create several integration issues with modern operating systems and can create new security vulnerabilities. Given the sophistication with which today’s hackers can bypass antivirus solutions to produce countless unique and unknown attacks, it takes more than just an antivirus solution to keep organizations safe. What to look for in endpoint security solutions Endpoint security solutions allow cybersecurity professionals to gauge every possible access route that a hacker might deploy to launch...