Rainstor Claims Hadoop Secure Even for Large Banks

July 20, 2013

The article titled RainStor Adds Enterprise-Grade Security, Search to Hadoop on ITWorld discusses the database specialist’s answer to the Big Data problem. What problem, you ask? When your clients number among the world’s largest banks, security and speedy search are of paramount importance. The article explains,

“When you put Hadoop into production, especially if you’re a telco or a large investment or retail bank, you suddenly have to think about the sensitivity and importance of the data,” says John Bantleman, CEO of RainStor. “If you lose a webclick, nobody cares. But if you allow unauthorized users access to high-value data … the requirements are just so much more rigorous. You need good authentication. You need to manage encryption keys and have an understanding around how the data is used.”

Rainstor’s data compression technology reduces the storage footprint by up to 97%, and they believe their enterprise-grade security and search for Hadoop will solve past problems. Data encryption, data masking, audit trail and tamper proofing are all new security features. The search aspect was also a priority (another search Hadoop play). Rainstor claims that its search capability performs at speeds 10 to 100 times faster than standard SQL by quickly dividing data into subsets, which analysts can further explore.

Chelsea Kerwin, July 20, 2013

Sponsored by ArnoldIT.com, developer of Augmentext

Embedded Security Noted As Additional Benefit of API

July 18, 2013

News of Intel’s acquisition of Mashery is still popping up on our radar. The ReadWrite article “Intel’s Buying Mashery To Get Deeper Inside The Data Center” offers an insightful perspective on why the chip giant went after a seven year old company that specializes in linking together Web-based software and services. In other words, Mashery is an API management service.

The focal point of the article reference circles around the idea that Intel no longer sees the computer as a silicon chip — now, they recognize the CPU as a network.

The article discusses the implications:

The same techniques that connect consumer apps, it turns out, also work well within large businesses. Comcast, for example, uses Mashery’s API management service to allow programmers to access internal systems. That’s a far more sensible way to create internal software than the alternative, which involves doing a lot of one-off integrations at considerable time and expense.

In addition to efficiency, a prime use case for APIs are eliminating any security risks a corporation has. We are seeing smart companies develop solutions such as Cogito API, which offers businesses concerned with avoiding risks the confidence in using a solution already embedded with corporate security measures.

Megan Feil, July 18, 2013

Sponsored by ArnoldIT.com, developer of Beyond Search

01Business and Search

July 4, 2013

Take a look at the article about Sinequa. Just run a query in the next few days at www.01net.com. The story presents some interesting information.

Stephen E Arnold, July 5, 2013

Stephen E Arnold, July 4, 2013

Sponsored by Xenky, the portal to ArnoldIT where you can find the world’s largest collection of first-person explanations of enterprise search

Quote to Note: Understanding and Content

June 12, 2013

I read “How a Low Level Insider Could Steal” in the USA Today. Here’s the phrase I circled:

We cannot defend what we don not undertand.

If accurate, does this statement apply to Big Data, whatever that is? If one does not know, how does one search for information?

Stephen E Arnold, June 12, 2013

Sponsored by Xenky

Search and Content Processing Vendor in the Spotlight

June 8, 2013

Once again I have no opinion about allegations regarding data intercepts. Not my business. Here in Harrod’s Creek, I am thrilled to have electric power and a couple of dogs to accompany me on my morning walk in the hollow by the pond filled with mine drainage.

I did read a TPM story commenting about Palantir, a company which has more than $100 million in funding and now has a PR profile higher than the Empire State Building. The write up explains that a company with search, connectors, and some repackaged numerical recipes may be involved with certain US government activities.

Here’s a quote from a quote in the write up:

Apparently, Palantir has a software package called “Prism”: “Prism is a software component that lets you quickly integrate external databases into Palantir.” That sounds like exactly the tool you’d want if you were trying to find patterns in data from multiple companies.

The write up has some links to Palantir documents.

Several thoughts:

First, there are quite a few firms working in the same content processing sector as Palantir. Some of these you may know; for example IBM. Others are probably off your radar and maybe drifting into oblivion like Digital Reasoning. The point is that many organizations looking to make money from search and content processing have turned to government contracts to stay afloat. Why haven’t real journalists and azure chip consultants cranking out pay to play profiles described the business functions of these outfits? Maybe these experts and former English majors are not such smart folks after all. Writing about Microsoft is just easier perhaps>

Second, the fancy math outfits are not confined to Silicon Valley. Nope, there are some pretty clever systems built and operated outside the US. You can find some nifty technology in such surprising places as downtown Paris, a Stockholm suburb, and far off Madrid. Why? There is a global appetite for software and systems which can make sense of Big Data. I don’t want to rain on anyone’s parade, but these systems do not vary too much. They use similar math, have similar weaknesses, and similar outputs. The reason? Ah, gentle reader, Big O helps make clear why fancy math systems are pretty much alike as information access systems have been for decades.

Third, the marketers convince the bureaucrats that they have a capability which is bigger, faster, and cheaper. In today’s world this translates to giant server farms and digital Dysons. When the marketers have moved on to sell Teslas, lesser souls are left with the task of making the systems work.

My view is that we are in the midst of the largest single PR event related to search in my lifetime.

Will the discussion of search and content processing improve information access?

Nope.

Will the visibility alter the trajectory of hybrid systems which “understand” content?

Nope.

Will Big Data yield high value insights which the marketers promised?

Nope.

My thought is that there will be more marketing thrills in the search and content processing sector. Stay tuned but don’t use a fancy math system to pick your retirement investment, the winner of today’s Belmont, or do much more than deliver a 1970s type of survey output.

Oh, the Big O. The annoying computational barriers. The need to recycle a dozen or so well known math methods juiced with some visualizations.

The search and content processing bandwagon rolls forward. The cloud of unknowing surrounds information access. What’s new?

Stephen E Arnold, June 8, 2013

Sponsored by Xenky, the ArnoldIT portal.

Open Source Security Responsibility Remains Undefined

June 6, 2013

Open source is enjoying increasing adoption in the enterprise, a realm where security has always been a top priority. However, it seems that when it comes to open source components, the enterprise has yet to determine a clear plan of action for ensuring and maintaining security. Network World explores the topic in the article, “Control and Security of Corporate Open-source Projects Proves Difficult.”

The article begins:

“Open source has become a staple for software development in the enterprise, but keeping track of it and maintaining security for it remains an elusive goal, according to a survey of more than 3,500 data architects and developers published today by Sonatype, which provides component lifecycle management products and also operates the Central Repository for downloading open-source software.”

An infographic goes on to show that responsibility for open source security falls across a wide variety of departments and job titles. But for organizations that are interested in implementing the best of open source without taking on the security risk, opting for a value-added solution instead of components is a better option. For instance, LucidWorks has made a name for themselves by offering a fully supported solution based on Apache Lucene and Solr. Best of all, LucidWorks is so trusted that others are incorporating the power of LucidWorks into their own offerings, in an attempt to ensure enterprise security standards.

Emily Rae Aldridge, June 6, 2013

Sponsored by ArnoldIT.com, developer of Beyond Search

Healthcare and Social Media: Complying with HIPAA and Avoiding Fines

June 1, 2013

On HIPPOmsg, the article Be Careful with Social Media and HIPAA Information Security seeks to warn healthcare professionals about the pitfalls of social media. HIPAA or Health Insurance Portability and Accountability Act requires stringent measures to protect the privacy of patients health information. Many doctors have professional pages, but even these are not the appropriate forum to give medial advice. The article explains why,

“With millions of people using social media day in and day out to communicate, there will no doubt be a time when a patient tries to ask for medical advice. Don’t give it!! Direct your patients to make an appointment. This allows you to see first-hand the situation and will take any speculation out of the equation. Also, social media is notorious for a lack of HIPAA security. Avoid sharing personal information to avoid HIPAA violations and fines or worse.”

The article also warns young doctors and med students to beware of sharing inappropriate “materials” that might damage their reputation and affect their career path later down the road. HIPPOmsg is offered as a secure way to text/email on a mobile device. But even with a professional page and a secure method of sharing information, doctors are not immune to wrongheaded behavior on their personal pages. At ArnoldIT you can learn about your digital footprint and how to minimize the risks associated with social media.

Chelsea Kerwin, June 01, 2013

If you are interested in gourmet food and spirits, read Gourmet De Ville.

Employee Rights Regarding Social Networks Passwords and Login Information

May 31, 2013

The article BYOD Policy: Employee Rights to Social Media Privacy is Paramount on PC Advisor, advises companies on the ideal way to approach social media privacy of its employees. BYOD (Bring Your Own Device) policies are now often legal documents with a privacy section outlining employee rights. Any attempt by an employer to access ISP’s or internet service providers can lead to a fine or imprisonment. The article explains,

“There is a legal precedent favoring employee rights: Pietrylov. Hillstone Restaurant Group in 2009, whereby a couple of employees created a MySpace page to complain to registered members about the company. Managers allegedly pressured one member, another employee, to give up her log-in ID and password to access the MySpace page. The two employees that created the MySpace page were outed and fired, yet the court upheld the jury’s verdict that Hillstone was liable for violations of the SCA.”

Janco Associates, a management-consulting firm, has a 14-page BYOD policy. But the underlying message is simple: the employer must not attempt to access the employees private social networks. Even requesting login information is dangerous because the burden falls on the employer to prove that they did not coerce the employee for the information. Being cautious and viewing employees private information as sacrosanct may be the easiest ways to avoid legal issues. To learn more about planning a safe and constructive social media strategy, visit ArnoldIT.

Chelsea Kerwin, May 31, 2013

If you are interested in gourmet food and spirits, read Gourmet De Ville.

Change Passwords and Administrative Statuses Before Firing Employees

May 31, 2013

The article Sacked HMV Employee, A Lesson In Social Media Security on Veronica Pullen is a cautionary tale for all business owners interested in social media. HMV, a music retailing company centered in London, learned the hard way that if you are going to fire a huge swath of staff, it might be best to take charge of the Twitter account beforehand. Fired employees began live-tweeting about the firings and badmouthing the company. The article discusses social media responsibility,

“Many business owners don’t know for sure exactly who has access to their Facebook and Twitter passwords, and if you don’t keep a tight rein on access info, you could be leaving yourself at risk too. One of the first things I do when I start working with a new client is to check who the administrators are for their Facebook Page, and who has access to Twitter.”

Even though HMV’s marketing staff eventually gained control back over the account later that day and erased the earlier posts, they didn’t count on a delighted audience taking screen shots of the inflammatory Tweets immediately after they were posted.

To avoid being put at the mercy of disgruntled employees, the article recommends paying close attention to social media account administrators and passwords. At ArnoldIT a staff of professional social media experts offer an abundance of information on implementing the right social media strategy for your business.

Chelsea Kerwin, May 31, 2013

If you are interested in gourmet food and spirits, read Gourmet De Ville.

Cloudera Falls Short in Big Data Security

May 31, 2013

Hadoop and its surrounding landscape are a big discussion point among not just the open source crowd, but also the entire discussion of enterprise data management. Cloudera is a leading contender for this interested in value-added solutions based on Hadoop. However, recent findings show that Cloudera is troubling some experts when it comes to security. Read more in the Cloud Tweaks article, “Cloudera Not Cutting It With Big Data Security.”

The article begins:

“Cloudera is, for the moment, a dominating presence in the open source Hadoop landscape; but does it have staying power? While Cloudera’s Big Data platform is the darling of the Hadoop space, they and their open source distribution competitors have so far failed to adequately address the elephant in the room: enterprise data security.”

When it comes to the enterprise, security failings cannot be easily overlooked. However, for those who are interested in harnessing the power of Hadoop, but maintaining the highest security standards, MapR recently launched a partnership with LucidWorks that does just that. MapR’s interest in LucidWorks was to bring powerful and secure analytics to Big Data through Hadoop. LucidWorks has a long record of industry trust and success, so enterprises can feel better about entrusting their data to a tested name in enterprise.

Emily Rae Aldridge, May 31, 2013

Sponsored by ArnoldIT.com, developer of Beyond Search

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta