Data, information, and knowledge – The Trinity of enterprise value
Based on the fundamental premise that data, information, and knowledge, are three intricate, indispensable and interdependent elements, all modern HyperScale systems will be built to unearth its untapped business values and business models with unprecedented processing power, speed and accuracy. We view data as simple discrete facts that become information when they are combined into meaningful structures, which subsequently becomes domain knowledge when put together in context. For strategic and growth needs, invariably all enterprises explore new avenues to harness the value buried deep inside this domain knowledge base by generating metrics, categorizing results, assessing values, making forecasting and predictions and finally making informed decisions.
Data has been there for a long time. What is different now? The 3Vs. The vast amount of dataset (Volume) that are generated now a days are distributed, diverse, disparate and heterogeneous in nature. They are structured, unstructured and semi- structured (Variety). Besides, these data set are growing at exponential pace (Velocity). For example, a single blade in a GE gas or wind turbine, generates 500 gigabytes of data each day and that’s just one blade. So that means in 30 days you're generating as much content as the print collection of the Library of Congress. There are about 4,500 GE gas turbines around the world, each with dozens of blades. There are around 22,000 GE wind turbines all outfitted with multiple sensors.
We recognize and convinced that the 3Vs of the modern data characteristics - Volume, Velocity and Variety - generates enormous challenges in areas of Storage, Retrieval, Security, Sharing, Analysis and Reporting. On the flip side they also open up massive business opportunities throughout different phases of data life cycle. Besides the 3Vs nature of the data we also recognize the density of information embedded in them. That is where true enterprise value lies. Without it any enterprise will be flying blind.
Data is Liquid and it is everywhere
Nature of today’s HyperScale data has striking similarities with water – very precious resource but abundant on earth. Needless to say it is one of the essential element for survival of all living forms. Remarkably, HyperScale data shares the basic characteristics of water – precious, abundant, storable, transportable, transformable, vulnerable and susceptible to contamination and process able for consumption.
Much like the way massive resources and infrastructures – dams/reservoirs, electric power stations, security and backup systems, purification and filtration systems, distribution-channels, maintenance, monitoring systems, billing/accounting/monetization systems – are built to harness the power of water, we believe that HyperScale data needs massive storage structures, security systems, high speed networks, HyperScale processing machines, monitoring and regulatory structure to extract and harness the vast power embedded in them.
Data Security – Multilayered approach
With big data comes big responsibility. Its security. A multilayered data security strategy – Prevention, Detection, and Policy/Administration - could be implemented as it is proven efficient to achieve all facets of data security. It maximizes the security controls at each layer as its thwarts the intruder’s malicious intensions and efforts at multiple levels.
Preventive controls stop intruders from gaining unauthorized access to our data. Detective controls centralize auditing and reporting across the organization so that either security breach or compromised system can be swiftly detected and necessary actions be taken. Using policies / administrative controls, unlimited and ad-hoc access to application data can be prevented but the same time allow legitimate administrative activity.
HyperScale Data Security
HyperScale data security layer has been designed to include a comprehensive data security management and governance model. It is implemented as 3 pronged approach.
· 2 Level Identification,
· Data Encryption and
· Data de-identification.
Two Level authentication: It provides secure access to our data by authenticating more than just the user’s password. The 2nd level is something in addition to the password. It delivers strong authentication with a range of easy 2nd level verification options—phone call, text message, or mobile app notification—allowing users to choose the method they prefer.
Data Encryption: We ensure that the data we handle is encrypted when it is at rest and as well in transit. We recognize that Data level encryption is more efficient than application level encryption since the same data is shared by wide array of applications. Rather than coding encryption and decryption algorithm into each application, we chose to handle encryption and decryption steps at the data level. When each application needs to process the data, it is decrypted at the data level and securely transmitted using our SSL channels.
Data de-identification. Besides encryption, we secure our data by de- identification which redacts sensitive data out of the application layer. Users looking at an application may see asterisks instead of actual information. For example, social security numbers might reveal only the last four digits for reference purposes. The data in the database is encrypted, but redacted when viewed.
Shak Kathirvel
Shak Kathirvel
No comments:
Post a Comment