Graph: The Missing Link in Big Data Analytics

Graph analytics is gaining traction in the world of big data and IoT. From solving real-world problems such as detecting cyberattacks and creating value from IoT sensor data to precisely identifying drug interactions faster than ever before, graph has become a powerhouse in detecting never-before-seen connections and emergent patterns. It’s critical to understand how graph can be added to traditional Hadoop® and Spark™ workflows for successful results. Join us Wednesday, March 16, for a live online chat, “Graph: The Missing Link in Big Data Analytics,” to learn and discuss all things graph analytics. You can easily participate using a Twitter, LinkedIn or Facebook account. Hear from industry experts from Deloitte, Mphasis and Cray who ... [ Read More ]

The Best Practices are No Longer the “Best” Practices – Part II

Earlier this week, I shared my views about best practices and cybersecurity. Now I want to move beyond best practices as your sole defense. The traditional cybersecurity mindset is one of prevention, believing threats cannot penetrate — and this is why security plans fail. It’s easy to assume defenses are successful against an insidious threat. Metrics will show an effective compliance program, intrusion detection and access denial. Yet to take for granted that the threat is gone, rather than having simply moved to another path within your network, is foolhardy. Assuming there are numerous threats to your security measures that are coming in a dynamic and continuous fashion may seem paranoid, but just because you’re paranoid doesn’t mean ... [ Read More ]

The Best Practices are No Longer the “Best” Practices – Part I

There was a time when information systems security was simpler. It focused on the appropriate time frame to take a sample of a one-dimensional system log that tracked events like blocked traffic, virus detection and machines taken off-line. Reporting on routine operations is a best practice, and following best practices is always… well… a good practice. Include some metrics for the percentage of your personnel trained in cyber risk avoidance and endpoint compliance and you have a nice corporate report. But, does it really mean anything? Clearly, the continuous barrage of media reports on breaches, data theft and cybercrime are not abating. In today’s Cray blog post, I would like to take you through a few cybersecurity “best practices” ... [ Read More ]

Super Bowl XLIX | Improve Effectiveness of Your Ad with Graph Analytics

The Super Bowl is the largest annual live televised event in the U.S., with viewership averaging 162.8 million over the past five years. Advertising rates for a 30-second advertisement during the upcoming Super Bowl broadcast are reportedly $4.5 million, dwarfing regular 30-second ad rates for non-sporting events (in 2014, spots for AMC’s “The Walking Dead” sold for $623,000). Advertisers have developed a range of methods for measuring ad success including views, social media interaction, YouTube hits, meme spinoffs … the list could go on. If you are an advertiser, you’d want your advertisement to be successful, but wouldn’t you also want it to be effective? An ad can be remarkably successful, but not necessarily effective. Other ads can ... [ Read More ]

Unlocking the Full Potential of Health Data

The health care industry is facing a challenging transition as it tries to use data more effectively. Gathering, sharing and analyzing patient information is an incredibly challenging process that is contributing to a technological revolution across the health care sector. One of the main challenges in our health care system today is the difficulty in working with patient data, because it exists in a variety of formats, both structured and unstructured, and it often exists in large volumes, making it difficult to handle in many data centers. This is where supercomputing comes into play, and the Oak Ridge National Laboratory (ORNL) is leading a project that is taking key steps forward in driving innovation. According to a recent ... [ Read More ]