Cisco Blogs


Cisco Blog > Security

Big Data in Security – Part II: The AMPLab Stack

TRAC

Following part one of our Big Data in Security series on TRAC tools, I caught up with talented data scientist Mahdi Namazifar to discuss TRAC’s work with the Berkeley AMPLab Big Data stack.

Researchers at University of California, Berkeley AMPLab built this open source Berkeley Data Analytics Stack (BDAS), starting at the bottom what is Mesos?

AMPLab is looking at the big data problem from a slightly different perspective, a novel perspective that includes a number of different components. When you look at the stack at the lowest level, you see Mesos, which is a resource management tool for cluster computing. Suppose you have a cluster that you are using for running Hadoop Map Reduce jobs, MPI jobs, and multi-threaded jobs. Mesos manages the available computing resources and assigns them to different kinds of jobs running on the cluster in an efficient way. In a traditional Hadoop cluster, only one Map-Reduce job is running at any given time and that job blocks all the cluster resources.  Mesos on the other hand, sits on top of a cluster and manages the resources for all the different types of computation that might be running on the cluster. Mesos is similar to Apache YARN, which is another cluster resource management tool. TRAC doesn’t currently use Mesos.

 

AMPLab Stack

The AMPLab Statck
Source: https://amplab.cs.berkeley.edu/software/

Read More »

Tags: , , , , , , , , , , , , , , , , , , ,

Big Data in Security – Part I: TRAC Tools

TRACRecently I had an opportunity to sit down with the talented data scientists from Cisco’s Threat Research, Analysis, and Communications (TRAC) team to discuss Big Data security challenges, tools and methodologies. The following is part one of five in this series where Jisheng Wang, John Conley, and Preetham Raghunanda share how TRAC is tackling Big Data.

Given the hype surrounding “Big Data,” what does that term actually mean?

John:  First of all, because of overuse, the “Big Data” term has become almost meaningless. For us and for SIO (Security Intelligence and Operations) it means a combination of infrastructure, tools, and data sources all coming together to make it possible to have unified repositories of data that can address problems that we never thought we could solve before. It really means taking advantage of new technologies, tools, and new ways of thinking about problems.

Big Data

Read More »

Tags: , , , , , , , , , , , , , , , , , , ,

Your Data, Yourself — in the Marketplace of Me

On a typical day, we leave a vast trail of data in our wake. Our browsing histories, online preferences, shopping habits, work decisions, social interactions—all are rendered in binary code, prompting a complex interaction of requests, responses, affirmations, and denials.

And that’s just from our laptops and smartphones.

What about when the Internet of Everything — with its explosion in connectivity from 10 billion “things” today to 50 billion in 2020 — truly shifts into overdrive? At that point, our clothing, our houses, our cars, our lawns, and our refrigerators may be generating ever-larger torrents of data — all about us.

This upsurge in personal Big Data has big implications. Indeed, each person’s emerging digital persona will go a long way toward defining their place in the world.  Furthermore, all of that data already has great intrinsic value to Internet giants, retailers, financial services companies, and many others. If we manage it right — in what I see as a burgeoning Marketplace of Me — some of that value may come right back to us.

Read More »

Tags: , , , , , , , , , ,

Cisco CMX at Dreamhack Winter 2013 in Jonkoping Sweden

Dreamhack Winter 2013 in the small city of Jonkoping in central Sweden claims to be the world’s largest digital event. I was skeptical at first, but when I arrived for the event, I was completely amazed at the scale of things in this tiny part of the world where its only bright for 5 or 6 hours during day this time of the year.

dreamhack1

Of course, the amount of daylight didn’t impact one bit the large numbers of people streaming into the event venue well before opening time on Thursday afternoon.

dreamhack2 Read More »

Tags: , , , , , , , , , , , , , , , , , , , ,

An Architectural Approach to Location-Based Services

When was the last time you looked at your mobile device? Minutes ago? Seconds ago? We can’t seem to live without them, and in the consumer space, new mobile services are popping up it seems faster than your Twitter feed can handle. Below are mobile consumer services trends from the latest VNI Service Adoption Forecast (2012 – 2017) – you can see Mobile SMS, Mobile Commerce, Mobile Video, and Mobile Social Networking are on the rise, as is the number of devices per consumer.

cmxarch

Many organizations are looking for ways to leverage this upward trend in mobility and innovative mobile services for business benefit – whether it be for increasing customer satisfaction and communicating how the general population wants to receive communication, or offering Wi-Fi so users are able to consume the mobile services they want.

Cisco has made a big investment in mobile location-based services (LBS) over the past year with the introduction of the Connected Mobile Experiences (CMX) solution. CMX enables mobile users to adopt new innovative mobile services with an added benefit of relevance. Businesses can conduct mobile commerce, send texts, extend mobile video, or integrate mobile services with social media now based on the user’s location. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , ,