{"id":2086,"date":"2014-06-23T17:18:46","date_gmt":"2014-06-23T17:18:46","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2086"},"modified":"2020-02-26T10:52:01","modified_gmt":"2020-02-26T15:52:01","slug":"whats-so-big-about-big-data","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/whats-so-big-about-big-data\/2086\/","title":{"rendered":"What&#8217;s so big about Big Data?"},"content":{"rendered":"<p>A\u00a0large portion of this week\u2019s blogposts will be dedicated to Big Data. For the last three years (roughly) it\u2019s been a new \u201cbig thing\u201d for the IT industry. The reason is clear: the technical possibility to sift through the gazillion bytes of assorted data discerning useful patterns that may grant a huge advantages over the competitors has emerged relatively recently. Now the Big Data topic is a much-hyped one, although multiple voices of doubt and reservations come in and grow in numbers.<\/p>\n<p>https:\/\/instagram.com\/p\/pqz60Mv0Do\/<\/p>\n<p>Some readers of this blog may watch <em>Person of Interest<\/em>. The third season of this criminal drama wrapped earlier this year, leaving its multiple of fans in great pain, craving for the next season\u2019s developments.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>Big Data has been the new \u201cbig thing\u201d for several\u00a0years, but more and more voices of doubt are\u00a0surfacing.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F4PJK&amp;text=Big+Data+has+been+the+new+%26%238220%3Bbig+thing%26%238221%3B+for+several%C2%A0years%2C+but+more+and+more+voices+of+doubt+are%C2%A0surfacing.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>For those who haven\u2019t seen or heard of it, this is a story about a small and covert group of crime-fighters led by an ingenious programmer who, shaken by the events of 9\/11, had created a special system, a \u201cMachine\u201d in order to detect and prevent possible acts of terror. It does this by crunching very large amounts of data from omnipresent surveillance devices (CCTV, etc.) and the Web, in order to find anomalies that may lead to mass-casualty events. Soon it turns out that the Machine \u201csees everything \u2013 violent crimes involving ordinary people\u201d, and that it is \u2013\u00a0in fact \u2013 sentient on its own. It\u2019s not malicious, but the very knowledge of it puts a person in a great peril.<\/p>\n<p style=\"text-align: center\">\n<\/p><p style=\"text-align: center\"><em>From the CBS\u2019s \u2018Person of Interest\u2019 intro.<\/em><\/p>\n<p>Well, that\u2019s a very superficial synopsis. This TV series actually covers a lot of actual and\/or popular topics: artificial intelligence, cyberweaponry (with Stuxnet explicitly mentioned at least a couple of times), mass surveillance, conspiracy, use and abuse of technology, and, of course, a dire plentitude of information available about each one of us. Also a recurring topic is the illusion of omnipotence that IT gives to humans, along with how rapidly it dissipates when it comes to facing the real heat, and how useless it may be next-to-unlimited access to petaloads of data when it comes down to being a human in a critical situation.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>Crunching petabytes of data in a reasonable time only recently became feasible.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F4PJK&amp;text=Crunching+petabytes+of+data+in+a+reasonable+time+only+recently+became+feasible.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Actually, in the real world there is an issue of such \u201cillusion of omnipotence\u201d regarding the IT, and it\u2019s directly related to the aforementioned TV series premise: the product of Big Data grinding provides its, well, handlers with not-so-subtle (if only tactical, though) business advantages. A lot of hype is generated over the last three years. But how big are these advantages and what\u2019s the price tag attached?<\/p>\n<p>In the next few posts we will tell a few stories \u2013 not so big ones \u2013 related to Big Data. It is not intended to be an in-depth thesis, it\u2019s just a handful of facts to, let\u2019s say, meditate upon. Stay tuned!<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center\"><strong>Big Data Week<\/strong><\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/business.kaspersky.com\/big-deal-when-machines-know-better\/\" target=\"_blank\" rel=\"noopener nofollow\">Next post &gt;&gt;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Big Data concept is the new &#8220;big thing&#8221; of the last two or three years. While it promises a lot of advantages, there are voices of doubt and reservation. This week we are publishing a series of blog posts dedicated to Big Data, trying to find out what this &#8220;big&#8221; is about. Stay tuned!<\/p>\n","protected":false},"author":209,"featured_media":16104,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[1042,191,1091,2115],"class_list":{"0":"post-2086","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-big-data","10":"tag-data","11":"tag-it","12":"tag-person-of-interest"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/whats-so-big-about-big-data\/2086\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/whats-so-big-about-big-data\/2086\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/whats-so-big-about-big-data\/2086\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/big-data\/","name":"big data"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2086"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2086\/revisions"}],"predecessor-version":[{"id":33191,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2086\/revisions\/33191"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16104"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}