Machine Learning is Transforming Data

From self-driving cars, to catching nefarious content in the fight against terrorism, to apps that automatically retouch photos before you even take them, it is popping up just about everywhere.

Each innovation is creating a new wave of business opportunity while simplifying and automating tasks that are generally beyond the reach of how much data we human beings can process at once, or even in a lifetime.

While machine learning might seem a newly emerging trend, which it most certainly is, it is also a breakthrough that has been a long time coming.
 
Back in 1959, computer science and gaming pioneer Arthur Samuel defined machine learning as giving “computers the ability to learn without being explicitly programmed.”

With so much to gain from computers helping us with front-end processing in apps and services, it’s no surprise that machine learning is rapidly moving to the backroom of data centers. With cyberattacks on the rise, researchers are examining how machine learning could improve data center security.

Machine learning controls inspired by Internet of Things (IoT) connectivity are already helping to manage power and cooling efficiency to help data centers become much more energy-conscious. Any gains in efficiency are most welcome, as NRDC estimates that by 2020, the electricity bill for keeping data centers running in the United States alone is expected to reach $13 billion.

Machine smarts beyond the switch

But there is far more efficiency ahead beyond our much-needed digital guard dogs and smart switches. Today, despite the rapid innovation on flash and other non-volatile memory technologies, entire storage systems are used inefficiently.

This is because there has not been a way to know what data is hot and needs high performance, or what data is inactive and can move to a less expensive storage tier, such as an offsite cloud. Since the dawn of computing, storage has been blind to applications, and applications blind to the storage systems serving their data.

As a result, to ensure service-level agreements, IT will over-provision an application’s storage needs, resulting in cold files sitting on expensive storage or capacity that is allocated but unused. The good news is that the insight needed to deliver machine-learning automation is already sitting latent in the data itself.

Metadata, the data about your data, can be used to determine when a file was last accessed, who opened it, what changed, and many more attributes that help reveal the current business value of a given dataset.

Metadata engine software can virtualise data, and examine how the data aligns with the storage resources available in your ecosystem. With that intelligence, it can then move data at any granularity (LUNs, volumes, directories, sub-directories or a single file), to the right tier to align with IT’s objectives.

The longer it operates, the more the metadata engine software can collect and analyse patterns and begin to make recommendations on how to optimise resources to maximise both performance for the data that needs it, and savings for the data that doesn’t.

Importantly, you should still be able to take manual control and define data that needs performance, since it’s likely that the CEO will want even her 18-month-old emails accessible in seconds.

Alternatively, IT can keep managing data manually in each of the storage silos in its datacenter, but as enterprises begin to adopt more efficient alternatives, sticking with the status quo may turn out to be a much greater business risk than being first to automate data management across on-premises IT infrastructure and the cloud.

Machine learning is about understanding what to do better in the future based on what was experienced in the past. Perhaps this is why so many of us react with a little fear when we hear about growth in machine learning.

Machines have far less emotional investment in the past than we do, but luckily, with a little human wisdom, we can put their abilities to work where our businesses need it most, in managing our data.

Network World

You Might Aslo Read: 

What is Machine Learning?:

Machine Learning Writes Better Emails:

« European Cyber Threat Summit 2017
Cybersecurity And Media Companies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

RSA Conference

RSA Conference

RSA Conference conducts information security events around the globe that connect you to industry leaders and highly relevant information.

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

Professional Information Security Association (PISA)

Professional Information Security Association (PISA)

PISA is an independent and not-for-profit organization for information security professionals, with the primary objective of promoting information security awareness and best practice.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

Wibu-Systems

Wibu-Systems

Wibu-Systems is a leading provider of solutions for the Digital Rights Management (DRM) and anti-piracy industry.

Atlantic Council Digital Forensic Research Lab (DFRLab)

Atlantic Council Digital Forensic Research Lab (DFRLab)

The Atlantic Council’s DFRLab has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

AVORD

AVORD

AVORD is a cloud-based security testing platform that allows clients to manage security testing requirements in a far more productive and efficient way.

Seekurity

Seekurity

Seekurity is an information security consulting firm specialized in all areas of Cyber Security including Penetration Testing, Vulnerability Assessments and Risk Management.

Consensys

Consensys

ConsenSys is a global blockchain company. We develop enterprise applications, invest in startups, build developer tools, and offer blockchain education.

Wisetek

Wisetek

Wisetek is a global provider of end-to-end IT Asset Disposition (ITAD), reuse and secure data destruction management services to the world’s leading IT Corporations, data centres and manufacturers.

Appsian Security

Appsian Security

Appsian provides powerful solutions that help organizations take control of their business critical data and financial transactions.

MyKRIS Asia

MyKRIS Asia

MyKRIS specialise in providing and managing Internet network services and cyber security services to enterprises.

V2X

V2X

V2X delivers IT support, networking, and cybersecurity solutions that ensure optimal mission support and performance.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.

RapidFort

RapidFort

RapidFort’s Software Attack Surface Optimization Platform remediates 95% of software vulnerabilities in minutes without code changes.