Machine Learning is Transforming Data

From self-driving cars, to catching nefarious content in the fight against terrorism, to apps that automatically retouch photos before you even take them, it is popping up just about everywhere.

Each innovation is creating a new wave of business opportunity while simplifying and automating tasks that are generally beyond the reach of how much data we human beings can process at once, or even in a lifetime.

While machine learning might seem a newly emerging trend, which it most certainly is, it is also a breakthrough that has been a long time coming.
 
Back in 1959, computer science and gaming pioneer Arthur Samuel defined machine learning as giving “computers the ability to learn without being explicitly programmed.”

With so much to gain from computers helping us with front-end processing in apps and services, it’s no surprise that machine learning is rapidly moving to the backroom of data centers. With cyberattacks on the rise, researchers are examining how machine learning could improve data center security.

Machine learning controls inspired by Internet of Things (IoT) connectivity are already helping to manage power and cooling efficiency to help data centers become much more energy-conscious. Any gains in efficiency are most welcome, as NRDC estimates that by 2020, the electricity bill for keeping data centers running in the United States alone is expected to reach $13 billion.

Machine smarts beyond the switch

But there is far more efficiency ahead beyond our much-needed digital guard dogs and smart switches. Today, despite the rapid innovation on flash and other non-volatile memory technologies, entire storage systems are used inefficiently.

This is because there has not been a way to know what data is hot and needs high performance, or what data is inactive and can move to a less expensive storage tier, such as an offsite cloud. Since the dawn of computing, storage has been blind to applications, and applications blind to the storage systems serving their data.

As a result, to ensure service-level agreements, IT will over-provision an application’s storage needs, resulting in cold files sitting on expensive storage or capacity that is allocated but unused. The good news is that the insight needed to deliver machine-learning automation is already sitting latent in the data itself.

Metadata, the data about your data, can be used to determine when a file was last accessed, who opened it, what changed, and many more attributes that help reveal the current business value of a given dataset.

Metadata engine software can virtualise data, and examine how the data aligns with the storage resources available in your ecosystem. With that intelligence, it can then move data at any granularity (LUNs, volumes, directories, sub-directories or a single file), to the right tier to align with IT’s objectives.

The longer it operates, the more the metadata engine software can collect and analyse patterns and begin to make recommendations on how to optimise resources to maximise both performance for the data that needs it, and savings for the data that doesn’t.

Importantly, you should still be able to take manual control and define data that needs performance, since it’s likely that the CEO will want even her 18-month-old emails accessible in seconds.

Alternatively, IT can keep managing data manually in each of the storage silos in its datacenter, but as enterprises begin to adopt more efficient alternatives, sticking with the status quo may turn out to be a much greater business risk than being first to automate data management across on-premises IT infrastructure and the cloud.

Machine learning is about understanding what to do better in the future based on what was experienced in the past. Perhaps this is why so many of us react with a little fear when we hear about growth in machine learning.

Machines have far less emotional investment in the past than we do, but luckily, with a little human wisdom, we can put their abilities to work where our businesses need it most, in managing our data.

Network World

You Might Aslo Read: 

What is Machine Learning?:

Machine Learning Writes Better Emails:

« European Cyber Threat Summit 2017
Cybersecurity And Media Companies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

CERT.GOV.AZ

CERT.GOV.AZ

Azerbaijan Government Computer Incident Response Team

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

Akheros

Akheros

Akheros develops cybersecurity learning algorithms which anticipate, detect and prevent offensive and incongruous behaviors of M2M interactions.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

Sift

Sift

The Sift Digital Trust Platform protects your business and customers from all vectors of fraud and abuse through our Live Machine Learning, global trust network and automation technologies.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

Cambridge Cybercrime Centre

Cambridge Cybercrime Centre

The Cambridge Cybercrime Centre is a multi-disciplinary initiative combining expertise from the Department of Computer Science and Technology, Institute of Criminology and Faculty of Law.

Cyber Pop-Up

Cyber Pop-Up

Cyber Pop-Up provide on-demand access to top security experts. No recruiting. No onboarding. No overhead costs.

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group, Ltd. (STIGroup) is an innovative firm that provides CyberSecurity consulting, secure IT engineering, managed security services, and human capital solutions.

Pelta Cyber Security

Pelta Cyber Security

Pelta Cyber Security is the cyber security consulting and solutions division of Softworld Inc. We provide staffing and recruitment services as well as consulting and solutions for outsourced projects.

Paradyn

Paradyn

Paradyn-managed security services can provide a holistic view of your business environment, no matter how simple or complex it is.

NorthRow

NorthRow

NorthRow provides digital transformation compliance solutions to help businesses manage regulatory and financial crime risks.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Barrier Networks

Barrier Networks

Barrier Networks are a Cyber Security Managed Service Provider that specialises in Network and Application security.