What Is Data Fusion?

Data fusion is a process for connecting and integrating many different data sources in order to create more consistent, accurate, and meaningful information and analysed data sources. 

Huge amounts of data, Big Data, is all around us, in every field of life. But in spite of the far-reaching advantages, obvious clues frequently hide in a sea of unrelated data.

This was the case in British Petroleum’s Deepwater Horizon rig explosion, which was the culmination of dozens of ignored warnings, Enron’s collapse, etc; each of these disasters began with siloed data, the puzzle pieces of which, if properly pieced together, might have revealed the problem patterns leading to the event.

This approach to data, known as data fusion, turns multiple raw materials into something greater than the sum of their parts. It goes beyond older methods of big data analysis, like data integration, in which large data-sets are simply thrown together in one environment.

Data fusion is broadly applied to technologies, for instance, in a research project, scientists might use data fusion to combine physical tracking data with environmental data, or in a customer dashboard, marketers might combine client identifier data with purchase history and other data collected at brick-and-mortar store locations to build a better profile.

In this new science of data fusion, technology is deployed not just to mash together billions of data records, but to fundamentally transform them so that humans can understand the unseen commonalities or inconsistencies within them.

Fusion breaks down traditional silos, allowing analysts to search for and corroborate theories quickly, at a scale and speed previously unthinkable. Recent advancements in machine learning and AI-based computing enable data fusion application.

For the military, this way of working has now become a routine. It took a major event to highlight the importance of data fusion, and significant effort on the parts of key people and agencies to implement the technology in an impactful way.

Private sector companies can do the same.

Automobile manufacturers, for instance, are beginning to use data fusion to identify safety problems in global fleets of vehicles, making it easier to get potentially dangerous vehicles off the roads quickly.

Insurance companies are using fusion to assess the risk in underwriting certain projects and products.

Financial services companies are using fused data to make better predictions about complex market trends.

How can more companies and organisations adopt the technology?

According to insidebigdata.com, they need to elevate IT leads to C-suite level, with distinct roles such as the Chief Data Officer. These people are uniquely suited to demonstrate how their approach to data fusion will yield measurable results.

Then, they need to develop a new operational way of working, showing that data, not human intuition, should be the primary lever behind major company decisions.

I-HLS:     Techopedia:   (CSI Edited and Enhanced)  Image: Nick Youngson

You Might Also Read:

Transforming Your Database:

 

« Cyber Security Pros Are Feeling The Pressure
Zuckerberg Has Failed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BCS, The chartered Institute for IT

BCS, The chartered Institute for IT

BCS provides IT professionals with up to date and relevant certifications enabling them to manage IT security effectively within their budget.

NQA Certification

NQA Certification

NQA provides certification to a range of ISO standards including ISO 27001 for information security management.

ESET

ESET

ESET provide security software for enterprises and consumers - Antivirus Software, Internet Security and Virus Protection.

CQS (Certified Quality Systems)

CQS (Certified Quality Systems)

CQS is an organisation specialising in ISO assessment and certification, including ISO 27001, along with other management system standards.

OSSEC

OSSEC

OSSEC is a scalable, multi-platform, open source Host-based Intrusion Detection System (HIDS).

Cyber Command

Cyber Command

Our Managed IT service allows clients to offload the management of day-to-day computer, server, and networking support to our team of professionals.

Ritz

Ritz

Ritz is the largest holistic pure-play cyber security solutions provider in Myanmar.

Gospel Technology

Gospel Technology

Gospel presents a totally new way of accessing and controlling data which is enterprise grade scalable, highly resilient, and secure.

International Data Sanitization Consortium (IDSC)

International Data Sanitization Consortium (IDSC)

IDSC is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry.

Netsecurity AS

Netsecurity AS

Netsecurity is a Norwegian owned company focused and specialised within IT security and cybersecurity-as-a service.

BLUECYFORCE

BLUECYFORCE

BLUECYFORCE is the leading professional training and cyber defense training organization in France.

CyGlass

CyGlass

CyGlass simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people.

Ward Solutions

Ward Solutions

Ward Solutions are an information security consultancy and managed services company. We help organisations protect their brand, people, assets, intellectual property and profits.

Acora

Acora

Acora provide a range of best-in-class managed services, Microsoft-centric business software, and cloud solutions designed to help mid-market organisations succeed in the digital economy.

CyberSanctus

CyberSanctus

CyberSanctus provide clients with a variety of pentest plans from the entry level starter plan, which is tailored for personal websites, to enterprise level pentests, tailored for large scale business

Crispmind

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.