• Tidak ada hasil yang ditemukan

BIG DATA MANAGEMENT

N/A
N/A
Protected

Academic year: 2017

Membagikan "BIG DATA MANAGEMENT"

Copied!
3
0
0

Teks penuh

(1)

1 Running header: BIG DATA MANAGEMENT IN DEFENCE

Summary

In the evolving world the role of information in defense is greater than ever before. How

fast and reliably actionable information is received by decision makers in time determines the

success of any defense action. This ideal situation is hampered by big volumes of data being

available in different data stores and on different platforms. This makes it very slow to collect

relevant data from each platform and convert it into actionable information for the defense

leaders resulting in information reaching the decision maker when it’s obsolete.

Several technological solutions that can resolve this problem exist in the market. Key

among them is cloud computing and new virtualization technologies which allow access of data

from multiple data stores without actually moving the data. This enhances the speed of data

transfer ensuring relevant information is received where needed in a timely manner for decision

making. However, most defense agencies are lagging behind in the uptake of these new

technologies. One of the key reasons behind this tendency is the procurement rules required for

government agencies. General risk averseness of defense agencies also hinders fast uptake of

new technology as a new technology has to go a multitude of tests and trials before the military

can consider it.

In so doing, the defense misses out on critical benefits that virtualization brings. One of

the main benefits of virtualization in managing big data is the creation of self-service in access of

information saving both time and money. These technologies enable the integration of data from

various sources, sorting and analysis of the big data and conversion into relevant information

depending on the request made. This ensures increased efficiency and effectiveness in

information sharing within the defense sector increasing the success of both military operations

(2)

2 BIG DATA MANAGEMENT IN DEFENCE

Reaction

In today’s world where terrorism is on the rise, the importance of accurate information

being delivered on time to military leaders for decision making can never be overstated. Time lag

can make the difference between a foiled terrorist attack and a repeat of 911. As such all

government agencies should work together to ensure that our military has the best and most

effective technologies to enhance big data processing and sharing of the subsequent information

in a timely manner.

To achieve this, all hurdles to realizing this goal should be systematically eliminated to

ensure our defense department remains ahead of our enemies as far as information is concerned.

In this regard it would be prudent for the military to get certain exemptions as far as government

agencies’ procurement rules to enhance their uptake of these emerging technologies in the field

of virtualization. Another critical factor in winning this war is the training of information

technology experts within the defense so as to create a culture more suited to the new

technologies. This ensures the people and the technology work together giving the best results

possible.

As far as the risk averseness is concerned I think it is a very delicate balancing issue. On

one hand, the military needs to be extremely cautious about the new technologies to avoid

instances of security lapses. On the other hand, too slow an uptake of technology gives our

enemies an edge over us in information utilization exposing us to serious threats. In this regard

the military should work with the developers or even develop similar technologies in house

ensuring that the virtualization technologies are secure enough. This entails the access controls

especially where sensitive military data is concerned. In working with the developers to

(3)

3 BIG DATA MANAGEMENT IN DEFENCE

Questions

Military operations include highly classified information, is virtualization really safe as

far as unauthorized access is concerned?

Just how prone is virtualization to hacking compared to the legacy methods of big data

management?

What relationship would exist between the developer and the military were the military to

Referensi

Dokumen terkait

Bila pelanggan bertambah maka penjualan akan semakin meningkat Stanton (1996:226), menyatakan bahwa hubungan antara pengembangan produk dengan penjualan adalah sebagai

[r]

Kebudayaan berasal dari kata buddhayah (bahasa sangsekerta) yaitu bentuk jamak dari buddhi yang berarti budi atau akal. Taylor menjelaskan kebudayaan merupakan

Korpus dari pemberitaan tersebut yaitu : berita-berita yang membahas tentang Seratus Hari Kinerja Presiden SBY-Boediono pada surat kabar Jawa Pos dan Kompas, 27-29 Januari

Tabel 16 Membaca tabloid Posmo karena pengalaman yang saya alami merupakan bagian dari peristiwa maupun kejadian mistik maupun klenik.... Membaca tabloid Posmo

Lirik lagu “Bibir” yang dipopulerkan oleh penyanyi Samantha Band adalah sebuah proses komunikasi yang mewakili seni karena terdapat informasi atau pesan yang

CHAPTER IV FINDING OF THE RESEARCH 4.1 The Reading Comprehension of Recount Text of the Eighth Grade Students of SMP NU Al Ma’ruf Kudus in Academic Year 2012/2013

Gas sulfur trioksida yang keluar dari converter, langsung didinginkan di economizer, kemudian dilewatkan absorber dan keluar produk asam sulfat. o Double