With the emergence of new channels and technologies such as social networks, mobile computing and sensors, a large number of new data have emerged. We live in an era of exponential growth in data, and conventional technology has struggled to cope with the massive amount of data at PB (1024TB) levels. We have entered the era of diversified data. How do we deal with such a large data structure and the age of unstructured information? "The advent of the big data age is beyond doubt," he said, as he interviewed Teradata, Stephen Brobst Baoliming, chief technical officer. Only those enterprises that can use these new data patterns can build sustainable and important competitive advantages. ”
The solution to the confusing teradata in the face of massive data
People are confused about massive numbers because they don't have a good grasp of the overall data, what they see is broken, fragmented, local data, like you usually make a summary of some data, and in the process of summing up, you lose a lot of detail, And there is a lot of valuable information being hidden in the specifics. Teradata can help users understand the details of the data in depth, for example, to help customers understand each of the data is composed of atoms or molecules. To achieve such a goal, you need to have a strong scalability. This extensibility can help users to remove the local knowledge of the data, depth to the details of the data, so that users can unlock the entire large data confusion.
In data analysis, Teradata's database is mainly used to analyze structural data. When Teradata acquires Third-party tools, Teradata can transform unstructured data into structured data, and then use Teradata Solutions, or products, to analyze them accordingly. After the acquisition of Aster data, we can actually directly to the structure of some of the information stored here, and then directly to the unstructured data analysis.
If you ask me if I have solved the problem of analyzing unstructured data through aster, my answer is that we will never be able to solve certain problems completely. It is only now that the work has become easier after acquiring Aster data.
Data security Teradata Data protection Advantages awe-inspiring
On the issue of privacy protection, Teradata's chief technology officer, Stephen Brobst Baoliming, believes that it can provide protection of user privacy at certain levels, such as by encrypting some data, or by simply having someone who needs to know the data understand, contact, or access the data, For example, people who need to make decisions, this is just a level of privacy protection. But more importantly, people are now very worried about their data or information will be seen by others, and Teradata can be data mining software to solve these problems. Data mining software, actually see the user's data or information is not a specific person, but a software. The software is used to process the data and to determine what kind of person the data should be used or for what purpose.
Personally, I am also a consumer of data, and once I receive a more useful and interesting advertisement, I am still willing to receive it, although I know it is only an advertisement accompanying the mail. So as a consumer, I can still accept this useful information data. In addition, I feel as a consumer, I also have the right to make some decisions, I want to use what data and information, not what type of data or information. So consumers can actually have some control over it, and they can also decide which data best fits his interests.
Legislators or governments in many countries want to protect the user's information by creating or enacting laws that protect privacy. But these lawmakers, the analysis of the corresponding data is very not understand. The end result may be the law for privacy protection, which ultimately produces undesirable results. For example, in some countries the call records for some telephone users can only be maintained for up to 90 days, and such a call log can only be used for billing purposes. This limits the telecommunications operators to the preservation of data, can not be well designed to meet the needs of consumers or users of telecommunications products, but also in the pricing has been greatly limited, and thus affect the market competition.
So this example shows that although the legislator's original intention is to protect the privacy of users, but because of his lack of knowledge of data analysis, ultimately may limit the user's real use of information and data. Telecommunication operators, if they want to keep records of their telephone communications, are also responsible for protecting records or information and data from unauthorized people using the information and data. In such a process, of course, you need to use encrypted software or other data protection methods. We are working very well with a company called Protegrity, and they have excellent encryption capabilities and technology, so we embed their encryption technology in our Teradata Company's products and solutions to provide protection for our users as we see it.
Teradata has a very advanced encryption technology, in fact all the design is encrypted, are from the database encryption, so in addition to we have a completely parallel internal database encryption capabilities, that is, in the form and so on. From a security standpoint, all data can be encrypted, stored, and stored. Even if some have entered the system, they are unable to understand this data, and the data must be encrypted this is the customer's choice, the best way is to be encrypted by the customer.
Data backup and Recovery Teradata Multi-System Management
and the data backup and disaster recovery, there is a certain amount of data in each branch, and the key is that you have to centralize the data at the beginning of the creation, and the benefit is that the data is no longer an island-like existence, but is concentrated together, So you have a single source of data. You can drill down into the details of each of these data by using data-integration techniques, or by using the technologies and solutions provided by Teradata companies. So after the centralization of such a data, it is possible that this single point of failure, when a single point of failure, you must have the ability to recover disaster. We often use the ability of multiple systems management, but also can provide a number of load capacity. If a system, as a result of natural disasters, such as earthquake, Hurricane interrupted, it will automatically transfer to other systems for the corresponding data processing and analysis capabilities.
There are many organizations that perform these critical tasks, or companies, that are using this approach to manage their data. such as Wal-Mart, Bay, At&t and the World Bank. In addition, China now has a lot of customers in the completion or implementation of a number of key tasks, they will be used in this way.
And I would also like to emphasize that our disaster recovery system is actually a dual active system, or a dual dynamic system. Teradata Products Unlike other products, other people in the disaster recovery, there will usually be two sets of systems, a set of only standby, which means that only when there is a disaster, it will start such a system to do. But our difference is that we have two sets of systems, both of which are working in an active state, that is, in a dynamic state, where we can achieve very good load balancing between the two systems. Both of these systems are working effectively, thus bringing a very high cost of efficiency. And the other company's products only a set of systems have been moving, and the other system has been in a passive state, or has been not actively in the work, this time the corresponding cost is very high.
Convergence and trend of technology in large data age
The most important value of business intelligence analysis, which can bring more value to people, is that it enables these knowledgeable workers to better control the data. As we mentioned earlier, we provide a very condensed, cloud-like environment in which knowledgeable workers can control their data well and control the analysis of the data. For example, such as Teradata Company provides the data visualization technology, can make the knowledge of the staff, do not need to have IT staff intervention, it can be their corresponding data analysis and processing.
I think that new technologies or groundbreaking technologies are essential. So that's why we bought the Aster data company because it offers groundbreaking new technology. We believe that there is a symbiotic relationship between the old and new technologies over time, but eventually the new technology will merge into one, and the technology will take some time to evolve, eventually forming a siege to the old technology, and finally merging it.
Then for the future of the technical trend of thinking I have four points, first 1th, is just in the press conference site also mentioned a point, we will see the sensor will be ubiquitous, the continuous development of Internet of things, also brought us a huge amount of data, let us carry out analysis.
2nd, we want to achieve large-scale, a lot of analytical scale to enter the database. We can't just do copies of the data, but more of the analytic functionality into the database, like a collaboration between SAS and Teradata now, we can incorporate SAS's data mining capabilities into our database, as well as our collaboration with Informix, We want to incorporate its data integration capabilities into the database.
3rd, ubiquitous or ubiquitous business intelligence. Business intelligence will develop into consumer intelligence in the future, so the two words "intelligence" and "analysis" should be said to be the key two elements in the future. And with the continuous popularization of mobile terminals, we see more and more intelligence and analysis capabilities, will be end users through the mobile terminal to achieve. So mobile terminals are also very important for the future.
4th, these unconventional data analyses, such as social media, video, or some voice-related data, are traditionally not required to be analyzed, but they are also data that needs to be analyzed.
The CIO's advice should be to invest in some of the appropriate investments, that is, not just to analyze and deal with the traditional data, but now it is necessary to put some effort into analyzing unstructured data. Therefore, they should be reconsidered and positioned in the corresponding strategies and considerations.
In the trend of large data socialization, it is necessary to capture some of the user feelings generated by social media. At this point we have to have a very clear understanding of the entire network of social media and awareness of the social media network can be extracted from the relevant data and information for closer analysis, so as to draw the user's feelings, Understand and capture. The analysis at this time includes the processing of natural languages for users on social media, as well as the analysis and handling of their behavior or some corresponding activity, which is why we acquired the Aster data company. The company's technology can help us deal with unstructured data and conduct a good analysis of the unstructured data.
(Responsible editor: Lu Guang)