Big data and social media, BAE Systems Detica

Internet World
14 de Nov de 2013
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
1 de 16

Más contenido relacionado

La actualidad más candente

How media agencies solve the big data revolutionHow media agencies solve the big data revolution
How media agencies solve the big data revolutionThe_IPA
Protecting Sensitive Personal Data in the EnterpriseProtecting Sensitive Personal Data in the Enterprise
Protecting Sensitive Personal Data in the EnterpriseTata Consultancy Services
Delivering analytics at scale with a governed data lakeDelivering analytics at scale with a governed data lake
Delivering analytics at scale with a governed data lakeJean-Michel Franco
Big data Seminar/PresentationBig data Seminar/Presentation
Big data Seminar/PresentationKirtimaan Chhabra
IBM Big Data Platform Nov 2012IBM Big Data Platform Nov 2012
IBM Big Data Platform Nov 2012Swiss Big Data User Group
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...TrustArc

La actualidad más candente(20)

Destacado

What is Big Data?What is Big Data?
What is Big Data?Bernard Marr
DETICA INTRODUCTION AND EXPLANATION .DETICA INTRODUCTION AND EXPLANATION .
DETICA INTRODUCTION AND EXPLANATION .Sourabh Puri
First Principles Vulnerability AssessmentFirst Principles Vulnerability Assessment
First Principles Vulnerability AssessmentManuel Brugnoli
VMA referralVMA referral
VMA referralScott Taylor
CRIMES ACT 1958 v the Casualties of TelstraCRIMES ACT 1958 v the Casualties of Telstra
CRIMES ACT 1958 v the Casualties of TelstraAlan Smith
LinkedIn 22 Nov 20`5 AAT 3 Oct 2008 hearing stat dec dated 26 July 2008LinkedIn 22 Nov 20`5 AAT 3 Oct 2008 hearing stat dec dated 26 July 2008
LinkedIn 22 Nov 20`5 AAT 3 Oct 2008 hearing stat dec dated 26 July 2008Alan Smith

Similar a Big data and social media, BAE Systems Detica

Hybrid Data Pipeline for SQL and RESTHybrid Data Pipeline for SQL and REST
Hybrid Data Pipeline for SQL and RESTSumit Sarkar
Cloud Computing Webinar - John RezaCloud Computing Webinar - John Reza
Cloud Computing Webinar - John RezaJohn Reza, MBA
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec
Delivering Analytics at The Speed of Transactions with Data FabricDelivering Analytics at The Speed of Transactions with Data Fabric
Delivering Analytics at The Speed of Transactions with Data FabricDenodo
Conférence  - Les enjeux et la vision de Veritas sur la protection des donnée...Conférence  - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...African Cyber Security Summit
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...DATAVERSITY

Similar a Big data and social media, BAE Systems Detica(20)

Más de Internet World

eCommerce Performance: What is it costing you, and what can you do about it? ...eCommerce Performance: What is it costing you, and what can you do about it? ...
eCommerce Performance: What is it costing you, and what can you do about it? ...Internet World
70% of companies don't know how their brands are performing. Do you know? M-B...70% of companies don't know how their brands are performing. Do you know? M-B...
70% of companies don't know how their brands are performing. Do you know? M-B...Internet World
Your customers deserve data driven communications, Communicator CorpYour customers deserve data driven communications, Communicator Corp
Your customers deserve data driven communications, Communicator CorpInternet World
Step Away From the Open Rates! Communicator CorpStep Away From the Open Rates! Communicator Corp
Step Away From the Open Rates! Communicator CorpInternet World
International Supply Chain, TripAdvisorInternational Supply Chain, TripAdvisor
International Supply Chain, TripAdvisorInternet World
Real Time – All The Time; How can I get the greatest value from my investment...Real Time – All The Time; How can I get the greatest value from my investment...
Real Time – All The Time; How can I get the greatest value from my investment...Internet World

Más de Internet World(20)

Último

Netwitness RT - Don’t scratch that patch.pptxNetwitness RT - Don’t scratch that patch.pptx
Netwitness RT - Don’t scratch that patch.pptxStefano Maccaglia
The Ultimate Administrator’s Guide to HCL Nomad WebThe Ultimate Administrator’s Guide to HCL Nomad Web
The Ultimate Administrator’s Guide to HCL Nomad Webpanagenda
Orchestration, Automation and Virtualisation Maturity ModelOrchestration, Automation and Virtualisation Maturity Model
Orchestration, Automation and Virtualisation Maturity ModelCSUC - Consorci de Serveis Universitaris de Catalunya
web test repair.pptxweb test repair.pptx
web test repair.pptxYuanzhangLin
Navigating the FutureNavigating the Future
Navigating the FutureOnBoard
Framing Few Shot Knowledge Graph Completion with Large Language ModelsFraming Few Shot Knowledge Graph Completion with Large Language Models
Framing Few Shot Knowledge Graph Completion with Large Language ModelsMODUL Technology GmbH

Último(20)

Big data and social media, BAE Systems Detica

Notas del editor

  1. They are mentioned a lot together but what do we mean by them and The world is becoming hyper-connected. Every minute 100,000 tweets are published, 47,000 apps are downloaded from the AppStore and $272,000 is spent on online shopping. By 2020, 28bn devices will be connected to the internet.And internet business transactions will reach 450bnper day.These developments bring new dangers and new risks. European insurance firms spend €8bnon fraudulent pay-outs. Tax evasion costs the Australian government $41bn per year. The US Navy faces 110,000 cyber attacks every hour. There are nearly 950mweb attacks globally every year.Detica has the skills, people, know-how, technology and track-record to deliver real business benefit to our clients in a rapidly changing environment. Our information intelligence platform is the product of our unique heritage and blend of capabilities. It enables our clients to secure information, finances, communications and business advantage in a connected world.
  2. Its big in volume but also in noise500m tweets a day
  3. The challenges include capture, enrich, storage, search, mineand visualization that data The BIG DATA Detica platform enables clients to derive intelligence from their information. Whether their business is preventing terrorism, enabling financial transactions or delivering services to consumers, Detica can maximise the speed and effectiveness of our clients’ data-driven operations. The platform is built on Detica’s heritage in data acquisition, signals processing and data analytics for the most demanding of commercial and government clients. We have an integrated platform – this saves clients the risk and cost of integrating multi-vendor solutions; it is also interoperable with other vendors’ products and interfaces to existing systems where requiredWe acquire and process large volumesof data– multiple data types and formats relating to transactions, people, entities and networks. Data can be client-generated or from third-party sources (e.g. social media), or generated from our own network monitoring IPWe use advanced network analytics to detectbehaviours, activities, patterns and connections in data.We are able to find leading indicators earlier than conventional technologies and deliver higher detection rates and lower false positives than other vendorsWe produce actionable intelligence through investigation which maximises the speed and effectiveness of our client’s data-driven operationsThe modular platform has multipleapplications where the cores elements have been configured to be best in class. Solutions are delivered within a secure infrastructure, with optimised operating environment. The platform is easily extensible.Detica has a number of services capabilities which are complementary to the platform. These include designing and configuring solutions for specific clients, combining technology with deep domain knowledge and technical capability in areas such as data management, security, user experience and digital transformation. We also package elements of the platform and related services into solutions which we can integrate into existing infrastructures and run as a managed service.
  4. Leading indicatorsPatches the gaps
  5. 60% bank transactions, 50% call records, 95% insurance claims and 100% tax and VAT returns in the UK are processed and analysed by Detica information intelligence solutionsGiven a set of transactions or events within your data how can we tell whether they are related and my indicate a collusive pattern or fraud?
  6. Detica NetReveal® automates the time consuming process of ingesting cleansing, matching and linking data to pro-actively identify risk patterns across all the source data.Here we see that the seemingly unrelated and “normal” looking bank transactions are actually part of a collusive “cash cycling” fraud perpetrated against a bank. The fraudsters cycle cash to generate a good credit rating (possibly using false or stolen identities) before taking out the full amount of available credit across loans, overdrafts and credit cards across a large number of accounts. They then bust out, take the money and disappear.
  7. Talk about Cyber Reveal managed service – pattern detection lead indicator flagging and triage Monitoring journalist reporting on hackativists.
  8. We are seeing Telco’s generating:300TB of web browsing data50TB of call dataThe use cases for big data are around customer segmentation. Network opertmisationSocial media can be used as engagement mechanism. It can also be used for network capacity planning or marketing
  9. O2EE
  10. Social media makes big data smallSocial media can enrich big data to provide greater insights