Machine Learning is Transforming Data

From self-driving cars, to catching nefarious content in the fight against terrorism, to apps that automatically retouch photos before you even take them, it is popping up just about everywhere.

Each innovation is creating a new wave of business opportunity while simplifying and automating tasks that are generally beyond the reach of how much data we human beings can process at once, or even in a lifetime.

While machine learning might seem a newly emerging trend, which it most certainly is, it is also a breakthrough that has been a long time coming.
 
Back in 1959, computer science and gaming pioneer Arthur Samuel defined machine learning as giving “computers the ability to learn without being explicitly programmed.”

With so much to gain from computers helping us with front-end processing in apps and services, it’s no surprise that machine learning is rapidly moving to the backroom of data centers. With cyberattacks on the rise, researchers are examining how machine learning could improve data center security.

Machine learning controls inspired by Internet of Things (IoT) connectivity are already helping to manage power and cooling efficiency to help data centers become much more energy-conscious. Any gains in efficiency are most welcome, as NRDC estimates that by 2020, the electricity bill for keeping data centers running in the United States alone is expected to reach $13 billion.

Machine smarts beyond the switch

But there is far more efficiency ahead beyond our much-needed digital guard dogs and smart switches. Today, despite the rapid innovation on flash and other non-volatile memory technologies, entire storage systems are used inefficiently.

This is because there has not been a way to know what data is hot and needs high performance, or what data is inactive and can move to a less expensive storage tier, such as an offsite cloud. Since the dawn of computing, storage has been blind to applications, and applications blind to the storage systems serving their data.

As a result, to ensure service-level agreements, IT will over-provision an application’s storage needs, resulting in cold files sitting on expensive storage or capacity that is allocated but unused. The good news is that the insight needed to deliver machine-learning automation is already sitting latent in the data itself.

Metadata, the data about your data, can be used to determine when a file was last accessed, who opened it, what changed, and many more attributes that help reveal the current business value of a given dataset.

Metadata engine software can virtualise data, and examine how the data aligns with the storage resources available in your ecosystem. With that intelligence, it can then move data at any granularity (LUNs, volumes, directories, sub-directories or a single file), to the right tier to align with IT’s objectives.

The longer it operates, the more the metadata engine software can collect and analyse patterns and begin to make recommendations on how to optimise resources to maximise both performance for the data that needs it, and savings for the data that doesn’t.

Importantly, you should still be able to take manual control and define data that needs performance, since it’s likely that the CEO will want even her 18-month-old emails accessible in seconds.

Alternatively, IT can keep managing data manually in each of the storage silos in its datacenter, but as enterprises begin to adopt more efficient alternatives, sticking with the status quo may turn out to be a much greater business risk than being first to automate data management across on-premises IT infrastructure and the cloud.

Machine learning is about understanding what to do better in the future based on what was experienced in the past. Perhaps this is why so many of us react with a little fear when we hear about growth in machine learning.

Machines have far less emotional investment in the past than we do, but luckily, with a little human wisdom, we can put their abilities to work where our businesses need it most, in managing our data.

Network World

You Might Aslo Read: 

What is Machine Learning?:

Machine Learning Writes Better Emails:

« European Cyber Threat Summit 2017
Cybersecurity And Media Companies »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Virtual Security

Virtual Security

Virtual Security provides solutions in the field of managed security services, network security, secure remote work, responsible internet, application security, encryption, BYOD and compliance.

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

Cyberkov

Cyberkov

Cyberkov services include Pentesting, Vulnerability Assessments, Digital Forensics, Incident Response, Source Code Analysis and Security Training.

Database Cyber Security Guard

Database Cyber Security Guard

Database Cyber Security Guard (aka Don't Be Breached) informs Security Professionals and DBAs of Zero Day, Ransomware and Data Breach attacks within milli-seconds

Seavus

Seavus

Seavus is a software development and consulting company with a proven track-record in providing successful enterprise-wide business solutions including Managed Security Services.

CI-CERT

CI-CERT

CI-CERT is the national Computer Incident Response Team for Cote d'Ivoire.

Strategic Cyber Ventures (SCV)

Strategic Cyber Ventures (SCV)

SCV grow cybersecurity companies that disrupt advanced cyber adversaries and revolutionize the cyber product marketplace.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

VariQ

VariQ

VariQ is a premier provider of Cybersecurity, Software Development and Cloud services to federal, state, and local government.

Securosys

Securosys

Securosys is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmission

ServerScan

ServerScan

ServerScan specializes in providing server scanning & compliance services to organizations of all types and sizes.

Intel 471

Intel 471

Intel 471 provides adversary and malware intelligence for leading intelligence, security and fraud teams.

Quantum Security Services

Quantum Security Services

Quantum Security Services is a specialist information security firm providing a range of risk, compliance and technical security services.

Cysurance

Cysurance

Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions.

Tanzania Industrial Research and Development Organization (TIRDO)

Tanzania Industrial Research and Development Organization (TIRDO)

TIRDO is a multi-disciplinary research and development organization.

DRT Cyber

DRT Cyber

DRT Cyber deploys technology solutions to support the functions of cybersecurity, privacy, and risk management.