Skip to main content

Anti-Patterns in Big Data convergence with M2M

It is almost an open secret right now that the next big trend in Big Data space would be the adoption in M2M and ‘Internet of Things’ arena. If any major indicators of the battle that would happen here need to be gauged, then one needs to look at major GE investment in Pivotal and Intel’s own distribution of Hadoop.

However, as the buzz goes around, there are still some M2M (machine to machine) anti-patterns which seem to be hyped as the inhibitors.
Defining Anti-pattern:
“there must be at least two key elements present …:
  • Some repeated pattern of action, process or structure that initially appears to be beneficial, but ultimately produces more bad consequences than beneficial results, and
  • An alternative solution exists that is clearly documented, proven in actual practice and repeatable.”

Let’s analyze 4 key notions and assuming them to be anti-patterns, counter them with possible solutions trade-off.

1)      The silos of Internet of Things

While it is true that the current focus is ‘Internet of Things’, the reality is we still have only ‘Intranet of things’. This means that the data exists in enterprise or organization silos only and it is rare to see devices of 1 organization talking to devices outside the boundary to devices of another organization.

  • Data Mashups – It may be a while before data will co-exist in some industry wide warehouse. Till that time, data mashups can be of excellent assistance. Therefore, it makes excellent sense to utilize the current data in silos, mash them up with other available sources and drive business insights from them.

2)     Trust among talking Machines

 ‘Trust’ is a widely debated topic is any sort of information exchange. In case of social networks, developing ‘trust’ still involves manual intervention. For instance, we share the data (status, pics, comments) on most social networks like Facebook only with trusted group of friends. The friend requests itself are accepted on social networks only from ‘trusted’ people. The same concept extends over in machine to machine requests albeit with less manual intervention and intelligence.

  • Analogous implementations – Many industries like financial services have successfully implemented trust based model for systems. Similar analogous beginnings for M2M may be easier to replicate and succeed.

3)     Skill grill

Both M2M and Big Data implementations are specialized vendor implementations. There is a scarcity of solutions, vendors and skilled work force currently for it.

  • Training - While it is a big talking point that Big Data, Hadoop skills are still far and few, the same discussion also extends over to M2M skills. As in Hadoop, where training and community outreach has been increasing penetration, so is it for M2M.

4)     Money to money

Most projects are guided by a strong monetization factor and the ROI figures dominate the proposal clearance. Currently, M2M is still in rudimentary stage and enterprise still needs to en-cash over investments being made.

  • Data as an asset- As a known business model, enterprises are known to reap rich rewards on their data assets. What may be of monetary value to one CSP (for instance), the same may be a competitive differentiator and strategic asset for the other. Consequently, blind focus on immediate returns may not yield any benefit.

While each firm may employ its own methods and strategies to deal with the M2M bubble, it is evident that Big Data technologies like Hadoop can be a key differentiator in creating the niche platform base. To that end, we will keep monitoring the space as the projects evolve over to create differentiated solutions.

Top image source: Navigant Research


Popular posts from this blog

Beyond NSA, the intelligence community has a big technology footprint

While all through the past few days the focus has been on NSA activities, the discussion has often veered around the technologies and products used by NSA. At the same time, a side discussion topic has been the larger technical ecosystem of intelligence units. CIA has been one of the more prolific users of Information Technology by its own admission. To that extent, CIA spinned off a venture capital firm In-Q-Tel in 1999 to invest in focused sector companies. Per Helen Coster of Fortune Magazine, In-Q-Tel (IQT) has been named “after the gadget-toting James Bond character Q”.
In-Q-Tel states on its website that “We design our strategic investments to accelerate product development and delivery for this ready-soon innovation, and specifically to help companies add capabilities needed by our customers in the Intelligence Community”. To that effect, it has made over 200 investments in early stage companies for propping up products. Being a not-for-profit group, unlike Private Venture capi…

Data deduplication tactics with HDFS and MapReduce

As the amount of data continues to grow exponentially, there has been increased focus on stored data reduction methods. Data compression, single instance store and data deduplication are among the common techniques employed for stored data reduction.
Deduplication often refers to elimination of redundant subfiles (also known as chunks, blocks, or extents). Unlike compression, data is not changed and eliminates storage capacity for identical data. Data deduplication offers significant advantage in terms of reduction in storage, network bandwidth and promises increased scalability.
From a simplistic use case perspective, we can see application in removing duplicates in Call Detail Record (CDR) for a Telecom carrier. Similarly, we may apply the technique to optimize on network traffic carrying the same data packets.
Some of the common methods for data deduplication in storage architecture include hashing, binary comparison and delta differencing. In this post, we focus on how MapReduce and…

Top Big Data Influencers of 2015

2015 was an exciting year for big data and hadoop ecosystem. We saw hadoop becoming an essential part of data management strategy of almost all major enterprise organizations. There is cut throat competition among IT vendors now to help realize the vision of data hub, data lake and data warehouse with Hadoop and Spark.
As part of its annual assessment of big data and hadoop ecosystem, HadoopSphere publishes a list of top big data influencers each year. The list is derived based on a scientific methodology which involves assessing various parameters in each category of influencers. HadoopSphere Top Big Data Influencers list reflects the people, products, organizations and portals that exercised the most influence on big data and ecosystem in a particular year. The influencers have been listed in the following categories:

AnalystsSocial MediaOnline MediaProductsTechiesCoachThought LeadersClick here to read the methodology used.

Analysts:Doug HenschenIt might have been hard to miss Doug…