O'Reilly logo

Application of Big Data for National Security by Babak Akhgar, Gregory B. Saathoff, Hamid R. Arabnia, Richard Hill, Andrew Staniforth, Petra Saskia Bayerl

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 18

Making Sense of the Noise

An ABC Approach to Big Data and Security

John N.A. Brown

Abstract

Processing Big Data for security is not a twenty first–century problem. By the time our early ancestors had reached the size of cats some 40 million years ago, they had already developed the tools they needed to process the vast amounts of security-related data that fell on them in a steady stream of sounds, smells, tastes, sights, and feelings. The key was a reflex loop called a “corollary discharge cycle”: the routine with which all living creatures perceive, process, and adapt before perceiving again. At its simplest, this is how the proprioceptors in our joints allow us to stand or to control the placement of our hands and fingers. More complex ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required