Book Image

Data Lake for Enterprises

By : Vivek Mishra, Tomcy John, Pankaj Misra
Book Image

Data Lake for Enterprises

By: Vivek Mishra, Tomcy John, Pankaj Misra

Overview of this book

The term "Data Lake" has recently emerged as a prominent term in the big data industry. Data scientists can make use of it in deriving meaningful insights that can be used by businesses to redefine or transform the way they operate. Lambda architecture is also emerging as one of the very eminent patterns in the big data landscape, as it not only helps to derive useful information from historical data but also correlates real-time data to enable business to take critical decisions. This book tries to bring these two important aspects — data lake and lambda architecture—together. This book is divided into three main sections. The first introduces you to the concept of data lakes, the importance of data lakes in enterprises, and getting you up-to-speed with the Lambda architecture. The second section delves into the principal components of building a data lake using the Lambda architecture. It introduces you to popular big data technologies such as Apache Hadoop, Spark, Sqoop, Flume, and ElasticSearch. The third section is a highly practical demonstration of putting it all together, and shows you how an enterprise data lake can be implemented, along with several real-world use-cases. It also shows you how other peripheral components can be added to the lake to make it more efficient. By the end of this book, you will be able to choose the right big data technologies using the lambda architectural patterns to build your enterprise data lake.
Table of Contents (23 chapters)
Title Page
Credits
Foreword
About the Authors
About the Reviewers
www.PacktPub.com
Customer Feedback
Preface
Part 1 - Overview
Part 2 - Technical Building blocks of Data Lake
Part 3 - Bringing It All Together

Achieving telecom security and regulatory compliance


This is more of an industry specific use case wherein nationwide Telecom companies are driven by regulatory compliance to implement all security protocols for Law Enforcement Agencies for investigation of any cyber crime and to perform occasional audits. These regulations have become much more strict with the advancement of technologies, social footprints and multiple ways by which cyber criminals can perform unethical activities. This has greatly expanded the scope of Telecom companies from regulatory compliance perspective, which today gets into more real-time and percolation driven detection along with batch analysis of network data. The data records can be analyzed in depth to establish a communication graph for every caller over a period of time such that this time series data can be replayed whenever required. These mechanisms prove very useful to Law Enforcement Agencies for their investigations. Here we are discussing massive data...