Over lunch recently, a former Secretary of the Department of Homeland Security asked me, “How long do you think it will be until mobile credentials fully replace plastic badges and cards?”
Social spaces will be able to identify and know their inhabitants, visitors, guests, caretakers, administrators, and any other people who interact with them. This knowledge is a fundamental building block because social relationships are built on the concept of stable personal identity over time.
Recently, there was a mall shooting in which three people died about five miles from my home in Columbia, MD. My wife and I were to have been there getting her phone fixed in the exact part of the mall where the killings took place.
In the first part of this series (published in April 2013) we discussed some of the major technologies that will play a role in the application of Big Data to the practice of physical security.
In the first part of this series (published in April 2013) we discussed some of the major technologies that will play a role in the application of Big Data to the practice of physical security.
The signs are all around that Big Data is the first major post-cloud technology that can change our useof data as much as the cloud has changed the way we deploy it.
In the first part of this series, we looked at the definition of Big Data and the business benefits that companies are beginning to see from this new technology. Today, we drill down on what types of security data might make up a Big Data strategy, with an eye toward what types of analytics might help extract value from that data.