0% found this document useful (0 votes)
22 views1 page

Distributed Computing Mind Maps

The document outlines various big data processing frameworks, including batch and stream processing methods like Hadoop, Spark, and Flink. It also discusses scalable data ingestion methods such as Sqoop, Flume, and Kafka, alongside AI and data science applications for large-scale analytics, including predictive and prescriptive analytics. Additionally, it covers security challenges in data management, AI-based intrusion detection, and secure multi-party computation.

Uploaded by

shubhamvarma1718
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views1 page

Distributed Computing Mind Maps

The document outlines various big data processing frameworks, including batch and stream processing methods like Hadoop, Spark, and Flink. It also discusses scalable data ingestion methods such as Sqoop, Flume, and Kafka, alongside AI and data science applications for large-scale analytics, including predictive and prescriptive analytics. Additionally, it covers security challenges in data management, AI-based intrusion detection, and secure multi-party computation.

Uploaded by

shubhamvarma1718
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Q5-a: Big Data Processing Frameworks Q5-b: SIMD vs MIMD

Batch Processing Multiple Instructions


In-memory Processing
Hadoop

Spark

MIMD

Big Data Frameworks

Parallel Models
Multiple Data

Flink SIMD

Stream Processing Single Instruction

Q5-c: Scalable Data Ingestion Methods Q6-a: AI & Data Science for Large-scale Analytics

Sqoop Predictive Analytics

Visualization

Flume

Stream Ingestion
Data Ingestion
AI & DS
Batch Ingestion
Kafka
Data Cleaning

Nifi Model Training

Q6-b: SISD vs MISD Q6-c: Real-Time Analytics

Multiple Instructions What Happened


What Will Happen
Descriptive

Predictive

MISD

Real-Time Analytics

Execution Models
Single Data

SISD Prescriptive

Single Instruction What to Do

Q7-a: AI-Based Intrusion Detection Q7-b: Secure Multi-Party Computation (SMPC)

User Behavior Patterns Data Sharing Without Exposure

Encryption Techniques

SMPC

Outlier Detection
Privacy Preservation

Behavioral Analysis

Intrusion Detection
Anomaly Detection No Central Authority

Q8-a: Security Challenges Q8-b: Threat Hunting and Visualization

Availability Graph Analysis Visualization


User Identity Dashboards

Authentication

Security Challenges

Encryption
Pattern Detection
Confidentiality

Threat Hunting

Data Integrity
Tamper-proof Data Attack Surface Analysis

You might also like