tag:blogger.com,1999:blog-1298551771411015285.post7250144501055018155..comments2024-03-24T05:33:36.168-05:00Comments on Analytics and Visualization of Big Data: Raytheon RIOT- an analytic social media toolFadel Megahedhttp://www.blogger.com/profile/08369551255758696380noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-1298551771411015285.post-2398930355601238812019-08-02T01:26:42.050-05:002019-08-02T01:26:42.050-05:00Thanks for sharingData Mining software service pro...Thanks for sharing<a href="http://www.chloros.in/datamining.html" rel="nofollow">Data Mining software service providers</a>Afsalhttps://www.blogger.com/profile/10019208966895935475noreply@blogger.comtag:blogger.com,1999:blog-1298551771411015285.post-3933531725722232062013-02-17T18:01:33.298-06:002013-02-17T18:01:33.298-06:00RIOT could save tax dollars, as well as make it ea...RIOT could save tax dollars, as well as make it easier for police to chase down bad guys and help government officials stop terrorist attacks. On the other hand, the price could be the loss of individual privacy. This no doubt will raise hackles about an ominous-sounding breach of privacy on the horizon.<br />As mentioned in the parent article ‘The Rapid Information Overly Technology’ reportedly can track check-in posts and geo tagged photos in social media. Further, it can chart social connections and highlight those an individual communicates with most often. This also develops a visualization model which shows a predictive animation module on how an individual’s life can be mapped. It ultimately undermines any privacy manners. It is also possible that the potential benefits to law enforcement are overrated.<br />‘Evil-doers’ already know about the software's existence and can easily avoid being tracked via social networks, or even leave a false trail. In other words, if criminal masterminds know that this technology exists, they can just establish a misleading routine to throw off pursuers when they make their actual strike. Meanwhile, members of the population as a whole could be ignorant of the technology and fail to take necessary steps to protect themselves. However this form of technology is not relatively new as ‘spying’ projects, reconstruction events have been successfully implemented in the past. What makes this technology innovative are the sources of data mining, technological advent of open source software and predominant growth of social media which makes access to datasets relatively easy.<br /> <br />Prashanthttps://www.blogger.com/profile/09155651075044213010noreply@blogger.com