Charleston, South Carolina Metropolitan Area
Contact Info
10K followers
500+ connections
About
Activity
-
BIG NEWS: Data Council is headed BACK TO THE BAY baby. Since 2013 we've been bringing together the brightest minds in data to share their OSS tools,…
BIG NEWS: Data Council is headed BACK TO THE BAY baby. Since 2013 we've been bringing together the brightest minds in data to share their OSS tools,…
Liked by Joshua Patterson
-
I've been experimenting with the Snowflake ADBC driver in Python, and one of my favorite things thus far is the "adbc_ingest" method. This method…
I've been experimenting with the Snowflake ADBC driver in Python, and one of my favorite things thus far is the "adbc_ingest" method. This method…
Liked by Joshua Patterson
-
Today, I met with five senior managers from enterprise data teams. Here are the key points from our discussion: All of them are using data…
Today, I met with five senior managers from enterprise data teams. Here are the key points from our discussion: All of them are using data…
Liked by Joshua Patterson
Experience & Education
Licenses & Certifications
-
Project Management Professional (PMP)
Project Management Institute (PMI)
IssuedCredential ID 2256551 -
SC Licensed Construction Manager
SC LLR
Issued -
SC Licensed Unlimited General Contractor
SC LLR
Issued
Publications
-
GPU Acceleration to Boost Business Outcomes
Business leaders looking for that next competitive edge should consider GPU acceleration.
Whether used to speed big data processing or prepare for a future of AI-related technologies, the opportunities for generating better outcomes through GPUs are a smart bet.
Read more about how GPU solutions can power growth and how to map out your next steps.Other authorsSee publication -
Streaming Cyber Security Into Graph
Traditional security tools like security information and event managers (SIEMs) are struggling to keep up with the terabytes of event data (250M to 2B events) being generated each day from an ever-growing number of devices. Cybersecurity has become a data problem, and enterprises need to reply with scalable solutions to enable effective hunting and combat evolving attacks. Rethinking the cybersecurity problem as a data-centric problem led Accenture Labs’s Cybersecurity team to use emerging big…
Traditional security tools like security information and event managers (SIEMs) are struggling to keep up with the terabytes of event data (250M to 2B events) being generated each day from an ever-growing number of devices. Cybersecurity has become a data problem, and enterprises need to reply with scalable solutions to enable effective hunting and combat evolving attacks. Rethinking the cybersecurity problem as a data-centric problem led Accenture Labs’s Cybersecurity team to use emerging big data tools along with new approaches such as graph databases and analysis to exploit the connected nature of the data to its advantage. Joshua Patterson, Michael Wendt, and Keith Kraus explain how Accenture Labs’s Cybersecurity team is using Apache Kafka, Spark, and Flink to stream data into Blazegraph and Datastax Graph to accelerate cyber defense.
Leveraging Datastax Graph and Blazegraph allows Accenture Labs to greatly accelerate query and analysis performance compared to traditional security tools like SIEM. Josh, Michael, and Keith share the challenges of fitting cybersecurity data into each of the graph structures, as well as the ways they exploited the connectedness of events to discover new threats that would have been missed in traditional SIEM tools. In addition, they explain how they use GPUs to accelerate graph analysis by using Blazegraph DASL. Josh, Michael, and Keith end by demonstrating how to efficiently and effectively stream data into these graph databases using best-in-breed technologies such as Apache Kafka, Spark, and Flink and touch on why Kudu is becoming an integral part of Accenture’s technology stack. Utilizing these technologies, clients have supercharged their security analysts’ cyber-hunting abilities and are uncovering threats faster.Other authorsSee publication -
Targeted Behavioral Analytics: Prioritizing High Privileged Accounts to Mitigate Risk
Organizations routinely monitor user accounts in an attempt to improve their security posture.
However, it can be difficult to collect the right amount of data—too little data, and the company cannot effectively inform security professionals’ decisions; too much, and the company quickly reaches data overload. The proverbial “needle in a haystack” soon follows.
Read on as we explain how leading enterprises are taking a more strategic and systematic approach to this security…Organizations routinely monitor user accounts in an attempt to improve their security posture.
However, it can be difficult to collect the right amount of data—too little data, and the company cannot effectively inform security professionals’ decisions; too much, and the company quickly reaches data overload. The proverbial “needle in a haystack” soon follows.
Read on as we explain how leading enterprises are taking a more strategic and systematic approach to this security challenge.Other authorsSee publication -
Accelerating Understanding Through Data Visualization: The power of storytelling
Accenture Labs
As companies go digital and leverage exponentially larger big data sources, they must apply a new logic to how they manage their data supply chain—from ingestion to insights. Yesterday’s model of data warehousing and periodic reporting is a slow, linear approach; the future model is nimble and multi-faceted, supplying the right data to companies and executives in real time.
But having instant access to the necessary data is not enough. The data must also be presented in a visually…As companies go digital and leverage exponentially larger big data sources, they must apply a new logic to how they manage their data supply chain—from ingestion to insights. Yesterday’s model of data warehousing and periodic reporting is a slow, linear approach; the future model is nimble and multi-faceted, supplying the right data to companies and executives in real time.
But having instant access to the necessary data is not enough. The data must also be presented in a visually appealing, meaningful way that people can quickly understand. This emerging field is called data visualization. With it, companies can turn raw data into meaning and ultimately into understanding to make better, faster decisions about strategy, operations, supply chains, logistics and more.Other authorsSee publication -
Using Open Government Data to Generate Insights
Accenture Labs
Blog on Data Wrangling with Open Government Data.
Projects
-
Project ASGARD
- Present
Every day hackers are working to breach business and government security systems. ASGARD is able to query billions of alerts from weeks - or years - of data and do it faster than ever before. This scalable, accelerated threat detection provides insights across your enterprise to help you identify threats already there. Utilizing best of breed big data technologies like Spark and Datastax, and GPU accelerated analytics like Graphistry, ASGARD is revolutionizing cyber hunting.
Other creatorsSee project -
Loan Risk Analysis
Loan Risk Analysis is a website developed to allow exploration into the complex mortgage industry with dynamic visualization, using publicly available data. There are three visualizations; each designed to analyze different aspects (the who, what, when, and where) of lending in the US.
Other creatorsSee project -
Disaster Viz
Disaster Visualization is webpage summarizing FEMA disasters from 1970 until 2013. Filter across years and disaster types to gain insight into disasters in the US.
Other creatorsSee project -
Hotshot Charts
Data analytics website showcasing insights and unique visualizations in basketball. Pick a year, team, and player and see who passes to who on that team, and where the player is hot on the court.
Featured in November 2013 issue of Wired Magazine.
http://www.wired.com/design/2013/10/2111-infoporn-basketball/Other creatorsSee project
More activity by Joshua
-
I am delighted to share that Accenture has acquired Cientra, a New Jersey headquartered silicon design and engineering services company offering…
I am delighted to share that Accenture has acquired Cientra, a New Jersey headquartered silicon design and engineering services company offering…
Liked by Joshua Patterson
-
Real-time fraud detection at scale is one of the most challenging problems in financial services today. When you're processing $228 billion in…
Real-time fraud detection at scale is one of the most challenging problems in financial services today. When you're processing $228 billion in…
Liked by Joshua Patterson
People also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Joshua Patterson in United States
-
Joshua P.
Customer Solutions Manager @ Amazon Web Services (AWS)
-
Joshua Patterson
-
Joshua Patterson
-
Joshua Patterson
-
Joshua Patterson
VP Markets & Strategy - Kiewit Nuclear Solutions
553 others named Joshua Patterson in United States are on LinkedIn
See others named Joshua Patterson