Joshua Patterson

Charleston, South Carolina Metropolitan Area Contact Info
10K followers 500+ connections

Join to view profile

About

Building bridges, not walls.

Activity

Join now to see all activity

Experience & Education

  • Voltron Data

View Joshua’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

  • Project Management Professional (PMP)

    Project Management Institute (PMI)

    Issued
    Credential ID 2256551
  • SC Licensed Construction Manager

    SC LLR

    Issued
  • SC Licensed Unlimited General Contractor

    SC LLR

    Issued

Publications

  • GPU Acceleration to Boost Business Outcomes

    Business leaders looking for that next competitive edge should consider GPU acceleration.

    Whether used to speed big data processing or prepare for a future of AI-related technologies, the opportunities for generating better outcomes through GPUs are a smart bet.

    Read more about how GPU solutions can power growth and how to map out your next steps.

    Other authors
    See publication
  • Streaming Cyber Security Into Graph

    Traditional security tools like security information and event managers (SIEMs) are struggling to keep up with the terabytes of event data (250M to 2B events) being generated each day from an ever-growing number of devices. Cybersecurity has become a data problem, and enterprises need to reply with scalable solutions to enable effective hunting and combat evolving attacks. Rethinking the cybersecurity problem as a data-centric problem led Accenture Labs’s Cybersecurity team to use emerging big…

    Traditional security tools like security information and event managers (SIEMs) are struggling to keep up with the terabytes of event data (250M to 2B events) being generated each day from an ever-growing number of devices. Cybersecurity has become a data problem, and enterprises need to reply with scalable solutions to enable effective hunting and combat evolving attacks. Rethinking the cybersecurity problem as a data-centric problem led Accenture Labs’s Cybersecurity team to use emerging big data tools along with new approaches such as graph databases and analysis to exploit the connected nature of the data to its advantage. Joshua Patterson, Michael Wendt, and Keith Kraus explain how Accenture Labs’s Cybersecurity team is using Apache Kafka, Spark, and Flink to stream data into Blazegraph and Datastax Graph to accelerate cyber defense.

    Leveraging Datastax Graph and Blazegraph allows Accenture Labs to greatly accelerate query and analysis performance compared to traditional security tools like SIEM. Josh, Michael, and Keith share the challenges of fitting cybersecurity data into each of the graph structures, as well as the ways they exploited the connectedness of events to discover new threats that would have been missed in traditional SIEM tools. In addition, they explain how they use GPUs to accelerate graph analysis by using Blazegraph DASL. Josh, Michael, and Keith end by demonstrating how to efficiently and effectively stream data into these graph databases using best-in-breed technologies such as Apache Kafka, Spark, and Flink and touch on why Kudu is becoming an integral part of Accenture’s technology stack. Utilizing these technologies, clients have supercharged their security analysts’ cyber-hunting abilities and are uncovering threats faster.

    Other authors
    See publication
  • Targeted Behavioral Analytics: Prioritizing High Privileged Accounts to Mitigate Risk

    Organizations routinely monitor user accounts in an attempt to improve their security posture.

    However, it can be difficult to collect the right amount of data—too little data, and the company cannot effectively inform security professionals’ decisions; too much, and the company quickly reaches data overload. The proverbial “needle in a haystack” soon follows.

    Read on as we explain how leading enterprises are taking a more strategic and systematic approach to this security…

    Organizations routinely monitor user accounts in an attempt to improve their security posture.

    However, it can be difficult to collect the right amount of data—too little data, and the company cannot effectively inform security professionals’ decisions; too much, and the company quickly reaches data overload. The proverbial “needle in a haystack” soon follows.

    Read on as we explain how leading enterprises are taking a more strategic and systematic approach to this security challenge.

    Other authors
    See publication
  • Accelerating Understanding Through Data Visualization: The power of storytelling

    Accenture Labs

    As companies go digital and leverage exponentially larger big data sources, they must apply a new logic to how they manage their data supply chain—from ingestion to insights. Yesterday’s model of data warehousing and periodic reporting is a slow, linear approach; the future model is nimble and multi-faceted, supplying the right data to companies and executives in real time.

    But having instant access to the necessary data is not enough. The data must also be presented in a visually…

    As companies go digital and leverage exponentially larger big data sources, they must apply a new logic to how they manage their data supply chain—from ingestion to insights. Yesterday’s model of data warehousing and periodic reporting is a slow, linear approach; the future model is nimble and multi-faceted, supplying the right data to companies and executives in real time.

    But having instant access to the necessary data is not enough. The data must also be presented in a visually appealing, meaningful way that people can quickly understand. This emerging field is called data visualization. With it, companies can turn raw data into meaning and ultimately into understanding to make better, faster decisions about strategy, operations, supply chains, logistics and more.

    Other authors
    See publication
  • Using Open Government Data to Generate Insights

    Accenture Labs

    Blog on Data Wrangling with Open Government Data.

    See publication

Projects

  • Project ASGARD

    - Present

    Every day hackers are working to breach business and government security systems. ASGARD is able to query billions of alerts from weeks - or years - of data and do it faster than ever before. This scalable, accelerated threat detection provides insights across your enterprise to help you identify threats already there. Utilizing best of breed big data technologies like Spark and Datastax, and GPU accelerated analytics like Graphistry, ASGARD is revolutionizing cyber hunting.

    Other creators
    See project
  • Loan Risk Analysis

    Loan Risk Analysis is a website developed to allow exploration into the complex mortgage industry with dynamic visualization, using publicly available data. There are three visualizations; each designed to analyze different aspects (the who, what, when, and where) of lending in the US.

    Other creators
    See project
  • Disaster Viz

    Disaster Visualization is webpage summarizing FEMA disasters from 1970 until 2013. Filter across years and disaster types to gain insight into disasters in the US.

    Other creators
    See project
  • Hotshot Charts

    Data analytics website showcasing insights and unique visualizations in basketball. Pick a year, team, and player and see who passes to who on that team, and where the player is hot on the court.

    Featured in November 2013 issue of Wired Magazine.
    http://www.wired.com/design/2013/10/2111-infoporn-basketball/

    Other creators
    See project

More activity by Joshua

View Joshua’s full profile

  • See who you know in common
  • Get introduced
  • Contact Joshua directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Joshua Patterson in United States

Add new skills with these courses