Time Travel: 2014

Chapter 364 Interests in Gray Area

Because dark data includes user activity logs, customer conversation or email records, server monitoring logs, video files, machine and sensor information generated by the Internet of Things.

Dark data may also include data that is no longer accessible because it is stored on outdated devices.

In this case, it is often possible to get some dark data when cleaning activity logs or collecting storage fragments.

In addition, there are many ways to collect dark data.

Although it is easy to say.

But as the saying goes, talking about toxicity regardless of dose is just a hooligan.

For the same reason, talking about mining data regardless of the size of the data is also a hooliganism.

Dark data on the scale planned by Pingcheng is definitely not satisfied by traditional data mining methods.

It seems that there is no good way to mine dark data nowadays.

When traditional companies deal with dark data, they use clumsy methods to find ways to convert unstructured data into structured data.

This method is time-consuming and laborious.

But that’s just for today’s technology companies.

For Lin Hui, he still has many data mining methods.

No one knows how to mine data better than Lin Hui.

For large-scale data mining, it seems that the most convenient way is to mine with the help of artificial intelligence.

Even Lin Hui's computer in his previous life had some ready-made methods for mining dark data.

Although the efficiency is limited by current hardware, it may be greatly reduced.

But compared with the current traditional mining method, it is also like a dimensionality reduction attack.

But a new question comes again, where to mine dark data?

As mentioned earlier, some deep data are private and controlled by governments or private organizations.

This includes data curated by academics, government agencies and local communities, medical records, legal records, financial information and organization-specific databases.

Even if it is dark data.

Even if Lin Hui had the guts, Lin Hui wouldn't dare dig it.

After all, another name for this thing is state secrets.

After thinking for a while, Lin Hui came up with a few ideas.

But after careful consideration, no matter which idea it is, it seems that it is very risky and will not be feasible in the short term.

Although it is almost impossible to say that doing things without taking risks is almost impossible.

But it seems unnecessary to take risks for a mere $200 million.

After all, based on the information in Lin Hui's mind, it actually wouldn't take long to earn 200 million US dollars.

In short, there is absolutely no need to take risks.

Since there was no need to take risks, and Lin Hui always wanted stability.

So why does Lin Hui come up with a bunch of risky methods when it comes to data mining?

Could it be that the forest dust has drifted away? ?

A few years from now, there will be no problem with Lin Hui's ideas.

At least judging from the thinking at the end of 2021, what Lin Hui just thought of was not a desperate solution.

The method Lin Hui thought of can be operated in compliance with the rules.

But unfortunately, it is now 2014, and it is impossible to perform the same operation.

As for the most direct reason, it can only be attributed to the limitations of the times.

In the past few years, data mining has been programmed and standardized.

But now, the corresponding matters are not standardized and standardized.

In the next few years, there will be a clear "Data/Data/Security/Law" regarding the use of data and data security, but now there is no such thing.

The first article of the "Data/Data Security/Security/Law" clearly states: "In order to regulate data processing activities, ensure data security, promote data development and utilization, protect the legitimate rights and interests of individuals and organizations, and safeguard national sovereignty, security and This law is enacted in the interest of development.”

The "Data/Security/Security/Law" has quite clear provisions on many things regarding data utilization and data security.

Needless to say, it involves data security emergency response mechanisms, data security reviews, and data export controls.

What is more critical is that this law clarifies the data classification and classification and core data protection system, and also clarifies the data security risk assessment and work coordination mechanism.

According to these two words, it undoubtedly means that the national level will come forward to conduct security risk assessments on some data to classify the data.

Although it seems that data control is stricter.

But this is good news for people who are really down-to-earth.

Why do you say that? ?

In many things, we are not afraid of having clear regulations, but we are afraid of being in a situation where everything is indispensable.

Nothing means a gray area.

Some people are born to walk in gray areas.

Wandering in gray areas makes these people happy.

It has to be said that some people's talents are naturally suitable for being in the dark under the light.

When fishing in troubled waters, these people can make both ends meet and are very comfortable.

But Lin Hui was not envious at all.

Although Lin Hui’s name contains the word “hui”.

But forget about wandering into gray areas.

And for those who walk in the gray area.

Lin Hui just felt that these people were stupid and bold, and they really didn't want to settle the score with Qiu Hou.

As the saying goes, don't worry about making trouble now, just make a list in the future.

When it comes to data security, there are no clear laws regarding data utilization.

But it really resulted in a situation where both humans and gods were angry.

Even if there is no particularly accurate correspondence.

You can still be punished if you are charged with endangering national security.

Of course these are digressions.

And these things have little to do with law-abiding people like Lin Hui.

Data utilization is still in a "grey" area.

It makes it possible for honest people to get involved.

On the contrary, some people who want to do whatever they want are doing whatever they want.

Anyway, Lin Hui felt that it would be better to have a clear system for things like this that involve large interests.

Having a clear system represents formalization and rationalization.

This is a major benefit for practitioners.

Let’s also take the content of the law as an example. The law clearly states that the state supports the development and use of data to improve the intelligence level of public services.

It is clearly stated that the state supports data development and utilization and data security technology research, encourages technology promotion and business innovation in the fields of data development and utilization and data security, and cultivates and develops data development and utilization and data security products and industrial systems.

In addition, it was also clearly stated that the country will promote the construction of data development and utilization technology and data security standard systems.

These are undoubtedly good news for conscientious technology practitioners like Lin Hui, because they represent the country’s clear recognition of reasonable and compliant data utilization.

According to this law, after screening out some key data related to national security and national interests.

Some ordinary data can actually be reasonably utilized based on this.

Even commercial use of data is perfectly fine as long as it does not violate regulations and does not reveal secrets.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like