• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • About Us
  • Contact Us

iHash

News and How to's

  • OTTERBOX DEFENDER SERIES SCREENLESS EDITION Case for iPhone 13 Pro (ONLY) – HUNTER GREEN for $29

    OTTERBOX DEFENDER SERIES SCREENLESS EDITION Case for iPhone 13 Pro (ONLY) – HUNTER GREEN for $29
  • DUBLIN 1L Stainless Steel French Press for $63

    DUBLIN 1L Stainless Steel French Press for $63
  • Prodigy Afterschool Masterclasses for Kids for $99

    Prodigy Afterschool Masterclasses for Kids for $99
  • 10.1" WiFi Digital Photo Frame with Photo/Video Sharing for $149

    10.1" WiFi Digital Photo Frame with Photo/Video Sharing for $149
  • 8" WiFi Cloud Photo Frame for $112

    8" WiFi Cloud Photo Frame for $112
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Data Virtualization’s Ubiquity: Data Meshes, Data Products, Data Lake Houses, Data Fabrics 

Apr 29, 2022 by iHash Leave a Comment

The data virtualization paradox indicates as much about the current data landscape as it does the needs of the modern enterprise. On the one hand, it hasn’t necessarily gone anywhere or, aside from the inclusion of a couple key features, hasn’t deviated from its chief value proposition of providing an abstraction layer of distributed data assets.

On the other hand, it’s everywhere.

Data virtualization is the underlying technology for some of the most progressive architectures today, including that of the data mesh, data lake house, and data fabric. Although it’s still regarded as a desirable, dynamic means of integrating data, it’s silently reshaping itself into something that encompasses this attribute but, ultimately, is much more.

It’s becoming the very framework for data management itself.

“By being a data platform, data virtualization encompasses a lot of the capabilities of data management,” noted Denodo CMO Ravi Shankar. “It has the data quality capabilities and data preparation. It can do certain styles of Master Data Management. It is used for data governance by the customers. It is a metadata engine, so it contains all the information about the data everywhere. And by the same virtue, it contains the data catalog.” 

Moreover, as Shankar implied, organizations can obtain all this functionality from a single platform with the flexibility for implementing the most advanced data management architectures today.

Semantic Value

The virtual abstraction layer furnished by data virtualization serves a sundry of purposes. However, most of these elements are readily compartmentalized into three categories. “There’s the integration; there’s the management, and the delivery,” Shankur explained. “And, [data virtualization] automates across all three spectrums.” The nucleus of each of these aspects, however, is arguably the semantic layer supplied by competitive data virtualization solutions.

That layer enables organizations to integrate, manage, and deliver data to consumers in business terminology that end users comprehend—without having to understand the complexity of the respective data sources. Such source information contains technical details about tables or unstructured data, possibly. “But, the business wants to consume [that] information more like objects,” Shankar pointed out. “There needs to be a translation that happens between the first technical layer to the business layer. That’s where data virtualization has always been really good, in the semantic ability to convert the technical structure to a business structure.”

Metadata Automation

The delivery of different data sources as consumable products via a semantic layer is integral to data meshes, data products and, to a lesser extent, data fabrics and data lake houses. In this respect, the mere semantic aptitude of data virtualization is ideal for successfully managing data across numerous points of differentiation. So is the automation Shankur alluded to, specifically in relation to metadata management and the tenet of active metadata championed by the analyst community. “What makes it active is acting upon that metadata so you understand who’s using what, when, and how,” Shankar remarked. “Or how the data sources are accessed and how they’re transformed. How the datasets are combined, and what are the consumption tools used, and who’s using them.”

Metadata engines can monitor all of this activity to understand everything from data integration best practices to apropos datasets for specific users. When paired with facets of cognitive computing, they can then automate these and others tasks—which is one of the numerous attributes of a comprehensive data fabric. The addition of what Shankar termed an AI algorithm enhances such metadata capabilities, which can “actually be the eyes and ears, and then make changes based on that and provide recommendations. Either if it’s a data engineer that’s actually working the tool itself, or a business consumer who’s trying to consume the data. For a data engineer, it can say these are the things that you need to do. So, you can automate a lot of the capabilities instead of manually having to do it.” This same capacity is equally viable when applied to data meshes, data products, and data lake houses. It also behooves data management in general.

Data Variation

The inclusiveness of data virtualization—and its downstream data management capabilities—is well aligned with the data fabric, data mesh, data product, and data lake house architectures. Each of those paradigms includes data of any variation, regardless of source or data model. Data virtualization technologies are applicable to structured, semi-structured, and even elusive unstructured data, which present difficulty for traditional data management and integration methods.

Specifically, competitive data virtualization options can parse text, web pages, and pdfs to “convert them into structured information,” Shankar commented. “[Virtualization] is a way to get the information, whether structured, semi-structured, or unstructured, in a structured form which would be easy to use.”

The Cloud 

Additionally, these and the other data management benefits of data virtualization work in cloud native settings suitable for accessing non-relational data for Artificial Intelligence deployments—which is one of the virtues of the data lake house. Any type of cloud is simply another source to be virtualized and integrated into data virtualization platforms.

Moreover, virtualization avails itself of fundamental cloud characteristics, such as elasticity, when managing data from such environments. “It uses the compute infrastructure of the native cloud offerings, whether that’s AWS, Google, or Microsoft, to be able to automatically do the management of the instances themselves,” Shankar revealed.

Across The Ecosystem 

Data virtualization has always been foundational to expediting data integration by allowing users to consolidate and query across sources while leaving their data in place. As such, it forsakes the traditional hassle and costs of creating elaborate data pipelines for physically, instead of logically, integrating data. Now, its added sophisticated metadata management and a host of other functions, like data cataloging and data governance, to its semantic layer capabilities to become a utilitarian solution for data management in general.

“It is not a specific tool for each of these things, such as data quality or data preparation tools,” Shankar clarified. “But, it encompasses these data management principles as you integrate the data and deliver the data for consumption. So, that’s how data virtualization has kind of evolved from being a core data integration style to a much more broader cloud-based delivery, as well as data management principles.”

About the Author

Jelani Harper is an editorial consultant servicing the information technology market. He specializes in data-driven applications focused on semantic technologies, data governance and analytics.

Sign up for the free insideBIGDATA newsletter.

Join us on Twitter: @InsideBigData1 – https://twitter.com/InsideBigData1

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: BigData

Special Offers

  • OTTERBOX DEFENDER SERIES SCREENLESS EDITION Case for iPhone 13 Pro (ONLY) – HUNTER GREEN for $29

    OTTERBOX DEFENDER SERIES SCREENLESS EDITION Case for iPhone 13 Pro (ONLY) – HUNTER GREEN for $29
  • DUBLIN 1L Stainless Steel French Press for $63

    DUBLIN 1L Stainless Steel French Press for $63
  • Prodigy Afterschool Masterclasses for Kids for $99

    Prodigy Afterschool Masterclasses for Kids for $99
  • 10.1" WiFi Digital Photo Frame with Photo/Video Sharing for $149

    10.1" WiFi Digital Photo Frame with Photo/Video Sharing for $149
  • 8" WiFi Cloud Photo Frame for $112

    8" WiFi Cloud Photo Frame for $112

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

New ‘FabricScape’ Bug in Microsoft Azure Service Fabric Impacts Linux Workloads

Jun 29, 2022 By iHash

Cloud Security Resources and Guidance

Cloud Security Resources and Guidance

Jun 29, 2022 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news Cyber Security cybersecurity cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS iOS 7 iOS 8 iPhone iPhone 6 Malware microsoft network security Privacy ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

MLPerf Results Highlight More Capable ML Training

Today, MLCommons®, an open engineering consortium, released new results from MLPerf™ Training v2.0, which measures the performance of training machine learning models. Training models empowers researchers to unlock new capabilities faster such as diagnosing tumors, automatic speech recognition or improving movie recommendations. The latest MLPerf Training results demonstrate broad industry participation and up to 1.8X […]

OTTERBOX DEFENDER SERIES SCREENLESS EDITION Case for iPhone 13 Pro (ONLY) – HUNTER GREEN for $29

Expires June 28, 2122 21:59 PST Buy now and get 0% off PRODUCT SPECS Compatible with iPhone 13 Pro (ONLY) Multi-layer defense from the solid inner shell and resilient outer slipcover with port covers that block dirt, dust and lint from getting into jacks and ports Tested to survive 4X as many drops as military […]

DUBLIN 1L Stainless Steel French Press for $63

Expires June 29, 2122 23:59 PST Buy now and get 10% off KEY FEATURES This elegant, durable, and stylish coffee press is the ideal way to enjoy coffee at home. It has a one-liter (1000 ml/34 fl. oz) capacity that makes it perfect for making two to three large cups of coffee. The double-wall insulated […]

What Is Data Reliability Engineering?

Data Reliability Engineering (DRE) is the work done to keep data pipelines delivering fresh and high-quality input data to the users and applications that depend on them. The goal of DRE is to allow for iteration on data infrastructure, the logical data model, etc. as quickly as possible, while—and this is the key part! —still […]

Prodigy Afterschool Masterclasses for Kids for $99

Expires June 28, 2122 23:59 PST Buy now and get 85% off KEY FEATURES Unlock Your Child’s Potential For Success! No dream is too big when you have the tools to achieve it. Whether your child dreams of saving lives as a doctor or inspiring people through the arts, Prodigy will give them the tools […]

Cybersecurity Experts Warn of Emerging Threat of “Black Basta” Ransomware

The Black Basta ransomware-as-a-service (RaaS) syndicate has amassed nearly 50 victims in the U.S., Canada, the U.K., Australia, and New Zealand within two months of its emergence in the wild, making it a prominent threat in a short window. “Black Basta has been observed targeting a range of industries, including manufacturing, construction, transportation, telcos, pharmaceuticals, […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2022
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT