global consulting group

Reveal utilizes Cloudera’s product, Apache Hadoop. Hadoop is an ecosystem of open source components that fundamentally changes the way enterprises store, process, and analyze data. Unlike traditional systems, Hadoop enables multiple types of analytic workloads to run on the same data, at the same time, at massive scale on industry-standard hardware. CDH, Cloudera’s open source platform, is the most popular distribution of Hadoop and related projects in the world (with support available via a Cloudera Enterprise subscription).

Hadoop’s infinitely scalable flexible architecture (based on the HDFS filesystem) allows organizations to store and analyze unlimited amounts and types of data—all in a single, open source platform on industry-standard hardware.

With Hadoop, analysts and data scientists have the flexibility to develop and iterate on advanced statistical models using a mix of partner technologies as well as open source frameworks like Apache Spark™.

global dynamic consulting

Reveal utilizes Confluent’s product, Apache Kafka. Kafka’s key strength is the ability to make high volume data available as a real-time stream for consumption in systems with very different requirement. Apache Kafka is a distributed publish-subscribe messaging system that is designed to be fast, scalable, and durable. Kafka’s flexibility makes it ideal for a wide variety of use cases, from replacing traditional message brokers, to collecting user activity data, aggregating logs, operational application metrics, and device instrumentation. Kafka’s key features include the Hadoop scale, fast ingest, Always-on reliability, Support for high currency and multi-tenacity, and security.

global consulting companies

Reveal is partnered with DMI because of their mobile capabilities, specifically their EndZone application which will be used in Reveal’s Smart Cities Project. Aware, responsive, and safe, EndZone delivers an enterprise-class mobile precision situational awareness solution to manage emerging threats in high risk areas. EndZone is a scalable, cloud or on-premise solution that provides the capability for networked communications (4G, LTE, Bluetooth, Wi-Fi, Coverage on Wheels (COW), and satellite) to align with location-based technology while keeping individuals safe during a crisis.

End Zone’s Key Takeaways:

  • Lightweight, easily deployable, and mobile centric, EndZone can be operated securely from any mobile device.
  • EndZone utilizes the map as the main point of reference for monitoring that leverages Dynamic Geofencing, multi-streaming video, and integrated telephone.
  • EndZone efficiently integrates into complex IT architectures and Software & IoT extensions that can accommodate facial recognition, biometrics, wearables, drones, beacons, sensors, and other connected products.
  • EndZone leverages two-way, FIPS 140-2 encrypted communication and a secure & scalable cloud architecture with automatic failover.
  • Because threats can happen at anytime, EndZone offers 24X7 global service center support.
global education consulting

Modeling and simulation of communication systems are essential for users to develop implement and analyze a network in real-time without the risks. To meet the need, SCALABLE developed the EXata communications system simulation software. EXata is a comprehensive suite of tools for emulating large wired and wireless networks. EXata provides a cost-effective and easy-to-use alternative to physical testbeds that typically have high equipment costs, complex setup requirements and limited scalability.

The user is able to work with a high performance, high fidelity, communications system simulation engine, in which an extremely accurate “virtual” models environment can be created, and then analyzed through a series of scenarios to identify where there are weak points or failure modes that need to be addressed. This allows for a lab-based risk reduction work environment that is repeatable, verifiable and highly cost effective.

EXata’s ability to provide communications visualization and communications system simulations is why the US Navy chose to leverage EXata simulation software to implement underwater communications modeling and communications visualization. EXata will model acoustic and optical communications and will help the Navy to analyze and assess network performance including Anti-Access/Area Denial (A2/AD) and Disconnected, Interrupted, and Low-bandwidth (DIL) environments.

EXata and the US Navy are able to prepare for future warfare and find new and innovative ways to make use of underwater communications. Unmanned underwater vehicles (UUVs) hold promise for stealthy surveillance, particularly in areas that pose difficulties for submarines such as shallow waters and channels. However, the underwater communication environment that is needed for command and control, and transfer of sensor data has its own set of challenges. Acoustic channels are subject to distortion, multipath effects, and noise, and have very low data rates. Underwater laser can achieve high data rates but is very limited in range due to absorption in sea water. UUVs have limited battery life and must return to underwater stations to recharge and transfer data, which must then be transferred to the surface or shore. Swarms of UUVs will need to be controlled in hostile environments.

EXata will model acoustic and optical communications, while Scenario Player will provide communications visualization to help the Navy analyze and assess network performance including Anti-Access/Area Denial (A2/AD) and Disconnected, Interrupted, and Low-bandwidth (DIL) environments. EXata will enable analysis of underwater network resiliency and self-healing performance, and help the Navy to develop network policies that will assure missions.

global consulting organization

Reveal is partnered with SafeNet for their ability to protect and encrypt data in transit, and at rest. A centralized solution will enable Government Network Operators and Commercial clients to protect and manage both the data and keys. Secure the data by encrypting or tokenizing it, while controlling access to the protected data. Protect keys by managing the full key lifecycle (generation, distribution, rotation, deletion, etc.) and establishing granular policies to control access to the data. To be a truly secure solution, it is imperative keys are stored separately from the data.

Data at Rest – Encrypt sensitive data located in any of the following places:

  • Application and web servers
  • File servers
  • Databases
  • Network attached storage

SafeNet’s key capabilities include:

  • Access Management
  • Encryption
  • Cryptographic Key Management
international global consulting

Arcadia Enterprise is the only BI platform that integrates with Confluent KSQL to provide real-time visualizations on Apache Kafka topics. All other BI technologies require dumping real-time data into a staging store, thus defeating the advantage of streaming analytics.

Arcadia data is a Hadoop Analytics platform, runs in-cluster to take advantage of the power of your data nodes.

Arcadia Data provides mapping capabilities to give you extra visual context with geospatial data when analyzing your data. Integration with Mapbox GL gives you the speed, scale, and flexibility to get insights from your geocoded big data.

Reveal leverages Arcadia’s powerful visualization capability to provide their clients with various charts, tables, heatmaps, and more to give users a clear understanding of their data.