Blog Archives

Everything generates data: Capturing WIFI anonymous traffic using Raspberry Pi and WSO2 BAM (Part III)

After configuring the Raspberry Pi in monitor WIFI/802.11 mode (first blog post) and after configuring Raspberry Pi to send the 802.11 captured traffic to WSO2 BAM and Apache Thrift listener (second blog post), now I will explain how to create

Tagged with: , , , , , , ,
Posted in BAM, Big Data, IoT, Security

Everything generates data: Capturing WIFI anonymous traffic using Raspberry Pi and WSO2 BAM (Part II)

After configuring the Raspberry Pi to capture WIFI/802.11 traffic (first blog post), we have to store this traffic in a Database (NoSQL and RDBMS). Because, the idea is to process in real-time and/or batch the stored data. To capture this

Tagged with: , , , , , , ,
Posted in BAM, Big Data, IoT, Security

Everything generates data: Capturing WIFI anonymous traffic using Raspberry Pi and WSO2 BAM (Part I)

Yes, in this digital world, everything generates data, but before to do BigData, you have to follow these steps: 1. Capture Acquires, Integrates data. 2. Store Classification, Consolidate, Transformation, Storage Design, etc. 3. Analysis Exploration, visualization, modeling, prediction, etc. Everything

Tagged with: , , , , , , ,
Posted in BAM, Big Data, IoT, Security
Archives