Our Data Services practice is led by one of the most sought after Consulting Engineers in the Big Data Analytics industry with a six year track record of success with some of the largest domestic and global clients across multiple industries. We recommend scheduling project planning calls with us as soon as new projects can be defined in order to ensure availability of resources.

In The News

Skills shortage
The Risks And Far-Reaching Impacts Of The Cybersecurity Skills Shortage
The Risks And Far-Reaching Impacts Of The Cybersecurity Skills Shortage By Richard...
Intel Announces First Quantum Computing Testing Tool
Intel and partners Bluefors and Afore have created a cryoprober, named the Cryogenic Wafer...
PKMS2
Secure Channels Releases Peer Review Report Validating Patented PKMS2
Secure Channels Inc. Releases Peer Review Report on Security Analysis Independently Validating...

Warning: Malware, rogue users can spy on some apps’ HTTPS crypto – by whipping them with a CAT o’ nine TLS

By Thomas Claburn in San Francisco 1 Dec 2018 at 01:00 20  SHARE ▼ Crypto boffins have found a...
DATA DEMONS

Richard Blech on Data Demons

From the Orange County Register: DATA DEMONS Richard Blech, CEO of tech security specialists...

HTTPS Isn’t Always as Secure as It Seems

Widespread adoption of the web encryption scheme HTTPS has added a lot of green padlocks—and...

Data Services and your Business

ETL Optimization

Recommending the right tool mix for the successful ingestion, transformation and publishing of data to operational and analytics users for downstream consumption for such tools as Informatica and Tableau, and analytics users such as KNIME and Spark.

Cluster Heath Check and Performance Optimization

Performing detailed analysis of existing environments and make actionable recommendations to improving operational efficiency and return on technology investments.

Data Migration

Project lead data migrations from one big data distribution to another with zero downtime and a smooth transition for customer’s staff and customers.

ZFS Deployment and Migration

Performing deployments and migrations to the ZFS file system which has features and benefits not found in any other non-distributed file system available today and is an excellent file system for demanding applications such as Percona/MySQL and other, critical infrastructure services.

Technology in the News

Is Your Encryption Flexible Enough? – Cyber Defense Magazine

The science of modern cryptography utilizes mathematics as the basis for transforming information into an encoded secret that cannot be decoded or translated without the correct key. Did you enjoy this article? Then read the full version from the author's...

Secure Channels Launches Desktop Encryption Utility ZIPcrypt™ Featuring XOTIC

Secure Channels Launches Desktop Encryption Utility ZIPcrypt™ featuring XOTIC™ extreme encryption technology and all-new “dialable” cipher-strength UNITED STATES, April 18, 2019 /EINPresswire.com/ -- IRVINE, CALIF. (April 17, 2019) – Secure Channels Inc. Did you enjoy...

HTTPS Isn’t Always as Secure as It Seems

Widespread adoption of the web encryption scheme HTTPS has added a lot of green padlocks—and corresponding data protection—to the web. Did you enjoy this article? Then read the full version from the author's...

540 Million Facebook User Records Found On Unprotected Amazon Servers

It's been a bad week for Facebook users. More than half a billion records of millions of Facebook users have been found exposed on unprotected Amazon cloud servers. Did you enjoy this article? Then read the full version from the author's...

Toyota Reveals a Second Data Breach

Watch for updates on this developing story. Toyota Motor Corp. has reported its second data breach in the past five weeks. The latest incident, revealed Friday, may have exposed data on as many as 3.1 million customers. Did you enjoy this article? Then read the full...

UCLA will pay $7.5 million in claims, cyber enhancements to settle 2015 breach

'); })(); //--> Skip to main content By Topics: Compliance & Legal, Network Infrastructure, Privacy & Security Did you enjoy this article? Then read the full version from the author's...

Quantum computing will break your encryption in a few years

Quantum computers – those that use the principles of quantum entanglement and superposition to represent information, instead of electrical bits – are capable of performing certain types of calculation orders of magnitude more quickly than classical, electronic...

Nielsen warns US ‘not prepared’ for foreign cyberattacks

Homeland Security Secretary Kirstjen Nielsen on Monday called for the U.S. to take on a “whole of society” approach to combat cyber threats, saying the U.S. “is not prepared” to handle hackers backed by other countries. “It’s not just U.S. Did you enjoy this article?...

These Are the Worst Corporate Hacks of All Time

As business processes and personal information move online, the number of data hacks is growing. Some are minor and go undetected, while others are so major that they can put an entire company at risk. Hacks ranged from a few million records exposed to several...

North Korea Is Still Trying to Hack US Critical Infrastructure

The ongoing cyber campaign seeks to infiltrate defense, financial, energy, telecom, and healthcare firms. Did you enjoy this article? Then read the full version from the author's...

SCI Solutions Using Data Services Technology

SCI Subsidiaries Using Data Services Technology

What is Data Services?

Cluster Design and Implementation

Working with customers to determine the optimal tool mix and topology delivering highly-available, production-ready frameworks, able to handle the most demanding and scalable workloads from day one.

Mentoring and Training

Mentoring and training big data staff and data scientists enabling companies to optimize returns on their big data investments.

Data Science Services

Performing use case discovery, model development and training, developing production ready machine learning, documented and ready to deploy, adding intelligence to business operations while enriching the value of existing data. Real-time streaming solutions with repeatable, verifiable results with world class training and documentation.

 

White Papers & Resources