{"id":1114,"date":"2013-12-30T13:55:09","date_gmt":"2013-12-30T14:55:09","guid":{"rendered":"http:\/\/sites.uac.pt\/amendes\/?p=1114"},"modified":"2013-12-30T13:55:09","modified_gmt":"2013-12-30T14:55:09","slug":"big-data-scoopit","status":"publish","type":"post","link":"https:\/\/sites.uac.pt\/amendes\/data-mining\/big-data-scoopit\/","title":{"rendered":"noticias, textos e tudo o mais sobre big data"},"content":{"rendered":"<div id=\"attachment_1115\" style=\"width: 193px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1115\" class=\"size-full wp-image-1115\" src=\"http:\/\/sites.uac.pt\/amendes\/files\/2013\/12\/scoopit.png\" alt=\"muito material interessante sobre big data\" width=\"183\" height=\"71\" \/><\/a><p id=\"caption-attachment-1115\" class=\"wp-caption-text\">muito material interessante sobre big data<\/p><\/div>\n<div id=\"titleAndDescription\">\n<div id=\"themeTitle\">\n<h1><a id=\"themeTitleA\" href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\"> Big Data Security Analytics <\/a><\/h1>\n<\/div>\n<div id=\"themeDescription\">Covering Cyber Situational Awareness, Security Analytics, Visibility and Intelligence Sharing<\/div>\n<div id=\"themeAuthor\">Curated by                 <a href=\"http:\/\/www.scoop.it\/u\/cysap\"> cysap <\/a><\/div>\n<div>\n<div id=\"edit-topic-tags-widget-popup-container\">\n<div id=\"topic-tags-widget\">\n<div>\n<div>\n<h2><a>Popular Tags<\/a><\/h2>\n<\/div>\n<\/div>\n<div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Insights+from+Industry\"> <span>Insights from Industry<\/span> <span>169<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Guides+and+Best+Practices\"> <span>Guides and Best Practices<\/span> <span>116<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Predictive+Analytics\"> <span>Predictive Analytics<\/span> <span>71<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Operational+Intelligence\"> <span>Operational Intelligence<\/span> <span>43<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Intelligence+Sharing\"> <span>Intelligence Sharing<\/span> <span>41<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Threat+Intelligence\"> <span>Threat Intelligence<\/span> <span>40<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Vendor+-+Splunk\"> <span>Vendor &#8211; Splunk<\/span> <span>40<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Analyst+Firms\"> <span>Analyst Firms<\/span> <span>36<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Case+Study\"> <span>Case Study<\/span> <span>33<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Vendor+-+IBM\"> <span>Vendor &#8211; IBM<\/span> <span>30<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=You+Tube\"> <span>You Tube<\/span> <span>30<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Webcast\"> <span>Webcast<\/span> <span>29<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Fraud+Analytics\"> <span>Fraud Analytics<\/span> <span>25<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Vendor+-+RSA\"> <span>Vendor &#8211; RSA<\/span> <span>22<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Visualisation\"> <span>Visualisation<\/span> <span>19<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Machine+Data+Analytics\"> <span>Machine Data Analytics<\/span> <span>18<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Hadoop\"> <span>Hadoop<\/span> <span>17<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Research\"> <span>Research<\/span> <span>17<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Vendor+-+21CT\"> <span>Vendor &#8211; 21CT<\/span> <span>15<\/span> <\/a><\/div>\n<div><a href=\"http:\/\/www.scoop.it\/t\/big-data-security-analytics\/?tag=Netflow\"> <span>Netflow<\/span> <span>13<\/span> <\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Big Data Security Analytics Covering Cyber Situational Awareness, Security Analytics, Visibility and Intelligence Sharing Curated by cysap Popular Tags Insights from Industry 169 Guides and Best Practices 116 Predictive Analytics 71 Operational Intelligence 43 Intelligence Sharing 41 Threat Intelligence 40 Vendor &#8211; Splunk 40 Analyst Firms 36 Case Study 33 Vendor &#8211; IBM 30 You [&hellip;]<\/p>\n","protected":false},"author":159,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[103,150],"tags":[174,171],"class_list":["post-1114","post","type-post","status-publish","format-standard","hentry","category-data-mining","category-materiais-para-profissionais","tag-big-data","tag-dw-bi"],"_links":{"self":[{"href":"https:\/\/sites.uac.pt\/amendes\/wp-json\/wp\/v2\/posts\/1114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.uac.pt\/amendes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.uac.pt\/amendes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.uac.pt\/amendes\/wp-json\/wp\/v2\/users\/159"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.uac.pt\/amendes\/wp-json\/wp\/v2\/comments?post=1114"}],"version-history":[{"count":2,"href":"https:\/\/sites.uac.pt\/amendes\/wp-json\/wp\/v2\/posts\/1114\/revisions"}],"predecessor-version":[{"id":1117,"href":"https:\/\/sites.uac.pt\/amendes\/wp-json\/wp\/v2\/posts\/1114\/revisions\/1117"}],"wp:attachment":[{"href":"https:\/\/sites.uac.pt\/amendes\/wp-json\/wp\/v2\/media?parent=1114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.uac.pt\/amendes\/wp-json\/wp\/v2\/categories?post=1114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.uac.pt\/amendes\/wp-json\/wp\/v2\/tags?post=1114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}