Skip to content
Kinetica in Motion
The Kinetica Blog

What's New

Go to:

How to Deliver an Omnichannel Customer Experience by Leveraging Geospatial Data

By Rebecca Golden | March 29, 2018

In the last few years, more and more data has become available from sensors, customer’s devices, and transactions—much of it with time and location information. Organizations are eager to analyze this goldmine of information and visualize the results on maps. However, if you’ve ever tried to leverage this data with a traditional database, you most…

Smart, Connected Cities and the Impact of IoT

By Andrew Wooler | March 23, 2018

Is your city “smart” or “dumb?” Most likely, your city still has potholes peppering the streets, parking lot meters that only accept coins, and “historic” buildings that are draftier than a Maine lighthouse. However, global trends–from population growth to urbanization to improving standards of living–are forcing city planners and municipalities to deploy smart IoT solutions…

Better Together – Spark and Kinetica

By Rebecca Golden | March 15, 2018

The Spark connector is typically leveraged to ingest data into Kinetica and perform various transformations in pipeline.  A Spark DataFrame is the core type while performing ingestion. Often after a Kinetica table has been created, new fields need to be appended or existing string fields have to be expanded within a Kinetica table.  Currently users…

Kinetica on NVIDIA DGX Station Helps Rescue The Honey Bee!

By Rebecca Golden | March 13, 2018

My daughter, a high school junior, came home one day talking about her upcoming science fair, and how she was interested in addressing a serious problem with the domestic honey bee. Apparently, domestic honey beehives are collapsing at an alarming rate due to parasitic mites called Varroa, and she provided a theory that a healthier…

How Kinetica Can Be Used to Thwart Cyber Attacks Around the World

By Amit Vij | March 1, 2018

  When leading cybersecurity expert Neil Rerup commented, “True cybersecurity is preparing for what’s next, not what was last,” he hit the nail on the head. In the past, the security tools that organizations relied on were really more reactive than proactive, and they lacked the bandwidth needed to deal with massive amounts of data…