Context
The problem
Browsing-log data can support several product paths, but only when ingestion, validation, enrichment, threat classification, and analytics preparation are separated cleanly enough to operate and evolve.
This work is separate from mobile tower network-event systems. It focuses on browsing logs and domain/URL signals: NiFi-heavy ingestion, AI threat-analysis outputs, safe-browsing classification, audience management, cohort creation, and queryable analytical datasets.