Posts Tagged ‘splunk’

Web Server Data Analysis Using Splunk

Business Scenario: In an e-commerce website, we have certain queries such as how many customers are visiting a particular product but not purchasing the product. What are the reasons for not purchasing the product? Maybe the price of the product is too high? What products have customers added to their cart but not purchased? This […]

Time for a Splunk Health Assessment?

Over time, a Splunk environment can become unstable due to environment complexity and configuration concerns. Common issues include distributed deployments, misconfigurations, configuration file creep, partially correct data on-boarding, poor query construction, improperly sized systems, log files containing multiple formats, date/time skew, user rights, and many other factors. Splunk environments should be reviewed on a periodic […]

Telecom Implements Splunk to Help with Network Optimization

It’s no secret that data is accelerating at a dramatic pace in terms of volume, velocity, variety, and variability. According to International Data Corporation (IDC), unstructured data accounts for more than 90% of the information in today’s organizations and its use is accelerating. Of the many different types of Big Data and unstructured data, machine data […]

4 Security Takeaways from the FBI

4 Security Takeaways From The FBI

As IT consultants, we’re pretty sure that we’re smart enough to recognize phishing attacks against us. We all get emails asking us to open invoices, confirm our bank account information, or perform other actions designed to separate us from our credentials and our money. But according to a consultant specializing in penetration testing, 40% of us will still […]

3 BI And Analytics Trends That Are Hard To Deny

  According to IBM, we generate 2.5 quintillion bytes of data every day. And, 90% of the data that exists today, whether found in your clinical systems, on social media, or on your mobile devices, has been gathered within the last two years. All of that is what we call “big data.” As the volume […]

Thanks Godfrey Sullivan, First Ballot Hall of Famer

“Godfrey, I think history is going to judge you as one of the truly iconic Silicon Valley CEOs.” –Greg McDowell, JMP Securities Analyst (11/19/2015) With Splunk’s Q3 earnings release was the additional announcement that Godfrey Sullivan would be handing over the CEO reins to Doug Merritt. I don’t know Silicon Valley history enough to confirm […]

Cyber Security Awareness Month brings plenty of awareness

October 1st marked the beginning of the United States’ National Cyber Security Awareness month.  Three days into the month, awareness is exactly what we have. Last week, Experian and T-Mobile announced a significant data breach.  What’s worse is that the hackers were able to maintain the breach for over two years.  T-Mobile CEO John Legere, […]

Big Data and the Skies

Earlier this week, I read a news article about the use of Twitter, or more accurately, the use of data collected from Twitter to prohibit a passenger from boarding a United Airlines flight. Strangely enough, the person banned from the flight was probably among the people who should know the most about cyber-security and perceived […]

security and development

The New National Emergency: Cyber Threats

In a blog post earlier this year, I discussed the increasing role data security is playing in the world today.  As mentioned in the article, 2014 was dubbed the “Year of the Data Breach”.  Around the time of the post, Sony had just been hacked.  Subsequently we learned there was credible evidence the cyber-attack was […]

What is Your Big Data Strategy…?

Big Data is big deal. Every vendor has a strategy and a suite of products. Navigating the maze and picking the right Big Data platform and tools takes some level of planning and looking beyond techie’s dream product suite. Compounding the issue is the open source option vs. going with a vendor version of the […]

An Architectural Approach to Cognos TM1 Design

Overtime, I’ve written about keeping your TM1 model design “architecturally pure”. What this means is that you should strive to keep a models “areas of functionality” distinct within your design. Common Components I believe that all TM1 applications, for example, are made of only 4 distinct “areas of functionality”. They are absorption (of key information […]

A Practice Vision

Vision Most organizations today have had successes implementing technology and they are happy to tell you about it. From a tactical perspective, they understand how to install, configure and use whatever software you are interested in. They are “practitioners”. But, how may can bring a “strategic vision” to a project or to your organization in […]

Load More