Blog

Machine Data: The True North in Digital Transformation

Pundits have been talking about ‘digital transformation’ since at least 1999, but it is a difficult concept to pin down, much less execute. Yet in …

Machine Data: The True North in Digital TransformationRead More »

Real-time IoT Analytics

What does the IoT actually look like, in real-time

Most of us intuitively visualize people and social networks with a relationship graph, yet few of us extend the analogy to the IoT space. There …

What does the IoT actually look like, in real-timeRead More »

Real-time IoT Analytics

What does the IoT actually look like, in real-time

Most of us intuitively visualize people and social networks with a relationship graph, yet few of us extend the analogy to the IoT space. There …

What does the IoT actually look like, in real-timeRead More »

Real-time IoT Analytics

Will IoT Drown in a Data Lake? It’s Time for the Event Lake

We see IoT being applied everywhere from wind farms to medical devices to smart home devices. Yet all the myriad use cases have one thing …

Will IoT Drown in a Data Lake? It’s Time for the Event LakeRead More »

Real-time Threat Hunting

Using Statistical Pattern Learning to Find the Method in Attackers’ Madness

With attackers getting more sophisticated and diabolical by the day, one of the scariest problems is that some of the most devastating intrusions may not …

Using Statistical Pattern Learning to Find the Method in Attackers’ MadnessRead More »

Real-time Threat Hunting

Beyond Analysis: Intelligent Security Requires Real-time Actionable Insights

The standard approach to Big Data in cyber security is like the police investigating a crime scene: analyzing the past. Similarly, we see companies are …

Beyond Analysis: Intelligent Security Requires Real-time Actionable InsightsRead More »

Real-time Threat Hunting

In the “Hot” Seat: Stuck with Cold Data Tiering

There seems to be no limit to the ingenuity of today’s cyber attacks, which are increasingly capable of finding and exploiting any weakness in your …

In the “Hot” Seat: Stuck with Cold Data TieringRead More »

Real-time Threat Hunting

In the “Hot” Seat: Stuck with Cold Data Tiering

There seems to be no limit to the ingenuity of today’s cyber attacks, which are increasingly capable of finding and exploiting any weakness in your …

In the “Hot” Seat: Stuck with Cold Data TieringRead More »

Real-time Threat Hunting

Modern threats respect no boundaries…and neither should your cyber security

As enterprises ingest more data at higher speeds they naturally encounter more cyber threats. But while the challenge of speed and volume is daunting enough, …

Modern threats respect no boundaries…and neither should your cyber securityRead More »

Media Coverage

When do you need an Event Stream Processing platform?

When do you need an Event Stream Processing platform? Roy Schulte The opinions expressed in this article are my own, and may not reflect the …

When do you need an Event Stream Processing platform?Read More »

Media Coverage

Report: New Logistics Pave Road for Machine Data Analytics

Report: New Logistics Pave Road for Machine Data Analytics Machine data analytics is the process of using big data from a variety of devices to …

Report: New Logistics Pave Road for Machine Data AnalyticsRead More »

1 2 6 7 8 11 12
See What Devo Can Do for You REQUEST DEMO