The latest News and Information on APIs, Mobile, AI, Machine Learning, IoT, Open Source and more!
In this How-To, we’re going to look at a specific Catchpoint synthetic monitor that helps you analyze the health of systems built around the Internet of things (IoT). Now, IoT is obviously a huge category, so in this case, we’re going to look at systems that utilize the Message Queuing Telemetry Transport or MQTT for short.
Security is an essential part of any modern IT foundation, whether in smaller shops or at enterprise-scale. It used to be sufficient to implement rules-based software to defend against malicious actors, but those malicious actors are not standing still. Just as every aspect of IT has become more sophisticated, attackers have continued to innovate as well. Building more and more rules-based software to detect security events means you are always one step behind in an unsustainable fight.
According to the Association of Certified Fraud Examiners, the money lost by businesses to fraudsters amounts to over $3.5 trillion each year. The ACFE's 2016 Report to the Nations on Occupational Fraud and Abuse states that proactive data monitoring and analysis is among the most effective anti-fraud controls.
Zero Trust security. Some would say it’s the latest and greatest buzzword and this disposition is understandable given the amount of jargon introduced into the Information Technology market each year. With vernacular being used interchangeably like “AI,” “Machine Learning,” and “Deep Learning,” these words get stripped of their real significance.
The last few years has been a time of major disruption in the Finserv sector. Artificial Intelligence (AI) technology has emerged as an important tool for providers of financial products and services to deliver more personalised and more sophisticated services to customers faster. The financial services sector is at the beginning of an exciting journey with AI – a journey that we believe will spark a revolution and redefine financial services.
Here at Splunk we’re passionate about helping our customers get as much value from their data as possible. Recently Lila Fridley has written about how to select the best workflow for applying machine learning and Vinay Sridhar has provided an example of anomaly detection in SMLE.
The phone app for mobile access to Alloy Navigator™ ITSM software keeps getting better and gains more features with every update. This time around, the mobile app takes on change management to help your team request infrastructure or process-related changes and take action on approval requests using phones or tablets.