Skip to main content
false

Learn Blogs

Latest Articles

Learn 7 Min Read

What is the Augmented Connected Workforce?

This article provides an overview of the Augmented Connected Workforce, detailing the use cases of AR and other key technologies, along with the key benefits and challenges associated with this concept.
Learn 8 Min Read

Data Logging: An Introductory Guide

In this blog post, we’ll cover an overview of data logging, including its key components, types, applications, and best practices for success.
Learn 7 Min Read

What is Fraud Detection and Prevention?

In this comprehensive guide, we will explore fraud detection and prevention strategies that can help mitigate the risks associated with fraudulent activities.
Learn 16 Min Read

Splunk Cheat Sheet: Query, SPL, RegEx, & Commands

In this blog post we'll cover the basics Queries, Commands, RegEx, SPL, and more for using Splunk Cloud and Splunk Enterprise
Learn 5 Min Read

SysAdmins: System Administrator Role, Responsibilities & Salary

System administrators (aka sysadmins) maintain the networks, servers and technology that support your entire business. Read on to understand this vital role.
Learn 6 Min Read

Risk Tolerance vs. Risk Appetite Explained

Risk Tolerance and Risk Appetite are two fundamental concepts for businesses to define today. Get the full story on these concepts here.
Learn 4 Min Read

Multi-Stage Attacks & How To Detect Them

Today's cyberattacks are sophisticated: there are multiple steps to take in order to have a huge impact. Get ahead of each step with this primer on detecting multistage attacks.
Learn 4 Min Read

The Digital Immune System (DIS) Explained

A strategic trend per Gartner, the digital immune system is a framework for ensuring your business resilience and health. Get the full story on this concept here.
Learn 8 Min Read

Data Observability: The Complete Introduction

Get the complete story on data observability here: what itis, the 5 pillars, benefits & implementing — and best of all, ALL the things you can do with it.
Learn 6 Min Read

Active vs. Passive Monitoring: What’s The Difference?

Active and passive monitoring: which one is for you? Let’s look at the two methods, along with their use cases, data volumes, and control over the data.
Learn 5 Min Read

Deployment Frequency (DF) Explained

Deploying changes to production is the only way end-users will see improved software. Learn about the deployment frequency (DF) metric from DORA here.
Learn 4 Min Read

What Is Human Centric Software?

Human centric software is a way of designing software for both tangible metrics and harder to measure concepts like user preference & satisfaction.
Learn 3 Min Read

Dogfooding: AKA drinking your own champagne, or eating your own ice cream

In this blog post we'll take a quick look at the history, benefits, challenges, and language of dogfooding.
Learn 5 Min Read

Infrastructure Management & Lifecycle Explained

Managing your IT infrastructure is a critical aspect of your business, even if you don't think it is. See how a 4-phase approach covers the entire span of the infrastructure management practice.
Learn 11 Min Read

AWS re:Invent Conference

Want to see what AWS re:Invent is all about? Check out this guide to AWS Re:Invent, along with details on Splunk's speakers, demos, and special events!
Learn 16 Min Read

IT Spending & Budgets: Trends & Forecasts 2024

In this blog post we'll look at IT spending trends & forecasts from top analysts and prognosticators for 2024.
Learn 3 Min Read

DNS Security: How It Works & Top DNS Risks Today

When 90% of businesses are victims of DNS attacks, you need to know about DNS security. Get the full story, including the top DNS risks, in this article.
Learn 4 Min Read

Policy as Code (PaC) Defined

Simplify how your software builds in policy. Policy as Code is one way to fold in security, compliance, audit and other policies into the software you're building.
Learn 4 Min Read

SOCs: Security Operation Centers Explained

SOC is a centralized location where security professionals build and maintain the security architecture that monitors, detects, analyzes and responds to cybersecurity incidents and threats, typically around the clock.
Learn 4 Min Read

Democratized Generative AI: Revolutionizing Knowledge Work

In this blog post, we'll take a look at the increasingly popular topic of Democratized Generative AI and how its transforming the way people work.
Learn 7 Min Read

What is Performance Engineering?

Engineering for optimized app, system & IT performance: that's how we can summarize performance engineering. Get the full story, tips & best practices here.