Search results

  1. Splunk App for Enterprise Security and PCI Compliance Correlation Search Drill-downs

    of events and uses statistical commands on aggregate sets of data. From ... hours ago over the previous hour's data, how can they view ... search that uses a statistical command to look at an aggregate set of data. ...

    Anshu - 08/10/2017 - 08:53

  2. Splunking the Linux Audit System

    into Linux audit logs using Splunk. A little background on the Linux Audit ... within Splunk. Some of the more common use cases for Audit include: ... * On-Boarding Audit logs Linux audit logs should be ingested into Splunk using ...

    Naveed - 08/04/2015 - 09:48

  3. Security Vulnerabilities- Who is to blame?

    What used to be an occasional attack on celebrity computer systems, ... to protect information and other critical assets. How do each of these play ... defines the who, what, where, when, and how an object is to be met, ...

    Rishi - 04/21/2015 - 13:11

  4. Drupal Commerce Marketplace: Filling in the Missing Pieces (Part One)

    a multistore framework- a host site for various merchants in a marketplace (think ... the host site owner on the individual merchants: i.e. revenue by store, ... the business use case for a recent client was challenging. Drupal Commerce 2.x ...

    Hani - 04/26/2017 - 08:42

  5. Why Do You Need a Project Management Office?

    Select and maintain project management tools for use by employees   Next ... office and how to overcome them. To be continued.... project management ...

    Sarika - 02/12/2015 - 13:45

  6. AI & The Redefinition of Content

    content?   Where has it been?   How was it used?   What has it influenced? ... do we want to build an ecosystem as far-reaching as possible using ... explore how machine learning can redefine content.   First, let's find ...

    marianne - 11/21/2017 - 08:42

  7. Claims-Based Authentication for SharePoint 2010

    However, different systems use different authentication systems ... directories/databases that an organization uses to store its user accounts ... as "federation trusts") that these organizations can use to project ...

    Somen - 06/17/2014 - 13:41

  8. Data Model Acceleration Enforcement

    "Data Models."  Here’s how it works: Through the user interface: I will be using one of the default data models found within the Splunk App ... within inputs.conf.  Let’s use the “Network Traffic” data model again ...

    Kevin - 03/29/2016 - 09:16

  9. Intellectual Property! Patents! Copyrights! Trade Secrets! Trademarks! Oh My!

    Image: FreeDigitalPhotos.net These five terms are often used ... will define what each of these terms mean and provide an overview how they can ... and trade secrets can be used to protect the technology itself, while ...

    Vidhya - 06/17/2014 - 15:20

  10. Best Practices for your Splunk Deployment: Indexer Performance

    starts from a utility used by your Systems Administrator to find ... tool used by the leaders of your organization.  Splunk as an enterprise ... Find out how may silos of Splunk installs you have in your organization, ...

    Sandeep - 07/06/2016 - 10:17

Stay In Touch