Paul and Dhiren from the Discovered Intelligence team won the first annual IoT (Internet of Things) Hackathon at the Splunk Partner Technical Symposium in New Orleans last week. The hackathon called for the creation of a fleet management system, using open data sources from the Ford GoBike Bay area bike share program. Using this data […]
Author Archive for: Discovered Intelligence
About Discovered Intelligence
This author has yet to write their bio.Meanwhile lets just say that we are proud Discovered Intelligence contributed a whooping 16 entries.
Entries by Discovered Intelligence
Aura Asset Intelligence™ from Discovered Intelligence, leverages our domain and security expertise to deliver real-time asset discovery and intelligence; helping security teams quickly discover and report on assets within their enterprise.
Team members of Discovered Intelligence were recognized for their global Splunk domain expertise at this years’ Splunk Conference in Las Vegas, scooping no less than two awards – Splunk Ninja and Splunk Developer! Our highly skilled DI team members have now been recipients of Splunk awards since 2012.
Looking to master your Operational data? Authored by leading experts from Discovered Intelligence; the new Splunk Operational Intelligence Cookbook provides hands-on, easy to follow recipes that will have you mastering Splunk and discovering new insights from your operational data in no time. Leveraging our years of expertise, the book is filled with best practices and packed […]
sendresults is an immensely powerful, life-changing Splunk command developed by Discovered Intelligence, that allows you to send tabulated search results to individuals dynamically, based upon the data within the results. This means that you no longer need to hardcode an email into the search, but can evaluate the email addresses instead.
Discovered Intelligence has developed a simple Splunk command for identifying Heartbleed vulnerabilities! This CIM-Compliant Technology Add-on (TA-Heartbleed) contains a new heartbleedtest Splunk command that can be used to check your internal infrastructure and external websites for the recently announced Heartbleed vulnerability.
The following blog posting provides guidance on steps that can be taken to secure and harden Splunk environments. Many of the security feature essentially follow security best practices, while others would probably only be implemented if there was a business or regulatory need to do so.
Splunk DB Connect is designed to deliver reliable, scalable, real-time integration between Splunk Enterprise and relational databases. Essentially, it lets you query a relational database from within Splunk and return the results. As DB Connect leverages JDBC/ODBC to perform such a function, would it be possible to use DB Connect to query data sitting in […]
There are many different methods and tools for interacting and querying data within Hadoop. The most widely used tools allow for SQL based querying of the data. The following article summarises a great comparison by MapR of the most common SQL on Hadoop technologies available today.
Splunk’s recently announced version 3.0 of its popular Splunk Application for Enterprise Security has come of age, delivering powerful functionality with a slick user experience.
From Our Blog
- Hey #SplunkLive Toronto attendees! We are pleased to offer a discount on our best selling #Splunk book, the Splunk… https://t.co/LFGF0NureL 2 months ago
- Today's the day! #SplunkLive! Toronto is here! Be sure to stop by the Discovered Intelligence booth and ask the tea… https://t.co/Eu4peqsuXO 2 months ago