Splunk

When to Use Reverse ETL and when it is an Anti-Pattern

This blog post explores why software vendors (try to) introduce new solutions for Reverse ETL, when Reverse ETL is really…

3 years ago

Kafka for Cybersecurity (Part 6 of 6) – SIEM / SOAR Modernization

This blog series explores use cases and architectures for Apache Kafka in the cybersecurity space, including situational awareness, threat intelligence,…

3 years ago

Kafka for Cybersecurity (Part 3 of 6) – Cyber Threat Intelligence

This blog series explores use cases and architectures for Apache Kafka in the cybersecurity space, including situational awareness, threat intelligence,…

3 years ago

Kafka for Cybersecurity (Part 1 of 6) – Data in Motion as Backbone

This blog series explores use cases and architectures for Apache Kafka in the cybersecurity space, including situational awareness, threat intelligence,…

3 years ago

Pulsar vs Kafka – Comparison and Myths Explored

Pulsar vs Kafka - which one is better? This blog post explores pros and cons, popular myths, and non-technical criteria…

4 years ago

Comparison Of Log Analytics for Distributed Microservices – Open Source Frameworks, SaaS and Enterprise Products

Log Analytics is the right framework or tool to monitor for Distributed Microservices. Comparison of Open source, SaaS and Enteprrise…

8 years ago

Framework and Product Comparison for Big Data Log Analytics and ITOA

Slide deck from OOP 2016: Comparison of Frameworks and Products for Big Data Log Analytics and ITOA, e.g. Open Source…

9 years ago