SlideShare a Scribd company logo
quocirca
Clarifyingthe business impact oftechnology
Masters of Machines II
Conquering complexity with
operational intelligence
Bob Tarzey
Analyst and Director
Quocirca
Matt Davies
Head of EMEA Marketing
Splunk
@mattdavies_uk
@tarzey
Agenda
IntroductiontoOperationalIntelligence
MastersofMachines2015
OIinaction– customerexamples
Finding the value in your data
Common benefits & benchmarks from 500 engagements worldwide
IT Operations
15-45% reduction in high
priority incidents
70-90% reduction in
incident investigation time
67-82% reduction in
financial impact
5-20% increase in capacity
utilization
70-90% reduction in QA
defect/failure investigation
10-50% improvement in
time to market
10-50% increase in value
for key projects
70-90% faster detection
and triage of security events
70-90% reduction in
incident response time
10-50% reduction in risk of
data breach, IP theft, fraud
70-90% reduction in
compliance reporting time
Application Delivery Security & Compliance
The value of Operational Intelligence
Save money through business and IT efficiency
Manage an increasingly complex hybrid technology mix
Identify and support the right outsourcing strategy
Improving customer experience and digital services
The value of Operational Intelligence
Better decisions with real-time analytics
Empower organisations, partners, employees
Secure and protect your company, customers & information
Innovate with IoT, mobility & big data
What is Operational Intelligence?
Reactive
Proactive
Proactive
Monitoring
and Alerting
Search
and
Investigate
Operational
Visibility
Real-time
Business
Insight
OIBenchmark.com
Based on the Quocirca research – what’s your OI score?
5 minutes? Get a personalised report
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology New 2015 research into the benefits
operational intelligence
Updates 2013/14
research
Masters of Machines I
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology
Telecoms, Commerce, Gaming, Finance,
Retail, Distribution, Transport, Manufacturing
Size, roles and sectors
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology
Over priced software down 29%
Two years is a long time in IT, from 2013 to 2015
cost concerns give way to:
– IT platform management and complexity
– The customer experience, especially across multiple
channels
– IT security
Since 2013……..
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology
Increasing IT complexity
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology The move to cloud services continues apace
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology IT complexity by industry
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology
The cross-channel
customer experience
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology The channels customers choose
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology Channel complexity by sector
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology Good news – complexity drives transactions!
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology
IT security
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology The growing concern about IT security
Two drivers:
– More rate security as a concern
– More rate security as their top concern
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology
The value of operational
intelligence
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology Machine data gathered from various sources
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology
IT complexity
and the
collection of
machine data
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology IT complexity and use of
operational intelligence tools
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology Percent of machine data collected and the
use of operational intelligence tools
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology
The 4 stages of operational intelligence maturity
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology
The 4 stages of operational intelligence maturity
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology Please rate your organisation’s ability to do
the following
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology
Operational intelligence maturity index
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology Operational intelligence maturity index
by sector
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology The impact of machine data on
operational intelligence
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology Operational intelligence index and the
use of operational intelligence tools
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology
IT infrastructure
complexity and
operational
intelligence index
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology Insight into how technology issues impact
business performance
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology Higher OI Index >> greater insight in to IT and business issues
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology Emergency response capability, when an IT
performance incident is impacting business
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology Emergency response status, concern about
downtime and operational intelligence
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology
Operational
intelligence
index by
reliance of
cross-channel
experience
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology
Transaction
volumes and
operational
intelligence
index
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology
Insight into
user
behaviours
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology Insight into user behaviour
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology
The dark side: security threats and OI
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology Not all positive – the rating of security
concern and the OI index
© Quocirca 2015
quocirca–Clarifyingthebusinessimpactoftechnology
Resources:
http://www.splunk.com/en_us/resources/q
uocirca/master-of-machines.html
44
MAKE MACHINE DATA ACCESSIBLE,
USABLE AND VALUABLE TO EVERYONE.
444444
THE POWER OF
COLLECT DATA
FROM
ANYWHERE
SEARCH AND
ANALYZE
EVERYTHING
DELIVER REAL-TIME
OPERATIONAL INTELLIGENCE
TO IT AND THE BUSINESS
European organisations transforming business with Splunk
How NHS HSCIC gets
real-time insight using Splunk
Spine 2 - more than a dozen connected
national IT systems and services
Fast time to value through real-time
Operational Intelligence
Faster issue resolution and better care
for NHS patients
How Credit Suisse makes significant
savings using Splunk
Grid computing management
& monitoring
Significant savings from IT operations
& application management
Measuring CPU, memory, OS
and application metrics
How Tesco uses Splunk to accelerate
development and understand customers
Cut Investigation & Resolution time 95%,
Reduce Escalations 50%, Accelerate Dev Cycles 30%
Activity Tracking Dashboards with Improved Customer
Experience and Reduced Lost Revenue
Operational Analytics with Live Transaction Tracing
and End-to-end Infrastructure Insight
How UniCredit usesSplunkfor
Operational Intelligence
3TBs Daily Data from 100+ Data Sources
10,000 Branches, ATMs, Mobile Banking, Apps, Network
Business Planning - Customer Trends,
Market Share Analysis & Regional Business Distribution
Real-time Analytics of ATMs, Mobile Banking,
Transactions, Card Usage and Client Behavior
Sophos
Security in the cloud, UK, Splunk powers their SOC
Security analytics driven SOC
to protect the business
Splunk Cloud delivered from
within EU as SaaS
Splunk for real-time
reporting, alerting & investigation
How Sophos uses Splunk Cloud for
an analytics driven SOC
How Telenor usesSplunkfor
Enterprise Security
1TB of Daily Data with “Splunk Everything” Strategy
for Network, Security and IT Data
Detect and Prevent Security Issues
Enabling “Central Emergency Response Team”
Baseline “Normal” Monitoring of Security and
Operations – Real-time Analysis of Deviation
Track end-to-end
transactions
Monitor & model
customer behavior
Billion dollar website
business & IT dashboards
Prevent lost revenue
via machine data insight
Multi-channel Retail
Analytics
Real-time insight enables
speed of innovation
Providing trend analysis for
campaigns & advertising services
Simple analytics for
everyone in real-time
Deeper understanding of
user behavior
How Shazam listens to
its customers with Splunk
How VW visualises Connected Car Data
VW Data Labs
Connected Car program
Post-sales big data
visualization
Customer loyalty &
retention
IoT analysis & prediction
of customer needs
IT
Operations
Application
Delivery
The same data. Multiple uses. Maximum value.
Business
Analytics
Industrial Data
and IoT
Security
and Fraud
FREE
ONLINE TRIAL
FREE
DOWNLOAD
FREE
AMAZON MACHINE
IMAGES (AMI)
Easy to Try & Get Started
1 32
OIBenchmark.com
Based on the Quocirca research – what’s your OI score?
5 minutes? Get a personalised report
Thank You

More Related Content

What's hot

Alondra | Powering Digital Distribution by everis (Insurance)
Alondra | Powering Digital Distribution by everis (Insurance)Alondra | Powering Digital Distribution by everis (Insurance)
Alondra | Powering Digital Distribution by everis (Insurance)
everis
 
Emergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementEmergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and Management
HCL Technologies
 
The Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the ManufacturerThe Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the Manufacturer
USA Firmware, LLC
 
Tower Operations Centre - Architecture & Blueprint
Tower Operations Centre - Architecture & BlueprintTower Operations Centre - Architecture & Blueprint
Tower Operations Centre - Architecture & Blueprint
Shahid Abbasi
 
Splunk Überblick
Splunk ÜberblickSplunk Überblick
Splunk Überblick
Splunk
 
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the EnterpriseNZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
IBM z Systems Software - IT Service Management
 
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)
GE코리아
 
IoT Services and Solutions - Brochure by RapidValue
IoT Services and Solutions - Brochure by RapidValueIoT Services and Solutions - Brochure by RapidValue
IoT Services and Solutions - Brochure by RapidValue
RapidValue
 
Industry 4.0 & the next generation: Towards a smart factory
Industry 4.0 & the next generation: Towards a smart factoryIndustry 4.0 & the next generation: Towards a smart factory
Industry 4.0 & the next generation: Towards a smart factory
Bluecrux
 
Delivering Business Value from Operational Inisights at ING Bank
Delivering Business Value from Operational Inisights at ING BankDelivering Business Value from Operational Inisights at ING Bank
Delivering Business Value from Operational Inisights at ING Bank
Splunk
 
Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT Operations
Splunk
 
Trends in AML Compliance and Technology
Trends in AML Compliance and TechnologyTrends in AML Compliance and Technology
Trends in AML Compliance and Technology
SAS Institute India Pvt. Ltd
 
Elitia_IoT_capabilities
Elitia_IoT_capabilitiesElitia_IoT_capabilities
Elitia_IoT_capabilities
sisanche
 
Spectos Live Tracking Solutions for Postal & Logistics
Spectos Live Tracking Solutions for Postal & LogisticsSpectos Live Tracking Solutions for Postal & Logistics
Spectos Live Tracking Solutions for Postal & Logistics
Nadia Hilger
 

What's hot (14)

Alondra | Powering Digital Distribution by everis (Insurance)
Alondra | Powering Digital Distribution by everis (Insurance)Alondra | Powering Digital Distribution by everis (Insurance)
Alondra | Powering Digital Distribution by everis (Insurance)
 
Emergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementEmergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and Management
 
The Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the ManufacturerThe Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the Manufacturer
 
Tower Operations Centre - Architecture & Blueprint
Tower Operations Centre - Architecture & BlueprintTower Operations Centre - Architecture & Blueprint
Tower Operations Centre - Architecture & Blueprint
 
Splunk Überblick
Splunk ÜberblickSplunk Überblick
Splunk Überblick
 
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the EnterpriseNZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
 
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)
 
IoT Services and Solutions - Brochure by RapidValue
IoT Services and Solutions - Brochure by RapidValueIoT Services and Solutions - Brochure by RapidValue
IoT Services and Solutions - Brochure by RapidValue
 
Industry 4.0 & the next generation: Towards a smart factory
Industry 4.0 & the next generation: Towards a smart factoryIndustry 4.0 & the next generation: Towards a smart factory
Industry 4.0 & the next generation: Towards a smart factory
 
Delivering Business Value from Operational Inisights at ING Bank
Delivering Business Value from Operational Inisights at ING BankDelivering Business Value from Operational Inisights at ING Bank
Delivering Business Value from Operational Inisights at ING Bank
 
Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT Operations
 
Trends in AML Compliance and Technology
Trends in AML Compliance and TechnologyTrends in AML Compliance and Technology
Trends in AML Compliance and Technology
 
Elitia_IoT_capabilities
Elitia_IoT_capabilitiesElitia_IoT_capabilities
Elitia_IoT_capabilities
 
Spectos Live Tracking Solutions for Postal & Logistics
Spectos Live Tracking Solutions for Postal & LogisticsSpectos Live Tracking Solutions for Postal & Logistics
Spectos Live Tracking Solutions for Postal & Logistics
 

Viewers also liked

Grandes matematicos
Grandes matematicosGrandes matematicos
Grandes matematicos
pabloeducacionfisica1
 
Short Sales Overview of EmpowerID
Short Sales Overview of EmpowerIDShort Sales Overview of EmpowerID
Short Sales Overview of EmpowerID
EmpowerID
 
Jesusisthe word en
Jesusisthe word enJesusisthe word en
Jesusisthe word en
MyWonderStudio
 
Websphere on z/OS and RACF security
Websphere on z/OS and RACF securityWebsphere on z/OS and RACF security
Websphere on z/OS and RACF security
Michael Erichsen
 
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
CA Technologies
 
midhun (1)
midhun (1)midhun (1)
midhun (1)
Midhun Jose
 
Power poin
Power poinPower poin
Pray away mealtime
Pray away mealtimePray away mealtime
Pray away mealtime
MyWonderStudio
 
The prophet’s character part 5 page 02
The prophet’s character part 5 page 02The prophet’s character part 5 page 02
The prophet’s character part 5 page 02FAHIM AKTHAR ULLAL
 
Desapariciones forzadas
Desapariciones forzadasDesapariciones forzadas
Desapariciones forzadas
Comisión Colombiana de Juristas
 
Prueba de competanecia basicas
Prueba de competanecia basicasPrueba de competanecia basicas
Prueba de competanecia basicas
alpaza27
 
EGREG Process Workflows
EGREG Process WorkflowsEGREG Process Workflows
EGREG Process Workflows
Fadi Hajjar
 
02.01.14.licitação para obra do General Osório será no dia 7
02.01.14.licitação para obra do General Osório será no dia 702.01.14.licitação para obra do General Osório será no dia 7
02.01.14.licitação para obra do General Osório será no dia 7
Guy Valerio Barros dos Santos
 
Micro Niche Experiment #4 – The 60 Day Blogging Authority Rule
Micro Niche Experiment #4 – The 60 Day Blogging Authority RuleMicro Niche Experiment #4 – The 60 Day Blogging Authority Rule
Micro Niche Experiment #4 – The 60 Day Blogging Authority Rule
My Weight Loss Dream
 
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
CA Technologies
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
CA Technologies
 
LOS DERECHOS DE LOS ANIMALES
LOS DERECHOS DE LOS ANIMALESLOS DERECHOS DE LOS ANIMALES
LOS DERECHOS DE LOS ANIMALES
Sol Hernandez Saira
 

Viewers also liked (17)

Grandes matematicos
Grandes matematicosGrandes matematicos
Grandes matematicos
 
Short Sales Overview of EmpowerID
Short Sales Overview of EmpowerIDShort Sales Overview of EmpowerID
Short Sales Overview of EmpowerID
 
Jesusisthe word en
Jesusisthe word enJesusisthe word en
Jesusisthe word en
 
Websphere on z/OS and RACF security
Websphere on z/OS and RACF securityWebsphere on z/OS and RACF security
Websphere on z/OS and RACF security
 
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
 
midhun (1)
midhun (1)midhun (1)
midhun (1)
 
Power poin
Power poinPower poin
Power poin
 
Pray away mealtime
Pray away mealtimePray away mealtime
Pray away mealtime
 
The prophet’s character part 5 page 02
The prophet’s character part 5 page 02The prophet’s character part 5 page 02
The prophet’s character part 5 page 02
 
Desapariciones forzadas
Desapariciones forzadasDesapariciones forzadas
Desapariciones forzadas
 
Prueba de competanecia basicas
Prueba de competanecia basicasPrueba de competanecia basicas
Prueba de competanecia basicas
 
EGREG Process Workflows
EGREG Process WorkflowsEGREG Process Workflows
EGREG Process Workflows
 
02.01.14.licitação para obra do General Osório será no dia 7
02.01.14.licitação para obra do General Osório será no dia 702.01.14.licitação para obra do General Osório será no dia 7
02.01.14.licitação para obra do General Osório será no dia 7
 
Micro Niche Experiment #4 – The 60 Day Blogging Authority Rule
Micro Niche Experiment #4 – The 60 Day Blogging Authority RuleMicro Niche Experiment #4 – The 60 Day Blogging Authority Rule
Micro Niche Experiment #4 – The 60 Day Blogging Authority Rule
 
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
 
LOS DERECHOS DE LOS ANIMALES
LOS DERECHOS DE LOS ANIMALESLOS DERECHOS DE LOS ANIMALES
LOS DERECHOS DE LOS ANIMALES
 

Similar to Masters of Machines II: Conquering complexity with operational intelligence

Softcat Splunk Discovery Day Manchester, March 2017
Softcat Splunk Discovery Day Manchester, March 2017Softcat Splunk Discovery Day Manchester, March 2017
Softcat Splunk Discovery Day Manchester, March 2017
Splunk
 
Challenges & Application In Industrial IoT by Sachin Pukale, machinepulse
Challenges & Application In Industrial IoT by Sachin Pukale, machinepulseChallenges & Application In Industrial IoT by Sachin Pukale, machinepulse
Challenges & Application In Industrial IoT by Sachin Pukale, machinepulse
Sachin Pukale
 
Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)
MachinePulse
 
TGS-BP-BusinessPresentation-en-r00
TGS-BP-BusinessPresentation-en-r00TGS-BP-BusinessPresentation-en-r00
TGS-BP-BusinessPresentation-en-r00
Itconic
 
Splunk for Monitoring and Diagnostics Breakout Session
Splunk for Monitoring and Diagnostics Breakout SessionSplunk for Monitoring and Diagnostics Breakout Session
Splunk for Monitoring and Diagnostics Breakout Session
Splunk
 
Markerstudy Group Drives Growth and Innovation
Markerstudy Group Drives Growth and InnovationMarkerstudy Group Drives Growth and Innovation
Markerstudy Group Drives Growth and Innovation
Cloudera, Inc.
 
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
polenumerique33
 
Why Embracing Digital Transformation Keeps Manufacturers Ahead of the Competi...
Why Embracing Digital Transformation Keeps Manufacturers Ahead of the Competi...Why Embracing Digital Transformation Keeps Manufacturers Ahead of the Competi...
Why Embracing Digital Transformation Keeps Manufacturers Ahead of the Competi...
Microsoft Advanced Analytics and Internet of Things
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deck
Susanna Harper
 
CyberScope - 2015 Market Review
CyberScope - 2015 Market ReviewCyberScope - 2015 Market Review
CyberScope - 2015 Market Review
resultsig
 
Meet the new champ: Why HR managers go wild for QlikView 9 people intelligenc...
Meet the new champ: Why HR managers go wild for QlikView 9 people intelligenc...Meet the new champ: Why HR managers go wild for QlikView 9 people intelligenc...
Meet the new champ: Why HR managers go wild for QlikView 9 people intelligenc...
TopLine Strategies
 
Best Practices For Sharing Data Across The Enteprrise
Best Practices For Sharing Data Across The EnteprriseBest Practices For Sharing Data Across The Enteprrise
Best Practices For Sharing Data Across The Enteprrise
Splunk
 
NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu
 
Demystifying Control Towers: What Drives Effectiveness?
Demystifying Control Towers: What Drives Effectiveness?Demystifying Control Towers: What Drives Effectiveness?
Demystifying Control Towers: What Drives Effectiveness?
Aggregage
 
Industrial Internet of Things by Edy Liongosari of Accenture
Industrial Internet of Things by Edy Liongosari of AccentureIndustrial Internet of Things by Edy Liongosari of Accenture
Industrial Internet of Things by Edy Liongosari of Accenture
gogo6
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
SMAU
 
3. Camplone 22/06/2015 Fabbrica 4.0 Evento Nazionale | Roma - Confindustria
3. Camplone 22/06/2015 Fabbrica 4.0 Evento Nazionale | Roma - Confindustria3. Camplone 22/06/2015 Fabbrica 4.0 Evento Nazionale | Roma - Confindustria
3. Camplone 22/06/2015 Fabbrica 4.0 Evento Nazionale | Roma - Confindustria
Confindustria Servizi Innovativi e Tecnologici
 
The Analytics Value Chain - Key to Delivering Business Value in IoT
The Analytics Value Chain - Key to Delivering Business Value in IoTThe Analytics Value Chain - Key to Delivering Business Value in IoT
The Analytics Value Chain - Key to Delivering Business Value in IoT
Peter Nguyen
 
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Georg Knon
 
Infographic - Digitizing Energy: Unlocking business value with digital techno...
Infographic - Digitizing Energy: Unlocking business value with digital techno...Infographic - Digitizing Energy: Unlocking business value with digital techno...
Infographic - Digitizing Energy: Unlocking business value with digital techno...
Accenture the Netherlands
 

Similar to Masters of Machines II: Conquering complexity with operational intelligence (20)

Softcat Splunk Discovery Day Manchester, March 2017
Softcat Splunk Discovery Day Manchester, March 2017Softcat Splunk Discovery Day Manchester, March 2017
Softcat Splunk Discovery Day Manchester, March 2017
 
Challenges & Application In Industrial IoT by Sachin Pukale, machinepulse
Challenges & Application In Industrial IoT by Sachin Pukale, machinepulseChallenges & Application In Industrial IoT by Sachin Pukale, machinepulse
Challenges & Application In Industrial IoT by Sachin Pukale, machinepulse
 
Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)
 
TGS-BP-BusinessPresentation-en-r00
TGS-BP-BusinessPresentation-en-r00TGS-BP-BusinessPresentation-en-r00
TGS-BP-BusinessPresentation-en-r00
 
Splunk for Monitoring and Diagnostics Breakout Session
Splunk for Monitoring and Diagnostics Breakout SessionSplunk for Monitoring and Diagnostics Breakout Session
Splunk for Monitoring and Diagnostics Breakout Session
 
Markerstudy Group Drives Growth and Innovation
Markerstudy Group Drives Growth and InnovationMarkerstudy Group Drives Growth and Innovation
Markerstudy Group Drives Growth and Innovation
 
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
 
Why Embracing Digital Transformation Keeps Manufacturers Ahead of the Competi...
Why Embracing Digital Transformation Keeps Manufacturers Ahead of the Competi...Why Embracing Digital Transformation Keeps Manufacturers Ahead of the Competi...
Why Embracing Digital Transformation Keeps Manufacturers Ahead of the Competi...
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deck
 
CyberScope - 2015 Market Review
CyberScope - 2015 Market ReviewCyberScope - 2015 Market Review
CyberScope - 2015 Market Review
 
Meet the new champ: Why HR managers go wild for QlikView 9 people intelligenc...
Meet the new champ: Why HR managers go wild for QlikView 9 people intelligenc...Meet the new champ: Why HR managers go wild for QlikView 9 people intelligenc...
Meet the new champ: Why HR managers go wild for QlikView 9 people intelligenc...
 
Best Practices For Sharing Data Across The Enteprrise
Best Practices For Sharing Data Across The EnteprriseBest Practices For Sharing Data Across The Enteprrise
Best Practices For Sharing Data Across The Enteprrise
 
NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
 
Demystifying Control Towers: What Drives Effectiveness?
Demystifying Control Towers: What Drives Effectiveness?Demystifying Control Towers: What Drives Effectiveness?
Demystifying Control Towers: What Drives Effectiveness?
 
Industrial Internet of Things by Edy Liongosari of Accenture
Industrial Internet of Things by Edy Liongosari of AccentureIndustrial Internet of Things by Edy Liongosari of Accenture
Industrial Internet of Things by Edy Liongosari of Accenture
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
3. Camplone 22/06/2015 Fabbrica 4.0 Evento Nazionale | Roma - Confindustria
3. Camplone 22/06/2015 Fabbrica 4.0 Evento Nazionale | Roma - Confindustria3. Camplone 22/06/2015 Fabbrica 4.0 Evento Nazionale | Roma - Confindustria
3. Camplone 22/06/2015 Fabbrica 4.0 Evento Nazionale | Roma - Confindustria
 
The Analytics Value Chain - Key to Delivering Business Value in IoT
The Analytics Value Chain - Key to Delivering Business Value in IoTThe Analytics Value Chain - Key to Delivering Business Value in IoT
The Analytics Value Chain - Key to Delivering Business Value in IoT
 
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
 
Infographic - Digitizing Energy: Unlocking business value with digital techno...
Infographic - Digitizing Energy: Unlocking business value with digital techno...Infographic - Digitizing Energy: Unlocking business value with digital techno...
Infographic - Digitizing Energy: Unlocking business value with digital techno...
 

More from Splunk

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
Splunk
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
Splunk
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
Splunk
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
Splunk
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
Splunk
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
Splunk
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
Splunk
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
Splunk
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
Splunk
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
Splunk
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
Splunk
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
Splunk
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
Splunk
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
Splunk
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
Splunk
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
Splunk
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
Splunk
 

More from Splunk (20)

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Masters of Machines II: Conquering complexity with operational intelligence

Editor's Notes

  1. Identify & support the right outsource strategy For public sector – quick wins and tangible wins Empower the gov agency Empower the citizen Need help
  2. If organizations don’t analyze data available to them, their competition will and they will separate themselves! Think about it, 20 years ago, you may have thought a website was optional. Organizations use Splunk products to gain fast visibility and insights from their machine data to: 1. Find and fix problems dramatically faster, investigate incidents and attacks 2. Automatically monitor to identify issues, problems and attacks 3. Gain end-to-end visibility to track and deliver on IT KPIs and make better-informed IT decisions 4. Gain real-time insight from operational data to make better-informed business decisions
  3. We will look at the impact of operational intelligence in all three areas
  4. Increase in use of sensor and other M2M comms – especially in manufacturing where 60% say such comms are important
  5. At it’s core, the Splunk platform enables you to: Collect data from anywhere – with universal forwarding and indexing technology. Search and analyze across all your data – with powerful search and schema on the fly technology. Rapidly deliver real-time insights from machine data to IT and business people – through a powerful UI and dashboards. This is what we call Operational Intelligence.
  6. The Business Tesco.com is the e-commerce arm of Tesco PLC, a British multinational grocery and general merchandise retailer that operates in the United Kingdom, Europe, Asia and North America. Introduced in 2000, Tesco.com serves the UK market with grocery shopping from home, general merchandise, clothing, as well as banking and insurance services. Challenges Web analytics firm Alexa ranks Tesco.com at 40 among all U.K. sites based on monthly traffic. Tesco customers expect to be able to shop where, when and how they want, blurring the boundary between physical and online shopping. Tesco developers and business/web analysts and operations teams needed a better understanding of what products and website features customers were engaging and what pathways resulted in the highest lead conversions. Traditionally a Microsoft shop, including the use of .NET technologies to support its original Tesco.com platform, the company decided several years ago to transition to a Linux and Java platform for the next generation of its direct General Merchandising Online (GMO) website. Supporting both infrastructures led to a large and complex development and production mix, including more than 400 servers across 10 environments in the UK and at its offshore developers in India. This heterogeneous mix makes it challenging to monitor critical processes and troubleshoot development and production problems. Before Splunk, Tesco relied primarily on custom scripts to capture log data and make it available to developers and IT support teams. The influx of new systems and the need to support multiple groups overwhelmed the firm's homegrown log monitoring. "With the major upgrade to our GMO site, we needed a way for multiple developers to securely access logs at various geographic locations and multiple platforms—a way to tie it all together and make sense of errors and other behaviors," explains Tesco applications engineer Joshua Anderson. "In the meantime, web site escalations were coming from our service team and backing up in our queue—sometimes 250 at a time! Our previous system of harvesting log files and running reports overnight was just too slow and cumbersome." Enter Splunk About two and half years ago, a major Tesco partner recommended Splunk to Tesco's IT organization. "Once we started rolling Splunk out and looking at some of the information we could extract, it opened up our world—like putting on glasses for the first time," Anderson relates. Today, Tesco has a 250GB per day Splunk license and has deployed the system across nearly all of its servers. Over 300 developers, quality assurance, customer support, web site operations and business/Web analysts have Splunk access. The organization uses Splunk to troubleshoot problems, identify drivers for improving user behavior and accelerating development cycle. Breakthroughs Performance monitoring and troubleshooting improve customer experience One of the earliest revelations for the Tesco application management team was how easy it was to use Splunk to correlate log data into events that reveal root causes. "Early on, we were having trouble with checkout flow on the website," recalls Anderson. "I remember just typing in 'error' and 'payment' in Splunk and all of a sudden we were able to narrow directly down to timeframes and see that there was a problem with our connectivity and the IP address." The Tesco application support team used Splunk to quickly clear the error backlog and establish alerts and dashboards to help speed future problem identification and resolution. They used Splunk to create customer activity tracking dashboards that are continually monitored by support operations centers in the UK and India and help identify and resolve website error trends before they become widespread problems. In this way, Tesco was able to dramatically improve the experience of website visitors and reduce the incidence of lost revenue due to abandoned shopping carts. Application visibility enhances business performance With millions of visits per week to Tesco.com, application process visibility is critical for order tracking accuracy, real-time alerts and site performance. Two Splunk search heads and four indexers track customer activity and provide application visibility. Splunk is used to monitor Java-based messaging queues and bridge the gap between Java/Linux systems and Windows. "Every dashboard has an associated alert," Anderson says. "Splunk alerts are integrated with our Microsoft SCOM monitoring and service desk systems. Our business teams also use Google Analytics tools to see what flows through the Tesco website; however, those tools don't really look at the response from the server. We use Splunk to look at the raw logs to determine, for instance, what's causing a '404' error." Splunk helps the Tesco team better understand the impact on the customer of any site errors. Anderson notes: "We're able to look at the raw logs and see, firstly, where we are producing '404' errors and what is actually happening to our systems. Splunk allows us to see the percentage of customers who are receiving an error message and resolve those issues quickly before it has an adverse effect on sales or service." Development cycle acceleration Hundreds of Tesco engineering and test team members worldwide now have access to test environment logs via Splunk, which has led to faster, more agile development and shorter development cycles. In this way, collaboration has been enhanced among geographically separated development teams. "We use Splunk to triage our application errors and cluster them into groups for analysis by our development teams," Anderson explains. "We can identify issues and resolve them so much faster than ever before, that we've been able to adopt a more agile development process and cut development time by about 30% across the board." Operational visibility and business insight Splunk usage is growing beyond its original base to new areas within Tesco PLC. New uses of Splunk expand beyond search and investigate to use in helping understand and optimize web behavior in real time. "As we roll out Splunk to new groups, we are discovering how little visibility there was in the past," Anderson notes. "By standardizing and consolidating with Splunk, we are assisting areas such as grocery, direct and international businesses in all our regions in mapping process flows and visually representing transactions in dashboards with associated alerts. We are already starting to see similar benefits to what we have experienced in application support and development at Tesco.com."
  7. The Business UniCredit Business Integrated Solutions (UBIS) is the UniCredit Group's global services company. Formed from the integration and consolidation of 16 Group companies and is dedicated to providing services in the sectors of Information and Communication Technology (ICT), Back Office and Middle Office, Real Estate, Security and Procurement. It is one of the first service companies to be created at a Pan-European level and its aim is to consolidate and reorganize those operational activities necessary for the correct functioning of the Group's business by leveraging on a more flexible delivery and improved response times. The Company includes about 11.000 people and oversees activities in 11 countries: Austria, Germany, Italy, Poland, Great Britain, Czech Republic, Romania, Slovakia, Hungary, the United States and Singapore. Challenges For a Financial Services (FSI) company, one of the key considerations when dealing with customers is their privacy and security. One of the most significant challenges faced by UniCredit Business Integrated Solutions in the context of its online banking offering was keeping pace with the consistently growing and massive amount of machine data generated across its infrastructure. The various banks in the corporation run approximately 1,000 applications on a variety of different operating platforms. Collecting, storing and analysing this data is critical for troubleshooting issues, identifying security concerns, detecting fraud and maintaining a positive customer experience. As there was no single point of access, a significant amount of time was required to analyse this large volume of machine data from a huge array of sources. Enter Splunk Compared to competitive products, Splunk software offered a far more innovative approach to managing the data challenge. Key features for UniCredit Business Integrated Solutions were real-time monitoring and incident investigations as a prerequisite for reducing the Mean Time To Investigate (MTTI) and the Mean Time To Resolve (MTTR) for security and IT performance issues. A further challenge was monitoring at the frontoffice application level: Splunk offers an overview of essential machine resources and transaction volumes (accounting). Using Splunk, UniCredit Business Integrated Solutions is able to access information extremely quickly and add new queries on the fly. Splunk software's ease of use has enabled a wide range of departments to access information relevant to their requirements without any special IT expertise. UniCredit Business Integrated Solutions was also looking for a fast implementation, which was achieved working with a Splunk partner, Moviri. A small team of three, including one Moviri employee, were involved in the rapid deployment (approximately a month). The Splunk deployment is Pan-European and aligns with UniCredit Business Integrated Solutions' business units across the region. The deployment is currently in Italy and Germany and expanding into Austria and the Czech Republic. The company recently made the strategic decision to scale up its data collection volume from 250 GB to 2.8 TB per day. Breakthroughs Having initially used Splunk software purely for troubleshooting and application monitoring, following its positive experiences UniCredit Business Integrated Solutions slowly began adding further use cases, so that the software is now also deployed for Operational Intelligence as well as security analysis and analytics. This evolutionary approach to the Splunk implementation is typical of many companies, which start out using the solution for a specific use case and then gradually expand its use across the enterprise when they realise the full capabilities of Splunk. Real-time and historical monitoring of data within Splunk has allowed UniCredit Business Integrated Solutions to instantly identify issues and proactively prevent incidents. Specifically, UniCredit Business Integrated Solutions is using Splunk to monitor transactions at regular intervals and send alerts based on specific thresholds and conditions. With proactive monitoring in place, the customer service team has seen a significant quality of service improvement and gained new efficiencies. For example, due to proactive incident management, about 40% of incidents can be managed before becoming evident to end users. Today, problems are quickly localized and eliminated. They estimate that 25% of their time is now spent on troubleshooting and a full 75% can be directed towards other activities such as innovating. It's safe to conclude that this improved response (avg. MTTR is less than 15 minutes versus 1 hour in the past) directly enhances the customer experience and has had a positive impact on revenue. Thus, time spent on problem solving and troubleshooting has been reduced by as much as 70%. By providing a single view into all of UniCredit Business Integrated Solutions' machine generated data, Splunk software has also simplified adherence to compliance requirements. The team responsible for production ability and readiness, troubleshooting and reports, now uses impact analyses to calculate the actual effects of operational and security incidents. In this way, the Splunk solution helps the organization meet Service Level Agreements (SLA) with its customers, thus avoiding potential compensation payments. Time savings, improved adherence to guidelines and a reduction in downtimes have enabled UniCredit Business Integrated Solutions to achieve a important reduction in costs. And last but not least, the company has been able to reduce its storage costs, as all data is stored in Splunk. About 700 UniCredit Business Integrated Solutions employees in 180 departments, including the system management and IT departments, are currently working with Splunk. The option of sharing information across all departments and business divisions forms the basis for the "Splunk Competence Center" currently being set up by UniCredit Business Integrated Solutions. In this knowledge pool, security and network employees collect and prioritise all queries, creating dashboards and reports. The troubleshooting and app performance monitoring team can create 24/7 alerts, check events for a wide range of tools and set bookmarks for the most frequent searches. This allows the entire infrastructure to be searched for frequent/recurring problems in under a minute and drilldowns can be engineered much faster. UniCredit Business Integrated Solutions business analysts are using Splunk software to create weekly reports for top management that provide real-time insights into key business metrics such as: served clients by bank branches as well as via internet banking and mobile banking channels number of new opened bank accounts loans / revolving cards managed payments / bank transactions executed UniCredit Business Integrated Solutions is also visualising mobile banking transactions via the Google Maps for Splunk app, which is then showcased on custom dashboards. In addition to the Google Maps app, UniCredit Business Integrated Solutions is using a range of other apps provided via the Splunk community site, Splunkbase, including Splunk on Splunk (S.o.S.), Splunk for Windows, Splunk for Tibco BusinessWorks Engine and Splunk DB Connect, all of which have been customized to the company's requirements.
  8. The Business Founded in 1855, Telenor, Norway's largest telecom services provider, has over 150 years of telecoms experience. The company believes "growth comes from truly understanding the needs of people to drive relevant change." Considering that Telenor's mobile subscribers globally grew from 15 to 160 million in less than a decade, its belief that deeper insight leads to success is holding true. Telenor's service portfolio in Norway includes fixed and mobile telephony, broadband and data communication. Customers rely on Telenor to provide always-on voice, data and content services. Challenges With millions of customers, thousands of servers and routers, and datacenters located throughout Norway, Telenor needed to understand the essential operating details of its infrastructure. Communication between far-flung departments was challenging and there were frequent miscommunications. While some log event data was being collected, the logs were difficult to analyze. In addition, granting access to certain logs on a server often meant giving access to all the logs collected on that server, which posed definite security and privacy risks. The few people with authorized access faced the impossible task of manually browsing through hundreds of millions of log records a day. Unsurprisingly, kernel errors and other issues sporadically slipped by unnoticed. Enter Splunk Splunk has provided Telenor Norway the visibility and operational insight to keep its IT systems and networks running at peak performance. Telenor is using Splunk Enterprise for troubleshooting, monitoring and security investigations. The network operations team runs dashboards visualizing network health and monitors for error events and unfamiliar patterns. The security team uses Splunk for correlation and analysis of security alarms. With Splunk they can look for, and be proactively alerted on, abnormal remote access patterns and investigate attacks on Internet-exposed services. Finally, Splunk also underpins the Telenor Computer Emergency Response Team (CERT), which is a cross-departmental incident response team. This virtual team uses Splunk for incident investigation, pinpointing the origin of large issues and performing rapid manual analysis of failing components to limit business impact. Telenor indexes 400GBs of data per day with Splunk, including data from thousands of servers, routers and data sources ranging from the datacenter, the IP infrastructure and the mobile network, to applications and services like web, email and IPTV. This constitutes about half of Telenor's entire IT estate, and there is now a 'Splunk first' policy in place, so any new data has to be put into Splunk. Telenor forwards data to a pool of Splunk indexers. Role-based access control ensures users get the access to the data they need without compromising security or violating customer privacy regulations. Breakthroughs Incident investigation and troubleshooting When something goes wrong, it is now quick and easy for Telenor to get to the root cause of the issue and resolve it. For example, the team noticed that Telenor WebMail accounts were being abused to send hundreds of thousands of SMS messages abroad. They used Splunk to analyze the incident and were immediately able to identify which accounts were being abused and how many SMS were being sent, as well as when and where the logins were coming from. Armed with this insight, it was a simple job to shut down the offending accounts and stop the abuse, preventing further revenue loss. Stronger security Using Splunk, the security teams can now determine the baseline for "normal" and track any deviations from that standard. This gives Telenor the ability to quickly and efficiently detect brute force login attacks and other security issues. With this established, they can now use easy-to-compose dashboards to monitor systems and services for anomalous activity. Other examples include correlating timing and IP addresses to determine if attacks from multiple countries are coordinated, and the ability to identify vulnerable Internet exposed services. Increased availability Not only can the CERT, security and operations teams troubleshoot problems faster than ever, the insights gained through Splunk software lets Telenor identify a problem long before it turns into a crisis. These valuable searches are now saved and run on a schedule, providing proactive alerts in front of recurring issues. Telenor can now spot an error as soon as it occurs and start working on correcting it immediately, which can prevent or reduce downtime. Business-critical insights Over time, the knowledge built into Splunk has enabled Telenor to learn more about the organization's IT and network infrastructure and its potential for the business. Telenor is now responding to incidents more proactively and providing better service as a result. The network operations team uses baseline measurements so they can understand what constitutes normal. They have created Splunk alerts to monitor for error spikes and unfamiliar patterns. This advanced visibility lets them troubleshoot problems before users notice them or services fail. In summary, since deploying Splunk, Telenor Norway has dramatically improved visibility into its complex IT infrastructure and networks. Not only can the internal teams now investigate and resolve issues much more quickly, they are also able to use operational intelligence to create baseline views to catch errors or anomalies early on, often addressing these issues before they impact the customer experience.
  9. Shazam are pioneering the way we consume music on our mobile with their app downloaded onto more than 500 million mobile devices to date and adding users at a rate of 13 million per month.  They have about 100 million monthly active users and they “Shazam” more than 20 million times per day. Shazam use Splunk for real-time business analytics for their customer service, engineering and sales/marketing teams. They use Splunk to monitor customer experience, new feature adoption, improve user engagement and accelerate their product innovation.
  10. Splunk have been working with VW’s data labs on their connected car and IoT program. Splunk is being used to analyse sensor data from VW’s E-Up cars. Splunk’s ability to search, alert, report and analyse IoT data allowed VW to see a fleet of E-Up cars at CeBIT and analyse metrics such as speed, RPM, battery level, range, temperature, when the doors were open and when windscreen wipers were on. This data could also be combined with location, maps and smart watches to show where vehicles had been, heatmaps, and driver heart rate
  11. The best part is that Splunk is really easy to try and deploy.   We have multiple options for getting started: - Try out Splunk Enterprise, Splunk Cloud, or HUNK with our free online sandboxes. - Or try our free software download. The free Splunk Enterprise download is the same product that scales to ingest petabytes of data per day. - Already running with Amazon Cloud deployments? AMIs for Splunk Enterprise and Hunk make it easy to get up and running.