Snowflake recently announced the general availability of materialized views (MVs). If you aren’t familiar with MVs, they are physical database objects that contain the result of a query, so they lie somewhere between a table, which is a physical object, and a view, which is based on a query but is a logical object. MVs have many uses, including enhancing query performance, encapsulating complex logic, and aggregating data.
When it comes to automation in the BI industry, I think a lot of vendors are holding back. It’s entirely possible to automate the majority of what data analysts do today, but vendors are reluctant to do this because it would impact data analysts and they’re a big gatekeeper in the buying cycle of analytic software.
The ability for cloud data warehouses to provide a single platform that enables organizations to analyze data at any scale is a market changing capability. Sure, much has been made of the ability of applying Artificial Intelligence (AI) to this data to gain insight into new areas, ultimately to increase an organization’s competitiveness. There is however a greater level of impact that this architecture can have that can be independent of AI and ultimately inclusive of AI.
An important part of any great website experience is a powerful search box, as anyone who’s struggled to find something on a site knows. As the owner of a personal website, I want to make sure my site isn’t causing any search-related headaches. But as a non-technical person with a lot on my plate, I don’t have time for complicated solutions that are over my head and require technical expertise or coding
Do you have a business process whose conversion rates and completion rates could be optimized? This blog is part of a three-part series on how Splunk Business Flow can help you continuously improve your business processes. For those of you who don’t know, Splunk Business Flow is Splunk’s process mining solution empowering you to interactively discover and investigate any business process.
Security information and event management (SIEM) systems are centralized log platforms to analyze event data in real time for early detection of targeted cyber attacks and data breaches. A SIEM is used as a tool to collect, store, investigate, and report on log data for threat detection, incident response, forensics, and regulatory compliance.
Screens display a series of widgets that you can use to share across your organization. Widgets can display your log activity, from the number of logs ingested in the last 4 hours, to a line graph comparing today’s logs to yesterday’s logs. You can control the data you want to display by creating a “Screen” with a combination of different widgets. Post your screen on a company monitor to provide your organization with a snapshot of your system’s activity.