Using Snowflake MVs in Looker

Snowflake recently announced the general availability of materialized views (MVs). If you aren’t familiar with MVs, they are physical database objects that contain the result of a query, so they lie somewhere between a table, which is a physical object, and a view, which is based on a query but is a logical object. MVs have many uses, including enhancing query performance, encapsulating complex logic, and aggregating data.


Unleashing the next level of organizational decision-making with the cloud data warehouse

The ability for cloud data warehouses to provide a single platform that enables organizations to analyze data at any scale is a market changing capability. Sure, much has been made of the ability of applying Artificial Intelligence (AI) to this data to gain insight into new areas, ultimately to increase an organization’s competitiveness. There is however a greater level of impact that this architecture can have that can be independent of AI and ultimately inclusive of AI.


How I added a search bar to my website in 20 minutes with Elastic Site Search

An important part of any great website experience is a powerful search box, as anyone who’s struggled to find something on a site knows. As the owner of a personal website, I want to make sure my site isn’t causing any search-related headaches. But as a non-technical person with a lot on my plate, I don’t have time for complicated solutions that are over my head and require technical expertise or coding


How To Make Your Business Process Suck Less - Part 3

Do you have a business process whose conversion rates and completion rates could be optimized? This blog is part of a three-part series on how Splunk Business Flow can help you continuously improve your business processes. For those of you who don’t know, Splunk Business Flow is Splunk’s process mining solution empowering you to interactively discover and investigate any business process.


Understanding and unlocking security data sources

Security information and event management (SIEM) systems are centralized log platforms to analyze event data in real time for early detection of targeted cyber attacks and data breaches. A SIEM is used as a tool to collect, store, investigate, and report on log data for threat detection, incident response, forensics, and regulatory compliance.


Screens Beta

Screens display a series of widgets that you can use to share across your organization. Widgets can display your log activity, from the number of logs ingested in the last 4 hours, to a line graph comparing today’s logs to yesterday’s logs. You can control the data you want to display by creating a “Screen” with a combination of different widgets. Post your screen on a company monitor to provide your organization with a snapshot of your system’s activity.