Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

5G is Rolling Out: Here's How Cognitive Analytics Will Take Part in the Revolution

5G is here and is widely expected to be a transformative communications technology for the next decade. This new data network will enable never-before-seen data transfer speeds and high-performance remote computing capabilities. Such vast, fast networks will need dedicated tools and practices to be managed, including AI and machine learning processes that will ensure efficient management of network resources and flexibility to meet user demands.

Predictive Maintenance: What's the Economic Value?

The global predictive maintenance market is expected to grow to $6.3 billion by 2022, according to a report by Market Research Future. However, a new paradigm is required for analyzing real-time IoT data. Predictive maintenance, which is the ability to use data-driven analytics to optimize capital equipment upkeep, is already used or will be used by 83 percent of manufacturing companies in the next two years.

Who Will Win and Who Will Die: 'Game of Throne' Fans Use Data Analysis to Predict What Happens Next

In the era of Peak TV, there is probably no more emblematic version of worthy binge watching than “Game of Thrones”. At the cusp of the series’ eighth and final season, the internet is buzzing with some painstaking analysis – using algorithms, AI, and big data sets, to find hidden Easter eggs. The numbers capture the mind-boggling detail author George R. R. Martin weaved into his novels and how easy it is to get lost in a fictional world as intricate as our own.

5 Critical Shortcomings of Traditional BI Tools

Business Intelligence (BI) tools have taken the business world by storm. According to new research, over 80% of executives believe that tools such as advanced visualization, dashboards, and reporting are critical tools when it comes to parsing data. However, many end users aren’t bringing in those dashboards because they really use them, rather they are hoping to get a sense of security (incorrectly) that they will know everything about their business.

Impact Alert: Why Was a Spike in Hotel Bookings No Cause for Celebration?

One of the world’s leading bed banks – a wholesaler of hotel allocations to B2B and B2C clients – recently experienced a surge in bookings. Great news, right? Not really. A glitch caused room prices from one of their hotel suppliers to drop from $100+ per night to JUST $8. Imagine how much this glitch could have cost them if left unchecked.

Why Every Data Leader Needs ETL Monitoring

It is 5 a.m. Tuesday. The ETL job that populates revenue data into your organization’s data warehouse fails midway through the process. When the CFO opens the mobile dashboard to review the last day’s results, he immediately notices that the data is wrong – again. For a few hours, the on-call ETL Architect determines what caused the data-load failure, fixes the issue, and restarts/monitors the job until it successfully completes.

Searching for Actionable Signals: A Closer Look at Time Series Data Anomaly Detection

Simple enough to be embedded in text as a sparkline, but able to speak volumes about your business, time series data is the basic input of Anodot’s automated anomaly detection system. This article begins our three-part series in which we take a closer look at the specific techniques Anodot uses to extract insights from your data.

Crime and Anomalies in the Windy City

When is it safest to visit Chicago parks? To walk the city’s streets? To be a kid? Here are three incredible anomalies I turned up in Chicago law enforcement data. I love Chicago. I’ve lived in Illinois for five years, and have come to love my visits to the city – the parks, the lake, the architecture, the music, the food, the universities, the people. It’s a city that’s truly unique in the world.

Searching for Actionable Signals: A Closer Look at Time Series Data Anomaly Detection

Simple enough to be embedded in text as a sparkline, but able to speak volumes about your business, time series data is the basic input of Anodot’s automated anomaly detection system. This article begins our three-part series in which we take a closer look at the specific techniques Anodot uses to extract insights from your data.