Operations | Monitoring | ITSM | DevOps | Cloud

Blockchain

Connecting Ethereum

ETHDenver connects developers, technologists, cypher punks, coders, crypto-economists, designers and makers to build on Ethereum, making it the perfect place to debut Splunk Connect for Ethereum. The use cases we saw added observability to blockchains like Ethereum mainnet and sidechains in real time. As the event went on, use cases and requests continued to pop up (which you'll see below); the app was used to index not just ethereum mainnet, but also sidechains such as xDai and OST Mosaic.

Introducing Splunk App for Quorum

It is imperative for organizations to monitor performance, security and stability of their blockchain integrations. Splunk makes it easy to achieve this observability, not just with blockchain but with all enterprise infrastructure. Our customers have told us this is simply a necessity for getting to production and also makes application development faster. Based on Ethereum, Quorum is an open source blockchain platform built for business and backed by strong partnerships such as J.P.

Top 8 Tools Every Blockchain Developer Should Know About

While Blockchain technology offers unprecedented security solution and information sharing solution, it remained as of now mostly limited to the cryptocurrencies. While cryptocurrencies made Blockchain their core technology strength, other industries remained mostly silent bystanders.

Is Blockchain a Permanent Fixture in the IT Industry?

By Des Nnochiri In essence, the nature of business comes down to different companies exchanging value with supplier, partners, and customers. By “value”, we mean goods, services, money, and data. This is the fundamental basis of any business and it has to do this effectively in order to make a profit and survive.

Conquer it with correlation-Part 3: Cryptojacking

In the previous posts of this blog series, we discussed advanced persistent threats and data breaches, highlighting the importance of data security in today’s times. In the final post of this series, we’ll talk about cryptojacking, a type of attack that can severely affect your network’s integrity, and how you can combat it with event correlation.