Author: James Miller
Publisher: Packt Publishing Ltd
ISBN: 1782173846
Category : Computers
Languages : en
Pages : 489
Book Description
This book is for those Splunk developers who want to learn advanced strategies to deal with big data from an enterprise architectural perspective. You need to have good working knowledge of Splunk.
Mastering Splunk
Author: James Miller
Publisher: Packt Publishing Ltd
ISBN: 1782173846
Category : Computers
Languages : en
Pages : 489
Book Description
This book is for those Splunk developers who want to learn advanced strategies to deal with big data from an enterprise architectural perspective. You need to have good working knowledge of Splunk.
Publisher: Packt Publishing Ltd
ISBN: 1782173846
Category : Computers
Languages : en
Pages : 489
Book Description
This book is for those Splunk developers who want to learn advanced strategies to deal with big data from an enterprise architectural perspective. You need to have good working knowledge of Splunk.
Exploring Splunk
Author: David Carasso
Publisher: Cito Research
ISBN: 9780982550670
Category : Computers
Languages : en
Pages : 168
Book Description
Big data has incredible business value, and Splunk is the best tool for unlocking that value. Exploring Splunk shows you how to pinpoint answers and find patterns obscured by the flood of machinegenerated data. This book uses an engaging, visual presentation style that quickly familiarizes you with how to use Splunk. You'll move from mastering Splunk basics to creatively solving real-world problems, finding the gems hidden in big data.
Publisher: Cito Research
ISBN: 9780982550670
Category : Computers
Languages : en
Pages : 168
Book Description
Big data has incredible business value, and Splunk is the best tool for unlocking that value. Exploring Splunk shows you how to pinpoint answers and find patterns obscured by the flood of machinegenerated data. This book uses an engaging, visual presentation style that quickly familiarizes you with how to use Splunk. You'll move from mastering Splunk basics to creatively solving real-world problems, finding the gems hidden in big data.
Practical Splunk Search Processing Language
Author: Karun Subramanian
Publisher: Apress
ISBN: 9781484262757
Category : Computers
Languages : en
Pages : 240
Book Description
Use this practical guide to the Splunk operational data intelligence platform to search, visualize, and analyze petabyte-scale, unstructured machine data. Get to the heart of the platform and use the Search Processing Language (SPL) tool to query the platform to find the answers you need. With more than 140 commands, SPL gives you the power to ask any question of machine data. However, many users (both newbies and experienced users) find the language difficult to grasp and complex. This book takes you through the basics of SPL using plenty of hands-on examples and emphasizes the most impactful SPL commands (such as eval, stats, and timechart). You will understand the most efficient ways to query Splunk (such as learning the drawbacks of subsearches and join, and why it makes sense to use tstats). You will be introduced to lesser-known commands that can be very useful, such as using the command rex to extract fields and erex to generate regular expressions automatically. In addition, you will learn how to create basic visualizations (such as charts and tables) and use prescriptive guidance on search optimization. For those ready to take it to the next level, the author introduces advanced commands such as predict, kmeans, and cluster. What You Will Learn Use real-world scenarios (such as analyzing a web access log) to search, group, correlate, and create reports using SPL commands Enhance your search results using lookups and create new lookup tables using SPL commands Extract fields from your search results Compare data from multiple time frames in one chart (such as comparing your current day application performance to the average of the past 30 days) Analyze the performance of your search using Job Inspector and identify execution costs of various components of your search Who This Book Is For Application developers, architects, DevOps engineers, application support engineers, network operations center analysts, security operations center (SOC) analysts, and cyber security professionals who use Splunk to search and analyze their machine data
Publisher: Apress
ISBN: 9781484262757
Category : Computers
Languages : en
Pages : 240
Book Description
Use this practical guide to the Splunk operational data intelligence platform to search, visualize, and analyze petabyte-scale, unstructured machine data. Get to the heart of the platform and use the Search Processing Language (SPL) tool to query the platform to find the answers you need. With more than 140 commands, SPL gives you the power to ask any question of machine data. However, many users (both newbies and experienced users) find the language difficult to grasp and complex. This book takes you through the basics of SPL using plenty of hands-on examples and emphasizes the most impactful SPL commands (such as eval, stats, and timechart). You will understand the most efficient ways to query Splunk (such as learning the drawbacks of subsearches and join, and why it makes sense to use tstats). You will be introduced to lesser-known commands that can be very useful, such as using the command rex to extract fields and erex to generate regular expressions automatically. In addition, you will learn how to create basic visualizations (such as charts and tables) and use prescriptive guidance on search optimization. For those ready to take it to the next level, the author introduces advanced commands such as predict, kmeans, and cluster. What You Will Learn Use real-world scenarios (such as analyzing a web access log) to search, group, correlate, and create reports using SPL commands Enhance your search results using lookups and create new lookup tables using SPL commands Extract fields from your search results Compare data from multiple time frames in one chart (such as comparing your current day application performance to the average of the past 30 days) Analyze the performance of your search using Job Inspector and identify execution costs of various components of your search Who This Book Is For Application developers, architects, DevOps engineers, application support engineers, network operations center analysts, security operations center (SOC) analysts, and cyber security professionals who use Splunk to search and analyze their machine data
Advanced Splunk
Author: Ashish Kumar Tulsiram Yadav
Publisher: Packt Publishing Ltd
ISBN: 1785881213
Category : Computers
Languages : en
Pages : 348
Book Description
Master the art of getting the maximum out of your machine data using Splunk About This Book A practical and comprehensive guide to the advanced functions of Splunk,, including the new features of Splunk 6.3 Develop and manage your own Splunk apps for greater insight from your machine data Full coverage of high-level Splunk techniques including advanced searches, manipulations, and visualization Who This Book Is For This book is for Splunk developers looking to learn advanced strategies to deal with big data from an enterprise architectural perspective. It is expected that readers have a basic understanding and knowledge of using Splunk Enterprise. What You Will Learn Find out how to develop and manage apps in Splunk Work with important search commands to perform data analytics on uploaded data Create visualizations in Splunk Explore tweaking Splunk Integrate Splunk with any pre-existing application to perform data crunching efficiently and in real time Make your big data speak with analytics and visualizations using Splunk Use SDK and Enterprise integration with tools such as R and Tableau In Detail Master the power of Splunk and learn the advanced strategies to get the most out of your machine data with this practical advanced guide. Make sense of the hidden data of your organization – the insight of your servers, devices, logs, traffic and clouds. Advanced Splunk shows you how. Dive deep into Splunk to find the most efficient solution to your data problems. Create the robust Splunk solutions you need to make informed decisions in big data machine analytics. From visualizations to enterprise integration, this well-organized high level guide has everything you need for Splunk mastery. Start with a complete overview of all the new features and advantages of the latest version of Splunk and the Splunk Environment. Go hands on with uploading data, search commands for basic and advanced analytics, advanced visualization techniques, and dashboard customizing. Discover how to tweak Splunk to your needs, and get a complete on Enterprise Integration of Splunk with various analytics and visualization tools. Finally, discover how to set up and use all the new features of the latest version of Splunk. Style and approach This book follows a step by step approach. Every new concept is built on top of its previous chapter, and it is full of examples and practical scenarios to help the reader experiment as they read.
Publisher: Packt Publishing Ltd
ISBN: 1785881213
Category : Computers
Languages : en
Pages : 348
Book Description
Master the art of getting the maximum out of your machine data using Splunk About This Book A practical and comprehensive guide to the advanced functions of Splunk,, including the new features of Splunk 6.3 Develop and manage your own Splunk apps for greater insight from your machine data Full coverage of high-level Splunk techniques including advanced searches, manipulations, and visualization Who This Book Is For This book is for Splunk developers looking to learn advanced strategies to deal with big data from an enterprise architectural perspective. It is expected that readers have a basic understanding and knowledge of using Splunk Enterprise. What You Will Learn Find out how to develop and manage apps in Splunk Work with important search commands to perform data analytics on uploaded data Create visualizations in Splunk Explore tweaking Splunk Integrate Splunk with any pre-existing application to perform data crunching efficiently and in real time Make your big data speak with analytics and visualizations using Splunk Use SDK and Enterprise integration with tools such as R and Tableau In Detail Master the power of Splunk and learn the advanced strategies to get the most out of your machine data with this practical advanced guide. Make sense of the hidden data of your organization – the insight of your servers, devices, logs, traffic and clouds. Advanced Splunk shows you how. Dive deep into Splunk to find the most efficient solution to your data problems. Create the robust Splunk solutions you need to make informed decisions in big data machine analytics. From visualizations to enterprise integration, this well-organized high level guide has everything you need for Splunk mastery. Start with a complete overview of all the new features and advantages of the latest version of Splunk and the Splunk Environment. Go hands on with uploading data, search commands for basic and advanced analytics, advanced visualization techniques, and dashboard customizing. Discover how to tweak Splunk to your needs, and get a complete on Enterprise Integration of Splunk with various analytics and visualization tools. Finally, discover how to set up and use all the new features of the latest version of Splunk. Style and approach This book follows a step by step approach. Every new concept is built on top of its previous chapter, and it is full of examples and practical scenarios to help the reader experiment as they read.
Mastering Apache Pulsar
Author: Jowanza Joseph
Publisher: "O'Reilly Media, Inc."
ISBN: 1492084875
Category : Computers
Languages : en
Pages : 243
Book Description
Every enterprise application creates data, including log messages, metrics, user activity, and outgoing messages. Learning how to move these items is almost as important as the data itself. If you're an application architect, developer, or production engineer new to Apache Pulsar, this practical guide shows you how to use this open source event streaming platform to handle real-time data feeds. Jowanza Joseph, staff software engineer at Finicity, explains how to deploy production Pulsar clusters, write reliable event streaming applications, and build scalable real-time data pipelines with this platform. Through detailed examples, you'll learn Pulsar's design principles, reliability guarantees, key APIs, and architecture details, including the replication protocol, the load manager, and the storage layer. This book helps you: Understand how event streaming fits in the big data ecosystem Explore Pulsar producers, consumers, and readers for writing and reading events Build scalable data pipelines by connecting Pulsar with external systems Simplify event-streaming application building with Pulsar Functions Manage Pulsar to perform monitoring, tuning, and maintenance tasks Use Pulsar's operational measurements to secure a production cluster Process event streams using Flink and query event streams using Presto
Publisher: "O'Reilly Media, Inc."
ISBN: 1492084875
Category : Computers
Languages : en
Pages : 243
Book Description
Every enterprise application creates data, including log messages, metrics, user activity, and outgoing messages. Learning how to move these items is almost as important as the data itself. If you're an application architect, developer, or production engineer new to Apache Pulsar, this practical guide shows you how to use this open source event streaming platform to handle real-time data feeds. Jowanza Joseph, staff software engineer at Finicity, explains how to deploy production Pulsar clusters, write reliable event streaming applications, and build scalable real-time data pipelines with this platform. Through detailed examples, you'll learn Pulsar's design principles, reliability guarantees, key APIs, and architecture details, including the replication protocol, the load manager, and the storage layer. This book helps you: Understand how event streaming fits in the big data ecosystem Explore Pulsar producers, consumers, and readers for writing and reading events Build scalable data pipelines by connecting Pulsar with external systems Simplify event-streaming application building with Pulsar Functions Manage Pulsar to perform monitoring, tuning, and maintenance tasks Use Pulsar's operational measurements to secure a production cluster Process event streams using Flink and query event streams using Presto
Mastering Splunk 8
Author: James D. Miller
Publisher:
ISBN: 9781838987480
Category : Computers
Languages : en
Pages : 456
Book Description
This book will cover Splunk's offerings to efficiently capture, index, and correlate data from a searchable repository all in real-time to generate insightful graphs, reports, dashboards, and alerts. Developers and architects alike can be in high demand if they become experts with this tool.
Publisher:
ISBN: 9781838987480
Category : Computers
Languages : en
Pages : 456
Book Description
This book will cover Splunk's offerings to efficiently capture, index, and correlate data from a searchable repository all in real-time to generate insightful graphs, reports, dashboards, and alerts. Developers and architects alike can be in high demand if they become experts with this tool.
Mastering Non-Functional Requirements
Author: Sameer Paradkar
Publisher: Packt Publishing Ltd
ISBN: 178829789X
Category : Computers
Languages : en
Pages : 224
Book Description
This book covers the most critical 24 NFRs that are applicable to IT applications and systems. About This Book Explains three stages of nonfunctional requirements, that is, analysis, architecture, and assessment In-depth knowledge of NFR framework and taxonomy that provides guidance around the modelling phase for the NFRs Coverage of 24 critical and pivotal NFRs, including the analysis, architecture, and assessment. Who This Book Is For The primary audience for this title are the gamut of roles starting from IT consultant to chief architects who are responsible to deliver strategic, tactical, and operational engagements for fortune 100 customers worldwide. Nonfunctional requirements are the key to any software / IT program. They cannot be overlooked or ignored. The book provides a comprehensive approach from analysis, architecture, and measurement of nonfunctional requirements. The book includes considerations for bespoke (Java, .Net, and COTS applications). These are applicable to IT applications from various domains. The book outlines the methodology for capturing the NFRs and also describes a framework that can be leveraged by analysts and architects for tackling NFRs for various engagements. The audience for this book include business analysts, enterprise architects, business architects, solution architects, technical architects/designers, domain/security/integration architects, software developers, support engineers and test engineers, technical project managers, project leads/technical leads/technical project managers, and students from the computer science/IT stream What You Will Learn Learn techniques related to the analysis, architecture, and monitoring of NFRs Understand the various tools, techniques, and processes in order to improve the overall quality of the desired outcomes Embrace the best practices of architecting, metrics, and success factors for NFRs Identify the common pitfalls to be avoided and the patterns to leverage Understand taxonomy and framework for NFRs Learn the design guidelines for architecting applications and systems relating to NFRs Abstract different methodologies to analyze and gather NFRs In Detail Non-functional Requirements are key to any software/IT program and cannot be overlooked or ignored. This book provides a comprehensive approach to the analysis, architecture, and measurement of NFRs. It includes considerations for bespoke Java, .NET, and COTS applications that are applicable to IT applications/systems in different domains. The book outlines the methodology for capturing the NFRs and also describes a framework that can be leveraged by analysts and architects for tackling NFRs for various engagements. This book starts off by explaining the various KPIs, taxonomies, and methods for identifying NFRs. Learn the design guidelines for architecting applications and systems relating to NFRs and design principles to achieve the desired outcome. We will then move on to various key tiers/layers and patterns pertaining to the business, database, and integrating tiers. After this, we will dive deep into the topics pertaining to techniques related to monitoring and measurement of NFRs, such as sizing, analytical modeling, and quality assurance. Lastly, we end the book by describing some pivotal NFRs and checklists for the software quality attributes related to the business, application, data, and infrastructure domains. Style and approach The book takes a pragmatic approach, describing various techniques related to the analysis of NFRs, the architecture of NFRs, and assessment of NFRs.
Publisher: Packt Publishing Ltd
ISBN: 178829789X
Category : Computers
Languages : en
Pages : 224
Book Description
This book covers the most critical 24 NFRs that are applicable to IT applications and systems. About This Book Explains three stages of nonfunctional requirements, that is, analysis, architecture, and assessment In-depth knowledge of NFR framework and taxonomy that provides guidance around the modelling phase for the NFRs Coverage of 24 critical and pivotal NFRs, including the analysis, architecture, and assessment. Who This Book Is For The primary audience for this title are the gamut of roles starting from IT consultant to chief architects who are responsible to deliver strategic, tactical, and operational engagements for fortune 100 customers worldwide. Nonfunctional requirements are the key to any software / IT program. They cannot be overlooked or ignored. The book provides a comprehensive approach from analysis, architecture, and measurement of nonfunctional requirements. The book includes considerations for bespoke (Java, .Net, and COTS applications). These are applicable to IT applications from various domains. The book outlines the methodology for capturing the NFRs and also describes a framework that can be leveraged by analysts and architects for tackling NFRs for various engagements. The audience for this book include business analysts, enterprise architects, business architects, solution architects, technical architects/designers, domain/security/integration architects, software developers, support engineers and test engineers, technical project managers, project leads/technical leads/technical project managers, and students from the computer science/IT stream What You Will Learn Learn techniques related to the analysis, architecture, and monitoring of NFRs Understand the various tools, techniques, and processes in order to improve the overall quality of the desired outcomes Embrace the best practices of architecting, metrics, and success factors for NFRs Identify the common pitfalls to be avoided and the patterns to leverage Understand taxonomy and framework for NFRs Learn the design guidelines for architecting applications and systems relating to NFRs Abstract different methodologies to analyze and gather NFRs In Detail Non-functional Requirements are key to any software/IT program and cannot be overlooked or ignored. This book provides a comprehensive approach to the analysis, architecture, and measurement of NFRs. It includes considerations for bespoke Java, .NET, and COTS applications that are applicable to IT applications/systems in different domains. The book outlines the methodology for capturing the NFRs and also describes a framework that can be leveraged by analysts and architects for tackling NFRs for various engagements. This book starts off by explaining the various KPIs, taxonomies, and methods for identifying NFRs. Learn the design guidelines for architecting applications and systems relating to NFRs and design principles to achieve the desired outcome. We will then move on to various key tiers/layers and patterns pertaining to the business, database, and integrating tiers. After this, we will dive deep into the topics pertaining to techniques related to monitoring and measurement of NFRs, such as sizing, analytical modeling, and quality assurance. Lastly, we end the book by describing some pivotal NFRs and checklists for the software quality attributes related to the business, application, data, and infrastructure domains. Style and approach The book takes a pragmatic approach, describing various techniques related to the analysis of NFRs, the architecture of NFRs, and assessment of NFRs.
Mastering Cybersecurity
Author: Akashdeep Bhardwaj
Publisher: CRC Press
ISBN: 1040262481
Category : Computers
Languages : en
Pages : 297
Book Description
In today’s ever‐evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyberdefender. The handbooks take you through the journey of ten essential aspects of practical learning and mastering cybersecurity aspects in the form of two volumes. Volume 1: The first volume starts with the fundamentals and hands‐on of performing log analysis on Windows and Linux systems. You will then build your own virtual environment to hone your penetration testing skills. But defense isn’t just about identifying weaknesses; it’s about building secure applications from the ground up. The book teaches you how to leverage Docker and other technologies for application deployments and AppSec management. Next, we delve into information gathering of targets as well as vulnerability scanning of vulnerable OS and Apps running on Damm Vulnerable Web Application (DVWA), Metasploitable2, Kioptrix, and others. You’ll also learn live hunting for vulnerable devices and systems on the Internet. Volume 2: The journey continues with volume two for mastering advanced techniques for network traffic analysis using Wireshark and other network sniffers. Then, we unlock the power of open‐source intelligence (OSINT) to gather valuable intel from publicly available sources, including social media, web, images, and others. From there, explore the unique challenges of securing the internet of things (IoT) and conquer the art of reconnaissance, the crucial first stage of ethical hacking. Finally, we explore the dark web – a hidden corner of the internet – and learn safe exploration tactics to glean valuable intelligence. The book concludes by teaching you how to exploit vulnerabilities ethically during penetration testing and write pen test reports that provide actionable insights for remediation. The two volumes will empower you to become a well‐rounded cybersecurity professional, prepared to defend against today’s ever‐increasing threats.
Publisher: CRC Press
ISBN: 1040262481
Category : Computers
Languages : en
Pages : 297
Book Description
In today’s ever‐evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyberdefender. The handbooks take you through the journey of ten essential aspects of practical learning and mastering cybersecurity aspects in the form of two volumes. Volume 1: The first volume starts with the fundamentals and hands‐on of performing log analysis on Windows and Linux systems. You will then build your own virtual environment to hone your penetration testing skills. But defense isn’t just about identifying weaknesses; it’s about building secure applications from the ground up. The book teaches you how to leverage Docker and other technologies for application deployments and AppSec management. Next, we delve into information gathering of targets as well as vulnerability scanning of vulnerable OS and Apps running on Damm Vulnerable Web Application (DVWA), Metasploitable2, Kioptrix, and others. You’ll also learn live hunting for vulnerable devices and systems on the Internet. Volume 2: The journey continues with volume two for mastering advanced techniques for network traffic analysis using Wireshark and other network sniffers. Then, we unlock the power of open‐source intelligence (OSINT) to gather valuable intel from publicly available sources, including social media, web, images, and others. From there, explore the unique challenges of securing the internet of things (IoT) and conquer the art of reconnaissance, the crucial first stage of ethical hacking. Finally, we explore the dark web – a hidden corner of the internet – and learn safe exploration tactics to glean valuable intelligence. The book concludes by teaching you how to exploit vulnerabilities ethically during penetration testing and write pen test reports that provide actionable insights for remediation. The two volumes will empower you to become a well‐rounded cybersecurity professional, prepared to defend against today’s ever‐increasing threats.
Mastering Windows Network Forensics and Investigation
Author: Steve Anson
Publisher: John Wiley & Sons
ISBN: 1118236084
Category : Computers
Languages : en
Pages : 663
Book Description
An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals. Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or network Places a special emphasis on how to thoroughly investigate criminal activity and now just perform the initial response Walks you through ways to present technically complicated material in simple terms that will hold up in court Features content fully updated for Windows Server 2008 R2 and Windows 7 Covers the emerging field of Windows Mobile forensics Also included is a classroom support package to ensure academic adoption, Mastering Windows Network Forensics and Investigation, 2nd Edition offers help for investigating high-technology crimes.
Publisher: John Wiley & Sons
ISBN: 1118236084
Category : Computers
Languages : en
Pages : 663
Book Description
An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals. Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or network Places a special emphasis on how to thoroughly investigate criminal activity and now just perform the initial response Walks you through ways to present technically complicated material in simple terms that will hold up in court Features content fully updated for Windows Server 2008 R2 and Windows 7 Covers the emerging field of Windows Mobile forensics Also included is a classroom support package to ensure academic adoption, Mastering Windows Network Forensics and Investigation, 2nd Edition offers help for investigating high-technology crimes.
Mastering Business Intelligence with MicroStrategy
Author: Dmitry Anoshin
Publisher: Packt Publishing Ltd
ISBN: 1785886266
Category : Computers
Languages : en
Pages : 389
Book Description
Build world-class enterprise Business Intelligence solutions with MicroStrategy 10 About This Book Fix the gap between BI tools and implementation/integration processes with big data and predictive analytics using this comprehensive guide to MicroStrategy 10 Highly practical, example-rich guide that lets you implement business intelligence with MicroStrategy 10 in your organization Create the best user experience with BI dashboards using MicroStrategy using this up-to-date, comprehensive guide Who This Book Is For This book is intended for BI, DWH, ETL developers, BI/DWH/Analytics managers, analysts, and business users who already have MicroStrategy in their organization and want to take it to the next level in order to increase performance and improve user experience. In addition, it helps the reader to migrate from MicroStrategy 9 to MicroStrategy 10 and to start using the new capabilities. What You Will Learn Explore various visualization techniques for presenting analyzed data Customize MicroStrategy in order to meet your business requirements Develop and design mobile dashboards Use the advanced techniques such as designing reports, documents and interactive dashboards for building dashboards Understand the concepts of data discovery and Desktop capabilities Explore the best practices for Microstrategy system administration Find and fix issues based on connections, environment or documents Integrate third party ESRI map tools with MicroStrategy to create geo based reports In Detail Business intelligence is becoming more important by the day, with cloud offerings and mobile devices gaining wider acceptance and achieving better market penetration. MicroStrategy Reporting Suite is an absolute leader in the BI market and offers rich capabilities from basic data visualizations to predictive analytics. It lets you various delivery methods such as the Web, desktops, and mobiles. Using real-world BI scenarios, this book helps you to implement Business Analytics solutions in big e-commerce companies. It kicks off with MicroStrategy 10 features and then covers schema design models and techniques. Building upon your existing knowledge, the book will teach you advanced techniques for building documents and dashboards. It further teaches various graphical techniques for presenting data for analysis using maps, graphs, and advanced charts. Although MicroStrategy has rich functionality, the book will show how to customize it in order to meet your business requirements. You will also become familiar with the native analytical functions that will help you to maximize the impact of BI solutions with powerful predictive analytics. Furthermore, the book will focus on MicroStrategy Mobile Analytics along with data discovery and desktop capabilities such as connecting various data sources and building interactive dashboards. The book will also uncover best practices, troubleshooting techniques for MicroStrategy system administration, and also security and authentication techniques. Lastly, you will learn to use Hadoop for MicroStrategy reporting. By the end of the book, you will become proficient in evaluating any BI software in order to choose the best one that meets all business requirements. Style and approach This book will be focusing on providing extensive guide to plan how to design and develop complex BI architecture for real world scenario, using Microstrategy 10, best practices and collected experience working with BI, predictive analytics, and Microstrategy and big data.
Publisher: Packt Publishing Ltd
ISBN: 1785886266
Category : Computers
Languages : en
Pages : 389
Book Description
Build world-class enterprise Business Intelligence solutions with MicroStrategy 10 About This Book Fix the gap between BI tools and implementation/integration processes with big data and predictive analytics using this comprehensive guide to MicroStrategy 10 Highly practical, example-rich guide that lets you implement business intelligence with MicroStrategy 10 in your organization Create the best user experience with BI dashboards using MicroStrategy using this up-to-date, comprehensive guide Who This Book Is For This book is intended for BI, DWH, ETL developers, BI/DWH/Analytics managers, analysts, and business users who already have MicroStrategy in their organization and want to take it to the next level in order to increase performance and improve user experience. In addition, it helps the reader to migrate from MicroStrategy 9 to MicroStrategy 10 and to start using the new capabilities. What You Will Learn Explore various visualization techniques for presenting analyzed data Customize MicroStrategy in order to meet your business requirements Develop and design mobile dashboards Use the advanced techniques such as designing reports, documents and interactive dashboards for building dashboards Understand the concepts of data discovery and Desktop capabilities Explore the best practices for Microstrategy system administration Find and fix issues based on connections, environment or documents Integrate third party ESRI map tools with MicroStrategy to create geo based reports In Detail Business intelligence is becoming more important by the day, with cloud offerings and mobile devices gaining wider acceptance and achieving better market penetration. MicroStrategy Reporting Suite is an absolute leader in the BI market and offers rich capabilities from basic data visualizations to predictive analytics. It lets you various delivery methods such as the Web, desktops, and mobiles. Using real-world BI scenarios, this book helps you to implement Business Analytics solutions in big e-commerce companies. It kicks off with MicroStrategy 10 features and then covers schema design models and techniques. Building upon your existing knowledge, the book will teach you advanced techniques for building documents and dashboards. It further teaches various graphical techniques for presenting data for analysis using maps, graphs, and advanced charts. Although MicroStrategy has rich functionality, the book will show how to customize it in order to meet your business requirements. You will also become familiar with the native analytical functions that will help you to maximize the impact of BI solutions with powerful predictive analytics. Furthermore, the book will focus on MicroStrategy Mobile Analytics along with data discovery and desktop capabilities such as connecting various data sources and building interactive dashboards. The book will also uncover best practices, troubleshooting techniques for MicroStrategy system administration, and also security and authentication techniques. Lastly, you will learn to use Hadoop for MicroStrategy reporting. By the end of the book, you will become proficient in evaluating any BI software in order to choose the best one that meets all business requirements. Style and approach This book will be focusing on providing extensive guide to plan how to design and develop complex BI architecture for real world scenario, using Microstrategy 10, best practices and collected experience working with BI, predictive analytics, and Microstrategy and big data.