Product Marketing is often considered the tip of the spear for a marketing team. Product marketing decides on what messages should be brought to market — and then those messages are driven into the market thanks to the heft of the shaft, comprised of all the programs run by the rest of the marketing team.
If product marketing crafts weak messages, your tip will be blunt, and you won’t penetrate your target market. And no amount of marketing programs will help.
But here’s the rub: while nearly your entire marketing department’s performance is quantified and tracked over time, product marketing’s…
I often get people asking me how to get started in racing the Laser, aka ILCA Dinghy. For a lot of sailors, the simplicity and ubiquity of the Laser is incredibly compelling — you can find a fleet just about anywhere in the world — heck, the 2020 Olympics even have Laser sailors from Papua New Guinea and Mozambique — there are plenty of events, and boats to buy or borrow are plentiful.
If you sail a Laser (also called ILCA Dinghy), and launch your boat on a ramp, you don’t want to be “that person” blocking the ramp and keeping others from launching. This can be stressful for everyone, especially when your fellow sailors are trying to get out in time for the starting signal of a race.
And at the end of the day, it can be annoying if you’re blocking others and taking a lot time to get your boat off the ramp and out of the water. No one likes a ramp hog!
Looking back at a recent Gartner Security & Risk Summit, a recurring theme was the SaaS Tsunami — the security and compliance issues that arise from the surprisingly large number of SaaS apps in use at companies — and how to address it.
To understand the SaaS Tsunami, ask yourself this question: How many SaaS apps is my organization using?
Do you think it’s 25? 100?
Over the past few years, the IoT community has embraced InfluxDB as a cornerstone of the solutions they build. Whether modernizing or greenfield, InfluxDB has helped many in working with vast quantities of sensor and device data as we continue to deliver on our promise of time to awesome for IoT.
Today, let’s look at why you should consider InfluxDB for your IoT data architecture, how to plan your IoT architecture, and what we’ve built recently to make InfluxDB even better at handling IoT data.
So, let’s dive in!
It boils down to a few things:
Here at InfluxData, we’ve been focusing recently on deepening our support for Microsoft Azure. First we turned on InfluxDB Cloud on Azure West Europe, in Amsterdam, back in July. Then we launched InfluxDB Cloud on Azure East US, in Virginia, in September. Today, we’re pleased to announce that InfluxDB Cloud joins InfluxDB Enterprise on Azure Marketplace.
InfluxDB integrates with a broad range of technologies related to Azure and Microsoft more broadly; here’s a visual representation. Microsoft-related technologies are in gray, while InfluxDB components are in purple.
At InfluxData, we believe it makes sense to use a time series database for security monitoring. In summary, it’s because security investigations are inevitably time-oriented — you want to monitor and alert on who accessed what, from where, at which time — and time series databases like InfluxDB are very efficient at querying the data necessary to do this.
In this post, we’d like to show you the beginnings of how we’re using InfluxDB for security monitoring so that you can apply these patterns to your own organization.
The first question: where to begin our security event monitoring? Since most…
At InfluxData, we focus on our customers’ productivity — time to awesome, as we call it. Usually this is about product capabilities — InfluxDB’s features, speed, scalability, etc.
But for some, your project will grow in size to the point where you need to purchase InfluxDB. And in some cases, you’ll need your compliance and/or security teams to sign off on the purchase. While that can be a slow process in the best of times, choosing a vendor with SOC 2 certification can help move things along faster, allowing you to go back to focusing on building apps and systems.
Recently one of my neighbors wrote:
We’re all familiar with the rampant garage break ins in our hood, but I felt compelled to post because there was an aspect of our break-in that I haven’t seen posted.
We got Ring cameras for the very purpose of deterring a break in like these and/ or getting footage if there was a perpetrator. Our garage was broken into last week and my bike stolen. …
The learning curve is steep, and I mean precipitous. I had to learn vim first, and then I read piles of configuration examples to get things working properly. Most of the documentation isn’t great.
In other words, command line interfaces (or CLIs for short) are powerful but not user-friendly. This might seem like an arcane problem, but it’s not. For any developer-first company like Twilio, Stripe, Hashicorp, or AWS, terminal usage is crucial piece of the user experience. …