Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
SAN FRANCISCO, CA -- (Marketwired) -- 05/04/15 -- Jut, the Operations Data Hub, today announced that it was one of three companies included in Gartner's list of "Cool Vendors" in IT Operations Analytics (ITOA) for 2015. The Jut platform lets users easily analyze streaming and historical operational data, including structured metrics and less-structured log and events data, in order to improve IT development and operations.
"We're thrilled to see Gartner recognize the power that comes from bringing together all types of operational data and leveraging dataflow for streaming and in-memory processing," said Steve McCanne, founder and CEO at Jut. "Enterprises are just beginning to realize the full value of being able to quickly and easily understand this complex data for everything from better performance monitoring and faster troubleshooting to continuous delivery."
Gartner noted the "Cool Vendors" list in ITOA is meant to distinguish advanced technologies that help companies ingest, analyze and visualize rapidly growing datasets, including both structured and unstructured data. To that end, the report highlighted the fact that Jut accommodates both streaming and stored data, along with the composition of multiple, parallel streams. The platform's dataflow language Juttle was also called out for its ease of use and success helping users actually govern those streams and turn them into insight and action.
"In its approach to data, pattern discovery and anomaly detection, Jut is unique, and Gartner anticipates that its technology may form a hub around which many of the popular ITOA NoSQL datastores and machine-learning platforms will congregate," said Colin Fletcher and Will Cappelli, analysts at Gartner, in the report. "The technology should interest IT operations teams supporting availability and performance efforts, including DevOps initiatives focused on the provision of continuous feedback from production into development environments."
Jut was founded by Steve McCanne, who co-founded Riverbed and FastForward Networks, which was acquired by Inktomi and now a part of Yahoo. In 2013, Jut secured $20 million in Series B funding led by Accel Partners, LightSpeed Venture Partners and Wing. For more information on Jut, please visit http://www.jut.io.
About Jut
For organizations who depend on their software to be smart, fast, and reliable, they need streaming intelligence across all of their data. Jut is the Operations Data Hub -- the place where all logs, metrics, and events come together in order to provide a unique view of your entire system.
Are you curious about what your software is doing? If so, then you'll love Jut.
About Gartner Cool Vendors
Each year, Gartner identifies new Cool Vendors in key technology areas and publishes a series of research reports highlighting these innovative vendors and their products and services. The annual reports highlight emerging vendors that provide innovative technologies warranting attention from prospective customers.
Cool Vendor Disclaimer
Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Alyssa Oursler
jutpr@merrittgrp.com
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs