Understanding the approximate nearest neighbor (ANN) algorithm
Elastic Blog
by The Elastic Platform team
2d ago
If you grew up in a time before the internet made its debut, you’ll remember it wasn’t always easy to find new things to like. We discovered new bands when we happened to hear them on the radio, we’d see a new TV show by accident because we forgot to change the channel, and we’d find a new favorite video game based almost entirely on the picture on the cover.  Nowadays, things are very different. Spotify will point me to artists that match my tastes, Netflix will highlight movies and TV shows it knows we’ll enjoy, and Xbox knows what we’ll probably want to play next. These recommendation ..read more
Visit website
Elastic Universal Profiling agent, a continuous profiling solution, is now open source
Elastic Blog
by Israel Ogbole,Christos Kalkanis
2d ago
..read more
Visit website
Sovereign solutions for sensitive workloads: Elastic on Google Distributed Cloud Hosted
Elastic Blog
by Valerio Arvizzigno
4d ago
Maintaining sovereignty over sensitive workloads is paramount, especially in industries like public sector and telecommunications. Combining this need with cloud adoption and the innovation acceleration it provides is not always an easy path. Thus, sovereign cloud solutions, ensuring data residency, regulatory compliance, and security become indispensable for organizations dealing with highly sensitive data. With data sovereignty, organizations retain control over their data, mitigating risks associated with data breaches, regulatory noncompliance, and geopolitical considerations. Elastic prio ..read more
Visit website
Zero Trust requires unified data
Elastic Blog
by Woody Walton,Michael Young
4d ago
It’s vital to have a common understanding and shared context for complex technical topics. The previously adopted perimeter model of security has become outdated and inadequate. Zero Trust (ZT) is the current security model being designed and deployed across the US federal government. It’s important to point out that ZT is not a security solution itself. Instead, it’s a security methodology and framework that assumes threats exist both inside and outside of an environment.  The ZT security model has two parts: Zero Trust Architecture (ZTA) and Zero Trust Network Access (ZTNA). ZTA focuses ..read more
Visit website
NLP vs. LLMs: Understanding the differences
Elastic Blog
by The Elastic Platform team
4d ago
As AI continues to grow and solve problems across countless industries, a key part of that tech is the ability to seamlessly bridge the gap between human language and machine understanding. This is where natural language processing (NLP) and large language models (LLMs) come in. They provide distinct and specialized approaches for connecting the power of human communication with software and machines. Or in simpler terms, NLP and LLMs enable us to have human-like conversations with software. NLP is the translator, analyzing and manipulating human language based on defined rules and structures ..read more
Visit website
Improving the event queue in Elastic Agent and Beats
Elastic Blog
by Fae Charlton,Alexandros Sapranidis
1w ago
In version 8.12, we introduced performance presets — a simpler way to tune Elastic Agent and Beats for a variety of scenarios. This improved performance for common environments without the fine-tuning that was often required in the past.  Starting with version 8.13, we focused on improving our internal libraries to better support these presets. The result was a rewrite of our internal event queue that brings reduced memory usage to all Beats. In our internal benchmark suite, Filebeat 8.13 showed memory reductions of about 20% on all presets. In this post we'll look at how we achieved that ..read more
Visit website
Telco as a Service (TaaS) with Elastic and Wilab
Elastic Blog
by Piotr Kobziakowski,Juergen Obermann,Martin Ferreyra,Tomas Achaval-Palacio
1w ago
Telco as a Service (TaaS) is poised to revolutionize the telecom industry by enabling operators to dynamically create and offer applications using open network capabilities and data. This model mirrors the successful approach of digital app stores like Apple's App Store but with a new universe of data that comes from the telecom ecosystem. By leveraging TaaS, telecom operators can rapidly develop and deploy new services and applications, tapping into a wealth of network data and capabilities. This not only fosters innovation but also enables telecom companies to respond swiftly to market deman ..read more
Visit website
Vector database vs. graph database: Understanding the differences
Elastic Blog
by The Elastic Platform team
1w ago
Big data management isn’t just about storing as much data as possible. It’s about being able to identify meaningful insights, discover hidden patterns, and make informed decisions. This quest for advanced analytics has been the driving force behind innovations in data modeling and storage solutions, way beyond traditional relational databases. Two of these innovations are vector databases and graph databases. Both are significant advancements in managing data, providing unique data structures with their own distinct strengths. But you need to have an understanding of how they work and how they ..read more
Visit website
Elastic Stack 7.17.20 released
Elastic Blog
by Maha Alsayasneh
1w ago
..read more
Visit website
Tracing history: The generative AI revolution in SIEM
Elastic Blog
by Mike Nichols,Mike Paquette
1w ago
The cybersecurity domain mirrors the physical space, with the security operations center (SOC) acting as your digital police department. Cybersecurity analysts are like the police, working to deter cybercriminals from attempting attacks on their organization or stopping them in their tracks if they try it. When an attack occurs, incident responders, akin to digital detectives, piece together clues from many different sources to determine the order and details of events before  building a remediation plan. To accomplish this goal, teams stitch together numerous (sometimes dozens) of produc ..read more
Visit website

Follow Elastic Blog on FeedSpot

Continue with Google
Continue with Apple
OR