Media & Industry Thought Leadership
Sightline Resources & Content
Blog Posts
MQTT Protocol
MQTT (Message Queueing Telemetry Transport) is a simple, lightweight message publishing and subscribing network protocol. It is the standard protocol for Internet of Things (IoT) and Industry 4.0 messaging.
It is lightweight, low bandwidth, and functions well in high latency and unreliable environments, making it ideal in production environments. Devices send data (publish) to an MQTT Broker with a topic and a data payload, and devices can subscribe to that topic and subtopics and receive updates containing that data from the broker when the data changes. Topics can be defined to use several levels of depth and devices can subscribe to topics using wildcards allowing for dynamic changes when required.
Zero-Trust Data Security
Zero-Trust is a security concept and cybersecurity framework allowing an organization to aggressively defend itself, its data, and user permissions using an advanced system of automated security protocols. Zero-Trust is centered on the belief that organizations should not automatically trust anything inside or outside their perimeters and instead must verify anything and everything trying to connect to their systems before granting access.
Data Correlation
The EDM Correlation data analysis tool is designed to help users perform root cause analysis across multiple devices or systems. It compares the activity of one system over a given period with the activity of multiple other systems and identifies the most highly related data points. This allows EDM to create an intuitive visualization of related events across an entire network of mixed technology enabling root cause analysis to be performed more efficiently than ever before.
Data Forecasting
Forecasting uses historical data as inputs to make informed estimates that are predictive in determining the direction of future trends. Choosing appropriate forecasting techniques depends on the type of data being used and behavior of the data. For example, forecasting techniques used for “financial data” may not be appropriate for time series data like “computer server data” or “data center network activity data” (though underlying forecasting principles stay the same).
Colonial Pipeline-Attack-Profile
Brandon Witte Brandon Witte is the CEO of Sightline Systems, a global leader in…
New Software Release: EDM™ 5.16
Brandon Witte Brandon Witte is the CEO of Sightline Systems, a global leader in…
Use Cases
Ensuring Secure Access to Your Sightline Data
Learn how Sightline Systems ensures data security through robust encryption and SSL/TLS protocols, protecting data in transit and securing user access to their performance monitoring platform. This commitment to security, combined with real-time analytics, proactively identifies potential vulnerabilities, allowing businesses to operate confidently.
Case Study: Anomaly Detection, Observability Solutions, and Sightline EDM™
Pennsylvania’s Department of Human Services (DHS) faced challenges ensuring a smooth rollout of the Affordable Care Act (ACA) due to system integration complexities. To address these issues, DHS implemented Sightline EDM™, an observability solution. This tool enabled real-time monitoring, performance measurement, and infrastructure comparison, ultimately leading to reduced system outages, improved reliability, and a successful ACA implementation.
Sightline EDM’s Security Event Detection: Fortifying European Banks for Stringent EU Stress Tests and Regulations
Sightline EDM is a software solution designed to help banks monitor their corporate computing infrastructure and ensure security, efficiency, and compliance with regulations. The software offers features such as risk-based monitoring, anomaly detection, and real-time advanced predictive analysis.
Better Analytics, Better Bottom Lines
Better Analytics, Better Bottom LinesElevate Your Fish Farming Profits with AQUA Sightline! Welcome to…
Reduce Variability & Waste: Improving Manufacturing Processes with Centerlining Tools
Throughout a typical workday in a manufacturing plant, employees who oversee production processes spend…
Case Study: Discover how Sightline improved federal defense capacity planning through advanced analytics and data-driven strategies.
A large federal government agency composed of more than 8,000 employees was looking into performance monitoring solutions for Unisys mainframes.
eBooks
Sightline EDM 6.0.5 Release
At Sightline Systems, we prioritize continuous improvement, reliability, and transparency. The release of EDM…
Sightline EDM 6.0 Release
Sightline EDM 6.0 Release Notes Introduction Sightline EDM provides centralized data collection, alerting, archiving…
Powerful Predictive Analytics for Sheet & Film Extrusion
Learn how advances in artificial intelligence and machine learning have made it possible to automate anomaly detection to identify outliers and prevent downtime.
Use Case: Root Cause Analysis for IIoT Operations
Overview The industrial and manufacturing industries are faced with no shortage of unique…
Capacity Planning: 6 Steps to Automating IT Resource Management
This guide details the six steps proactive IT operations teams can take to automate capacity planning, reduce over-provisioning expenses and forecast capacity constraints in advance.
5 Steps for Automating Root Cause Analysis
This guide details the five steps proactive IT operations teams take to leverage anomaly detection and event correlation to reduce mean time to resolution.