Hemant Seth's Blog Posts

Hemant is a Principal Product Manager at Splunk, leading the Kubernetes Monitoring offering within Splunk Observability Cloud. Prior to this role, he focused on Splunk Observability Platform administration, including identity management and license usage. Hemant brings over a decade of experience in the observability domain and holds a Master’s degree in Electrical Engineering with a specialization in Telecommunications.

Edge AI Explained: A Complete Introduction
Learn
7 Minute Read

Edge AI Explained: A Complete Introduction

Edge AI revolutionizes tech by processing data locally on devices, ensuring faster responses, enhanced privacy, and reduced internet reliance.
Building a Leading Observability Practice Starts With Culture
Cto Stack
5 Minute Read

Building a Leading Observability Practice Starts With Culture

Discover how leading organizations build resilient observability practices, boost innovation, and foster a culture of excellence. Insights from the State of Observability 2024 report.
APAC in 2025: A Harder Look at AI, Data and Cybersecurity Standards
Leadership
4 Minute Read

APAC in 2025: A Harder Look at AI, Data and Cybersecurity Standards

Splunk's Simon Davies dives into our Splunk Predictions 2025 report and breaks down three key trends that will be pertinent to the APAC region in the year ahead.
Business Continuity vs. Business Resilience: What's The Difference?
Learn
6 Minute Read

Business Continuity vs. Business Resilience: What's The Difference?

Business resilience is a key trend this year, so let’s outline the differences between business continuity and resilience. Hint: one’s a process, one is much more.
RBAC vs. ABAC: Role-Based & Attribute-Based Access Control Compared
Learn
6 Minute Read

RBAC vs. ABAC: Role-Based & Attribute-Based Access Control Compared

Compare RBAC vs ABAC: Learn the pros, cons, and use cases of Role-Based & Attribute-Based Access Control to enhance security and simplify management.
Threat Detection, Explained
Learn
5 Minute Read

Threat Detection, Explained

Threat detection is fundamental to any cybersecurity practice. Learn what this term means and how to get started with it in this article.