On November 11, I was lucky enough to attend Commvault SHIFT in NYC. I’m no stranger to data protection, or Commvault. This was a great opportunity to dive deeper into some of Commvault’s newest products and technology. Commvault Cloud Unity One of the top asks for any customer of any platform is always a “single pane …
Vulnerability
We didn't find any posts for your search term.
Latest Posts
During the rise of AI, NVIDIA has become almost a household name. Even those outside of tech have heard of the company at this point. Until recently, NVIDIA was best known for graphics cards, but those same GPUs have taken on a whole new life in the age of AI. The truth is, NVIDIA is …
AI native GPU clouds are powering the next wave of intelligence. I’ve been designing private clouds for over 20 years, and I’ve been very vocal about my disdain for the cloud. More specifically, the cloud done wrong. Have I architected hybrid cloud solutions? Absolutely, but I’ve done them right. The most frustrating thing about the …
If you haven’t heard the letters AI recently, you probably aren’t even reading this. AI is everywhere we look, even beyond the technology industry. Regular people are using ChatGPT in their daily life, and there are AI commercials on TV. In the technology world every vender boasts some sort of AI feature in their product, because, well, they …
M365 SharePoint, OneDrive, Teams and Groups are managed in different consoles and often times by different administrators and in some cases even by the power user. Without centralized visibility into these permissions and reporting enterprises may be left with governance issues that expose enterprise data to the wrong internal and external teams. Being able to …
Recently I spent some time reviewing the ESI Benchmark Report from Hornet security and found some valuable insights. Also, as a long-time practitioner deploying email infrastructure and including deploying methods of phishing prevention, my interest in this topic and its evolution is still top of mind. The other pinnacle consideration here for your enterprises is that phishing attacks …






