Category : C2 Fall 2020

C2 Fall 2020

Protecting Your Most Valuable Asset Demands A New Approach To Cybersecurity

Cohesity
Today, data is likely your most valuable and vulnerable strategic asset, and yet many of the methods for storing and protecting it are decades old. Data is not only a record of what has happened;...
C2 Fall 2020

Lisa Partridge of XYPRO Technology Corporation: How We Plan To Rebuild In The Post COVID Economy

Charlie Katz
Everything that happens is ultimately my responsibility. Period. However, one cannot and should not do it all alone. No one person has all the answers and think of all the perspectives to consider when making...
Around the Storage Block C2 Fall 2020 Storage

Around The Storage Block

Calvin Zito
We spend a lot of time and energy talking about HPE Primera and HPE Nimble Storage – for good reason as I really believe they are the best one-two punch of mid-range and Tier-0 mission...
C2 Fall 2020 Editors' Picks

Five steps to transform to on-premises cloud services

Erik Vogel
Not all applications can be run in the public cloud. Here's how to get the cloud to come to you. By now, the benefits of the cloud are well known: reduced costs, improved scalability, increased...
C2 Fall 2020

Möbius Partners Success Story: Improving Cluster Management and System Updates

Kevin D. Hall
Recently Möbius Partners worked with a client who lacked high-performance computing (HPC) cluster manageability tools that resulted in non-standardized operating systems and patching inconsistencies. This customer entrusted our team to provide a solution that would...
C2 Fall 2020 Digital Transformation Education and Training

Working—and Thriving—in the Age of Digital Transformation

Hewlett Packard Enterprise
In the past decade, we’ve experienced a global acceleration of digital transformation as many things that we once did in-person are now routinely done online—communicating, shopping, dating, finding entertainment, and applying for jobs, to name...
C2 Fall 2020 comforte

End-to-End Cloud Data Security: Shouldn’t It Be a No-Brainer?

comforte
Hardly a week goes by without news of a high-profile data breach. Sometimes, the damage is quite limited either due to the low market value of the apprehended data, the strength of the data security...
C2 Fall 2020

Integrate Your HPE NonStop Servers with SailPoint Identity Governance

XYPRO Team
Whether you need to provision users on one or multiple HPE NonStop servers, XYGATE Identity Connector (XIC) elegantly integrates your NonStop servers with your SailPoint enterprise solution.  Achieve user governance, provisioning and reconciliation of HPE...
C2 Fall 2020

How REI used automation to cloudify infrastructure and rapidly adjust its digital pandemic response

Dana Gardner
Like many retailers, Recreational Equipment, Inc. (REI) was faced with drastic and rapid change when the COVID-19 pandemic struck. REI’s marketing leaders wanted to make sure that their online e-commerce capabilities would rise to the...