Tag : ConnectConverge

C2 Winter 2021 Editors' Picks

Maximize your cloud experience everywhere

Alexey Gerasimov
I often get asked if people really care about Hybrid Cloud. Of course, customers do. Not only do they care, but it’s also the reality. According to the latest State of the Cloud report from...
Articles C2 Winter 2021 Cloud Data

The Year in Review Around the Storage Block

Calvin Zito
Wow, what happened to 2021! You’d think all the time spent at home over the last 20 months would mean 2021 would crawl by but that’s not the case. I’m particularly reflective as I write...
Articles C2 Winter 2021 Data Data Security

How to Safeguard Your Data & Applications from Ransomware

Cohesity
It’s ugly out there. Each week, we all see the news reports about more and more companies and organizations falling victim to ransomware and the trend is accelerating. No doubt, you or your colleagues work...
Articles C2 Winter 2021 Data Data Security Data Storage

Getting the most from your data-driven transformation: 10 key principles

Hewlett Packard Enterprise
Best practices like determining what makes data valuable and creating company cultures that promote data sharing will enable businesses to embrace data in the modern enterprise....
AI AI-driven infrastructure Articles Artificial Intelligence C2 Winter 2021 Data Data Security

Democratization of AI in the Enterprise

Frederic Van Haren
The democratization of Artificial Intelligence (AI) makes it easier for organizations to transform their business with AI. It wasn't that long ago that applying AI to transform a business required a lot of technical expertise...
Articles C2 Winter 2021 Data Solutions Mission Critical

XYPRO – Best of NonStop 2021

Steve Tcherchian
Have we become numb to the news of security breaches? Unfortunately, the attacks on our businesses, personal lives and even global infrastructure are not slowing down. Cybercrime is up over 600% during the pandemic. According...
https://insights.comforte.com/hubfs/data%20protection%20methods%20blog%20header.jpeg
Articles C2 Winter 2021 Data Data Security

Getting Started with Data-centric Security

Dan Simmons
With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is...
Articles C2 Winter 2021 Data

To bring strategy back into your security, turn to chess

Ramsés Gallego
In a game of chess, skilled players need to think in two ways at once. Tactically, they need to be able to respond to the immediate situation on the board, countering threats and finding ways...
Articles C2 Fall 2021 Innovation Leadership remote work

The Flip Side

Gaye Clemson
It’s refreshing to me to occasionally see honest viewpoints expressed on LinkedIn regarding the various stresses people feel in their day-to-day work lives. Regardless of its actual existence pre-COVID, work/life balance is officially over, replaced by a...