A Striated Strategy at Strata
  • Published in

Just home from the latest Strata+Hadoop World in NYC, with over 6,700 participants and at least 150 vendors, and I wanted to share some reflections on the event and the big data market as a whole.

Read More
On the Lookout for These Three at AWS re:Invent 2015
  • Published in

Wait! AWS re:Invent is next week? Thankfully Amazon did not opt for the December date being bandied about and chose a date early in the quarter to avoid travelling around the holidays. And how this event has grown. When I first attended in 2013, attendance had doubled from 2012 to 6,000 and then...

Read More
Ericsson – growth in a changing ICT world
  • Published in

I attended Ericsson’s North American industry analyst day and was pleased to see their progress in transitioning themselves into the new world of mobile networks where apps ultimately drive the change. Theyre also getting ready for 5G networks. As most readers are aware, mobile networks are...

Read More
The End of the Beginning...
  • Published in

The End of the Beginning... Earlier this week, AT&T made an exciting announcement about their Network on Demand platform. They are enhancing it with Juniper’s NFV/virtualization technologies and deploying vCPE (Virtual Customer Premises Equipment), a solution...

Read More
Network Security: It’s a Zero-Sum Game

Network Security: It’s a Zero-Sum Game Make sure you win it with...

Read More
Eight Ways to Heighten Cybersecurity

Eight Ways to Heighten Cybersecurity As our world has become ever...

Read More
Extending Operational Intelligence for GigaSECURE with Gigamon Visibility App for Splunk

Next generation business infrastructures and their IT operations teams rely on a variety of tools...

Read More
Securing the Promise of SDDC Micro-segmentation

SDDCs promise to dramatically increase the security of data centers using NSX micro-segmentation...

Read More
Rethink of Security Architecture Means Opportunity for Channel Partners

The massive data breaches that are dominating headlines nearly daily are forcing a reimagining of...

Read More

Videos

DCW Asia 2025 - Part 1 of 3
Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...

News

NetApp outlines its strategy to help ASEAN businesses scale AI responsibly with resilient, governed, and high-performance data infrastructure.
ABBYY announces its 2026 MVP Class, celebrating global experts advancing automation with Document and Process AI.
Arctic Wolf highlights a surge in data-theft extortions and remote access threats in its latest threat report.
Vertiv partners with the University of Bologna to drive digital infrastructure advancement and foster knowledge development over a five-year collaboration.