interviews

Mohit Aron Cohesity NetEvents17.png

Less clutter. More clout

Primary storage is the privileged data, held close to the processor on costly rapid access chips, allowing lightning fast availability for on-going critical computing. Secondary storage plays the Cinderella role, holding less urgent data that will or might sometimes be wanted on whatever storage media are available. It’s the difference between having a textbook open on your desk, versus knowing there is a copy in the library should it be needed

more
Bharghavan Vaduuvur Ondot.png

Power in the hand that holds the card

“The people have the power. All we have to do is awaken the power in the people” said John Lennon  more
Brian Lord OBE.JPG

The Mind of the Hacker - Insights from GCHQ, MI6 and Israeli Intelligence

It used to be the trickery of the disinterested joker – bright youngsters pulling the data strings just to see what would happen. Then came criminals, adapting old con-trickery and thieving skills to the new cyber environment. Then it escalated to international gangs and now we are faced with political interest and rival shaping a post-truth world. Where are we heading? What is already happening? Vital questions must be addressed in this opening session before we turn to the technologies, solutions and strategies for securing the Cloud and Internet of Things. Brian Lord, OBE – former GCHQ Deputy Director for Intelligence and Cyber Operations – begins by describing the big picture, how it is evolving and where we could be heading. How is the balance of knowledge and power changing? And how will this affect our industry, business and society?

more
Forbes NetEvents.JPG

Unicorns and baby unicorns – So adorable but where do they go from here?

Billion-dollar startups are the talk of the town; a unicorn´s CEO can´t sneeze without it showing up on Valleywag, or the founder being parodied on the hit TV show, “Silicon Valley”. Meanwhile, everyone is watching the baby unicorns, the next-generation startups that appear to be on the fast-track to a massive valuation. Not yet household names outside the venture and tech communities, the baby unicorns represent tremendous potential for their investors. Or do they? And there are the reliable technology leaders – not unicorns, not baby unicorns, perhaps not even startups. Solid performers who generate innovation…and revenues. How do they all fit together in the fast-moving industry?

more
Special Guest Speaker Greg Fitzgerald Cylance.jpg

New technology approaches to today’s threat environment

Too often the bad guys are winning. Every day we learn about more cyber attacks – that is to say, more successful examples where hackers manage to penetrate vital business or government systems, steal data, steal money, steal intellectual property, and insert secret back doors for continuous surveillance, espionage, and sabotage

more
Brad Casemore.JPG

Software defined cloud networking – the formless in pursuit of the ephemeral?

What are the key drivers here: Is it service orchestration and operational management? Improving CAPEX and OPEX? Migrating legacy technology? Product differentiation? Or simply inertia or apathy by enterprise customers who haven’t taken the time to understand SDN?

more
    1. 1
    2. 2
    3. 3
    4. 4
    5. 5
    6. 6
    7. 7
    8. 8
    9. 9
  1. last »

keywords