Blog

  • Network access solutions protect against IoT threats

    Are Network Access Control Solutions Worth It?

    Almost every modern business wrestles with the dilemma of finding uncompromising protection for their always-on workforce without sacrificing accessibility, efficiency, and productivity. And it’s not going to get any easier. Gartner predicts that there will be 70 billion connected devices in circulation by 2020. We all know that the IoT is changing the way that […]

  • How to Protect Your Environment from Cloud Security Threats

    How to Protect Your Environment from Cloud Security Threats

    Everybody’s environment is hybrid these days. With the democratization of virtualized services, no company is entirely on-premise anymore (or 100% cloud for that matter). If you use SaaS applications like Gmail, Dropbox, Office 365, Google Docs, or Salesforce, then you are relying, to some degree, on public cloud infrastructure to conduct your business in congruence […]

  • Why Do We Use GPUs for Machine Learning

    Why Do You Use GPUs Instead of CPUs for Machine Learning?

    GPU vs CPU Admittedly, discussing the differences between CPUs and GPUs is a rather elementary concept for technologists, but it’s an important exercise that helps us better understand what drives modern Artificial Intelligence. Although GPUs are traditionally used to compliment the tasks that CPUs execute, they are, in fact, the driving force behind your AI […]

  • Network Visibility - What's Happening on Your Network?

    Network Visibility, Real-Time IT, and Business Insights

    “The application is slow.” “I bet it’s the server.” “Nope, it’s gotta be the network performance.” How many times have you heard these phrases tossed back and forth at your IT planning meetings? Unfortunately, in this business of virtualized “bigger, faster, better,” finger-pointing can be the natural compulsion when things go south. But rooting out […]

  • security requires relationships

    Successful Security Starts with Relationships and IT Leadership

    What is good security? “It’s the right people, at the right place, at the right time, doing the right thing,” says Corey Gary, Enterprise Solutions Architect at TSA. “It’s pretty simple,” he continues, “Don’t do what you’re not supposed to do and follow through with what you’re supposed to do.” But establishing and sustaining those […]

  • Composable Infrastructure

    Choosing the Right Platform:

    Traditional vs. Hyper-Converged vs. Composable Infrastructure Hybrid cloud infrastructure is not a one-size fits all solution. And while there are numerous options, making the right decision can be overwhelming. The right implementation can certainly drive speed to market, increase scalability, and bolster performance across your environment, but its architecture still needs to complement your current […]

  • You’ve Decided to Go to Cloud. What’s Next?

    Upper management has decided that your company’s next business move will be towards cloud. Which (as you know) is much easier said than done. You have infrastructure to consider, hardware to decommission, and you have to somehow translate those legacy applications to that ready-and-waiting virtual environment. How do you know which apps to migrate (and […]

  • How Strong is My Password?

    How Strong is My Password?

    The Importance of Secure Logins One would hope that the days of “abc123” and “pa$$word” passwords are of the past. But while the majority of users don’t fall under such blatant disregard for personal security, there is still a large percentage of people who don’t do their due diligence in creating and maintaining strong passwords. […]

  • Strategic Simplicity for Your Hybrid Cloud

    NetApp OnCommand Insight: Strategic Simplicity for Your Hybrid Cloud

    As legacy infrastructure around the globe struggles under the ever-growing end-user demand of data generation and consumption, the industry steadily moves towards cloud to relieve the pressure. Hybrid at the Expense of Your Resources However, with more and more companies migrating to cloud-based architecture, hybrid cloud solutions are in much higher demand. This is because […]

  • Analytics Maturity Assessment

    Using Analytics for Annual Planning

    When people hear the word “analytics,” they tend to get nervous—especially when it’s coupled with other words like “algorithm,” “GPU,” and “deep learning.” And they automatically think that the subject matter is beyond their understanding (or even their IT team’s abilities). However, analytics doesn’t have to be impossible or “beyond your current capabilities.” Your company […]

  • Data Ingestion and the Data Value Chain

    Purposeful Data Ingestion: What You Need to Know About the Data Value Chain

    Previously, we discussed the three fundamental branches of analytics as well as how each one successively breaks data down into more manageable pieces. In today’s installment, let’s continue the data ingestion conversation by discussing the different components of the Data Value Chain. Let’s Get Back to Basics The Business Dictionary Online defines a value chain […]

  • Democratize Your Data

    Enabling Decision-Making at the BU Level with Analytics

    Housing untapped, raw data does little but expend additional storage and security resources. But, at the same time, accessing that data for active use is hard. Because of this, many companies have started working through their database administrators (DBAs) to try to get more from their data. However, as is the current trend, organizations are […]