Data

Ransomware Data Recovery — Protect and Recover Your Data

A ransomware attack is devastating. Compromised businesses and organizations suffer steep financial losses (an estimated $10.5 trillion annually by 2025) compounded by the loss of customer and partner trust. If a healthcare organization is a victim, it can even risk human life. By virtue of the increased value of data to organizations, not only are the number of ransomware attacks growing, but so too are the different types of this threat. According to Bitdefender’s Mid-Year Threat Landscape Report 2020, global ransomware reports increased by 715% year over year.
Read more

Three Years of GDPR – a Look Back

It might be hard to imagine, but it has been three years since the General Data Protection Regulation (GDPR) was implemented in the European Union (EU) on 25 May 2018. Time certainly does fly by when you are trying to protect data. Nevertheless, the term ‘GDPR’ has set a precedent on what is to be expected from organizations when it comes to protecting personally identifiable information (PII) of EU data subjects and has served as the foundational inspiration for many international data security regulations.
Read more

Building a container strategy―13 potholes to avoid

Containers and the rise of Kubernetes is the most talked-about, most impactful IT technology today. Containers give enterprises the ability to do amazing things, like build applications faster, move workloads between platforms, and optimize their environments.

Used correctly, containers open the agility doors of the organization and enable teams to build solutions faster than ever before. But, as anybody who’s implemented a new technology knows, pathways aren’t always smooth.…

Read more

Discover HPE’s new building block for digital transformation

If there is one realization enterprises around the world reached last year, it is the fact that digital transformation can’t wait. In responding to the COVID-19 crisis, companies faced starkly different realities based on how much—or how little—they had advanced their digital transformation journeys. Some were caught without any scalable remote working technologies, while for others, even if disruptive, the move to a working-from-home model was relatively straightforward.…

Read more

Easily Modernize and Expose Valuable Enscribe Data – Eliminate Data Silos with HPE Shadowbase

Several customers recently approached us looking for solutions to their remote data access/connection requirements. HPE Shadowbase software uses a data replication/integration architecture to meet these needs, and has experience successfully deploying these solutions at a number of customer sites.

 

Resolving this Challenge

In the past, companies accessed trapped data via remote clients. Unfortunately, this approach had several issues:

  • Queries impacted several key components
    • Production environment
    • Network
    • CPU resources
  • Queries timed out and failed if the network was down or the production environment was inaccessible

Today, these companies face a dilemma: “What do we do if our solution has gone End-of-Service-Life (EOSL)?

Read more

Conversational AI with Transfer Learning

Introduction

I recently joined Stephen Foskett from Gestalt IT on a video podcast to discuss “Improving AI with Transfer Learning”. This podcast is part of a series of podcasts on “Utilizing AI”. The series focuses on Artificial Intelligence (AI) and Machine Learning (ML) practical applications in the modern enterprise data center and cloud infrastructure.

The full description and the link to the podcast can be found here.…

Read more

Take a Data Privacy Road Trip

Three years ago, I started as a PreSales consultant covering the topics of Data Analysis and Data Management. These topics were directly connected to the topic of Data Privacy and all the regulations around it, so it was naturally part of my conversations.
Read more