5 questions you need to ask yourself about hybrid cloud
It’s becoming increasingly difficult to manage a hybrid infrastructure that includes multiple clouds. Here’s how to reduce cloud sprawl and costs while increasing benefits to your business.
It’s becoming increasingly difficult to manage a hybrid infrastructure that includes multiple clouds. Here’s how to reduce cloud sprawl and costs while increasing benefits to your business.
This is usually the C2 issue where I get to write about the recent HPE Discover European event but, as we all know, that didn’t take place this year and has been replaced with the ongoing Discover More events around the globe. We at Connect have received great feedback about these shows and encourage you all to attend when it comes to a city near you. Of course, the venerable HPE Discover show in Las Vegas is still going strong with another event planned for this coming June!
Happy New Year! Well, it’s a new (fiscal) year here at HPE and 2020 is just around the corner. And we finished our fiscal 2019 with a bang. There were several announcements and we hosted bloggers at an event in Anaheim at Disneyland. So let me touch on each of these and give you links where you can get more.
Around the world CIO’s and IT department leaders have stated that increased training is needed to guarantee the success of IT projects. In my experience, 40-51% of teams need to be trained in order to be effective but despite this need, organizations are rarely able to train enough people to meet project requirements. HPE has responded by implementing a Digital Learner platform as part of its Learning as a Service strategy.
As 2020 approaches, it’s time to discuss cybersecurity predictions that will impact the industry in the upcoming year. As a CISSP and Chief Information Security Officer for XYPRO, I thought long and hard about what I could say that would be impactful and hasn’t been said before – that’s a tall order! The reality is, what we predicted would be important in 2019, 2018 and even 2017 – is still applicable. A lot of what we predicted back then was never properly addressed and remains a risk today – credential theft and attacks targeting privileged user logins are more prevalent than ever. Currently, the best way to combat these types of attacks is to use 2 factor authentication.
Named Angel of the Year by Enterprise Angels, investor Alan Dick talks about the importance of making resources available to a wider group of people.
Once upon a time, the term cloud meant public cloud, and many commentators thought it would remove the need for enterprises to run their own servers or locate infrastructure in their own choice of datacenter. But over the past few years, the word hybrid has emerged not just as an aspiration, but as the model of choice for most enterprises.
A discussion on how IT operators are now looking to increased automation, orchestration, and compatibility benefits to further exploit containers as a mainstay across their next-generation hybrid IT estate.
Whether your company accepts payments at a store or restaurant, sells products or services through a website, or handles monthly payment billing, you or someone at your company is most likely aware of the security requirements of the Payment Card Industry Data Security Standard (PCI DSS). Each calendar year, your organization needs to prove that it complies with the 12 requirements listed under PCI DSS. Often, this process is time consuming, costly, and involves key people primarily focusing on assessing, verifying, and completing the compliance audit.