AI is transforming industries, and on-prem solutions are emerging as a strategic advantage. Businesses are shifting AI workloads in-house to gain speed, efficiency, and full data control—while sidestepping the escalating costs of cloud services. In this TECH Talk episode, DataEndure’s CTO Shahin Pirooz and CMO Kirstin Burke discuss how organizations can harness AI appliances and private cloud systems to enhance productivity, ensure compliance, and maximize performance. 00:00 Introduction 00:52 AI’s… Read More
December 2024 TECH Talk – Top 3 Technology Strategies
From AI-driven automation to faster, localized data processing, and the growing emphasis on sustainability, we explore the top trends shaping the year ahead.
Why Network Security Must Be Your First Priority
The network is the central hub of your business—connecting people, devices, and data across multiple environments. Yet, every connection point is also a potential entry point for hackers. Today, the network and threats have changed. In this TECH Talk, networking expert Ross Rehart, MSc. explains why your thinking must change, too. 0:00 Introduction 0:17 Traditional Network Topologies 0:56 Impact of Cloud Computing 1:46 The Role of Wireless and 5G 2:32… Read More
Digital Ghosts: The Cybersecurity Risks of Abandoned Data
Is your organization haunted by forgotten data? Abandoned data can quickly become a prime target for cybercriminals lurking in the shadows, waiting to cause data breaches and compliance nightmares. We share practical strategies to mitigate risk. 0:00 Introduction 0:23 The Scale of Data Growth 2:00 Understanding ROT (Redundant, Obsolete, Trivial) Data 9:00 Steps to Manage Abandoned Data 13:30 Setting Data Retention Policies 19:00 Best Practices for Data Hygiene 26:00 The… Read More
The Backup Fallacy: Why Data Protection Alone Won’t Stop Ransomware
Is data protection enough to stop ransomware in its tracks? Not quite. In this TECH Talk, DataEndure’s CTO Shahin Pirooz and CMO Kirstin Burke explain why air-gapped backups, immutability, and access controls are key to recovery. 0:00 Introduction 0:11 Data Protection Alone Won’t Stop Ransomware 7:19 Collaboration Between IT and Security Teams 10:10 Disaster Recovery Strategy 12:02 Ensure Backups are Clean from Malware 14:38 How IT and Security Teams Can… Read More
Prevent Cloud Costs from Crushing Your AI Initiatives Podcast
AI and High-Performance Computing (HPC) workloads are notorious for their demand on cloud resources, often resulting in unexpected, skyrocketing costs. In this TECH Talk, we share proactive measures to control cloud expenses while scaling your AI and big data capabilities. 0:00 Introduction 1:30 Evolution of Cloud and AI 4:00 Impact of AI Workloads on Data Consumption 5:08 Data Security 10:00 Optimizing Performance 16:00 Managing Cloud Costs 21:30 Cloud vs On-Prem… Read More
Human and AI Synergy in Modern Security
While cutting-edge augmented intelligence (AI) technologies are becoming increasingly adept defending against cyber threats, the human factor remains indispensable. Listen to gain a deeper understanding of how to effectively combine human expertise and advanced technologies to fortify your cybersecurity posture. 0:00 Introduction 0:22 Augmented Intelligence Explained 1:58 Enhancing Human Capabilities 3:31 AI in Cybersecurity 5:49 Role of Human Analysts 9:01 Practical Tips and Challenges 20:00 Summary and Final Thoughts
Scale Smart: Modern Storage for AI Workloads
Investing in scalable storage for AI workloads isn’t just an operational decision—it’s a strategic one. In this TECH Talk, special guest Bjorn Kolbeck, CEO at Quobyte, shares practical insights to ensure the infrastructure that fuels your AI initiatives is set up for success. 0:00 Introduction 0:24 Quobyte Overview 1:28 The AI Infrastructure Journey 2:56 Data Growth Across Industries 8:07 Scaling Storage as You Grow 10:01 Scalable Storage as a Service… Read More
Breach, Repeat: Understanding Recurrent Cyberattacks
When it comes to cybersecurity, the adage “lightning never strikes the same place twice” doesn’t apply. The reality is 80% of ransomware victims get targeted again. With a second attack on Change Healthcare making the news, we unpack why businesses that suffer an initial cyberattack are frequently targeted again, regardless of company size or industry. And, more importantly, what you can do to protect your business. 0:00 Introduction 0:31 Airplane… Read More
Prepare to be Hacked: A Strategic Cybersecurity Planning Session
Traditional security tools only spring into action after a breach, highlighting a critical gap in many organizations’ defenses. This oversight emphasizes the need for a dual approach, one that not only responds to incidents but also anticipates them. In this TECH Talk, we delve into how to craft a balanced cybersecurity framework that delivers both proactive and reactive defenses. Our goal is to equip business executives with the knowledge to… Read More
- 1
- 2
- 3
- …
- 6
- Next Page »