Michael Wharton, Principal Machine Learning Engineer at KUNGFU.AI discusses some of the biggest hurdles to AI adoption today, his view on artificial intelligence and machine learning, and his vision around containers and the role they will play in...
David Chapa, Chief Evangelist and Product Strategist discusses the Technical Evangelist role, why we should flip the term backup & recovery, the reason ransomware is here to stay, and his views on Recovery Time and Recovery Point Objectives.
Doug Neumann, Co-Founder and CEO of Arpio discusses the best practices for good data protection hygiene when moving to the cloud, disaster recovery tips, and keeping safe from ransomware whether on-prem or in the cloud.
Malcolm Hawker, Head of Data Strategy at Profisee discusses what Master Data Management is and why it is something that CIOs need to be focused on and how MDM and Data Governance enables data protection.
Niranjan Maka, CEO of SmartHub.ai discusses why the Edge is exploding, the role of automation, and how to keep your Edge devices secure.
Phil Goodwin, Research VP, Infrastructure Software Platforms at IDC discusses the best way for organizations to harness the value of their data, the role monitoring and alerting plays when keeping data secure and resilient, and the evolution of...
John Shegerian, Co-Founder, Chairman and CEO of Electronic Recyclers International – ERI discusses his journey through recycling electronic waste for environmental and sustainability reasons, the importance of data protection, insights on...
Martha Heller, Executive Recruiter of CIO, CTO, Digital Executives and CEO of Heller Search Associates discusses the Chief Data Officer role and its rising importance during this Great Resignation and some advice for rising data leaders and aspiring...
Howard Marks, Technologist Extraordinary and Plenipotentiary at VAST Data discusses the rules of nines, pros and cons of using all-flash storage, and using replication to keep RTOs and RPOs in check.
Filip Verloy, Technical Evangelist at Noname Security discusses the difference between IT infrastructure API usage and business API usage, some of the challenges associated with cyber security, and the link between API security and ransomware.