Browse

Search for common episodes by clicking on the key phrases on the right most column.

ImageTitleCategoriesTags
#117 2022 In ReviewArtificial Intelligence, Communications, Data Management, Edge Computing, Multi-Cloud, Security, , , , , ,
#116 An Argument for a Holistic approach to Critical Infrastructure SecurityEdge Computing, Security, , , ,
#115 Blocking and Tackling of SecurityPeople, Process, Security, , ,
#114 Automating Business Process ManagementMulti-Cloud, Technology, , ,
#113 Operationalizing Business Process ManagementMulti-Cloud, Process, Technology, , , ,
#112 Myths of Lift and Shift Cloud MigrationMulti-Cloud, Process, Technology, ,
#111 Realizing Smart City PotentialEdge Computing, People, Uncategorized, ,
#110 Securing the Supply ChainProcess, Security, Technology, ,
#109 Advancing Operations with 5GCommunications, Edge Computing, Technology, , ,
#108 History of Advanced CommunicationsCommunications, Technology, , , ,
#106 The Birth of Graph Intelligence PlatformsArtificial Intelligence, Data Management, , ,
#107 Securing Critical InfrastructureEdge Computing, Process, Security, Technology, , , ,
#104 Information-driven LeadershipData Management, People, ,
#103 Operationalizing Your AI ProjectsArtificial Intelligence, Process,
#102 Identity-based Micro-segmentation with ElisitySecurity, Technology
#101 Network Controller Security with ElisitySecurity, Technology,
#100 Intel’s Public Sector SuperheroesArtificial Intelligence, Edge Computing, Multi-Cloud, People, Security, Technology, , ,
#99 Precog Cyber Attack Path with XM CyberSecurity, Technology, ,
#98 The Emergence of the Global Data NetworkData Management, Technology, , , ,
#97 The Benefits of Graph DatabasesData Management, ,
#96 Leveraging Virtual Datacenters with Verge.ioMulti-Cloud, Process, Technology, ,
#95 Requirements for Edge to Cloud ArchitecturesEdge Computing, Multi-Cloud, Security, Technology, ,
#94 The Rebirth of the Private CloudMulti-Cloud, Technology, , ,
#93 The Four Superpowers of Digital TransformationArtificial Intelligence, Edge Computing, Multi-Cloud, Security, , , ,
#92 Protecting the Outer Walls of your Castle with Vulnerability ScansMulti-Cloud, Security, Technology, ,
#91 Fighting the Cyber Adversary by Securing your Software Supply ChainProcess, Security, Technology, , ,
#90 Barriers to Future Tech AdoptionPeople, Process, Technology, , , , , ,
#89 Future of BigMemory and CXLEdge Computing, Multi-Cloud, Security, Technology, , ,
#88 Collaborative DevSecOpsMulti-Cloud, Process, Security, Technology, , ,
#87 Confidential Computing in the DevSecOpsMulti-Cloud, Security, , ,
#86 The Things I Wish I Knew as a Government CTOArtificial Intelligence, Communications, People, Technology,
#85 Artificial Intelligence and SecurityArtificial Intelligence, Security, ,
#84 Securing Your Castle with Zero-TrustProcess, Security, Technology,
#83 IDC Directions 2022Data Management, Edge Computing, Multi-Cloud, Security, ,
#82 Shifting from Infrastructure to WorkloadsMulti-Cloud, People, ,
#81 Heterogeneous Programing with OneAPIEdge Computing, Multi-Cloud, Technology, , , , ,
#80 Meeting Intel’s Cloud Solution ArchitectsMulti-Cloud, People, Process, Technology, ,
#79 Onboarding Remote WorkersEdge Computing, People, Process,
#78 Understanding the Shared Responsibility Security ModelMulti-Cloud, Process, Security, ,
#77 Digital Transformation in 2022Artificial Intelligence, Communications, Data Management, Edge Computing, Multi-Cloud, People, Process, Security, Technology, , , , ,
#76 Day in the Life of a Cloud Solution ArchitectMulti-Cloud, People,
#75 Cyber Security Solutions with HitachiProcess, Security, Technology,
#74 Ransomware: Prepare and Don’t PanicPeople, Process, Security, ,
#73 2021 a Year in ReviewPeople, Process, Technology, , ,
#71 Modern Data GovernanceData Management, Process, Technology, ,
#70 Modern Data GovernanceData Management, Security, ,
#69 Securing the Data Center Through the EdgeEdge Computing, Security, ,
#68 5G in DefenseCommunications, , ,
#67 5G Past, Present, and FutureCommunications, ,
#66 Managing Complexity in the CloudMulti-Cloud, Uncategorized, ,
#65 Accelerating Cloud Adoption while Decreasing Complexity and CostMulti-Cloud,
#64 Follow and Secure the Bit Edge to CloudEdge Computing, Security,
#63 Inspiring IT Cultural ChangeMulti-Cloud
#62 Demystifying 5G, Edge and AIArtificial Intelligence, Communications, ,
#61 Data Breaches & Secure Supply ChainSecurity,
#60 Managing Risk in the Face of RansomwareSecurity,
#59 Evolution of Data PrivacyData Management, ,
#58 Understanding Edge to Data Center ProblemsData Management, Edge Computing,
#56 Cloud Broker Organization Part 2Multi-Cloud, Uncategorized, ,
#56 Cloud Broker OrganizationsMulti-Cloud, People, Process, ,
#55 Communication During TransformationMulti-Cloud, People, Process,
#54 People & Process in Digital TransformationPeople, Process, Uncategorized,
#53 DevOps with Speed While Reducing RiskMulti-Cloud, Uncategorized, ,
#52 Telemetry in the CloudMulti-Cloud, Uncategorized, ,
#51 Practical Optane Persistent Memory Use CasesMulti-Cloud, Uncategorized, , ,
#50 Understanding Employee BurnoutPeople, Process, Uncategorized, ,
#49 Remote Work Before, During and After the PandemicPeople, Process, Uncategorized,
Storage Tiers#48 VAST Data RevisitedMulti-Cloud, Uncategorized, , ,
#47 Looking forward to 2021People, Process, Uncategorized, ,
#46 Securing your DevOps PipelineMulti-Cloud, Uncategorized, , ,
#45 – Not All Cores are EqualMulti-Cloud, Uncategorized, ,
#44 Cloud in the Digital AgeMulti-Cloud, Uncategorized, ,
#43 – The Role of the CIO in Cloud AdoptionMulti-Cloud, Uncategorized, , ,
#42 Securing your DevOps PipelineUncategorized, , ,
DedvOps#41 The Black Art of DevOpsMulti-Cloud, Uncategorized,
#40 Collaborative Medical Research with Confidential CopmputingMulti-Cloud, Process, Uncategorized, , ,
#39 Watercooler Talk in a Remote WorkforcePeople, Process, Uncategorized, ,
#38 Roaring 20’s a Look Forward to 2021People, Process, Uncategorized, , , ,
#37 2020 in ReviewPeople, Process, Uncategorized, ,
Cyber-security#36 Six Pillars of Cyber-securityData Management, Security, Uncategorized, , , ,
#35 Navigating Disruptive ChangePeople, Process, Uncategorized, , ,
Modern Workplace#34 Embracing Workspace EvolutionPeople, Process, Uncategorized, , , ,
#33 The AWS Outage of Nov 2020Multi-Cloud, Process, Uncategorized, , ,
Catalytic#32 No Code (RPA) Approach to Back Office EfficiencyPeople, Process, Uncategorized
Catalytic#31 Improving Employee Value with CatalyticPeople, Process, Uncategorized, ,
#30 Application Portability with OneAPIMulti-Cloud, Process, Technology, Uncategorized, , ,
RPA#28 Legacy Integration with Cloud and RPAMulti-Cloud, Process, Uncategorized, ,
Aerospike#29 Aerospike Next-Generation of Hyperscale DatabaseMulti-Cloud, Process, Uncategorized, , ,
SGX#27 Hardware Security an Imperative for Data TransformationData Management, Security, Uncategorized, , ,
#26 Multi Cloud Data solutions with HammerspaceMulti-Cloud, Process, Uncategorized, , ,
Data Pipeline#25 Operationalizing Data PipelinesData Management, Security, Uncategorized, , ,
#24 Digital Strategy and Data ArchitectureUncategorized, , , ,
#23 Insight Creation in Data-Centric OrganizationsUncategorized, , , ,
Multi-cloud#22 An Argument for Multi-Hybrid CloudMulti-Cloud, Process, Uncategorized, , ,
Memory Controller#21 Big Memory Software Defined Memory ControllerMulti-Cloud, Process, Uncategorized, , , ,
Storage Tiers#20 Destroying the Complexity of Storage TiersData Management, Uncategorized, , ,
#19 Using Data as a Strategic AssetData Management, Uncategorized, ,
Data-centric#18 Data Collection and PreparationData Management, Uncategorized, ,
Elasticsearch Optane#17 ElasticSearch and Intel Optane DCPMMData Management, Uncategorized, ,
Optane DCPMM#16 Decreasing Ingestion Congestion with Intel Optane DCPMMData Management, Uncategorized, , ,
Data Centric#15 Kick-Starting Organizational Transformation Organizational ChangeData Management, Uncategorized, ,
Analytic System#14 Kick-Starting Organizational Transformation to Become Data-CentricData Management, Uncategorized, , ,
Illogical Obsession with Logic#13 – Illogical Obsession with LogicData Management, Uncategorized,
Remote Learning#12 – Securing the Distance Learner and TeacherMulti-Cloud, People, Uncategorized, , ,
Remote Learning#11 – Distance Teaching and LearningMulti-Cloud, People, Uncategorized
#10 Teleworker Sizing Your VDI SolutionMulti-Cloud, People, Uncategorized, ,
#9 – Telework Securing Your Home OfficeSecurity, Uncategorized, , ,
#8 – Securing the Teleworker with Intel TechnologySecurity, Uncategorized, , , ,
#7 – Securing the TeleworkerSecurity, Uncategorized, , ,
#6 – Managing Telework at CapacityMulti-Cloud, People, Uncategorized, ,
#5 – Infrastructure Maturity ModelMulti-Cloud, People, Uncategorized, , , , ,
#4 – Information Management Maturity ModelData Management, Uncategorized, , ,
#3 – Benefits of the Multi-Hybrid Cloud ArchitectureMulti-Cloud, Technology, Uncategorized, ,
#2 – Follow the BitEdge Computing, Uncategorized, ,
#1 – History of Data Centric ArchitectureData Management, Uncategorized, , , , , , ,

Leave a Reply