Skip to main content
Link
Menu
Expand
(external link)
Copy
Copied
Deutsch
Über
Wöchentliche Nachrichten
Sammlungen
Folgen
Cloud im digitalen Zeitalter
Português
Sobre
Notícias Semanais
Episódios
English
About
News Briefs
Collections
Zero Trust Architecture
Multi-Hybrid Cloud
Generative AI
Episodes
Español
Acerca de
Noticias Semanales
Episodios
Nube en la Era Digital
Français
À propos de
Nouvelles Hebdomadaires
Épisodes
Le nuage à l'ère numérique.
Italiano
Informazioni
Riepilogo Settimanale
Episodi
Episodes
Developing a Multi-Hybrid Cloud Operating Model
Building a Multi-Hybrid Cloud Strategy
Natural Language Data Analytics
Security in Generative AI
GenAI Policies
GenAI in Higher Education
Operationalizing GenAI
Becoming a Data Ready Organization
GenAI Advisor for Datacenter Management
GenAI Use Cases
Training the Next Generation in AI
Practical Generative AI
Understanding Generative AI
Embracing Sustainability with Smart Buildings
Update on 5G in the Department of Defense
Securing the Remote Worker Through Mobile Virtualization
GenerativeAI and Automation (Google Bard)
Embracing the AI Revolution
Attracting People Back to the Office
Science Behind Digital Twins
Use Cases in Confidential Computing
Data Protection with Confidential Computing
From Neurology to Neuromorphic Computing
Background Checking Your Open Source
Resilient Logistical Analytics
Evolution of Cloud
Rebirth of the Private Cloud
Resilient Data in Disruptive Comms
Trustworthy and Ethical AI
WaveForm AI
Lessons in HPC Oil & Gas
Software Defined BareMetal Management
Digital Transformation in Federal Government
Productizing Decisional AI
HPC OnDemand
Closing the Digital Skills Gap
Innovation as a Service
Certifying Autonomous Flight
Ways to Reduce Cybersecurity Risk
Cybersecurity in Public Sector
Automation with AI
Disruptive Private Clouds
An Argument for Global Data Networks
Moore's Law is not Dead!
What's ahead in 2023
2022 Year In Review
An Argument for a Holistic approach to Critical Infrastructure Security
Blocking and Tackling of Security
Automating Business Process Management
Operationalizing Business Process Management
Myths of Lift and Shift Cloud Migration
Realizing Smart City Potential
Securing the Supply Chain
Advancing Operations with 5G
History of Advanced Communications
Securing Critical Infrastructure
The Birth of Graph Intelligence Platforms
Information-driven Leadership Part 2
Information-driven Leadership
Operationalizing Your AI Projects
Identity-based Micro-segmentation with Elisity
Network Controller Security with Elisity
Intel's Public Sector Superheroes
Precog Cyber Attack PAth with XM Cyber
The Emergence of the Global Data Network
The Benefits of Graph Databses
Leveraging Virtual Datacenters with Verge.io
Requirements for Edge to Cloud Architectures
the Rebirth of the Private Cloud
The Four Superpowers of Digital Transformation
Protecting the Outer Walls of your Castle with Vulnerability Scans
Fighting the Cyber Adversary by Securing your Software Supply Chain
Barriers to Future Tech Adoption
Future of Big Memory and CXL
Collaborative DevSecOps
Confidential Computing in DevSecOps
The Things I Wish I Knew as a Government CTO
Artificial Intelligence and Security
Securing Your Castle with Zero-Trust
IDC Directions 2022
Shifting from Infrastructure to Workloads
Heterogeneous Programming with OneAPI
Meeting Intel's Cloud Solution Architects
Onboarding Remote Workers
Understanding the Shared Responsibility Security Model
Digital Transformation in 2022
Day in the Life of a Cloud Solution Architect
Cybersecurity Solutions with Hitachi
Ransomware: Prepare and Don't Panic
2021 a Year in Review
Modern Data Governance
Modern Data Governance
Securing the Data Center Through the Edge
5G in Defence
5G Past, Present, and Future
Managing Complexity in the Cloud
Accelerating Cloud Adoption while Decreasing Complexity and Cost
Follow and Secure the Bit Edge to Cloud
Inspiring IT Cultural Change
Demystifying 5G, Edge and AI
Data Breaches & Secure Supply Chain
Managing Risk in the Face of Ransomware
Evolution of Data Privacy
Understanding Edge to Data Center Problems
Cloud Broker Organization Part 2
Cloud Broker Organizations
Communication During Transformation
People & Process in Digital Transformation
DevOps with Speed While Reducing Risk
Telemetry in the Cloud
Practical Optane Persistent Memory Use Cases
Understanding Employee Burnout
Remote Work Before, During and After the Pandemic
VAST Data Revisited
Looking Forward to 2021
Securing your DevOps Pipeline
Not All Cores are Equal
Cloud in the Digital Age
The Role of the CIO in Cloud Adoption
Securing the DevOps Pipeline = SecDevOps
The Black Art of DevOps
Collaborative Medical Research with Confidential Computing
Watercooler Talk in a Remote Workforce
Roaring 20's a Look Forward to 2021
2020 in Review
Six Pillars of Cybersecurity
Navigating Disruptive Change
Embracing Workspace Evolution
The AWS Outage of Nov 2020
No Code (RPA) Approach to Back Office Efficiency
Improving Employee Value with Catalytic
Application Portability with OneAPI
Next-Generation Hyperscale Database - Aerospike
Legacy Integration with Cloud and RPA
Hardware Security: Imperative for Transforming Data
Multi Cloud Data Solutions with Hammerspace
Operationalizing Data Pipelines
Digital Strategy and Data Architecture
Insight Creation in Data-Centric Organizations
An Argument for Multi-Hybrid Cloud
Big Memory Software Defined Memory Controller
Destroying the Complexity of Storage Tiers
Using Data as a Strategic Asset
Data Collection and Preparation
Elastic Search & Intel Optane DCPMM
Decreasing Ingestion Congestion with Intel Optane DCPMM
Kick-starting Organizational Transformation
Kickstarting Your Organizational Transformation to Become Data-Centric
Illogical Obsession with Logic
Put the Title Right Here
Distance Teaching and Learning
Teleworker Sizing Your VDI Solution
Telework Securing Your Home Office
Securing the Teleworker Part 2
Securing the Teleworker
Managing Telework at Capacity
Infrastructure Maturity Model
Information Management Maturity Model
Benefits of Multi-Cloud Architecture
Follow the Bit
History of Data Centric Architecture
Guests
Aaron Reid
Adrian Kosowski
Alan Chalker
Alan Evans
Amy Tong
Andrew Cohen
Andrew Padilla
Andy Morris
Ann Madea
Anna Scott
Bard
Betsy Freeman
Byron Tarry
Callen Sapien
Cameron Chehreh
Camille Morhardt
Carla Trevino
Charles Fan
ChatGPT
Chetan Venkatesh
Chris Lehman
Christine McMonigal
Colin McLean
Dan Demers
Dana Yanch
Darren W Pulsipher
Dave Marcus
Dave Shrestha
David Esposito
David Richard
David Rowley
Denis O'Shea
Doug Bourgeois
Eric Greenwald
Eric Hornsby
Erin Moseley
Glenn Kurowski
Google Bard
Grant Kelly
Greg Campbell
Greg Clifton
Greg Ernst
Greg Steck
Gretchen Stewart
Ian Evans
Ibett Acarapi
Illyse Sheaffer
James Reinders
Jared Shepard
Jason Dunn-Potter
Jeffrey Lancaster
Jeremy Harris
Jesse Schrater
Jim Richberg
Johan Ballin
John Evans
Jon Gottfried
Keith Gray
Ken Urquhart
Kevin Bleckmann
Kiran Agrahara
Laura Newey
Leeland Brown
Leland Brown
Logan Selby
Louis Parks
Luuk Van Dijk
Madeline Pulsipher
Madi Ahmadi
Mark Valcich
Matt Lembright
Matthew Carroll
Matthew Pulsipher
Max Young
Michael Lenox
Michael Mehlberg
Mike Fraser
Mike Wagner
Neil Bahandur
Nick Bhadange
Ofir Azoulay-Rozanes
Ori Yudilevich
Pamela Follet
Patrick Conte
Paul Giorgi
Pete Schmitz
Phillip Griffith
Phillip Griffiths
Rachel Dreikosen
Rachel Mushawar
Rajiv Mandal
Randy Hayes
Ricardo Dutton Jr
Rick Herrmann
Rob Watts
Robert Looney
Ron Fritzemeier
Sam Ceccola
Sam Seccola
Sarah Kalicin
Sarah Musick
Sean Chou
Sean Heiney
Shamim Naqvi
Sonu Panda
Stephanie Sabatini
Stephen Holt
Steve Orrin
Steve Wasick
Steven Holt
Sunny Stueve
Thomas Horlander
Tim Faulkes
Tim Flynn
Todd Christ
Tom Garrison
Uzair Hussain
Walter Hancock
Yazz Krdzalic
Search
Tags
2fa
2factauth
5g
5ginorbit
5gsecurity
5gtechnology
academiccheating
academicintegration
academicintegrity
academicpolicies
accesscontrol
accountability
addressingbiasesingenerativeai
advancedcomms
advancedcommunications
advancedsecuritymodels
aerospike
ai
aiaccountability
aiagriculture
aiassistance
aibias
aibreakthrough
aichatbots
aicontent
aics
aidetection
aiethics
aifairness
aiforgood
aigeneratedcontent
aiharm
aihealcare
aiinaugmentation
aiinclassroom
aiineducation
aiinschool
aiinselfassessment
aiintegration
aijobloss
aijobs
aimemployment
aiml
aimodels
ainetworks
aiops
aipolicy
aiproductization
airbus
airegulation
aireliability
aisecuritycenter
aishortcomings
aistrategies
aistudents
aisuccess
aisummit
aisystems
aitoolkit
aitools
aitransparency
aiven
aiwarfare
aiworkflows
aiworkforce
alibabacloud
altman
amazonselfpublishers
analysis
analytics
anomalydetection
anthropic
antihack
antispyware
antivirus
aplhav
applicationrationalization
applicationrearchitecture
applications
articul8
artificialintel
artificialintelligence
atos
attack
attackprev
authenticvoices
automatedthreatresponse
automation
avoslocker
aws
azure
balancingaiintegrationineducation
bard
baremetal
barriers
battlingdataprotectionissues
bias
bigdata
bigmemory
bitcoinhack
blogpost
botnets
bpm
brainstormingapplications
breach
breachalert
britain
businessesanalyzeinformation
businessgoals
businessinformationsecurity
businessintelligence
businessprocesses
businessprocessmanagement
byuidaho
california
camunda
capitalbpm
catalytic
cellphone
censys
ceo
chainofcustody
challenges
challengesinnaturallanguageprocessing
challengingdataprotection
change
changeagent
chatbotperformance
chatbotsincontentcreation
chatgpt
cheatingconcerns
childprotection
china
chinachipexports
chineseofficialsban
chineserisks
chipsact
cio
cisa
cisco
claude
claudeai
clearfake
clearvision
cloud
cloudadoption
cloudbasedinfrastructure
cloudbestpractices
cloudbroker
cloudcomputeoptions
cloudcomputing
cloudconfiguration
cloudcost
clouddeploymentmodels
cloudfirst
cloudinstance
cloudinstanceperformance
cloudmigration
cloudnative
cloudoutage
cloudreliability
cloudsafe
cloudsec
cloudsecurity
cloudsmart
cloudsolutionarchitect
cloudspecialistadvice
cloudstorage
cloudstrategy
cloudtechnologies
cloudtrends
cmauk
cognitivescience
collaboration
collectiongenerativeai
collgenerativeai
collmultihybridcloud
columbiauniversityresearch
commercial5gusage
comms
communication
complexdata
compliance
compliancemonitoring
compliancerequirements
compute
computeselectiontools
computing
conceptualautomata
confidentialcomputing
confidentialcomputingchipsets
confidentialcomputingmanager
contactless
container
contentcreationautomation
contentmoderation
context
continuousauthentication
continuouslearning
continuouspolicies
convergeditot
conversationai
costeffectivecomputesolutions
covid
cpra
cpu
crcattack
creativecontentgeneration
creativeoutput
criticalinfrastructure
criticalthinkingskills
crossdomaincollaboration
cryptojacking
cryptosafe
csa
csp
csuite
cto
culturalchange
customerengagement
customerexperience
customerfacingapplications
customersatisfaction
customerservice
customized
cuttingedgedatasecurity
cxl
cyberattack
cybercrime
cybercriminals
cyberdefend
cyberhygiene
cyberlaw
cyberrisk
cybersec
cybersecure
cybersecurity
cybersecurityawareness
cybersecuritybreach
cybersecurityrisks
cyberspace
cyberworld
darkweb
darrenpulsipher
data
dataaccess
dataanalysis
dataanalytics
dataarchitecture
dataassurance
dataaudits
dataauthentication
database
databaseencryption
databreach
databreaches
datacenterdependencies
datacentric
datacentricorganization
datadriveninsights
dataencrypt
dataencryption
datagovernance
datainnovation
datainput
dataintegrity
dataintelligence
datalake
dataleak
dataleakage
datalineage
datamanagement
datamanangement
datamesh
dataoptimization
datapipeline
dataplatform
dataprevention
dataprivacy
dataprivacyspecialist
dataprotect
dataprotection
dataprotectionexpert
dataprotectioninnovation
dataprotectionsolution
dataquality
datareadiness
datasafe
datascience
datasciencesolution
datasecure
datasecurity
datasecuritymanager
datasecurityplatform
datasets
datashapes
datasharingsolutions
datasharingtechnology
datastrategy
datatransmission
datawarehouse
datbreach
ddil
decision
decisionalai
decisionmaking
decryption
deepfake
deeplearning
defaultdeny
defensestrategy
dell
deloitte
dependencies
developer
devops
devsecops
differentindustries
digital
digitalage
digitalbridge
digitaldefend
digitalgovernance
digitalinnovations
digitallandscape
digitalnews
digitalorg
digitalorg.
digitalpublishing
digitalsafety
digitalsec
digitalsecurity
digitaltransf
digitaltransform
digitaltransformation
digitaltransformationpodcast
digitaltransformationsecurity
digitaltwin
digitools
disruption
distinguishingguidelines
distributedanalytics
diversity
diversityandinclusion
dod
duediligence
ecybersecurity
edge
edgecompute
edgecomputing
edgecomputinginhealthcare
edgecomputingrevolution
edgedevices
edgemere
edgetocloud
edt156
edt158
edt159
edt160
edt161
edt162
edt163
edt164
edt165
edt167
edt168
education
educationaltechnology
educationtransformation
edw37
efficiencies
elisity
embracing
embracingdigital
embracingdigital.org
embracingdigitaltransformation
embracingdigitaltransformationpodcast
embracingdt
embracingvariability
emergingtech
employeeburnout
employeeexperience
emrbacingdigital
encrypinfo
encryptingdata
encryption
encryptionkeys
endpointmanagement
endpointsec
endtoendencryption
engagement
enhanceefficiency
enhancingdailytasks
enterpriseaistrategy
entrepreneurs
environmentalimpact
ethicalconsiderations
ethicalusageofai
ethics
eucybersecurityregulations
externalhackers
fantasysportsapp
feedback
figma
filestorage
finetuning
firefly
firewall
firewalled
firewallprog
firewalls
flexibility
fortanix
fosteringsecurecomputing
fpga
fraudalert
futuredigitalbusinesses
futureofai
futureofconfidentialcomputing
futureofdataanalysis
futureproofsecurity
gemini
genai
generativeai
generativeaipolicy
genz
geographicaldistribution
github
globaldatanetwork
globalkeymanagement
google
googlebard
googlechrome
governance
governanceandsecurity
government
gpt4
gpu
granularpolicies
graphdb
graphintelligenceplatform
greenlake
guidelines
hack
hackathon
hackdefense
hackdetect
hackerproof
hackers
hackersafe
hacking
hackprotect
hacksafe
haking
hamasconflict
hammerspace
harmefuloutput
harnessingai
healthcare
healthcareai
healthcarecyber
healthcaremarket
heterogeneouscompute
heterogeneousprogramming
highereducation
highqualitycontent
highqualitydata
holidayhacks
homelawncaretools
hotms
hpc
hpe
hsbc
humancentereddesign
humansupport
hybridcloud
hybridclouds
hybridconfidentialcomputing
hybridinfrastructure
hybridstrategy
hybridworkspace
hypori
ibm
icscybersecurity
ictdefense
idc2022
identitybasednetworking
identitymanagement
identityverification
immuta
immutableauditlog
implementingzerotrust
importance
improveddataprotection
incoorporatingai
industrialdge
ineducationalcurriculums
informationdriven
informationmanagement
informationmaturity
informationtechnology
informedconsent
infoscentience'ssolution
infosec
infotech
infraaudit
infrastructure
infrastructuremanagement
infrastructurematurity
ingestion
initiatives
innovation
innovationandeducation
innovativeapproach
innovativeapproachestoprivacy
innovativeideas
insiderthreats
insight
integration
intel
intelcloudsolutionarchitects
intelinterview
intelnervana
internet
internetsafe
intrusionalert
intsecure
iosspyware
iot
iotapplications
iotdevices
iotsec
iotsecurity
iranianhackers
irdeto
iridiumnetwork
ironnetclosure
irs
isovalent
israelai
israelcyberattacks
it
it/otconvergence
itinfrastructure
itot
itprotect
itsec
itsecurity
itsecurity.
jargon
jeremyharris
jobdisplacement
katanagraph
kenurquhart
keyvulnerabilities
keywords
languagemodels
latencyreduction
lauranewey
lauratorresnewey
lawenforcement
leadership
leastprivilege
legalcompliance
lelandbrown
llm
loganalysis
lonelyislandapproach
m2prochip
machinelearning
macrometa
macstadium
majorleaguehacking
malware
malwaredetect
malwarerem
malwarerisk
management
manufacturingindustry
materialscience
mathematicaldataverification
mcafee
mcdonalds
mec
mediumriskapplication
memverge
meta
metify
mfa
mgmbreach
microcloud
microsegmentation
microservice
microsoft
migration
migrationplan
military5gusage
miraibotnet
misleadingoutput
mitai
mitresearch
mobile
mobilecomputing
mobilementor
mobilesecure
mobilevirtualization
modeltraining
moderneducationdynamics
monitoring
mooreslaw
mozillafirefox
multiaccessedgecomputing
multicloud
multifactorauthentication
multihybridcloud
multilayeredsecuirty
nano
nationalgrid
nationalsecurity
naturallanguageaisystem
naturallanguagegeneration
naturallanguageprocessing
naturallanguagereporting
navigation
netprivacy
netsafety
netsec
netsecure
netsecurity
netsurit
network
networkarchitecture
networkdefense
networkingconcepts
networksec
networksecurity
neuralchat7b
neurology
neuromorphic
newproductdevelopment
newtechnologies
nlp
northkoreanhackers
nosql
npu
nsa
nsacyber
nuclearecurity
nutanix
ohiosupercomputercenter
oneapi
ongoingdebates
online
onlineguard
onlinesafety
onprem
onpremisesinfrastructure
ontariohack
ontarioincidents
openai
opencommunication
openondemand
opensourcemodels
openzerotrust
openziti
operationalefficiency
operationalization
operationaltechnology
operationaltechnologysecurity
optane
optimization
optimizecloud
oracle
organizationalchange
organizationalculture
organizationalmodernization
organizationalthreats
organizations
osc
otaccesscontrol
otdataprotections
otinsiderthreats
otnetworkcompliance
otnetworkmonitoring
otnetworksecurity
otnetworksegmentation
otriskassessments
otsecurity
outoftheboxthinking
overlaynetworks
password
passwords
passwordsec
pathway
patientdata
pc
pcprotection
pentagon
pentagoncloud
people
personalizedphishingattacks
phisguard
phishattack
phishing
phishprotect
physicitaldigitalknowledgegap
plugindata
pmem
podcast
polarismarketresearch
policies
policy
policyenforcement
politicalcapital
polystores
powerofgenerativeai
poweroflanguage
powerplantcyberthreats
precrime
predictive
preservingauthenticityandindividuality
prevention
privacy
privacynet
privacysafe
privatecloud
privateclouds
pro
proactivecybersecurity
process
productdevelopment
professionalhabitat
projectmanagement
promptinjection
protect
protection
publiccloud
publiccloudinvestigation
publicclouds
pushingboundaries
pwsecure
qualitativeimprovement
quantumcomputing
quantumrandomness
r&dprocess
radiusag
ransomeware
ransomware
ratings
realtimeapplications
redalertsystemapp
reducecosts
reducerisk
reengineering
regulatedindustries
regulatorycompliance
reinforcementlearning
reliability
remotelearning
remotework
remoteworker
representativedata
resistanceagainstai
resourceefficiency
responsibleai
responsibleusage
responsibleuse
reviews
revolutionizedigitallandscape
revolutionizing
revolutionizingindustries
rightsmanagement
rishisunak
riskmanagement
riskmitigationplan
riskschallenges
roadmap
robotics
rootkit
rpa
russianthreats
sabr
safedigital
safeinternet
safelyshare
safelyshared
safety
safetyonline
safeweb
samaltman
samsungipleak
sandboxenvironment
sandworm
sbom
scadasystemsecurity
scareware
scatteredspider
sdi
sdn
searchintent
secdigital
sechack
secnetorg
secnews
secops
secpodcast
secretmicrosoft365
securecloud
secureconnectivity
securedata
securedataaccess
securedataexchange
securedatasharing
secureenclaves
secureexecution
securenet
securepc
securepod
securesupplychain
securesurf
securesurfing
securetech
secureweb
security
securityaspects
securitychallenges
securitymeasures
securitymodel
selfassessment
serviceintegration
serviceproviders
sgx
shamimnaqvi
sharedresponsibility
sharingcodeai
shortcutculture
siemens
signalwire
smartbuilding
smartnetworking
smoothtransition
snowflake
socialeng
software
softwaredeveloper
softwaredevelopers
softwareengineers
softwarsafe
solix
solutionarchitect
solutionarchitecture
spam
specificcontext
sportsanalytics
spyware
sql
stackoverflow
startupinnovation
stevewasick'sjourney
storage
strategicanalytics
strategicmove
strategies
structuredmethodologies
successfulinnovations
supplychain
surprises
sustainability
sutterhealth
systemchange
tailored
taiwanai
tapestorage
taxevasion
teachingexperience
tech
techdefend
techfounders
techguide
techindustry
technews
technicalbackground
technicalchallenges
technicaldebt
technology
technologyinnovation
technologytrends
techpod
techpodcast
techsafe
techsafety
techsec
techsecurity
techtalk
techtrends
tecprotect
telecominfrastructure
telelearning
telework
texttoaudio
texttoimage
texttotext
texttovideo
threatanaly
threatdetection
threats
tomtom
torbrowser
traditionalteaching
training
transparency
trentonsystems
trojan
truetrustapplications
trust
trustednetworks
trustworthiness
typingcadence
ubiquitouscomputing
ukchinatensions
ultra
unauthorizeduserdatause
unbiaseddata
unconventionalpaths
uniquehandmadewoodfurniture.
uniqueperspectives
uno
unstructureddata
upskilling
usarmy
usda
useradoption
usercontroldata
userdataprivacyconcerns
userdatasafeguarding
userexperience
valuingdataprivacy
vastdata
vdi
vendorlockinprevention
vergeio
veridify
versec
videoconferencing
videogen
virtualdatacenter
virtualization
virtualnetworks
virus
virusdefense
viruses
virusguard
virusscan
voicerecognition
vpn
vpnnetworks
vpns
vprotection
vulnerabilities
vulnerability
walacor
waveform
waveformai
web30
webassembly(wasm)
webdefend
webdefender
webguard
webpodcast
webprotect
webprotection
websec
websecure
websecurity
wifi6
wireguardnetworks
witnessexecution
wordpress
workerreplacement
workflow
workload
workloadcloud
workloadoptimization
workloadplacement
workloads
xmcyber
xwpspamshield
yazkrdzalic
zero5gtrust
zerodayvulnerability
zeroknowledgeproofs
zerotrust
zerotrustarchitecture
zerotrustnetworking
zerotrustotnetworks
zerotrustprinciples
zerotrustsecurity
zscaler
zta
zyxelsecurity
Search
Shop
News Briefs
Podcast Site
Youtube
LinkedIn Group
Facebook Group
Search Podcast