Skip to main content
Link
Menu
Expand
(external link)
Copy
Copied
Deutsch
Über
Wöchentliche Nachrichten
Sammlungen
Folgen
Cloud im digitalen Zeitalter
Português
Sobre
Notícias Semanais
Episódios
English
About
News Briefs
Collections
Zero Trust Architecture
Multi-Hybrid Cloud
Generative AI
Episodes
Español
Acerca de
Noticias Semanales
Episodios
Nube en la Era Digital
Français
À propos de
Nouvelles Hebdomadaires
Épisodes
Le nuage à l'ère numérique.
Italiano
Informazioni
Riepilogo Settimanale
Episodi
Episodes
Developing a Multi-Hybrid Cloud Operating Model
Building a Multi-Hybrid Cloud Strategy
Natural Language Data Analytics
Security in Generative AI
GenAI Policies
GenAI in Higher Education
Operationalizing GenAI
Becoming a Data Ready Organization
GenAI Advisor for Datacenter Management
GenAI Use Cases
Training the Next Generation in AI
Practical Generative AI
Understanding Generative AI
Embracing Sustainability with Smart Buildings
Update on 5G in the Department of Defense
Securing the Remote Worker Through Mobile Virtualization
GenerativeAI and Automation (Google Bard)
Embracing the AI Revolution
Attracting People Back to the Office
Science Behind Digital Twins
Use Cases in Confidential Computing
Data Protection with Confidential Computing
From Neurology to Neuromorphic Computing
Background Checking Your Open Source
Resilient Logistical Analytics
Evolution of Cloud
Rebirth of the Private Cloud
Resilient Data in Disruptive Comms
Trustworthy and Ethical AI
WaveForm AI
Lessons in HPC Oil & Gas
Software Defined BareMetal Management
Digital Transformation in Federal Government
Productizing Decisional AI
HPC OnDemand
Closing the Digital Skills Gap
Innovation as a Service
Certifying Autonomous Flight
Ways to Reduce Cybersecurity Risk
Cybersecurity in Public Sector
Automation with AI
Disruptive Private Clouds
An Argument for Global Data Networks
Moore's Law is not Dead!
What's ahead in 2023
2022 Year In Review
An Argument for a Holistic approach to Critical Infrastructure Security
Blocking and Tackling of Security
Automating Business Process Management
Operationalizing Business Process Management
Myths of Lift and Shift Cloud Migration
Realizing Smart City Potential
Securing the Supply Chain
Advancing Operations with 5G
History of Advanced Communications
Securing Critical Infrastructure
The Birth of Graph Intelligence Platforms
Information-driven Leadership Part 2
Information-driven Leadership
Operationalizing Your AI Projects
Identity-based Micro-segmentation with Elisity
Network Controller Security with Elisity
Intel's Public Sector Superheroes
Precog Cyber Attack PAth with XM Cyber
The Emergence of the Global Data Network
The Benefits of Graph Databses
Leveraging Virtual Datacenters with Verge.io
Requirements for Edge to Cloud Architectures
the Rebirth of the Private Cloud
The Four Superpowers of Digital Transformation
Protecting the Outer Walls of your Castle with Vulnerability Scans
Fighting the Cyber Adversary by Securing your Software Supply Chain
Barriers to Future Tech Adoption
Future of Big Memory and CXL
Collaborative DevSecOps
Confidential Computing in DevSecOps
The Things I Wish I Knew as a Government CTO
Artificial Intelligence and Security
Securing Your Castle with Zero-Trust
IDC Directions 2022
Shifting from Infrastructure to Workloads
Heterogeneous Programming with OneAPI
Meeting Intel's Cloud Solution Architects
Onboarding Remote Workers
Understanding the Shared Responsibility Security Model
Digital Transformation in 2022
Day in the Life of a Cloud Solution Architect
Cybersecurity Solutions with Hitachi
Ransomware: Prepare and Don't Panic
2021 a Year in Review
Modern Data Governance
Modern Data Governance
Securing the Data Center Through the Edge
5G in Defence
5G Past, Present, and Future
Managing Complexity in the Cloud
Accelerating Cloud Adoption while Decreasing Complexity and Cost
Follow and Secure the Bit Edge to Cloud
Inspiring IT Cultural Change
Demystifying 5G, Edge and AI
Data Breaches & Secure Supply Chain
Managing Risk in the Face of Ransomware
Evolution of Data Privacy
Understanding Edge to Data Center Problems
Cloud Broker Organization Part 2
Cloud Broker Organizations
Communication During Transformation
People & Process in Digital Transformation
DevOps with Speed While Reducing Risk
Telemetry in the Cloud
Practical Optane Persistent Memory Use Cases
Understanding Employee Burnout
Remote Work Before, During and After the Pandemic
VAST Data Revisited
Looking Forward to 2021
Securing your DevOps Pipeline
Not All Cores are Equal
Cloud in the Digital Age
The Role of the CIO in Cloud Adoption
Securing the DevOps Pipeline = SecDevOps
The Black Art of DevOps
Collaborative Medical Research with Confidential Computing
Watercooler Talk in a Remote Workforce
Roaring 20's a Look Forward to 2021
2020 in Review
Six Pillars of Cybersecurity
Navigating Disruptive Change
Embracing Workspace Evolution
The AWS Outage of Nov 2020
No Code (RPA) Approach to Back Office Efficiency
Improving Employee Value with Catalytic
Application Portability with OneAPI
Next-Generation Hyperscale Database - Aerospike
Legacy Integration with Cloud and RPA
Hardware Security: Imperative for Transforming Data
Multi Cloud Data Solutions with Hammerspace
Operationalizing Data Pipelines
Digital Strategy and Data Architecture
Insight Creation in Data-Centric Organizations
An Argument for Multi-Hybrid Cloud
Big Memory Software Defined Memory Controller
Destroying the Complexity of Storage Tiers
Using Data as a Strategic Asset
Data Collection and Preparation
Elastic Search & Intel Optane DCPMM
Decreasing Ingestion Congestion with Intel Optane DCPMM
Kick-starting Organizational Transformation
Kickstarting Your Organizational Transformation to Become Data-Centric
Illogical Obsession with Logic
Put the Title Right Here
Distance Teaching and Learning
Teleworker Sizing Your VDI Solution
Telework Securing Your Home Office
Securing the Teleworker Part 2
Securing the Teleworker
Managing Telework at Capacity
Infrastructure Maturity Model
Information Management Maturity Model
Benefits of Multi-Cloud Architecture
Follow the Bit
History of Data Centric Architecture
Guests
Aaron Reid
Adrian Kosowski
Alan Chalker
Alan Evans
Amy Tong
Andrew Cohen
Andrew Padilla
Andy Morris
Ann Madea
Anna Scott
Bard
Ben Kotvis
Betsy Freeman
Byron Tarry
Callen Sapien
Cameron Chehreh
Camille Morhardt
Carla Trevino
Charles Fan
ChatGPT
Chetan Venkatesh
Chris Lehman
Chris Sestito
Chris Sistito
Christine McMonigal
Colin McLean
Dan Demers
Dana Yanch
Darren W Pulsipher
Dave Burrill
Dave Marcus
Dave Shrestha
David Esposito
David Richard
David Rowley
Denis O'Shea
Doug Bourgeois
Eduardo Alverez
Eric Greenwald
Eric Hornsby
Erin Moseley
Glenn Kurowski
Google Bard
Grant Kelly
Greg Campbell
Greg Clifton
Greg Ernst
Greg Steck
Gretchen Stewart
Ian Evans
Ibett Acarapi
Illyse Sheaffer
James Reinders
Jared Shepard
Jason Dunn-Potter
Jason Dunn-Potter
Jeff Marshall
Jeff Reich
Jeffrey Lancaster
Jeremy Harris
Jesse Schrater
Jim Richberg
Johan Ballin
John Evans
Jon Gottfried
Keith Gray
Ken Urquhart
Kevin Bleckmann
Kiran Agrahara
Laura Newey
Leeland Brown
Leilani Bloomquist
Leland Brown
Logan Selby
Louis Parks
Luuk Van Dijk
Madeleine Wallace
Madeline Pulsipher
Madi Ahmadi
Manish Tandor
Mark Valcich
Matt Lembright
Matthew Carroll
Matthew Pulsipher
Max Young
Michael Greenberg
Michael Lenox
Michael Mehlberg
Mike Fraser
Mike Wagner
Neil Bahandur
Nick Bhadange
Ofir Azoulay-Rozanes
Ori Yudilevich
Pamela Follet
Patrick Conte
Paul Giorgi
Pete Schmitz
Phillip Griffith
Phillip Griffiths
Rachel Dreikosen
Rachel Mushawar
Rajiv Mandal
Randy Hayes
Ricardo Dutton Jr
Rick Herrmann
Rob Watts
Robert Looney
Robert Vaughn
Ron Fritzemeier
Sam Ceccola
Sam Seccola
Sarah Kalicin
Sarah Musick
Sean Chou
Sean Heiney
Shamim Naqvi
Sonu Panda
Stephanie Sabatini
Stephen Holt
Steve Orrin
Steve Wasick
Steven Holt
Steven Orrin
Sunny Stueve
Thomas Horlander
Tim Faulkes
Tim Flynn
Todd Christ
Tom Garrison
Uzair Hussain
Walter Hancock
Yazz Krdzalic
Tags
23andme
5g
5gbattery
5ginorbit
5ginterference
5gnetwork
5gspectrum
acceldata
accesscontrol
accountability
adaptiveleadership
advancedcomms
advancedcommunications
aerospike
agile
agileteams
ai
aiact
aiagriculture
aiapplications
aiassistants
aiattack
aiattacks
aibias
aibreakthrough
aichatbots
aics
aidata
aidevelopment
aiedge
aielection
aienergysupply
aiethics
aietics
aifighterjet
aifordiplomacy
aiforenergy
aiformilitary
aigeneratedcontent
aihardware
aihealcare
aiineducation
aiinitiatives
aiinnovation
aiinschool
aiinspace
aiintegration
aijobs
ailedgislations
ailegislation
aimodels
ainetworks
ainews
aioperation
aiops
aiot
aiotedge
aipotential
aipowered
aiprompt
airansomeware
airbus
airegulation
aireliability
aisaas
aisafety
aiscalability
aisecurity
aisecuritycenter
aisolutions
aispokesperson
aistrategies
aisummit
aitechnology
aitechsecurity
aitraining
aitransparency
aitrick
aitutors
aivalidation
aiwarfare
aiwashing
aiworkflows
aiworkforce
alibabacloud
altair
altman
amazonselfpublishers
amd
analytics
anomalydetection
anthropic
aplhav
apple
appleai
applicationsecurity
apt28attack
articul8
artificial_intelligence
artificialintel
artificialintelligence
assetinventory
at&t
atlan
atos
att
attackers
attackpaths
audi
auditability
aurora
authentication
automatedsecurity
automation
autonomtech
avoslocker
aws
awscloud
awssoftware
azure
azurecloud
bankingtrojans
batterylife
bias
bitcoinhack
biz
blockchaindt
bpm
breach
britain
britgenai
bt
bugs
businessanalyst
businessmanagement
businessprocessmanagement
businessprocessreengineering
cambridgesem
censys
champions
changemanagement
chatbotperformance
chatbots
chatgpt
childprotection
china
chinachipexports
chineseofficialsban
chineserisks
chipsecurity
chromeai
cio
cisa
cisaboard
cisco
citytech
clearfake
cloud
cloudcomputing
cloudconfiguration
cloudcost
clouddatamanagement
cloudedge
cloudfees
cloudfirst
cloudfrepatriation
cloudmanagement
cloudmigration
cloudnative
cloudoperations
cloudrepatriation
cloudsec
cloudsecurity
cloudservice
cloudsmart
cloudstorage
cloudtech
cloudtechnology
cloudtrends
cloudwars
cmauk
cognitivescience
cohesity
collaboration
collectiongenerativeai
columbiauniversityresearch
comms
communication
communityengagement
compliance
compute
confidentialcomputing
confidentialcomputingmanager
connectivity
connectwise
contentgeneration
contextai
continuousimprovement
continuouslearning
convergeditot
corporatesocialresponsibility(csr)
cozybear
cpra
creativity
criticalflaw
criticalinfrastructure
criticalthinking
crossfunctionalcollaboration
cryptojacking
csuite
culturalchange
customerserv
cxl
cyberattack
cyberattacks
cyberbill
cybercrime
cyberdefense
cyberrealm
cybersec
cybersecurity
cybersecurityawareness
cybersecuritybreach
cybersecuritypolicies
cybersecurityrisks
cyberseurity
cyberthreat
cyberthreats
cybertools
data
data_management
dataanalysis
dataanalytics
dataarchitecture
dataassurance
database
databaseencryption
databreach
databreaches
databricks
datachip
datademands
datadiversity
datadrivendecisionmaking
dataencryption
datagovernance
dataintegrity
datalake
datalifecyclemanagement
datalineage
datamanagement
datamesh
datamgmt
datamodeling
datanews
dataops
dataplatform
dataprivacy
dataprivecy
dataprocessing
dataprotection
dataprovenance
dataquality
dataretentionpolicies
datasciencesolution
datasecurity
datasecuritymanager
datasecurityplatform
datastrategy
datatraceability
datatrust
datavisualization
decencloud
deceptiveai
decisionalai
decisionmaking
deeofake
deepfake
deepfakes
deeplearning
dell
deloitte
devops
devopssec
devsecops
dhs
digiorgtran
digital
digitalbridge
digitaldefense
digitalethics
digitalgovernance
digitallandscape
digitalliteracy
digitalnews
digitalpublishing
digitalsecurity
digitaltrans
digitaltransf
digitaltransform
digitaltransformation
digitaltransformationpodcast
digitransf
dimension2
disruption
distributedanalytics
dod
duediligence
ecybersecurity
edge
edgeai
edgecomp
edgecompu
edgecompute
edgecomputing
edgecomputinginhealthcare
edgecomputingrevolution
edgecybersec
edgedevices
edgeplatform
edgetocloud
edt
edt160
education
edw37
efficiency
eganransomware
egressfees
embracedigi
embracedigital
embracindigital
embracingdigital
embracingdt
emergingtech
employeeengagement
employeeexperience
employeengagement
encryptingdata
encryption
encryptionkeys
endpointsecurity
endusersecurity
entedge
enterprisearchitecture
environmentalimpact
epa
erp
esxi
ethicaldatause
ethics
eucybersecurityregulations
evactech
exascale
exportsignal
federalagencies
filestorage
financeai
firmware
fiveeyes
flexibility
fortanix
fulladoption
futureofconfidentialcomputing
gaia
gaiax
gemini
genai
genaiphone
genaisecurity
genaistrat
genaiwork
generativeai
generativeaipolicy
geneticsdata
geophysics
github
globalkeymanagement
google
googleai
googlechrome
googlecloud
governance
governmentai
gpt3.5
gpt4
growthrate
hackerattack
hackers
hacking
hamasconflict
harnessingai
healthcare
healthcareai
healthcarecyber
healthcarehack
healthcaremarket
hellmanns
hhs
highereducation
highperformancecomputing
holespins
holidayhacks
homelawncaretools
hospitals
hpc
hpcc
hpe
hpectosummit
hphack
hrtech
hugfacehack
hybridcloud
hypershield
hypori
ibm
ibmcloud
ibmqradar
idc
identity
identityaccessmanagement
identitymanagement
incidentresponse
industrai
industrialdge
industry4.0
informatica
informationsecuritymanagement
informationtechnology
infrastructure
infrastructuremanagement
innovation
insiderthreats
integration
intel
intelai
intelcloudsolutionarchitects
intelevents
intelfederal
intelinterview
intelinvest
intelit
intelnervana
intelplatform
iosspyware
iot
iotapplications
iotdevices
iotsecurity
iphone
iranianhackers
iraniansanctions
iridiumnetwork
ironbow
ironnetclosure
irs
isovalent
israelai
israelcyberattacks
itcare
itgovernance
itot
itoutage
jenkinsvul
keywords
kidsinai
knowledgesharing
languagemodels
largetextmodel
latencyreduction
lawenforcement
leadership
leadgen
linkedin
llama3
llm
llms
log4j
lonelyislandapproach
m2prochip
machinelearning
macrometa
macstadium
malware
malwaredetect
malwares
marylynritchie
mcafee
mcdonalds
mealreveal
mec
memverge
meta
meteorlake
mgmbreach
microsegmentation
microservices
microsoft
microsoftbreach
microsoftsec
midbiz
miraibotnet
mitai
mitresearch
ml
mobilecomputing
mobileworld
moderncomputing
monitoring
mooreslaw
mozillafirefox
msazure
multiaccessedgecomputing
multicloud
multifactorauthentication
nano
nationalgrid
nationalsecurity
navigation
networkarchitecture
networksecurity
neuralchat7b
neurology
neuromorphic
nist
nistcsf
nokia
northkoreanhackers
nosql
nsa
nsacyber
nsastrategies
nuclearecurity
nutanix
nvd
obligation
oneapi
onprem
ontariohack
ontarioincidents
openai
opensourcesecurity
openziti
operationalefficiency
operationalization
operationaltechnology
optane
optimization
oracle
oracledb23ai
oraclegai
orantechnology
organizationalchange
organizationalculture
ot
othacks
outage
overlaynetworks
paloaltoai
parallelworks
patientdata
pc
pdfhack
pennai
pentagon
pentagoncloud
people
personalizededu
personalizedphishingattacks
pharmacy
phishing
plugindata
plugxusb
podcast
podcastshow
polarismarketresearch
policy
policyenforcement
polystores
portability
powerplantcyberthreats
precrime
predictive
prepostdeployment
privacy
private5g
privatecloud
privategenai
pro
proactivecybersecurity
process
processautomation
processoptimization
productassurance
promptinjection
proofofconcept
publiccloud
publiccloudinvestigation
purview
qualcomm
quantumcomputing
quantumrandomness
qubit
ragdesign
ransomeware
ransomware
realtimeapplications
redalertsystemapp
redzone
reinforcementlearning
reka
repatriation
replicatesai
responsibleai
rishisunak
riskmanagement
riskmanagementpolicies
riskschallenges
robbertvaughn
roboticprocessautomation
romania
routerhack
rpa
rsaconference
russianthreats
sabr
safelyshare
samaltman
samsungipleak
sandworm
sap
sapai
savvycustomerengagement
sbom
scatteredspider
school
sde/loggergence
sealsq
seamframw
sechack
secretmicrosoft365
secureai
secureconnectivity
secureenclaves
secureexecution
security
securityaspects
securitymeasures
semiconductor
serviceproviders
sgx
sharingcodeai
shotspottr
siemens
simswap
smalbiz
smartcity
smartsecurity
snowflake
softwaresecurity
solix
somos
sovereignty
space
spacetechnology
sql
stackoverflow
stanford
stateandlocalgovernment
storage
strategicdecisionmaking
superbowl
supercomputer
supplychain
supplychainoptimization
sustainability
taiwanai
tapestorage
taxevasion
techethics
techindustry
techlaws
technews
technology
techregulation
techtrends
techupdates
tedlasso
telework
thirdpartyerror
threatdetection
tmobile5g
tomtom
training
traininganddevelopment
transformation
transformpod
transparency
trendmicro
truetrustapplications
trust
twofactorauthentication
typingcadence
ubicomp
ubiquitous
ubiquitouscomp
ubiquitouscomputing
ukchinatensions
ultra
uniquehandmadewoodfurniture.
unitedhealth
universaltranslator
uno
upskilling
usairforce
usarmy
uscybertrust
usda
useraccessmanagement
userbehavioralanalytics
usfcc
valuechain
vasa1
vastdata
vdi
vergeio
verizon
videogen
virtualization
virtuallocalareanetwork
vision2024
vmware
voicerecognition
volttyphoon
vpn
vulnerabilities
vulnerabilitymanagement
walacor
wallaceinsight
webassembly(wasm)
wifi
wordpress
workforcereskilling
workiva
workloadoptimization
workloads
workplaceproductivity
xwpspamshield
zboxai
zero5gtrust
zerodayvulnerability
zeroknowledgeproofs
zerotrust
zerotrustarchitecture
zerotrustnetworking
zerotrustsecurity
zotac
zta
zyxelsecurity
Search
Shop
News Briefs
ED-T the Fish
Podcast Site
Youtube
LinkedIn Group
Facebook Group
Tags
aiot
#aiot
Episodes