Tech Field Day Coverage

Our delegate panel includes independent writers and thought leaders, and we collect their coverage of the event, Tech Field Day presentations, and sponsoring companies here.

Cloud Rewind at Cloud Field Day 23: Resilience as Code, Without the Ritual

Mike Stanley provided a detailed overview of the concept of Resilience as Code discussed at Cloud Field Day 23, highlighting the pivotal shift towards automating resilience in cloud environments without the cumbersome rituals traditionally associated with high reliability. He focused on how modern cloud solutions streamline operations and enhance system robustness through advanced coding practices. For additional insights into Cloud Field Day 23, explore more of Mike Stanley’s reviews and analysis on this topic.

Read More:

Cloud Rewind at Cloud Field Day 23: Resilience as Code, Without the Ritual

HPE Takes Aim at IT Operations Chaos with OpsRamp Platform

In a recent insightful piece, Jack Poller discusses HPE’s strategic move to address the complexities of IT operations through its OpsRamp platform. The platform is designed to enhance visibility and control across diverse IT environments, aiming to streamline operations and reduce inefficiencies. For further insights on Cloud Field Day 23, explore additional coverage by Jack Poller.

Read More:

HPE Takes Aim at IT Operations Chaos with OpsRamp Platform

Microsoft Security Copilot Agents and You

Karen Lopez provides an insightful examination of Microsoft Security Copilot Agents, highlighting their role and impact on IT security protocols. She discusses the integration of these agents into existing security frameworks and their potential to enhance data protection and threat response efficiency. Further insights from Karen on Security Field Day 13 can be found here on LinkedIn.

Read More:

Microsoft Security Copilot Agents and You

Cisco Live 2025: Community, Balance, and Big Dreams for AI

At Cisco Live 2025, the focus centered on fostering a sense of community, achieving balance within the tech ecosystem, and exploring ambitious expansions in artificial intelligence capabilities. The event showcased Cisco’s commitment to integrating AI more deeply into network management, security solutions, and customer experience enhancements. For further insights into this topic, visit the coverage provided by Justin Cohen.

Read More:

Cisco Live 2025: Community, Balance, and Big Dreams for AI

Learning how Dell’s Hardware-assisted Security brings value to the organization

Lars Trøen explores the significant advantages that Dell’s Hardware-assisted Security offers to organizations, emphasizing how this technology enhances overall system protection and operational efficiency. He highlights the integration of cutting-edge security features into Dell’s hardware, illustrating their pivotal role in countering emerging cyber threats. For further insights and detailed analysis of Security Field Day 13, be sure to check out additional content by Lars Trøen.

Read More:

Learning how Dell's Hardware-assisted Security brings value to the organization

Why Supply Chain Security Is The First Line of Defense

Tom Hollingsworth highlights the critical role of supply chain security as the foundational defense mechanism in protecting organizational systems and data. By analyzing how vulnerabilities within the supply chain can lead to widespread security breaches, he emphasizes the need for robust security strategies that address both direct and indirect threats. For additional insights from Security Field Day 13, refer to Tom Hollingsworth’s coverage on Security Boulevard.

Read More:

Why Supply Chain Security Is The First Line of Defense

Broadcom’s Acquisition of VMware Might Be the Biggest Catalyst for IT Modernization There Is

Alan Shimel discusses the potential impacts of Broadcom’s recent acquisition of VMware, highlighting it as a crucial catalyst for widespread IT modernization across industries. He emphasizes how the merger could enhance technological integrations and advancements, paving the way for significant improvements in infrastructure efficiency and innovation. Find more coverage of this topic by Alan Shimel on Techstrong IT.

Read More:

Broadcom’s Acquisition of VMware Might Be the Biggest Catalyst for IT Modernization There Is

Simplifying Cloud Application Resilience in a Dynamic World

Alastair Cooke discusses the crucial need for resilient cloud applications in today’s dynamic digital environment, emphasizing the challenges and solutions for enterprises aiming to maintain robust operations amid frequent changes. He explores how simplifying the resilience of cloud-based applications can significantly benefit businesses by enhancing their ability to adapt and respond to new demands and potential disruptions. You can explore more coverage of Cloud Field Day 23 by Alastair Cooke on DevOps dot Com.

Read More:

Simplifying Cloud Application Resilience in a Dynamic World

Extracting Value, Retaining Control: A Fresh Take on Network Data with Aviz

In the recent discussion at Networking Field Day 38, Aviz Networks introduced innovative strategies to enhance value extraction and retain control over network data. Their fresh approach energizes traditional network operations, ensuring that businesses can maximize efficiency while maintaining robust data governance. To learn more about Aviz’s insights and other presentations from the event, find additional coverage of Networking Field Day 38 by visiting Nate Nielsen’s LinkedIn feed.

Read More:

Extracting Value, Retaining Control: A Fresh Take on Network Data with Aviz

Hedgehog at Networking Field Day: Operationalizing Open Networking for AI and Cloud Builders

At the recent Networking Field Day 38, Hedgehog presented its innovative strategies for operationalizing open networking, particularly focusing on the needs of AI and cloud infrastructure developers. The company showcased how their solutions are designed to enhance scalability, manageability, and efficiency in complex network environments. For additional insights and coverage on this topic, see more about Networking Field Day 38 on Nate Nielsen’s LinkedIn Pulse.

Read More:

Hedgehog at Networking Field Day: Operationalizing Open Networking for AI and Cloud Builders

Security Field Day 13 – part 1 (finally!)

Futurum Research analyst Fernando Montenegro shares his perspective on the security industry following his first appearance as a delegate at Security Field Day 13. For additional information and coverage from Security Field Day 13, you can visit the Futurum Group website.

Read More:

Security Field Day 13 - part 1 (finally!)

Navigating HPE’s Ambitious VMware Alternative Strategy

Keith Townsend recently published an enlightening overview of HPE’s ambitious strategy to position itself as a VMware alternative. The piece examines the implications of this move for the broader IT industry, analyzing potential impacts and opportunities for enterprise IT infrastructure. For more comprehensive discussions on Networking Field Day 38, visit Keith Townsend’s LinkedIn Pulse.

Read More:

Navigating HPE's Ambitious VMware Alternative Strategy

Scality at Cloud Field Day 23: When Petabytes Feel Predictable – Operational Lessons

Mike Stanley recently covered Scality’s presentation at Cloud Field Day 23, focusing on how their solutions are making the management of petabyte-scale data environments more predictable. His analysis highlighted key operational lessons and strategies that enhance data handling efficiency and reliability. For more comprehensive coverage of Cloud Field Day 23, visit Mike Stanley’s website.

Read More:

Scality at Cloud Field Day 23: When Petabytes Feel Predictable – Operational Lessons

Satellite Data’s Journey: How Ring is Helping ESA Manage Petabytes of Information

Alastair Cooke explores how Ring, Scality’s data storage and processing solution, is revolutionizing the way the European Space Agency (ESA) manages vast amounts of satellite data. He details the innovative methods and technologies employed by ESA to handle and utilize petabytes of information more efficiently. For additional insights into Cloud Field Day 23, check out Alastair Cooke’s coverage on Techstrong IT.

Read More:

Satellite Data's Journey: How Ring is Helping ESA Manage Petabytes of Information

My thoughts on Aviz Network’s Network Copilot Platform at #NFD38

In a recent post, Mike Huot shares his insights on Aviz Network’s Network Copilot Platform, as experienced at Networking Field Day 38. He discusses the platform’s innovative approach to streamlining network operations through automation and advanced analytics. For more comprehensive coverage of Networking Field Day 38, visit Mike’s LinkedIn Pulse feed.

Read More:

My thoughts on Aviz Network’s Network Copilot Platform at #NFD38

From Packets to Protection: How Network Observability Powers Security and Forensics

In this detailed exploration, Tom Hollingsworth discusses the critical role of network observability in enhancing security protocols and facilitating effective forensic analysis. He emphasizes how insights gleaned from observing network traffic can significantly bolster an organization’s cybersecurity measures against increasingly sophisticated threats. For further insights into Security Field Day 13, see additional coverage by Tom Hollingsworth on Security Boulevard.

Read More:

From Packets to Protection: How Network Observability Powers Security and Forensics

HPE Aruba Networking showcasing innovation at Networking Field Day 38

At Networking Field Day 38, HPE Aruba presented a series of innovations highlighting their continued commitment to advancing network technology. The discussions included insightful details on new capabilities and the strategic direction for their networking solutions. You can find more coverage of Networking Field Day 38 on the Techstrong websites.

Read More:

HPE Aruba Networking showcasing innovation at Networking Field Day 38

Beyond the Perimeter: Dell’s Three-Pillar Defense Against Modern Cyber Threats

In his latest analysis, Jack Poller examines Dell’s strategic approach to combatting modern cyber threats through a robust three-pillar defense mechanism. Highlighting innovations in predictive analytics, endpoint security, and cloud protection, Poller sheds light on how Dell’s integrated solutions are designed to enhance organizational resilience in today’s complex security landscape. For additional insights from Security Field Day 13, follow Jack Poller’s coverage on LinkedIn Pulse.

Read More:

Beyond the Perimeter: Dell's Three-Pillar Defense Against Modern Cyber Threats

Kubernetes for Your Physical Network? My Take on Hedgehog from #NFD38

At Networking Field Day 38, a notable highlight was the intriguing discussion on Hedgehog, an innovative platform designed to bring Kubernetes-like management to physical network infrastructures. This new approach promises to streamline network operations by abstracting complexity and enhancing automation, much like Kubernetes does for container orchestration. Find more coverage of Networking Field Day 38 by exploring Mike Huot’s analysis and discussions.

Read More:

Kubernetes for Your Physical Network? My Take on Hedgehog from #NFD38

cPacket Networks: The Network Observability Specialists Who Know Their Stack

Skye Fugate explores the expertise of cPacket Networks in network observability, highlighting their comprehensive understanding of networking stacks. The article details how cPacket Networks differentiates itself with deep network insights and smart data-led solutions that enhance network performance and security. For more on Security Field Day 13, read additional analyses by Skye Fugate on this topic.

Read More:

cPacket Networks: The Network Observability Specialists Who Know Their Stack