Tech Field Day Coverage

Our delegate panel includes independent writers and thought leaders, and we collect their coverage of the event, Tech Field Day presentations, and sponsoring companies here.

Navigating HPE’s Ambitious VMware Alternative Strategy

Keith Townsend recently published an enlightening overview of HPE’s ambitious strategy to position itself as a VMware alternative. The piece examines the implications of this move for the broader IT industry, analyzing potential impacts and opportunities for enterprise IT infrastructure. For more comprehensive discussions on Networking Field Day 38, visit Keith Townsend’s LinkedIn Pulse.

Read More:

Navigating HPE's Ambitious VMware Alternative Strategy

Scality at Cloud Field Day 23: When Petabytes Feel Predictable – Operational Lessons

Mike Stanley recently covered Scality’s presentation at Cloud Field Day 23, focusing on how their solutions are making the management of petabyte-scale data environments more predictable. His analysis highlighted key operational lessons and strategies that enhance data handling efficiency and reliability. For more comprehensive coverage of Cloud Field Day 23, visit Mike Stanley’s website.

Read More:

Scality at Cloud Field Day 23: When Petabytes Feel Predictable – Operational Lessons

Satellite Data’s Journey: How Ring is Helping ESA Manage Petabytes of Information

Alastair Cooke explores how Ring, Scality’s data storage and processing solution, is revolutionizing the way the European Space Agency (ESA) manages vast amounts of satellite data. He details the innovative methods and technologies employed by ESA to handle and utilize petabytes of information more efficiently. For additional insights into Cloud Field Day 23, check out Alastair Cooke’s coverage on Techstrong IT.

Read More:

Satellite Data's Journey: How Ring is Helping ESA Manage Petabytes of Information

My thoughts on Aviz Network’s Network Copilot Platform at #NFD38

In a recent post, Mike Huot shares his insights on Aviz Network’s Network Copilot Platform, as experienced at Networking Field Day 38. He discusses the platform’s innovative approach to streamlining network operations through automation and advanced analytics. For more comprehensive coverage of Networking Field Day 38, visit Mike’s LinkedIn Pulse feed.

Read More:

My thoughts on Aviz Network’s Network Copilot Platform at #NFD38

From Packets to Protection: How Network Observability Powers Security and Forensics

In this detailed exploration, Tom Hollingsworth discusses the critical role of network observability in enhancing security protocols and facilitating effective forensic analysis. He emphasizes how insights gleaned from observing network traffic can significantly bolster an organization’s cybersecurity measures against increasingly sophisticated threats. For further insights into Security Field Day 13, see additional coverage by Tom Hollingsworth on Security Boulevard.

Read More:

From Packets to Protection: How Network Observability Powers Security and Forensics

HPE Aruba Networking showcasing innovation at Networking Field Day 38

At Networking Field Day 38, HPE Aruba presented a series of innovations highlighting their continued commitment to advancing network technology. The discussions included insightful details on new capabilities and the strategic direction for their networking solutions. You can find more coverage of Networking Field Day 38 on the Techstrong websites.

Read More:

HPE Aruba Networking showcasing innovation at Networking Field Day 38

Beyond the Perimeter: Dell’s Three-Pillar Defense Against Modern Cyber Threats

In his latest analysis, Jack Poller examines Dell’s strategic approach to combatting modern cyber threats through a robust three-pillar defense mechanism. Highlighting innovations in predictive analytics, endpoint security, and cloud protection, Poller sheds light on how Dell’s integrated solutions are designed to enhance organizational resilience in today’s complex security landscape. For additional insights from Security Field Day 13, follow Jack Poller’s coverage on LinkedIn Pulse.

Read More:

Beyond the Perimeter: Dell's Three-Pillar Defense Against Modern Cyber Threats

Kubernetes for Your Physical Network? My Take on Hedgehog from #NFD38

At Networking Field Day 38, a notable highlight was the intriguing discussion on Hedgehog, an innovative platform designed to bring Kubernetes-like management to physical network infrastructures. This new approach promises to streamline network operations by abstracting complexity and enhancing automation, much like Kubernetes does for container orchestration. Find more coverage of Networking Field Day 38 by exploring Mike Huot’s analysis and discussions.

Read More:

Kubernetes for Your Physical Network? My Take on Hedgehog from #NFD38

cPacket Networks: The Network Observability Specialists Who Know Their Stack

Skye Fugate explores the expertise of cPacket Networks in network observability, highlighting their comprehensive understanding of networking stacks. The article details how cPacket Networks differentiates itself with deep network insights and smart data-led solutions that enhance network performance and security. For more on Security Field Day 13, read additional analyses by Skye Fugate on this topic.

Read More:

cPacket Networks: The Network Observability Specialists Who Know Their Stack

Navigating the Rise of LLM-Powered Point Tools: What Every CTO Needs to Know

In the rapidly evolving landscape of enterprise IT, CTOs must stay abreast of the developments surrounding Large Language Models (LLMs) and their integration into point tools. This article provides critical insights into how LLMs are reshaping tools that manage specialized tasks, highlighting the implications for system efficiency and data management. For additional details and discussions from Networking Field Day 38, visit Gestalt IT.

Read More:

Navigating the Rise of LLM-Powered Point Tools: What Every CTO Needs to Know

AI Hype Check: Why Traditional ML Still Powers Real Business in 2025

In this article by Keith Townsend following Tech Field Day at Qlik Connect, the author critically assesses the ongoing buzz around advanced AI technologies and emphasizes the significant, enduring value that traditional machine learning (ML) continues to bring to business operations as of 2025. Townsend explores various real-world applications where traditional ML methods outperform newer AI models, offering stability and reliability that newer technologies can’t yet match. For more coverage of this topic, please see additional articles by Keith Townsend.

Read More:

AI Hype Check: Why Traditional ML Still Powers Real Business in 2025

Learning how Dell’s Hardware-assisted Security brings value to the organization

Lars Trøen recently explored the significant benefits of Dell’s Hardware-assisted Security and its impact on organizational protection. His insights highlight how these technological advancements bolster defense mechanisms, enhancing overall enterprise security. For more insights on Security Field Day 13 from Lars, visit his coverage.

Read More:

Learning how Dell's Hardware-assisted Security brings value to the organization

Broadcom’s Big Bet: Why VMware Cloud Foundation Is Gaining Ground | TSG Ep. 885

The Techstrong Gang episode discusses Broadcom’s acquisition of VMware and its impact on IT modernization. The panel explores VMware Cloud Foundation 9.0, emphasizing its role in simplifying infrastructure and operational management, especially for small application teams.

Read More:

Broadcom’s Big Bet: Why VMware Cloud Foundation Is Gaining Ground | TSG Ep. 885

David vs. Goliath in AI Hardware: Signal65’s Independent Tests Reveal Gaudi 3’s Surprising Edge

Following the Futurum presentation at Cloud Field Day, Jack Poller examines the performance benchmarks of Habana Labs’ Gaudi 3 AI processor, revealing its competitive advantage over industry giants in AI hardware. Signal65’s independent testing highlights Gaudi 3’s enhanced processing capabilities, which could reshape expectations within the AI technology landscape. Find more coverage of Cloud Field Day 23 by visiting Techstrong IT and AI.

Read More:

Breaking Through – Beating Mainframe Delivery Bottlenecks

You Don’t Need a CCIE to Build a Network—Until You Do

Keith Townsend’s latest piece challenges the conventional wisdom around the necessity of having a CCIE for building networks given the advent of SONiC and Hedgehog. He explores scenarios in which the expertise afforded by a CCIE becomes crucial, despite the trend toward automated network solutions. For additional insights and discussions on Networking Field Day 38, follow Keith Townsend’s updates on LinkedIn Pulse.

Read More:

You Don’t Need a CCIE to Build a Network—Until You Do

Beyond Backup: How Coveware is Revolutionizing Veeam’s Ransomware Defense

Tom Hollingsworth provides an insightful exploration of how Coveware is enhancing Veeam’s ransomware defense mechanisms, pushing beyond traditional backup solutions to offer a more robust security posture. He explains the strategic integration of Coveware’s tools with Veeam’s technology, which not only secures data but also ensures faster recovery post-attack. For additional insights from Security Field Day 13, see Tom Hollingsworth’s coverage on Security Boulevard.

Read More:

Beyond Backup: How Coveware is Revolutionizing Veeam's Ransomware Defense

Exploring AI Talent Acquisition and Networking Innovations | TSG Ep. 880 – Techstrong TV

In this episode of Techstrong TV, Stephen Foskett dives into the critical topic of AI talent acquisition and examines groundbreaking innovations in networking. Bringing together expertise from various sectors, the discussion highlights strategies for harnessing AI capabilities and optimizing network performance. For additional insights into Networking Field Day 38, visit Techstrong Gang’s continued coverage.

Read More:

Exploring AI Talent Acquisition and Networking Innovations | TSG Ep. 880 - Techstrong TV

The Era of Agentic Security with Microsoft Security Copilot

In his recent discussion on The Era of Agentic Security with Microsoft Security Copilot, Tom Hollingsworth explores the evolution of cybersecurity tools, emphasizing the innovative strides Microsoft has made in integrating AI technologies to enhance security operations. He highlights how Microsoft Security Copilot serves as a paradigm shift towards more autonomous, AI-driven security systems that proactively manage and protect IT environments. For additional insights on Security Field Day 13, you can read more articles by Tom Hollingsworth on Security Boulevard.

Read More:

The Era of Agentic Security with Microsoft Security Copilot

Fortifying Defenses: Veeam’s Comprehensive Approach to Cyber Resilience

Jack Poller offers a comprehensive review of Veeam’s enhanced cybersecurity measures, illustrating a multi-layered approach aimed at increasing an organization’s cyber resilience. He discussed key enhancements like improved data protection capabilities and the integration of proactive measures to prevent data breaches. You can read more of Jack Poller’s analyses from Security Field Day 13 on LinkedIn Pulse.

Read More:

Fortifying Defenses: Veeam's Comprehensive Approach to Cyber Resilience