Marian Newsome explores how utilizing DNS data can enhance compliance and cyber resilience, providing organizations with a strategic advantage in preempting security threats. Through efficient data analysis, businesses are not only able to meet regulatory requirements but also fortify their defenses against potential cyberattacks. Discover more insights on this topic by Marian Newsome on LinkedIn Pulse.
What If Your Storage Knew How to Talk Back?
Vriti Magee recently posted on LinkedIn following MinIO’s presentation at Cloud Field Day 23. PromptObject allows developers to interact with unstructured data using natural language prompts, retrieving structured JSON responses. This integration with LLM APIs and the Model Context Protocol (MCP) standardizes AI agent interactions with storage, enabling functions like listing buckets and generating dashboards.
Behind the Exabytes: A Field Note from Inside the Cloud
In this article, Vriti Magee takes a look at Sality’s presentation at Cloud Field Day 23. Scality’s RING platform, a practical storage architecture for data-intensive organizations, supports exabyte-scale growth and internal cloud services. Its disaggregated architecture allows independent scaling of compute, storage, and metadata, managing 12 exabytes of data with low latency and high reliability. Scality’s architecture supports native erasure coding, geo-distributed availability zones, and asynchronous replication, making it a backbone for regulated enterprises building internal clouds.
Share Cleveland 25 Took Mainframe to the Next Level
Jeffrey Powers recently covered the transformative advances seen at SHARE Cleveland 25 in elevating mainframe technology. This insightful piece discusses how the company leveraged innovative strategies to enhance their mainframe capabilities significantly. For additional insights from Jeffrey Powers, check his articles on LinkedIn Pulse.
cPacket: Every Packet Counts
Lars Trøen provides an insightful overview of cPacket’s technologies, emphasizing how critical each packet is in network monitoring and analysis. He demonstrated how cPacket’s solutions enable deeper visibility into network traffic, significantly aiding in performance tuning and security threat detection. For additional insights from Security Field Day 13, please visit his coverage on this topic.
Tech Field Day Session Recap: #2 – PopUp Mainframe
IBM unveiled PopUp Mainframe at SHARE, addressing mainframe delivery challenges with two editions: Z Edition for Linux on Z and X Edition for x86/cloud. It offers a virtualized mainframe environment with z/OS functionality, development tools, and enhanced data compliance support. Read more in this LinkedIn article by Derek Britton following SHARE Cleveland 2025.
Tech Field Day Session Recap: #1 – Broadcom
Broadcom presented WatchTower, an observability product that provides actionable insights from data across hybrid IT environments. WatchTower integrates with SRE tools and offers features like topology, alert insights, machine learning, and application profiling. Read more in this LinkedIn article by Derek Britton following SHARE Cleveland 2025.
Qlik Answers from the New Zealand Government 2025 Budget
Alastair Cooke provides a detailed analysis of how the New Zealand Government’s 2025 budget addresses Qlik solutions. Focusing on the implications for IT and data analytics sectors, the article explores strategic investments and policy changes. You can find additional insights on this topic by Alastair Cooke on LinkedIn Pulse.
HPE Aruba at Networking Field Day 38: A Strong Showing from a Deep Portfolio
At Networking Field Day 38, HPE Aruba showcased its robust and diverse portfolio, underlining its strength and depth in network solutions. The presentation demonstrated how Aruba’s innovative technologies and strategic insights address complex networking challenges across various industries. Discover more coverage of Networking Field Day 38 from Nate Nielsen on LinkedIn.
NFD38: cPacket Shows How AI Meets Packet Data (And Where It’s Heading)
At Networking Field Day 38, cPacket Networks demonstrated the integration of AI technologies with packet data, highlighting advanced analytics and real-time data processing capabilities. The presentation focused on how this convergence improves network performance, security, and management by enabling more precise and proactive operational decisions. For additional insights from Networking Field Day 38, watch for coverage on LinkedIn by Mike Huot.
The AI Memory Crisis (And How One Company Thinks They’ve Solved It)
As enterprises increasingly deploy AI applications, they face a significant bottleneck due to the limitations of conventional memory architectures. In response, Phison claims to have developed a solution that addresses this critical “AI Memory Crisis” by enhancing memory efficiency and scalability. Discover additional insights about AI Infrastructure Field Day 2 in our coverage on LinkedIn Pulse featuring Jack Poller.
The AI Infrastructure Bottleneck No One Talks About
Jack Poller sheds light on the seldom-discussed AI infrastructure bottleneck, highlighting the limitations in current technologies that could potentially hinder AI applications’ effectiveness. He explores the complexity of balancing computational power, data storage capacity, and network capabilities to optimally support AI workloads. For more insights on Netris, you can check out additional coverage from Security Field Day 13 on LinkedIn Pulse.
The Lifeboat Is Already in the Water: Rethinking Business Continuity in a Distributed World
In this article by Vriti Magee, the focus is on the evolving strategies for business continuity in an era where traditional centralized operational models are becoming obsolete. It highlights the necessity for organizations to adopt a more distributed approach to ensure resilience and operational stability amidst global disruptions. For more insights into Qumulo, check out our coverage of Cloud Field Day 23.
Veeam’s Quiet Evolution: From Backups to Detection, Response, and Recovery
Skye Fugate explores the strategic transformation of Veeam from its traditional focus on backups to a broader role encompassing detection, response, and recovery capabilities in enterprise security environments. This shift reflects Veeam’s response to the evolving needs of modern IT infrastructure, where security is paramount. For additional insights on Security Field Day 13 by Skye Fugate, visit his LinkedIn feed.
Microsoft Security Copilot Agents and You
Karen Lopez provides an insightful examination of Microsoft Security Copilot Agents, highlighting their role and impact on IT security protocols. She discusses the integration of these agents into existing security frameworks and their potential to enhance data protection and threat response efficiency. Further insights from Karen on Security Field Day 13 can be found here on LinkedIn.
Learning how Dell’s Hardware-assisted Security brings value to the organization
Lars Trøen explores the significant advantages that Dell’s Hardware-assisted Security offers to organizations, emphasizing how this technology enhances overall system protection and operational efficiency. He highlights the integration of cutting-edge security features into Dell’s hardware, illustrating their pivotal role in countering emerging cyber threats. For further insights and detailed analysis of Security Field Day 13, be sure to check out additional content by Lars Trøen.
Extracting Value, Retaining Control: A Fresh Take on Network Data with Aviz
In the recent discussion at Networking Field Day 38, Aviz Networks introduced innovative strategies to enhance value extraction and retain control over network data. Their fresh approach energizes traditional network operations, ensuring that businesses can maximize efficiency while maintaining robust data governance. To learn more about Aviz’s insights and other presentations from the event, find additional coverage of Networking Field Day 38 by visiting Nate Nielsen’s LinkedIn feed.
Hedgehog at Networking Field Day: Operationalizing Open Networking for AI and Cloud Builders
At the recent Networking Field Day 38, Hedgehog presented its innovative strategies for operationalizing open networking, particularly focusing on the needs of AI and cloud infrastructure developers. The company showcased how their solutions are designed to enhance scalability, manageability, and efficiency in complex network environments. For additional insights and coverage on this topic, see more about Networking Field Day 38 on Nate Nielsen’s LinkedIn Pulse.
Security Field Day 13 – part 1 (finally!)
Futurum Research analyst Fernando Montenegro shares his perspective on the security industry following his first appearance as a delegate at Security Field Day 13. For additional information and coverage from Security Field Day 13, you can visit the Futurum Group website.