Jack Poller explores the revolutionary impact of Hammerspace on AI infrastructure, highlighting the potential for a single rack to manage up to one exabyte of data. This approach not only simplifies the physical footprint of data storage but also enhances the scalability and efficiency crucial for AI-driven enterprises. For more insights into AI Infrastructure Field Day 4, see the full coverage on our website.
Your GPUs Are Only as Good as the Network Feeding Them
In a recent article by Jack Poller about Cisco, he emphasizes the critical role of the network infrastructure in maximizing GPU performance for AI applications. He argues that irrespective of the GPUs’ computational capabilities, the overall system throughput and efficiency are heavily dependent on the robustness and speed of the underlying network. For additional insights and coverage from AI Infrastructure Field Day 4, visit Gestalt IT.
Cloud Strategy, The Future of Infrastructure, and Of Course AI at Cloud Field Day 25
Cloud Field Day 25 kicks off March 11–12 with two days of in-depth technical discussions, live demos, and expert insights from some of the most innovative companies in the industry. On Wednesday at 9:00 AM PT, Hammerspace kicks things off by exploring real-world use cases for global namespaces and policy-based data management—especially for AI workloads. […]
Security Is More Than AI in 2026
There’s more to security than AI models and keeping them safe. Identity and user security are sure to be hot topics during this year’s RSAC Conference. In this episode, Tom Hollingsworth is joined by Jack Poller and Drew Conry-Murray as they discuss what’s hot in the non-AI areas of security. They discuss the importance of identity-based security and how it can be extended to include non-human employees. They also discuss how enterprises are focused on securing browsers with extensions and not forcing a specific application. The guests debate the advantages and disadvantages of all of these aspects as well as how AI will eventually provide additional context around them all.
AI Tooling is Causing Identity Security Issues with 1Password
The rise of AI tooling and agents in the enterprise has created a gap with identity security platforms. Addressing that gap remains challenging when so much is still unclear about how users and agents interact. In this episode of the Tech Field Day podcast, brought to you by 1Password, Tom Hollingsworth is joined by Kate Scarcella, Jack Poller, and Sanjay Ramnath of 1Password.
The panel discusses the shift from client-server models to the new agentic landscape. They talk about the challenges of tracking activity and how static credential management is unable to keep up. They also talk about the need for business to lead the change in IT and enable security to keep up with the current velocity of features. They also discuss how there needs to be a shift in the way that companies develop and apply security policy to users, both physical and digital.
AI Has Escaped Your Datacenter Presented by Cisco
AI has driven your datacenter designs and is now moving outwards through your whole network. This episode of the Tech Field Day podcast features Lee Peterson from Cisco discussing AI and networks with Andy Banta, Jack Poller, and Alastair Cooke. The discussion explores how AI is “escaping the data center” and becoming pervasive across the network, necessitating a dual focus on “networking for AI” and “AI for networking.” The former involves building robust, high-performance, and secure infrastructure, particularly at the edge, to support AI workloads like real-time inference. The goal is to support new applications such as robotics, fraud detection, and small language models, moving beyond traditional cloud-centric deployments to a more federated model. The latter leverages AI to manage, optimize, troubleshoot, and secure the network itself, with Cisco utilizing deep network learning models, historical data, and expertise to create AI assistants that enable intent-based networking and streamline operations. Additionally, the conversation emphasizes the critical role of advanced security, including hardware-accelerated post-quantum cryptography, to protect data in this evolving, AI-driven environment from future decryption threats.
Cutting-Edge AI Networking and Storage Kick Off 2026 at AI Infrastructure Field Day 4
We’re kicking off 2026 with one of our most popular events, AI Infrastructure Field Day 4, running from January 28th through January 30th. The event will stream live on LinkedIn, Techstrong TV, the Tech Field Day website, and for the first time ever, on our YouTube channel, offering a front-row view of the latest in […]
The AI Librarian: How Microsoft Sentinel Transforms Chaos into Clarity
In a recent piece by Jack Poller, he explores how Microsoft Sentinel, an advanced security information and event management (SIEM) solution, adeptly handles and organizes vast amounts of data to create manageable, actionable insights, thus functioning akin to an AI librarian. This technology not only enhances an organization’s ability to detect and respond to threats but also simplifies the complex integration and correlation of disparate data sources. For more comprehensive analysis from our special event with Microsoft Security, watch Jack Poller’s blog.
Modern Data Mobility is Challenging the Laws of Physics with Hammerspace
Modern data mobility is challenging the laws of physics; the speed of light is a fundamental limit for moving signals. This episode of the Tech Field Day podcast features Kurt Kuckein from Hammerspace discussing data movement and management with Jim Jones, Jack Poller, Andy Banta, and Alastair Cooke. The challenge is that the distributed nature of data, spread across the globe, creates significant obstacles for AI, particularly regarding the speed of light and power consumption. We delve into overcoming these limitations through technologies that facilitate data access and movement, touching on concepts such as efficient storage solutions (Open Flash Platform), the importance of centralized data management, and the agility required for evolving AI workloads. While the underlying principles of data management are not new, the scale and complexity of AI necessitate innovative approaches to ensure data can be accessed and utilized effectively, regardless of its physical location.
Hackers Think in Graphs. Your Security Team Should Too
Jack Poller emphasizes the importance of adopting a graph-based approach in cybersecurity, mirroring the method hackers often use to understand complex network relationships and vulnerabilities. He argues that by using graphs, security teams can enhance their ability to predict, analyze, and mitigate risks effectively. For more coverage from our recent Tech Field Day event with Microsoft Security, visit Jack Poller’s website.
Microsoft Takes Aim at “Swivel-Chair Security” with Defender Portal Overhaul
Microsoft is targeting inefficiencies in security operations with its latest update to the Defender Portal, aimed at reducing the need for security professionals to switch between multiple tools, a process often referred to as “Swivel-Chair Security.” The overhaul enhances user experience by streamlining workflows and integrating various security solutions into a single, cohesive platform. For further coverage from our special event with Microsoft Security, follow Security Boulevard.
The Dawn of Digital Fortitude: Commvault Cloud Unity Defines AI Resilience
Jack Poller’s recent article highlights the launch of Commvault Cloud Unity, a pioneering initiative that integrates AI to enhance data resilience in cloud environments. This approach not only strengthens data protection strategies but also ensures a more robust safeguarding of critical information assets across diverse platforms. For additional coverage from Commvault SHIFT 2025, follow us on LinkedIn Pulse.
Nile’s Bold Claim: Your LAN Architecture Is Fundamentally Broken
Jack Poller critically evaluates Nile’s assertion that traditional LAN architecture is inherently flawed, suggesting the need for innovative enhancements in network design. He explores the implications of this viewpoint, highlighting potential areas for improvement to meet modern connectivity demands. For additional insights and coverage from Security Field Day 14, follow Jack Poller on Security Boulevard.
HPE’s Post-Juniper Vision: AI-Driven Security at Enterprise Scale
In a recent piece by Jack Poller, the focus shifts to HPE’s strategic direction post its acquisition of Juniper, highlighting its aim to enhance enterprise-scale security through AI-driven solutions. This approach signifies a pivotal shift towards integrating advanced artificial intelligence to improve security frameworks and network management. For further insights from Security Field Day 14, follow Jack Poller’s coverage on Security Boulevard.
How Fortinet Is Tackling the New Attack Surface Created by AI Agents
Jack Poller recently explored Fortinet’s innovative strategies in addressing the expanding attack surface brought on by AI agents. His analysis highlights how Fortinet is enhancing security protocols and tools to mitigate potential threats that accompany the integration of AI technology in various sectors. For additional insights on Cloud Field Day 23, follow Jack Poller’s updates on LinkedIn Pulse.
DNS Must Be Secured Presented by Infoblox
DNS security is no longer optional. This service is not only being attacked by nefarious actors but it is also being leveraged in ways to compromise users and exfiltrate data. In this episode of the Tech Field Day podcast, brought to you by Infoblox, Tom Hollingsworth is joined by Jack Poller and Cricket Liu. They talk about the historical openness of DNS and how that has led to it becoming easy to see what users are doing and create ways to manipulate them. They discuss ways to secure the protocol and how companies like Infoblox are extending the capabilities for future security.
The Cloud Comes Home: Oxide Reimagines On-Prem Computing
Jack Poller provides an insightful analysis of Oxide’s innovative approach to on-premises computing, which rethinks the traditional infrastructure by integrating cloud-like agility directly within enterprise environments. He highlights how Oxide brings the efficiency and scalability of the cloud into a controllable on-site format, promising enhancements in performance and security. For more insights from Cloud Field Day 24, follow Jack Poller’s continuing coverage on LinkedIn Pulse.
From Chaos to Clarity: HPE’s CloudOps Vision for Hybrid Control
Jack Poller explores HPE’s latest strategy aimed at transforming chaos into clarity by providing enhanced hybrid control through its CloudOps vision. This approach seeks to streamline complex multi-cloud environments, making it easier for businesses to manage and optimize their cloud operations effectively. For further insights from Cloud Field Day 24, follow Jack on LinkedIn!
Beyond the Vault: 1Password’s Strategic Pivot to Extended Access Management
Jack Poller recently discussed 1Password’s expansion beyond its core password management capabilities, highlighting its strategic shift towards Extended Access Management. This evolution aims to provide more comprehensive security solutions that address various access control needs in an increasingly complex digital environment. For further coverage of Security Field Day 14, follow Jack Poller’s coverage on Security Boulevard.
Why Enterprise Storage Is Still Stuck in 2010—And How Pure Storage Plans to Fix It
In this article, Jack Poller examines the reasons behind the stagnation of enterprise storage technology, noting that it has barely evolved since 2010. He discusses Pure Storage’s innovative approach to revamping enterprise storage solutions with their focus on simplicity, reliability, and efficiency. You can find more coverage of Cloud Field Day 24 on LinkedIn Pulse.













