POPULARITY
Chris Adams is joined by Zachary Smith and My Truong both members of the Hardware Standards Working Group at the GSF. They dive into the challenges of improving hardware efficiency in data centers, the importance of standardization, and how emerging technologies like two-phase liquid cooling systems can reduce emissions, improve energy reuse, and even support power grid stability. They also discuss grid operation and the potential of software-hardware coordination to drastically cut infrastructure impact.
We step back in this episode of our Tech Ops series and talk about cloud self managed infrastructure and how you balance the competing concerns. We started from a report that RackN had commissioned talking about on premises Kubernetes, and mixing that into your IT infrastructure. Can you have a cloud broker? Can you do multi cloud, some sort of tried and true topics for cloud consideration, but through a new filter and through this repatriation idea of mixing and matching your IT Infrastructure? Transcript: https://otter.ai/u/FKGuQpV-5bQFVASAYDhNQJtuoKM?utm_source=copy_url Resources: https://store.repebble.com/ https://rackn.com/2025/03/18/ready-for-kubernetes-on-bare-metal/ https://www.reuters.com/technology/cybersecurity/google-agrees-buy-cybersecurity-startup-wiz-32-bln-ft-reports-2025-03-18/ https://gabrielsimmer.com/blog/kubernetes-plus-oneplus
Send me a messageThe sustainability of IT infrastructure is often overlooked, yet it plays a crucial role in reducing corporate carbon footprints. In this episode, I sit down with Shannon Payne, SVP of Supply Chain Solutions at MDSi, to explore how organisations can optimise reverse logistics, extend asset lifecycles, and reduce emissions in their IT operations.Shannon explains why many large enterprises have well-defined procurement processes but lack structured methodologies for managing IT asset decommissioning, reuse, and recycling. She shares insights into how companies can reduce waste, lower costs, and maximise value from legacy equipment through certified pre-owned IT solutions, which can cut emissions by up to 80% compared to new hardware.We also discuss the growing energy demand of AI, expected to surge by 160% by 2030, and how businesses can balance technology refresh cycles with sustainability goals. Shannon outlines key supply chain challenges, including tracking stranded assets, reducing unnecessary purchases, and optimising forward and reverse logistics for minimal environmental impact.Key Takeaways:The role of IT infrastructure in corporate sustainability and carbon reductionHow AI is reshaping supply chain efficiencies—and increasing energy demandThe business case for refurbished IT assets and the cost savings they offerWhy reverse logistics is often overlooked and how to make it more effectiveEssential KPIs for tracking sustainability progress in supply chain management
Here, Angela Shell dives into ways to make procurement more efficient, sustainable, and inclusive. She covers how technology is improving transparency, strategies for choosing eco-friendly products, and ways to get the most value from group purchasing agreements. Angela also looks at how to create more opportunities for diverse suppliers, like small and minority-owned businesses, and explores innovative bidding methods, such as reverse auctions, to streamline procurement. Angela Shell, Chief Procurement Officer, Department of General Services (DGS) For more great insights head to www.PublicSectorNetwork.co
Unlock the Intel podcast to hear cybersecurity experts discuss the importance of supply chain security and solution acquisition strategies for safeguarding IT environments. Discover how your Federal Government agency can mitigate risk for end users while maintaining compliant and efficient operations.
In this episode we are looking at how technology is enabling as close as possible to 100% up-time for the most mission-critical business operations. We'll be looking at how software and hardware are coming together to ensure the absolute pinnacle of reliability, and what it means for our organizations.Joining us to discuss is Casey Taylor, Vice President and General Manager of HPE NonStop.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest: Casey Taylor: https://www.linkedin.com/in/getcaseytaylor/ Sources cited in this week's episode:TahawulTech report into the cost of IT downtime: https://www.tahawultech.com/insight/why-dns-exploits-continue-to-be-a-top-attack-vector-in-2024/ Siemens report into tech downtime in manufacturing: https://assets.new.siemens.com/siemens/assets/api/uuid:3d606495-dbe0-43e4-80b1-d04e27ada920/dics-b10153-00-7600truecostofdowntime2022-144.pdf Octopus suckers mimicked for better denture grip: https://www.kcl.ac.uk/news/octopus-suckers-fix-dentures
Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
In this episode we are looking at how technology is enabling as close as possible to 100% up-time for the most mission-critical business operations. We'll be looking at how software and hardware are coming together to ensure the absolute pinnacle of reliability, and what it means for our organizations.Joining us to discuss is Casey Taylor, Vice President and General Manager of HPE NonStop.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest: Casey Taylor: https://www.linkedin.com/in/getcaseytaylor/ Sources cited in this week's episode:TahawulTech report into the cost of IT downtime: https://www.tahawultech.com/insight/why-dns-exploits-continue-to-be-a-top-attack-vector-in-2024/ Siemens report into tech downtime in manufacturing: https://assets.new.siemens.com/siemens/assets/api/uuid:3d606495-dbe0-43e4-80b1-d04e27ada920/dics-b10153-00-7600truecostofdowntime2022-144.pdf Octopus suckers mimicked for better denture grip: https://www.kcl.ac.uk/news/octopus-suckers-fix-dentures
In this episode we are looking at how technology is enabling as close as possible to 100% up-time for the most mission-critical business operations. We'll be looking at how software and hardware are coming together to ensure the absolute pinnacle of reliability, and what it means for our organizations.Joining us to discuss is Casey Taylor, Vice President and General Manager of HPE NonStop.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest: Casey Taylor: https://www.linkedin.com/in/getcaseytaylor/ Sources cited in this week's episode:TahawulTech report into the cost of IT downtime: https://www.tahawultech.com/insight/why-dns-exploits-continue-to-be-a-top-attack-vector-in-2024/ Siemens report into tech downtime in manufacturing: https://assets.new.siemens.com/siemens/assets/api/uuid:3d606495-dbe0-43e4-80b1-d04e27ada920/dics-b10153-00-7600truecostofdowntime2022-144.pdf Octopus suckers mimicked for better denture grip: https://www.kcl.ac.uk/news/octopus-suckers-fix-dentures
The Employment Development Department serves millions of Californians through dedicated programs and services like unemployment and disability benefits, Paid Family Leave, workforce services and more. They've been on a long-term transformation project to upgrade their IT infrastructure. Ron Hughes, the Deputy Director for EDDNext, has three decades in IT leadership with a specific focus on large-scale digital transformation projects. He'll be sharing what a 5 year IT modernisation project looks like in just 15 minutes. Ron Hughes the Deputy Director for EDDNext For more great insights head to www.PublicSectorNetwork.co
Financial institutions are focused on IT resilience as outages repeatedly disrupt operations such as the ones that affected Crowdstrike, Bank of America, Monzo and others this year. With outage repercussions in mind, organizations are investing in infrastructure, teams and resiliency strategies to reduce downtime and losses, software company Cockroach Labs co-founder and Chief Executive Spencer Kimball tells Bank Automation News on this episode of “The Buzz” podcast. In a survey conducted by Cockroach Labs and Wakefield Research, 100% of respondents said they had experienced unplanned or unexpected downtime in the past 12 months. The report surveyed 1,000 senior cloud architects and engineering and technology executives from Aug. 29 to Sept. 10. The report also found: 53% of banking and financial service companies experience outages or service interruptions weekly or more frequently; 93% of executives surveyed said they lose sleep over the impacts of unplanned downtime; and Cost per outage ranges from $10,000 to $1 million. Listen as Kimball discusses what is causing these outages and how to build resilient infrastructure.
Our daily lives are more and more connected online. This includes our utility grids. Jojo Maalouf, Hydro Ottawa's Director of Cybersecurity and IT Infrastructure, joins thinkenergy to discuss the role of cybersecurity in the energy sector. From cybersecurity threats, like cyber warfare and ransom-seeking hacktivists, to the measures required to defend our energy systems. Plus, how AI both helps and complicates matters. Listen in to learn what's driving change and the collaboration needed to protect the grid. Related links Ontario Cybersecurity Framework: https://www.oeb.ca/regulatory-rules-and-documents/rules-codes-and-requirements/ontario-cyber-security Get Cyber Safe resources: https://www.getcybersafe.gc.ca/en Jojo Maalouf on LinkedIn: https://www.linkedin.com/in/jojo-maalouf-cism-cissp-0546b03/ Trevor Freeman on LinkedIn: https://www.linkedin.com/in/trevor-freeman-p-eng-cem-leed-ap-8b612114/ Hydro Ottawa: https://hydroottawa.com/en To subscribe using Apple Podcasts: https://podcasts.apple.com/us/podcast/thinkenergy/id1465129405 To subscribe using Spotify: https://open.spotify.com/show/7wFz7rdR8Gq3f2WOafjxpl To subscribe on Libsyn: http://thinkenergy.libsyn.com/ Subscribe so you don't miss a video: https://www.youtube.com/user/hydroottawalimited Follow along on Instagram: https://www.instagram.com/hydroottawa Stay in the know on Facebook: https://www.facebook.com/HydroOttawa Keep up with the posts on X: https://twitter.com/thinkenergypod Transcript: Trevor Freeman 00:07 Welcome to think energy, a podcast that dives into the fast, changing world of energy through conversations with industry leaders, innovators and people on the front lines of the energy transition. Join me, Trevor Freeman, as I explore the traditional, unconventional and up and coming facets of the energy industry. If you have any thoughts, feedback or ideas for topics we should cover, please reach out to us at thinkenergy@hydrottawa.com Hi everyone, welcome back. It won't be a surprise to anyone listening that our energy systems, like much of the rest of our lives, are becoming more and more connected and more online than ever before. Let's just take a look at our own personal lives. We've got apps that can control multiple aspects of our homes. For example, for my phone, I can adjust temperature, set points and fan speed heating and cooling in my house, I can turn on or off lights, both inside and outside. I can look and see who just rang my doorbell, even if I'm in another city, and I can check and see where my vehicle is, whether it's charging or not. And I can even turn it on all from my phone. And I would consider myself like middle of the road in terms of how connected and online I am. There are even further examples of this in some of those ultra-connected homes. This is part of our fast paced and constant evolution towards invenience and using technology to find solutions to problems that we didn't always know existed, and maybe they didn't actually exist. We've all heard that term, the Internet of Things, referring to this ultra-connected world where it's not just people talking over the internet, but our devices and systems are talking as well. I was absolutely floored when I was doing some research on this podcast to find out that this term, the Internet of Things, was first used 25 years ago, in 1999 when I first wrote the text for this. I put a placeholder in to say, oh, it's been around for over 10 years. And then when I actually did my research, it's over 25 years. Think about how far we've come since that idea was thought of in 1999 how different life is today than 1999 our energy systems and our utility grids are undergoing a similar transition. I talked about this a little bit with Hydro Ottawa's Jenna Gillis in a previous episode about grid modernization. So go back and have a listen to that. If you haven't already, we are adding more and more data points to our grids, and that includes sensors, smart switches, fault detectors, smarter meters, etc., etc. Even for hydro Ottawa, a local distribution company with around 350,000 customers, we are talking about many times that number of smart devices in the coming years, all connected, all trading data between themselves and our central systems and the smart folks who run them now, there is a ton of upside to this transition, and that's why we're doing it. More data leads to better decision making, a better view of what's happening, whether that's during an outage or at times when the grid is heavily utilized. It lets us get more out of the equipment we have, react and adjust to the needs of our customers, and react and adjust to the needs of the grid. It will lead to faster restoration during outages, and sometimes that restoration will be automatic without having to roll a truck. It will allow us to better integrate distributed energy resources like small scale solar and storage and other things into our grid for the benefit of our customers and the grid. There is no question that this is a move in the right direction, and hydro Ottawa is leaning into this aspect of the energy transition to build a smarter grid for our customers. However, it does highlight something that has long been a priority for us, cyber security. With so many connected devices, with so much data out there, we need to be extremely vigilant and rigorous with our digital security. Cyber-attacks on utility infrastructure are not theoretical. In 2015 and 2016 attacks on the Ukrainian power grid resulted in large scale power outages in that country, as we increasingly rely on electricity for so many aspects of our lives, attacks like this, whether by nation states or bad actors seeking financial gain, can have devastating consequences. Luckily, this is something that has been a priority for us for many years, and as the threats become more sophisticated, so too do our strategies to protect our systems and our grid from those attacks. Joining me today to talk about this is Hydro Ottawa's director of cybersecurity and IT infrastructure. Jojo Maalouf, JoJo, welcome to the show. Jojo Maalouf 04:46 Thanks for having me. Trevor Freeman 04:47 All right, so Jojo, cyber security is a little bit of a buzzword that a lot of folks have probably heard in a bunch of different contexts. Help us unpack it a little bit. What do we actually mean when we talk about cybersecurity threats and cybersecurity prevention, I guess? Jojo Maalouf 05:05 Very good question, right? So, I mean, let's kind of simplify things, so we obviously have these adversaries, right? And these adversaries are trying to get into organizations networks. We hear a lot of the sensitivity or the criticality of information, so they're trying to obtain that information. And, you know, can they look at potentially monetizing that? Really what we're kind of trying to do, or what cyber security is, is, if you think about it, we have these bad guys, these adversaries. They're trying to get into organizations they possess or introduce some sort of level of risk. What we are trying to do as people in cyber security is defend those organizations from those risks and those adversaries. So, in order for us to do that, we need to put together a program. We need to make sure we have the relevant controls in place, because, at the end of the day, what we're trying to do is mitigate that risk to an acceptable level where the business can run. Trevor Freeman 06:07 Yeah, totally. And who are these threats coming from? Like, we hear a lot about state sponsored groups for profit, hackers. There's sort of that hacktivists, kind of ideologically driven group. Who are we worried about in the in the energy industry? Jojo Maalouf 06:20 You know, it's very good question. I think, to be honest, you, I think we worry about all of them. I think from from our perspective, threats are threats. And obviously, depending on the magnitude of those threats and where they're coming from, they could potentially possess or introduce a different type of risk. But the reality is, they all introduce a level of risk. Yes, we are worried about state sponsored entities. You know, we've seen what's happened throughout the years. It started out in Stuxnet with Iran in 2010 we've seen what's happened with Ukraine in 2015 the end of day, what are we trying to protect? We're trying to ensure that a cyber-attack doesn't actually impact our ability to deliver power to our customers. What we are seeing now in the industry, obviously, is that adversaries are understanding that they can really monetize this, right? So, we're seeing the exponential growth of ransomware throughout the years. I remember back in 2016 when a major Canadian university was asked to pay a think approximately a $35,000 ransomware. Where we looked at that in comparison in 2024 where the average cost of a ransomware attack is just under $5 million. So, it's a billion dollar industry, right? And it's only growing. You know, I'd say the threats are coming everywhere, but you're definitely seeing the monetization aspect of it growing exponentially. Trevor Freeman 07:51 Yeah. So, I guess from our perspective, it really doesn't matter what the motivation is. If someone's getting into our systems and sort of impacting our ability to do what we do doesn't matter what the motivation is. It's a problem for us, and we try and guard against it. Jojo Maalouf 08:05 Correct. I think, I think people are very highly motivated now, whether it's for it's ransomware, whether it's state sponsored, I think entities, or I would say adversary, sorry, are definitely highly motivated. And it doesn't really change our approach. So, you know, the energy sector needs to make sure that they do what they can to protect the systems. Trevor Freeman 08:23 Yeah, fair enough. So, we've talked in the past on the show, and in my intro, I talked about grid modernization, and this sort of evolution of our grid, and the technology on our grid to have more and more connected devices out in the field, and the amount of data that's flowing on our grid is increasing. Obviously, there are many benefits to this, but inherently that brings a degree of risk as well. Can you talk to us about the risk that their grid modernization brings, and sort of how we're thinking about that? Jojo Maalouf 08:58 So, Trevor, I think you said it well when you said more and more devices are connected now. So really, what ends up happening every time we add a device that's connected, it increases the organization's risk profile. So ideally, what we want to be able to do is we want to manage exactly what that those entry points into potential organizations are. So, every time I add a device, I have to think that it increases that attack surface to a degree. So, I mean, you've talked about what grid modernization can do. There are many capabilities I think that's going to benefit organizations. But I think as this happens, we need to ensure that cybersecurity risks are managed to ensure that that risk profile is managed to an appropriate level. Trevor Freeman 09:48 How prepared is the energy industry to respond to and to recover from a major cyber-attack, if one were to happen on the power grid? Jojo Maalouf 09:57 Honestly, I think that the energy sector as well. Prepared as a critical infrastructure entity, the energy sector has the benefit of dealing a lot with government partners. So, I think what you want to do as an organization is you want to build that trust, that ecosystem of partners, whether it is through public and private relationships. But I'd say from a critical infrastructure perspective, there are very good relationships with the industry, very good relationships with government partners. I think testing organizations resiliency has been in play now for many, many years. But I think from a cyber perspective, I think it's something where organizations continue to be prepared, continue to do some of the appropriate testing, you know? And I'll be honest, I say it's, it's, you never want to be complacent, right? And I think what we've learned over the years is threats are evolving. Threats are changing. The industry is always going to be susceptible to attacks. Trevor Freeman 11:00 Are we collaborating and working with other stakeholders? I mean, both at the sort of other utility level, you mentioned, governments and regulatory bodies, are we collaborating with those other entities? And sort of in line when it comes to cybersecurity? Jojo Maalouf 11:15 There is a lot of collaboration that occurs within the industry, whether it's in Ontario, you'll see now that the regulator, the Ontario Energy Board, you know, there is the Ontario cybersecurity framework that has been in play now since around 2018 even at the national level there. Here are many different bodies where, you know cybersecurity, like critical infrastructure protection is paramount, as discussed regularly, and then obviously there's the government agency. So, there's a lot of collaboration that goes whether it's from the provincial, the National, and then the government side as well. And I mean, I think you need those relationships, right? You need those partnerships to help. Trevor Freeman 12:02 Yeah, we're not we're not a lone utility kind of figuring out on our own. We're working with our partners and our peers to figure that out. The other kind of area of emerging technology that I want to talk about is, AI, artificial intelligence and sort of machine learning. Are we using those technologies? Or do you see us using those technologies in the future to sort of enhance the cyber security of our grid and our assets? Jojo Maalouf 12:29 Yeah, I mean, I think obviously artificial intelligence, machine learning, seems to be the 2024 theme. The reality is, is a lot of technologies have already adopted, whether it's AI or machine learning, into their into their solutions. You know, I think the whole Gen AI aspect is growing, and it's something that I think is going to benefit everybody in the industry as well. The unfortunate thing is, is that I think adversaries are going to be able to use these technologies as well. You know, whether it's to paint a better picture of an organization, maybe to customize some attack patterns, but I think it's something where we have to embrace the technology. We have to use it in our, I would say, in our toolkit, but we're very much cognizant of the fact is that adversaries are going to be using these, these tool sets as well to potentially target organizations within the energy sector. Trevor Freeman 13:33 And are there specific things that you know, speaking as the local distribution company, specific things that our customers can do or should be aware of? What's the role of our customer when it comes to cybersecurity? Jojo Maalouf 13:46 It's a very good question. I mean, from a from a customer's perspective, I think customers need to realize the importance of their information. So, I mean, the reality now is a lot of adversaries are targeting people directly because they want their information. Their information. Their information is valuable. So, I think as a customer, what they want to make sure they do is that they do what they can to protect their information. So, some very simple steps that they can do make sure you have a complex password that only you know, that's not easily guessable. The other thing is, you don't want to use that password across multiple systems. So, what's the best way for you to be able to manage all your passwords? Invest in a password manager. There are free solutions out there. There are other really good solutions that are at a fraction of a cost as well as that password. What you want to make sure you do is you have multi factor authentication attached to it. What that really means is it's a second level of authentication that's going to challenge you to make sure you are who you say you are. It could just be an application that's installed on your phone. Think those are really some really good ways that you know a customer can use to protect themselves. I think even investing in credit monitoring is really good because. Is the last thing you want to do is an adversary to target you, steal your information, then all of a sudden, are starting to open up accounts in your name, right? So credit monitoring is another really important one. So, I mean, I think those are some really basic ones, but I think that they can go a long way to protecting a customer from threats. There are some really good online resources that they can use. Public Safety Canada has their get cyber safe website that provides a lot of information for, you know, everyday residential people or customers, sorry, steps that they can take to protect themselves. Trevor Freeman 15:33 And for our listeners that kind of are thinking like, Oh, I feel like I've heard that before. I think you're right. You have it is those basic steps that really can protect us. And just so that everybody knows this is a focus of us internally as well, all employees of Hydro Ottawa also have a focus on what can we as employees do in order to make sure we're protecting our systems, we're protecting our data, and all the things that JoJo mentioned when it comes to password integrity, conscious of protecting our data. We're focused on that on a day-to-day basis as well. Jojo, thanks very much for taking the time to talk us through this. It's something that is maybe a bit adjacent to the energy transition, but so important as we increasingly digitize our grid, digitize our systems, as I mentioned, add more data points. We can't sort of leave cybersecurity behind. So, I really appreciate you taking the time to join us today, as our listeners know, and as you know, we always end our interviews with a series of questions to our guests. So I will jump right into those. Jojo, what's a book that you've read that you think everybody should read? Jojo Maalouf 16:39 Yeah, good question. I'll give you two books, especially within the context of cybersecurity. You know, we did briefly mention Stuxnet. A really good book is by Kim Zetter. It's called Zero Day, and it basically depicts what happened with Stuxnet. Really informative. It's actually really good read. It's not necessarily technical, but just goes to show kind of how cyber warfare was actually built. Another really good one is from Andy Greenberg. It's called sandworm, a new era of cyber war in the hunt for the Kremlin's most dangerous hackers. Another really good read as well. So, I think those are two books, I would say, in the cybersecurity context, that I think are really good reads. Trevor Freeman 17:29 Nice. Same question. But for a movie or a show, is there a movie or show that you think everyone should have a look at? Jojo Maalouf 17:36 I'm actually really into Yellowstone these days, right? So, I'm gonna give that props. Trevor Freeman 17:41 Nice. That's a good one. If someone offered you a free round-trip flight anywhere in the world, where would you go? Jojo Maalouf 17:48 Good question, I think right now where I am, I'd probably go anywhere, either in the Alps or in the Dolomites, to ski. Trevor Freeman 17:56 That's awesome. And our last question, what is something about the energy sector or its future that you are particularly excited about? Jojo Maalouf 18:04 To be honest with you, I What really interests me and what I'm really excited about is, think the evolution in change into we are now a technology company, And I think what we're where the energy sector is grow is, is moving towards, is really exciting. You know, I think over the years, it's been a very siloed approach to the way services are driven or given where I find now, its very technology focused, right? And I think that's very exciting times. Trevor Freeman 18:39 Very cool. Well, JoJo, I really appreciate your time today, and you sharing your insight with us, and thanks for coming on the show. Jojo Maalouf 18:46 Thank you, Trevor, it's great being here. Trevor Freeman 18:50 Thanks for tuning in to another episode of The think energy podcast. Don't forget to subscribe wherever you listen to podcasts, and it would be great if you could leave us a review. It really helps to spread the word. As always, we would love to hear from you, whether it's feedback comments or an idea for a show or a guest. You can always reach us at think energy@Hydroottawa.com.
In this episode, Shane Rodabaugh, Vice President of IT Infrastructure at Baptist Health System KY & IN, discusses the impact of AI on healthcare, the evolving role of technology in patient care, and the importance of staying agile in a rapidly changing IT landscape.
In this episode, Shane Rodabaugh, Vice President of IT Infrastructure at Baptist Health System KY & IN, discusses the impact of AI on healthcare, the evolving role of technology in patient care, and the importance of staying agile in a rapidly changing IT landscape.
Join us in an exploration of the world of luxury e-commerce featuring Monica Villaquiran, Vice President of IT Infrastructure and Client Experience Innovation at Richemont Americas, and Kailin Noivo, President and Co-founder of Noibu. The discussion between Monica and Kailin covers the balance between specialization and creativity in retail technology, the role of boutique vendors, and the potential of VR, AR, and AI in enhancing customer engagement. This episode emphasizes a problem-first approach to innovation. It explores frameworks for addressing business challenges, defining KPIs, and leveraging AI to transform customer feedback into actionable insights. It's an insightful discussion that bridges technical expertise with exceptional end-user experiences, setting new standards for luxury brands in the digital era. Show Highlights: Client-centric innovation blending technology and human touch across Richemont's 26 brands. Benefits of collaborating with boutique vendors for personalized relationships in retail technology. Problem-first approach to innovation, focusing on identifying business challenges before choosing technology solutions. Utilizing AI to transform customer feedback into actionable insights for luxury brands. Framework for defining KPIs and leveraging decision trees to address business issues. Follow and Review: We'd love for you to follow us if you haven't yet. Click that purple '+' in the top right corner of your Apple Podcasts app. We'd love it even more if you could drop a review or 5-star rating over on Apple Podcasts. Simply select “Ratings and Reviews” and “Write a Review” then a quick line with your favorite part of the episode. It only takes a second and it helps spread the word about the podcast. Supporting Resources: Join the Commerce Cloud Community: http://sforce.co/commercecrew To learn more about Commerce Cloud Innovations, go here: https://www.salesforce.com/commerce/innovations/ Interested in being a guest or know someone who should be? Use this nomination form: http://sfdc.co/podnomination *** Episode Credits If you like this podcast and are thinking of creating your own, consider talking to my producer, Emerald City Productions. They helped me grow and produce the podcast you are listening to right now. Find out more at https://emeraldcitypro.com. Let them know I sent you.
As an Ops person, the role of IT expert is often part of the job. So how can you ensure your agency's IT infrastructure is set up for scaling? That's the focus of our discussion with Dan Timmiss, Technical Director at Kaizen IT Solutions. With over two decades of experience, Dan has helped hundreds of creative agencies optimize and manage their IT setups, from audits to complete IT overhauls and supporting scaling teams.In this episode, Dan shares essential best practices:The importance of implementing single sign-on (SSO) and multi-factor authentication (MFA) for security and ease of accessHow cloud storage can complement on-premise servers if you have heavy media filesUsing mobile device management solutions like Jamf to manage your fleet of computers, including ‘zero touch deployment' and easy on-boarding and off-boardingSeeking security accreditations like Cyber Essentials Plus, CIS Benchmarks or ISO 27001 to help secure contracts with global clientsHow newer services like MDR (managed detection and response) and XDR (extended detection and response) go beyond traditional anti-virus solutions to monitor your systems for threatsWhy to educate your team on ‘social engineering' scams that could cause financial and reputational harmFollow Dan on LinkedIn: https://www.linkedin.com/in/dan-timmiss-486ab517/ Follow Harv on LinkedIn: https://www.linkedin.com/in/harvnagra/Stay up to date with regular ops insights. Subscribe to The Handbook: The Operations Newsletter.This podcast is brought to you by Scoro, where you can manage your projects, resources and finances in a single system.
Curtis Anderson, Chief Technology Officer at Exchange Income Corporation, thrives in an environment where uncertainty and innovation go hand in hand. His role is a testament to the excitement that comes with leading technology and strategy amidst constant change. Curtis's ability to navigate this ever-evolving landscape speaks to his deep understanding of the field and his readiness to embrace the unknown. For him, the unpredictability of technological advancements is not just a challenge but a source of inspiration, driving him to explore new possibilities and push the boundaries of what's achievable.Here's more about Curtis AndersonExperienced and forward-thinking Chief Technology Officer with a proven history of driving technological innovation and delivering strategic IT solutions across diverse industries.Successfully spearheaded IT transformations, elevated cyber-security measures, and navigated complex M&A Due Diligence processes.Adept in IT Strategy, Digital Transformation, Business Process Reengineering, IT Infrastructure, Cyber-Security, and Project Management, with additional strengths in Enterprise Sales and IT Consulting.Graduated with technical diplomas from the University of Winnipeg & Red River Polytech, and backed by a wealth of hands- on experience and technical certifications, returned to school to study Business Administration and earn a MBA from the prestigious Smith School of Business at Queens University.This Operations and Management training helps effectively deliver the business value of IT to Executives and business owners of all sizes.
In this episode of the Heroes of IT podcast, Ashley interviews Jack Milburn, a senior IT engineer with a focus on cloud security. They discuss Jack's experience with Automox and how he uses it for patching and vulnerability scanning. They also talk about Automox University (AXU) and the value of online learning in bridging the skills gap in IT. Jack shares his journey of earning certificates and the different levels of complexity in AXU courses. They also touch on the importance of company culture in promoting continuous learning.
On this episode of the Six Five Webcast, host Paul Nashawaty is joined by Dell Technologies' Nivas Iyer, Sr. Principal Product Manager, for a conversation on overcoming data storage challenges in modern IT environments, transitioning from traditional VMs to Kubernetes. Their discussion covers: The evolution of data storage from VMs to Kubernetes. Key challenges businesses face when managing data storage in Kubernetes environments. Best practices for implementing data storage solutions in Kubernetes. Dell Technologies' approach to simplifying data storage for Kubernetes. Predictions for the future of data storage and Kubernetes.
On this episode of the Six Five on the Road, hosts David Nicholson and Lisa Martin are joined by Dell's Omar Rawashdeh, PowerEdge Product Planner, for a conversation on Dell's latest announcements at DTW regarding their PowerEdge Servers. Their discussion covers: The latest PowerEdge Servers Dell is announcing at DTW Key highlights about the new T160/R260 PE servers The key use cases/workloads for these servers Availability dates for the T160/R260/R660/R770 servers
In a world where businesses are constantly evolving and facing new challenges in cybersecurity and IT infrastructure, the importance of collaboration between IT and security teams has never been more critical. At the recent RSA Conference, Sean Martin had the opportunity to sit down with Tim Roddy from Open Systems to talk about the topics of business transformation, IT security, and the necessity of aligning IT and security initiatives for a more secure and efficient operation.Business and IT Transformation in the Digital AgeThe conversation kicked off discussing the challenges that businesses face in a rapidly changing digital landscape. Tim highlighted the need for businesses to adapt to transformations driven by factors like remote work, cloud migrations, and evolving business requirements. With threats constantly looming, the alignment of business processes, IT functions, and security measures becomes paramount to staying ahead of the curve.Zero Trust Network Access (ZTNA) - A Game-Changer in Connectivity and SecurityOne of the key topics discussed was the concept of Zero Trust Network Access (ZTNA) and its impact on network security. Tim shed light on the importance of implementing ZTNA to ensure secure and controlled access to critical applications and data. By deploying ZTNA, organizations can limit access to authorized personnel only, thereby reducing the risk of unauthorized access and potential data breaches.Bridging the Gap Between IT and Security TeamsTim emphasized the need for organizations to bridge the gap between IT and security teams, especially in smaller enterprises where resources are limited. By offering managed services like SASE (Secure Access Service Edge), Open Systems enables organizations to focus on core business activities while ensuring that IT and security functions are efficiently managed and monitored.Real-World Use Cases and Success StoriesThroughout the conversation, Tim shared insightful examples of how Open Systems has helped businesses, particularly in the manufacturing sector, enhance their security posture and IT infrastructure. From implementing ZTNA for secure access to critical equipment to transitioning from MPLS to SD WAN for cost efficiency and flexibility, Open Systems has been instrumental in driving IT and security transformations for organizations of all sizes.Looking Towards a Secure FutureAs businesses continue to navigate the complexities of modern cybersecurity challenges, the role of providers like Open Systems in guiding organizations towards a more secure and efficient future becomes increasingly significant. By offering tailored solutions, expert guidance, and proactive monitoring, Open Systems stands as a valuable partner in the journey towards robust IT and security operations.This conversation with Tim Roddy from Open Systems highlighted the critical need for businesses to prioritize IT and security transformation in today's digital landscape. By embracing collaboration, deploying innovative solutions like ZTNA, and relying on trusted partners for managed services, organizations can navigate the complexities of cybersecurity with confidence and efficiency.Reach out to Open Systems to learn more about their comprehensive IT and security solutions and embark on a transformative journey towards a more secure and resilient business infrastructure.Learn more about Open Systems: https://itspm.ag/opensystems-d11Note: This story contains promotional content. Learn more.Guest: Tim Roddy, Vice President Marketing, Open Systems [@RealOpenSystems]On LinkedIn | https://www.linkedin.com/in/troddy/ResourcesLearn more and catch more stories from Open Systems: https://www.itspmagazine.com/directory/open-systemsView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In a world where businesses are constantly evolving and facing new challenges in cybersecurity and IT infrastructure, the importance of collaboration between IT and security teams has never been more critical. At the recent RSA Conference, Sean Martin had the opportunity to sit down with Tim Roddy from Open Systems to talk about the topics of business transformation, IT security, and the necessity of aligning IT and security initiatives for a more secure and efficient operation.Business and IT Transformation in the Digital AgeThe conversation kicked off discussing the challenges that businesses face in a rapidly changing digital landscape. Tim highlighted the need for businesses to adapt to transformations driven by factors like remote work, cloud migrations, and evolving business requirements. With threats constantly looming, the alignment of business processes, IT functions, and security measures becomes paramount to staying ahead of the curve.Zero Trust Network Access (ZTNA) - A Game-Changer in Connectivity and SecurityOne of the key topics discussed was the concept of Zero Trust Network Access (ZTNA) and its impact on network security. Tim shed light on the importance of implementing ZTNA to ensure secure and controlled access to critical applications and data. By deploying ZTNA, organizations can limit access to authorized personnel only, thereby reducing the risk of unauthorized access and potential data breaches.Bridging the Gap Between IT and Security TeamsTim emphasized the need for organizations to bridge the gap between IT and security teams, especially in smaller enterprises where resources are limited. By offering managed services like SASE (Secure Access Service Edge), Open Systems enables organizations to focus on core business activities while ensuring that IT and security functions are efficiently managed and monitored.Real-World Use Cases and Success StoriesThroughout the conversation, Tim shared insightful examples of how Open Systems has helped businesses, particularly in the manufacturing sector, enhance their security posture and IT infrastructure. From implementing ZTNA for secure access to critical equipment to transitioning from MPLS to SD WAN for cost efficiency and flexibility, Open Systems has been instrumental in driving IT and security transformations for organizations of all sizes.Looking Towards a Secure FutureAs businesses continue to navigate the complexities of modern cybersecurity challenges, the role of providers like Open Systems in guiding organizations towards a more secure and efficient future becomes increasingly significant. By offering tailored solutions, expert guidance, and proactive monitoring, Open Systems stands as a valuable partner in the journey towards robust IT and security operations.This conversation with Tim Roddy from Open Systems highlighted the critical need for businesses to prioritize IT and security transformation in today's digital landscape. By embracing collaboration, deploying innovative solutions like ZTNA, and relying on trusted partners for managed services, organizations can navigate the complexities of cybersecurity with confidence and efficiency.Reach out to Open Systems to learn more about their comprehensive IT and security solutions and embark on a transformative journey towards a more secure and resilient business infrastructure.Learn more about Open Systems: https://itspm.ag/opensystems-d11Note: This story contains promotional content. Learn more.Guest: Tim Roddy, Vice President Marketing, Open Systems [@RealOpenSystems]On LinkedIn | https://www.linkedin.com/in/troddy/ResourcesLearn more and catch more stories from Open Systems: https://www.itspmagazine.com/directory/open-systemsView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
On this episode of The Tyler Tech Podcast, Russell Gainford, Senior Vice President, Cloud Strategy & Operations at Tyler Technologies, explores the benefits of embracing the cloud while also delving into the risks posed by legacy systems. From practical strategies to best practices, Russell offers a roadmap for navigating the complexities of a modern IT infrastructure.We also look ahead to Connect 2024, which will be in Indianapolis, Indiana from May 19th to May 22nd. Registration is now open at: www.tylertech.com/connectLearn more about the topics discussed in this episode with these resources:White Paper: Is Your Legacy Digital Infrastructure Putting You at Risk? Blog: The Cloud Experience: Improving Government ServicesVideo: Cloud-Based ERP Delivers Multiple Wins for School DistrictBlog: Future-Proofing Government Through Technology ModernizationBlog: District Goes from Cumbersome to Convenient with CloudBlog: Public Safety Embraces Cloud Tech for Enhanced EfficiencyE-book: A Digital Guide to Modernizing the Resident ExperienceAnd you can listen to other episodes of the podcast at this link: www.tylertech.com/resources/podcastLet us know what you think about the Tyler Tech Podcast in this survey!
Welcome to episode 250 of the Cloud Pod podcast – where the forecast is always cloudy! Well, we're not launching rockets this week, but we ARE discussing the AI arms race, AWS going nuclear, and all the latest drama between Elon and OpenAI. You won't want to miss a minute of it! Titles we almost went with this week: The Paradox of AI choice Amazon just comes across super desperate on RACING to AI foundation model support Your new JR developer Test-LLM If you can't beat OpenAI, sue them A big thanks to this week's sponsor: We're sponsorless this week! Interested in sponsoring us and having access to a specialized and targeted market? We'd love to talk to you. Send us an email or hit us up on our Slack Channel. General News 01:12 IT Infrastructure, Operations Management & Cloud Strategies: Chicago (Rosemont/O'Hare), Illinois Want to meet cloud superstar Matthew Kohn in person? He's going to be giving a talk in Chicago, if you're going to be in the neighborhood. *Maybe* he'll have some stickers. 11:30am – 12:30pm: Using Data and AI to Shine a Light on Your Dark IT Estate AI Is Going Great (Or, How ML Makes All Its Money) 03:42 Anthropic claims its new models beat GPT-4 AI Startup Anthropics, has announced their latest version of Claude. The company claims that it rivals OpenAI's GPT-4 in terms of performance. Claude 3, and its family of models, includes Claude 3 Haiku, Sonnet and Opus, with Opus being the most powerful. All show “increased capabilities” in analysis and forecasting, Anthropic claims, as well enhanced performance on specific benchmarks versus models like GPT-4 (but not GPT-4 Turbo) and Googles Gemini 1.0 Ultra (but not Gemini 1.5 Pro) Claude 3 is Anthropics first multi-modal model. In a step better than rivals, Claude can analyze multiple images in a single request (up to 20). This allows it to do compare and contrast operations However, there are limits to its image capabilities. It’s not allowed to identify people. They admit it is also prone to mistakes on low-quality images under 200 pixels, and struggles with tasks involving spatial reasoning and object counting. 05:42 Justin – “Overall, this looks like not a bad model. I do see a little bit of chatter today actually. Some people say it’s not quite as good in some areas, but it’s pretty good in others. And it is not connected to the internet, this model. So it is dated only through August of 2023. So anything that happened after that, like the Israeli Hamas conflicts, it doesn’t know anything about those. So just be aware.” 06:08 Matthew – “You know, it’s actually interesting now. There’s so many models out there. You know, you have to start to look at what makes sense for your data and what you need, along with also price. You know, I look too closely at what the price is, but you might be able to get away
GDP Script/ Top Stories for Mar 8th Publish Date: Mar 7th From the Ingles Studio Welcome to the Gwinnett Daily Post Podcast. Today is Friday, March 8th, and Happy 78th Birthday to The Monkees Micky Dolenz. ***03.08.24 – BIRTHDAY – MICKY DOLENZ*** I'm Bruce Jenkins and here are your top stories presented by Tom Wages Funeral Home. Second Suspect Arrested for Allegedly Impersonating a Federal Agent During Home Invasion Duluth Police Finish Expansion of Real Time Crime Center 7 Tips for making college more affordable All of this and more is coming up on the Gwinnett Daily Post podcast, and if you are looking for community news, we encourage you to listen daily and subscribe! Break 1: WAGES STORY 1: Second Suspect Arrested For Allegedly Impersonating a Federal Agent During Home Invasion Yenson Adrian Cedeno Acevedo, a second suspect in a Lawrenceville home invasion case, has been apprehended by the Gwinnett County Police. The incident, which took place in December, involved three individuals who posed as federal agents to gain entry into an apartment. The culprits then restrained a father and son duo using zip ties and proceeded to rob them of their possessions. At the time of his arrest, Acevedo was already detained on separate charges. Another suspect, Luis Soto, had been taken into custody earlier, with police discovering tactical equipment and stolen items connected to the crime in his possession. The police investigation is still underway, and they urge anyone with further information to reach out to local authorities or provide anonymous tips to Crime Stoppers. STORY 2: Duluth Police Finish Expansion of Real Time Crime Center The Duluth Police Department has announced the completion of its Real Time Crime Center's expansion. The center, founded in 2017, employs a combination of advanced technology and a dedicated team of analysts to manage immediate crises and aid in crime resolution. The latest expansion has resulted in increased space and upgraded technology, boosting the total number of surveillance cameras to approximately 400. This expansion signifies a major step forward in Duluth's dedication to public safety, enabling the center to function as a comprehensive hub for crime response. Analysts are now able to offer precise support to officers during ongoing criminal activities and city events, while also ensuring smooth collaboration with neighboring law enforcement agencies. STORY 3: 7 Tips for Helping You Afford College The average in-state tuition at public colleges has climbed to over $10,000, while private colleges are averaging a steep $42,162. However, Estephany Flores, a staunch advocate for financial aid, urges students not to be discouraged by these numbers. She highlights the importance of viewing a college education as a future investment. Flores points out that dual enrollment programs, which allow high school students to accrue college credits, are often overlooked resources that can substantially cut down tuition costs. Dr. Reanna Berry, an Associate Professor, offers several strategies to help offset tuition expenses. These include early savings plans, pursuing two-year degrees, enrolling as transient students, taking AP/IB classes, applying for grants, and exploring work-study opportunities. Dr. Berry cautions students against depending on loans as their primary financial solution and alerts them to potential scams aimed at those seeking college funding. Despite the financial hurdles, Gwinnett College continues to maintain its affordability, providing a wide range of options for financial assistance. Flores encourages students to contact the college's financial aid office for tailored advice and support in navigating the financial aspects of college education. We have opportunities for sponsors to get great engagement on these shows. Call 770.874.3200 for more info. We'll be right back. Break 2: INGLES 1 STORY 4: LAKO: Found money: Should you use an old 401(k) to pay off a child's student loans? Many parents harbor the desire to financially support their adult children, which is a factor that should be considered during financial planning. Some may discover dormant 401(k) accounts and consider utilizing these funds to settle their child's student loans. However, drawing from retirement accounts for this purpose can trigger penalties and taxes, thereby diminishing the sum available for debt repayment. The decision between investing for the future or paying off debt needs careful consideration, considering aspects such as interest rates and potential returns on investments. Financial experts typically discourage depleting retirement savings, instead proposing alternative strategies such as reallocating current savings or assisting with loan payments directly from regular income. STORY 5: Lawyer accusing Fulton DA of conflict details accusations of misconduct at Georgia Senate hearing Ashleigh Merchant, the legal counsel for Michael Roman, appeared before a state Senate committee to testify about her discovery of an alleged romantic relationship between Fulton County District Attorney Fani Willis and special prosecutor Nathan Wade. Merchant initiated a motion to have Willis disqualified from the Trump election interference case because of this alleged affair. Details of the affair were revealed by Terrence Bradley, Wade's previous law partner, who voiced concerns about Wade's behavior. In response to these allegations, the Senate committee issued a subpoena to Merchant to delve deeper into the accusations, concentrating on potential conflicts of interest and monetary rewards in the case. Despite the ongoing controversy, Willis reiterated her commitment to continue with the felony racketeering case against Trump and his associates. STORY 6: Vidalia onions headed to grocery shelves April 17 Georgia Agriculture Commissioner Tyler Harper, in collaboration with the Vidalia Onion Committee, has declared April 17th as the official pack date for the 2024 Vidalia onion season. Famed for their distinctive sweet taste, Vidalia onions will be accessible in supermarkets across the country from April until early September. The determination of the pack date is influenced by factors such as soil and weather conditions, which serve to ensure the superior quality of the onions. With approximately 11,000 acres set aside for cultivation during the 2024 season, producers are optimistic about another prosperous year. Vidalia onions, unique to 20 counties in southern Georgia due to specific environmental conditions, are protected under federal and state legislation. STORY 7: Statham's Brian Harris Named Jackson EMC Vice President of Information Technology Brian Harris, hailing from Statham, has been named as the new Vice President of Information Technology at Jackson EMC, taking over from Jeff Keen who is set to retire after 41 years of dedicated service. In his previous role as Director of IT Infrastructure and Data Integrity, Harris was responsible for leading the cooperative's cybersecurity program and the Incident Response Team. In his new position, Harris will be tasked with spearheading technological advancements at Jackson EMC, focusing on infrastructure, collaboration, implementation, and support. Harris brings a wealth of experience to the role, having been a part of the cooperative since 1997 and serving in various capacities throughout the years. Harris is an alumnus of the University of Georgia, holding a Bachelor of Business Administration in Management Information Systems, and is an active member of InfraGard. Jackson EMC, with its headquarters located in Jefferson, Georgia, provides service to over 260,000 meters across 15,000 miles of energized wire. We'll have final thoughts after this. Break 4: HENRY CO SHERIFFS OFFICE Signoff – Thanks again for hanging out with us on today's Gwinnett Daily Post podcast. If you enjoy these shows, we encourage you to check out our other offerings, like the Cherokee Tribune Ledger Podcast, the Marietta Daily Journal, the Community Podcast for Rockdale Newton and Morgan Counties, or the Paulding County News Podcast. Read more about all our stories and get other great content at Gwinnettdailypost.com. Did you know over 50% of Americans listen to podcasts weekly? Giving you important news about our community and telling great stories are what we do. Make sure you join us for our next episode and be sure to share this podcast on social media with your friends and family. Add us to your Alexa Flash Briefing or your Google Home Briefing and be sure to like, follow, and subscribe wherever you get your podcasts. Produced by the BG Podcast Network Show Sponsors: ingles-markets.com wagesfuneralhome.com henrycountysheriffga.gov #NewsPodcast #CurrentEvents #TopHeadlines #BreakingNews #PodcastDiscussion #PodcastNews #InDepthAnalysis #NewsAnalysis #PodcastTrending #WorldNews #LocalNews #GlobalNews #PodcastInsights #NewsBrief #PodcastUpdate #NewsRoundup #WeeklyNews #DailyNews #PodcastInterviews #HotTopics #PodcastOpinions #InvestigativeJournalism #BehindTheHeadlines #PodcastMedia #NewsStories #PodcastReports #JournalismMatters #PodcastPerspectives #NewsCommentary #PodcastListeners #NewsPodcastCommunity #NewsSource #PodcastCuration #WorldAffairs #PodcastUpdates #AudioNews #PodcastJournalism #EmergingStories #NewsFlash #PodcastConversationsSee omnystudio.com/listener for privacy information.
The next BriefingsDirect mobile devices security and privacy discussion examines how a new balance needs to be struck between giving users at the remote edge all the productivity they want, while protecting the most sensitive information. Listen to the podcast. Subscribe to it on iTunes. Read a full transcript or download a copy. Stay here to learn how a Minnesota law firm puts the power of diverse mobility to widespread use and keeps confidential and regulated data under strict control. Here to share his story of how to guide small and medium-sized businesses (SMBs) to the edge and back safely is Mark Hatfield, IT Director at Jeff Anderson & Associates, and IT Infrastructure and Security Consultant at Hatfield Engineering Corp., both in St. Paul, Minnesota. The discussion is moderated by Dana Gardner, Principal Analyst at Interarbor Solutions. Listen to the podcast. Subscribe to it on iTunes. Read a full transcript or download a copy. Sponsor: Bitdefender.
Alice Fournier is Chief Information Officer at ISS Americas where she executes the technology roadmap for the retail business, workplace technology and internal IT Infrastructure, with a focus on technology as a driver of productivity and business growth. Mike Petrusky asks Alice to share her perspectives on the importance of accepting and driving change, the role of AI and technology in facility management and corporate real estate, and the need to create a workplace experience that matches consumer expectations. They discuss creating a culture that embraces change, the challenges facing facility managers and the opportunity they have to shape the future of the built environment. Alice believes that AI has significant potential for predicting maintenance needs and optimizing asset lifecycles, but it requires clean, trustworthy, and available data. Mike and Alice agree that employee experiences need to mimic our seamless personal tech and they offer advice to help you deliver on expectations and be a Workplace Innovator in your organization! Connect with Alice on LinkedIn: https://www.linkedin.com/in/alice-fournier/ Learn more about ISS A/S: https://www.issworld.com/en Explore the latest Eptura Workplace Index Report: https://lp.eptura.com/content-eptura-workplace-index-Q3.html Discover free resources and explore past interviews at: https://www.workplaceinnovator.com/ Learn more about Eptura™: https://eptura.com/ Connect with Mike on LinkedIn: https://www.linkedin.com/in/mikepetrusky/
On this episode of the Futurum Tech Webcast – Interview Series, host Daniel Newman welcomes Alteryx CIO Trevor Schulze for a conversation on the evolving landscape of IT decision-making, the importance of data analytics in modern IT strategy, and how IT leaders can “future-proof” their strategies by leveraging them. Their discussion covers: The role of AI in the shifting role of the CIO and what IT leaders should consider around AI when making technology decisions The importance of data analytics in shaping the decisions made by IT leaders and contributing to overall business success Some top predictions for the future of IT decision-making, especially concerning the increasing emphasis on predictive analytics, the integration of AI, and the democratization of data Insights on how IT leaders can “future-proof” their strategies by leveraging data analytics and what specific approaches can enhance these strategies for success
Chris May is a Python Consultant, Trainer, & Author: In this episode he discusses best practices & methods for refactoring your Python code. When you should, when you shouldn't, and gives us a step by step example of how to do it! Resources: https://www.linkedin.com/in/1chrismay/ https://fosstodon.org/@_chrismay https://twitter.com/_ChrisMay https://blog.alexewerlof.com/p/tech-debt-day https://everydaysuperpowers.dev/resources/python-refactoring-toolkit/ https://everydaysuperpowers.dev
The more you know about your customer, the better you can serve them. And that definitely goes for health system CISOs trying to serve (and protect) their clinician customers. As Dr. Eric Liederman says, it's not that hard to lock things down; what's trickier is putting in place as much protection and risk mitigation as […] Source: Q&A with Eric Liederman, MD, National Leader, Privacy, Security & IT Infrastructure, The Permanente Federation: “Cyber Leaders & Clinicians Must Work Together” on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.
Kalen Arndt is a triple VCDX & Staff Solutions Engineer at HashiCorp! In this episode we went through best practices for Terraform module development and a LIVE DEMO! Resources: https://twitter.com/kalenarndt https://www.linkedin.com/in/kalenarndt/ https://registry.terraform.io/
Show Notes
In this episode of the Infrastructure Matters podcast, we cover the evolving landscape of IT infrastructure consumption and how traditional models have shifted due to the rise of cloud computing and hybrid approaches. We cover pricing, procurement, performance, availability, scalability, security, and compliance, which all play a crucial role in determining the most suitable consumption model for different workloads. We discuss considerations such as end-of-life planning and the decision-making process making sure the process aligns with the business needs. Topics include: Recent news items, including earnings releases from Microsoft, Google, Intel and Seagate The increasing presence of AI in earnings reports with the growth of generative AI, N2W Software, a data protection provider focusing on AWS and Azure Evolving IT infrastructure consumption models due to cloud computing and hybrid approaches, including offerings from Dell, Hitachi, HPE, IBM, Kyndryl, Lenovo, NetApp and Pure Storage. Strategies for balancing business and technical requirements You can watch the video of our conversation below, and be sure to visit our YouTube Channel and subscribe so you don't miss an episode.
With the latest release in the statistics on the CNCF projects, it is evident that Opentelemetry is the recent trend in the developer community. It involves following standards about how to enable a single pane of glass to allow for tracing in the world of decentralized architectures, This Session will be focused on the open telemetry features in the Cloud realm and how AWS helps us to enable this inside the production workloads. Resources: - Twitter: https://twitter.com/AritraNag4 - Blogpost: https://medium.com/nordcloud-engineering/a-song-of-decentralization-and-observability-dance-with-open-telemetry-ec2c4d7006cf - Github repository:ttps://github.com/aritnag/opentelemetry-config-agent
Eric Matthes is author of the best selling book Python Crash Course. In this episode he discusses the why of software testing and then walks us through a live coding example to create tests for a text editor he created! Resources: https://www.linkedin.com/in/eric-matthes-598765205/ https://nostarch.com/python-crash-course-3rd-edition https://ehmatthes.github.io/pcc_3e/ https://mostlypython.substack.com/ https://github.com/ehmatthes/django-simple-deploy https://django-simple-deploy.readthedocs.io https://github.com/initialcommit-com/git-sim https://github.com/ehmatthes/whimbrel https://pypi.org/project/pexpect/ http://learngrandstaff.com/ https://automationpanda.com/2018/08/01/the-testing-pyramid/
Sean Tibor is a Sr. Cloud Engineer at Mondelez International and host of the Teaching Python Podcast! In this episode he discusses tools, lessons learned and best practices for using Terraform in a serverless environment! Resources: https://www.linkedin.com/in/seantibor/ https://twitter.com/smtibor https://serverless.tf/ https://github.com/antonbabenko/serverless.tf https://docs.powertools.aws.dev/lambda/python/latest/ https://docs.python.org/3/ https://www.oreilly.com/library/view/fluent-python-2nd/9781492056348/ https://www.youtube.com/watch?v=dH2GP6Lydj8
Rosemary Wang is a Senior Developer Advocate at HashiCorp and author of "Infrastructure as Code, Patterns and Practices: With examples in Python and Terraform"! In this episode she discusses tools, lessons learned and best practices for testing Terraform! Resources: https://joatmon08.github.io/ https://www.linkedin.com/in/rosemarywang/ https://twitter.com/joatmon08 https://tinyurl.com/rosemary-iac
In this episode of Infrastructure Matters, Steven Dickens and Krista Macomber discuss zero-trust architecture and its implementation. They emphasize that zero-trust is not just a single product or tool but a concept that requires a combination of people, processes, and technologies. They also mention the importance of confidential computing in securing data in use and the need for a shared responsibility model when using cloud services. Additionally, IBM's acquisition of Apptio and BMC's new AMI Cloud portfolio are discussed. Topics include: IBM's acquisition of Apptio BMC announcing its AMI Cloud portfolio NetApp's BlueXP enhancements for multi-cloud operations and cyber-resiliency Zero Trust Architectures What are they? How do they shift thinking and technology requirements compared to traditional, perimeter-based approaches? How exactly do they impact IT Infrastructure design? Reference architectures and services that can help in design and implementation You can watch the video of our conversation below. Be sure to visit our YouTube Channel and subscribe so you don't miss an episode.
David Cerf, Chief Data Evangelist at GRAU DATA generously lends us his in-depth knowledge on data protection, tape solutions. Through our conversation, you'll learn the significance of a layered approach to data protection, the key steps towards a zero trust environment with application firewalls, and the realities of obtaining ransomware insurance in the current landscape.
In business, progress demands continuous transformation. The velocity of innovation is increasing, and nearly everything in today's environment is digital first. How do you know if you're making the right kind of progress to overcome increasing IT complexity, costs and vulnerability?Welcome to The Progress Report, a podcast brought to you by Kyndryl, your partner for continuous innovation. Join our Chief Design Officer, Sarah B. Nelson, and Global Leader of Kyndryl Vital, Tom Rourke, as they sit down with innovators, thought leaders, problem solvers, technologists, and business leaders to explore how you can keep your finger on the pulse of progress. Listen in for provocative and unique perspectives on how to modernize for efficiency and growth, innovate for differentiated experiences, secure for resilient business -- and more! Make sure to subscribe so you don't miss an episode.
Hila Fish is a Sr. DevOps Engineer at Wix, a HashiCorp Ambassador, and an AWS Community Builder(Whew!)! In this episode she discusses best practices for deploying Terraform at scale! Resources: https://www.linkedin.com/in/hila-fish/ https://twitter.com/Hilafish1 https://bit.ly/3QwhL7t https://docs.aws.amazon.com/tag-editor/latest/userguide/tagging.html https://bit.ly/3D9NfNy https://bit.ly/3RQyUtC https://bit.ly/3TWoV80 https://bit.ly/3Brt7Fp https://bit.ly/3KZUQjG https://bit.ly/3U8xJYz
Having talked to a lot of builders (Community Builders, AWS engineers, ...) world wide there is a pattern of new projects being started without proper CI/CD (Continuous Integration and Continuous Deployment) in mind which later results in decreased developer productivity. Starting with the value flow of developer experience and DevSecOps best practices we are going to use Amazon CodeCatalyst to kick off a project development while keeping in mind developer productivity. The session incorporates findings and learnings from the conversations with builders. Resources: https://aws.amazon.com/builders-library/cicd-pipeline/ https://github.com/Lock128/cicdonaws-example-projects https://pipelines.devops.aws.dev/application-pipeline/ri-codecatalyst-pipeline/ https://codecatalyst.aws/explore
Mike Fiedler is a PyPI maintainer and Code Gardener and in this episode we talk about how to contribute to open source software (OSS)! We learn how to start easy, contribute effectively, and the best ways to get started! Resources: https://www.linkedin.com/in/miketheman/ https://twitter.com/mikefiedler https://choosealicense.com/ https://stackoverflow.com/help/minimal-reproducible-example https://www.codetriage.com/ https://goodfirstissue.dev/ https://opensource.com/ https://hacktoberfest.com/
Britton Johnson is a Staff Solution Engineer at VMware and in this episode we talk about the new security and advanced threat protection features in NSX 4.1! Resources: https://www.linkedin.com/in/britton-johnson-05872959/ https://twitter.com/vcixnv
Michael Heap, Director of Developer Experience at Kong Inc., joins us to explain what he learned from his failures and discuss his thoughts on strategic management.
Britton Johnson is Staff Solution Engineer at VMware and in this episode we start a 4 part series talking about NSX 4.1! In part 1 we talk about core components and capabilities. Resources: https://www.linkedin.com/in/britton-johnson-05872959/ https://twitter.com/vcixnv
Britton Johnson is Staff Solution Engineer at VMware and in this episode we start a 4 part series talking about NSX 4.1! In part 1 we talk about core components and capabilities. Resources: https://www.linkedin.com/in/britton-johnson-05872959/ https://twitter.com/vcixnv
Lahiru Hewawasam is Security Engineer for ExpressVPN and an AWS Community Builder. In this episode he talks about architectural best practices when building a data lake dedicated to security concerns. Resources: https://www.linkedin.com/in/richardfan1126/ https://twitter.com/richardfan1126
Old friend of the show Scott Lowe is Principal Technical Content Engineer at Pulumi and in this episode he talks about the value of infrastructure as code (IaC) and gives us a LIVE DEMO! Resources: https://www.linkedin.com/in/scottslowe/ https://twitter.com/scott_lowe
In this podcast, I interview Josh Lory, Senior Director of Product and Technical Marketing at VMware, where he focuses on driving awareness and adoption of AI-powered technologies to dramatically help customers to be successful, leading with VMware Skyline. Josh has been at VMware for more than 9 years. He held leadership roles in Software-Defined Data Center Architecture, Global Technical Alliances, and Americas Technical Partnerships. Prior to VMware, Josh was at Accenture in IT Infrastructure. Before that, he was at Stony Brook University, Jericho Computing, and Connoisseur International Distributors. And prior to all of that, Josh was in the United States Air Force as part of Security Forces - Nuclear ICBM - doing a job that he likely can't talk about:) Josh got his AAS in Criminal Justice at Community College of the Airforce, his Bachelors of Science from the State University of New York at Stony Brook, and completed the Engineering Leadership Professional Program at UC Berkeley College of Engineering. I got to know Josh when I convinced him to move from New York and from the Partner organization at VMware, into my team developing VMware Validated Designs. Josh also worked with me in the Global Servies organization where we reinvented support and built VMware Skyline. Josh is a father of twin boys, an amazing connector, a great storyteller, with high energy guy, excellent technical knowledge, and a drive to succeed. I think you will enjoy my interview with Josh.