blog

An Update on Pure Storage From Pure Accelerate – Gigaom

I’m at Pure Accelerate 2019 trying to collect my thoughts and report on what I saw in the last couple of days. Some of the announcements were particularly exciting, others less so maybe, but I think that Pure Storage demonstrated, once again, to have a solid long-term strategy based on the idea of an “All-Flash …

An Update on Pure Storage From Pure Accelerate – Gigaom Read More »

Card Access Systems: Guide For End-Users

Card access systems works in a relationship between a plastic card and an electronic access control locks. Depending on the system, the card may contain a coded magnetic stripe that needs to be swiped into the card reader or metallic engraving that are used to trigger magnets inside the device, or even RFID technology. RFID …

Card Access Systems: Guide For End-Users Read More »

Object Storage – Time for Differentiation and Diversification – Gigaom

I recently started to work on new research about object storage, and I’ll be writing a report about it soon. As you may have noticed, object storage has finally found its place in enterprise IT. There are several reasons for that, but the most important is the success of Amazon AWS S3. In fact, the …

Object Storage – Time for Differentiation and Diversification – Gigaom Read More »

How Security Managers should collaborate with IT for planning an IoT Security Infrastructure

IoT devices need to be managed both internally, (e.g., software maintenance) and externally (i.e., their communication with other system). Let’s drive in the details of how these devices are connected. Every IoT device is connected to a management unit, known as a command and control center. These Centers are responsible for software maintenance, configurations, firmware …

How Security Managers should collaborate with IT for planning an IoT Security Infrastructure Read More »

Here we go again (serious PHI breach)

A Calgary doctor uses his personal Gmail account to communicate sensitive personal health information, does not protect his account, and whammo: 7,000 of his patients now have their private information circulating on the Intertubes. What are the takeaways? First, never use your personal email to communicate business sensitive information. In this case, the doctor had …

Here we go again (serious PHI breach) Read More »

A Conversation with Eric Topol – Gigaom

Today’s leading minds talk AI with host Byron Reese About this Episode Episode 95 of Voices in AI features Byron speaking with author Eric Topol regarding how Artificial Intelligence could revolutionize medicine and the health care industry. Listen to this episode or read the full transcript at www.VoicesinAI.com Transcript Excerpt Byron Reese: This is Voices in …

A Conversation with Eric Topol – Gigaom Read More »