Chat with us, powered by LiveChat

Posts in collection posts

    Point-in-Time Recovery Using Zerto Journal History

    User Error/accidental deletion, system corruption, hardware failure, ransomware infection, malicious employees… your business faces internal and external security threats every day. Having the right IT tools in place and the knowledge to leverage them effectively is critical to your ability to mitigate these threats effectively and ensure continuous business operations and data protection. For example, point-in-time recovery (PITR) –...

    Disaster Recovery Infrastructure Availability

    Are you incentivizing the wrong IT behaviors?

    Most of the C-Suite professionals I meet with these days have moved away from the old “IT as a cost center” talk and more towards “IT as a business enabler” thinking. But C-Suite and IT leaders’ actions don’t always match up with words. From my perspective, here are the most common forms of incentivizing the wrong IT behaviors that...

    cloud computing managed services digital transformation

    Lessons Learned from Central Ohio IT Leaders.org - Three Pillars to Communicate Your Vision

    Three Pillars to Communication Your Vision With a great deal of help, I put together an IT leadership development program – Central Ohio IT Leaders.org – in 2017 for aspiring CIOs in Central Ohio.  The following message is my effort to share what I’ve learned from the tremendous CIO guest speakers that have presented as part of the program. Central...

    IT Leadership

    Collaboration Key to Dell Technologies' Cloud Future

    I attended Dell Technologies / World 2019 this past week. Held in Las Vegas, the show hosted its largest list of attendees yet. I’m told that nearly 15,000 people attended the conference to learn about the combined innovations at the family of companies that includes DellEMC, VMware, RSA, Pivotal, Secureworks, Virtustream, and Boomi. Expedient is a DellEMC Platinum Partner...

    Cloud Computing Multi-cloud VMware

    The State of InfoSec - A Change is Gonna Come

    Last month, I traveled to San Francisco for one of the largest Information Security exhibitions of the year – the RSA Conference (RSAC). As a technologist, I always look forward to attending events like RSAC because they provide me with the opportunity to learn about hundreds of emerging technology solutions and gain an updated perspective on the trends driving...

    Security and Compliance