Expert IT Blog
Featured Article
The Dell AI Factory with NVIDIA: Creating an AI Environment that Turns Ideas into Practical Application
Bryan Samson Strategic Alliances Manager Technological Singularity “Technological Singularity,” or simply “the singularity” is a term I learned today. It is the advancement of artificial intelligence (AI) to where it can improve upon itself and therefore...
Recent Articles
VLOG: Operationalize Sustainability and Drive Cost Savings
2:00 Operationalize Sustainability and Drive Cost Savings Video Highlights What is Business Sustainability Data Sources Technology adoption
BLOG – Implementing the Device Code Grant Pattern with Red Hat SSO
Jade ThorpePrinciple Solutions & Innovations Consultant Red Hat Single Sign-On (“RH-SSO”) is a core service that is part of a number of products such as the Red Hat Enterprise Application Platform. Red Hat® SSO is a powerful tool that provides several options...
BLOG – Implementing Infrastructure As Code Best Practice
Ayush MainaliSolutions & Innovation Consultant Part 2 of a 2-Part Series In Part 1: Gaining Efficiency With Infrastructure As Code of this blog series, I discussed how Infrastructure as Code (IaC) helps organizations gain efficiency. In this second and final...
BLOG – 5 Cloud Compliance Best Practices You Need To Know
Farhan HussainVP, Hybrid Cloud Practice The cloud is all about agility. It enables you to scale up to foster more innovation in your organization. But the more environments in play, the more data you have to protect. Sixty-five percent of organizations state...
BLOG: Active Directory Threat Detection and Response
Keith Thuerk Storage Engineer Protect Active Directory from Advanced Attacks with Automated Remediation In the past, the security boundaries of IT networks were typically limited to a small number of assets located outside the firewall, with some...
BLOG – Sign On Made Simple with Single Sign-On
Jade ThorpePrinciple Solutions & Innovations Consultant Time to start your day. You go to your desk, where your two 23" inch monitors and sticker-covered laptop are located. Your monitors are littered with sticky notes reading, "Username: XXXXXX Password:...
BLOG: Deception Technology: A Critical Tool to Combat Cyber Threats
Dave Santeramo Security Architect and Mainline Network and Security Leader Sun Tzu, Chinese general, strategist, philosopher, and author of the classic book “Art of War,” once stated that all warfare was based on deception. Deception creates the view that one’s...
BLOG – TRAC Solutions gains service reliability with a hybrid-cloud solution
Farhan HussainVP, Hybrid Cloud Practice INDUSTRY: Internet of Things TRAC Solutions provides full-service electronic and alternative monitoring solutions for courts and jails in the Midwest states of Illinois, Indiana, Iowa, Minnesota, Missouri, and Wisconsin...
BLOG – Pros and Cons of 4 Common Cloud Migration Strategies
Farhan HussainVP, Hybrid Cloud Practice It's expected that the public cloud service market will reach $623.3 billion by 2023 worldwide. After all, cloud computing offers businesses greater flexibility, resilience, and recovery. But migrating all of your...
BLOG – Franklin Madison migrates to a cloud based middleware solution
Farhan HussainVP, Hybrid Cloud Practice INDUSTRY: Financial ServicesCOMPANY SIZE: 200 EmployeesHEADQUARTERS: Franklin, TN Having separated from its parent company, Franklin Madison wanted to build a modern, cloud-based infrastructure using Amazon Web Services...
BLOG – Ramagine up to the challenge of transforming malware analysis
Farhan HussainVP, Hybrid Cloud Practice Introduction In today’s modern landscape of rapidly changing priorities, rising expectations from customers, and new market opportunities, IT leaders must discover new ways to streamline the delivery of the applications...
BLOG: IBM Ceph Storage Delivers Hybrid Cloud-Native Storage Capabilities
Scott BueckerStorage Engineer Product Positioning, Delivery, and Support On October 4th IBM announced that the Red Hat and IBM Storage businesses are coming together as a single group within IBM. Red Hat and IBM have been working closely for many years,...