Thu.Jul 20, 2023

article thumbnail

Frequently Asked Questions: Differences between BCLE AUD ISO 22301 and BCLE AUD NFPA 1600 audit courses

DRI Drive

DRI’s audit courses describe and explain the requirements in the identified international standard. Core competencies – including risk assessment, business impact analysis, continuity strategies, and crisis communications – are addressed in similar ways within both courses. Content specific to NFPA 1600 (such as emergency management, employee assistance and support, and crisis management) is not included, […] The post Frequently Asked Questions: Differences between BCLE AUD ISO 22301 and B

Audit 195
article thumbnail

Disk Is Done When It Comes to Backups

Pure Storage

Disk Is Done When It Comes to Backups by Pure Storage Blog Using all-flash storage for backups is a subject I first wrote about 10 years ago in a blog post published on Computerworld. Back in 2013, it was an unprecedented idea, but using my crystal ball, I predicted the following: The way I see it, a few years from now it will be common to use flash arrays as backup targets, and probably a few years after that we’ll all wonder how we ever used anything else.

Backup 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Audit Is NOT a Four-Letter Word

DRI Drive

By Donald L. Schmidt, CBCLA When you hear about an upcoming audit, do you get that dreaded feeling that someone’s going to be looking for problems, questioning your judgement, or wasting your time? Maybe all three. I’ve worked in corporate environments and have had to overcome that impression and some resistance. As a consultant, engaged […] The post Audit Is NOT a Four-Letter Word appeared first on DRI Drive.

Audit 195
article thumbnail

Fighting in Sudan Is Creating a Rift Among U.S. Security Partners

The Rand Blog

While the national security community often focuses on strategic competition between the United States and its near-peer adversaries, the conflict in Sudan is a good reminder that regional powers are also engaged in competition for influence and resources.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

The M365 bundling and pricing blueprint for MSP success: A must-see webinar

Acronis

For service providers, securing M365 environments isn’t just a great opportunity for new revenue streams: it’s a necessity to keep clients safe. MSPs have a unique opportunity to build scalable, layered offerings that their clients want — here's how to get started.

More Trending

article thumbnail

Data protection and security in the manufacturing industry

Acronis

Today, the high cost of downtime and a growing array of cyberthreats are pushing manufacturing leaders to focus on cyber defense and rapid restoral from a variety of sources. Understanding and implementing effective data protection and security safeguards can give them a significant advantage.

article thumbnail

Why We Love Working at Pure Storage

Pure Storage

Why We Love Working at Pure Storage by Pure Storage Blog This is a special time for us at Pure Storage. We were just named a Great Place to Work for Millennials ™ in 2023 and a Best Workplace in the Bay Area TM for 2023. What’s behind these accolades? Our people. When I first joined Pure, I immediately knew I’d found a “hidden gem.” And if you ask anyone at Pure, they’ll tell you the same.

article thumbnail

Thinking Through Your Next Crisis Now

BryghtPath

Its Friday afternoon when the phone rings. Something truly bad has happened – something that could change the face of your company. What to do next? Breathe deep and think through these steps: Gather the essential information. Gather all of the essential information. Not everything will be available right away, but more information will come … The post Thinking Through Your Next Crisis Now appeared first on Bryghtpath.

article thumbnail

How to Build an Open Data Lakehouse with Spark, Delta, and Trino on S3

Pure Storage

How to Build an Open Data Lakehouse with Spark, Delta, and Trino on S3 by Pure Storage Blog This article on how to build an open data lakehouse was originally published on Medium. the blog has been republished with the author’s credit and consent. Data lakes represent the first step towards gaining insights from ever-growing data. In many cases, it is the first place collected data lands in the data system.

Travel 52
article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Managing Extreme Heat Events

everbridge

A Q&A with Brian Toolan , Everbridge VP Global Public Safety Talk about the trend in heat events that are impacting state and local governments. Each year, we witness the challenges cities and towns face due to extreme heat. Some of the biggest areas of concern are the places that haven’t experienced such extreme heat in the past or for prolonged periods of time.

article thumbnail

How to Create Scalable and Reliable Kubernetes Logging

Pure Storage

How to Create Scalable and Reliable Kubernetes Logging by Pure Storage Blog This article on creating scalable and reliable Kubernetes logging originally appeared on Medium. This blog has been replublished with the author’s credit and consent. Building a basic logging solution for Kubernetes could be as easy as running a couple of commands. However, to support large-scale Kubernetes clusters, the logging solution itself needs to be scalable and reliable.

article thumbnail

SIA New Member Profile: KoreLock, Inc.

Security Industry Association

New Security Industry Association (SIA) member KoreLock, Inc. , provides turnkey smart lock technology, with its IoT Smart Lock platform including embedded firmware, ready-made or custom printed circuit boards, cloud infrastructure, mobile and web apps and access control software integration. The company is headquartered in Denver, Colorado, and serves lock manufacturers, lock brands, integrators, software companies and access control providers worldwide.

article thumbnail

Microsoft Fabric: An End to End Implementation

Advancing Analytics

This blog will walk you through the entire data lifecycle of ingesting data from SharePoint and Azure Blob Storage, through the lakehouse pattern, and finally to the reporting stage - all using Microsoft Fabric. As we’re well into summer now, festivals can be a great way of spending time with friends and family. But all too often, we each want to see various acts and activities.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Risk Governance: To Stay Safe,  Write Policies Addressing These Five Areas 

MHA Consulting

Whether the company you work for has five employees or 5,000, it should have a risk governance program. Specifically, it should have policies and procedures covering the five key areas of data retention, data access, device security, people security, and social media. Related on MHA Consulting: How GRC Can Help You Gain Real Control Risk Governance Is for Everyone Every organization, regardless of size or industry, should implement a risk governance program to reduce the chances of its being imp

article thumbnail

Zerto Now Available on HPE GreenLake Cloud Platform

Zerto

HPE GreenLake for Disaster Recovery Is Generally Available Experience Zerto wherever and however you want! Traditionally, Zerto has been available on-premises, in the public cloud, or with an MSP (managed service provider). Now customers can also experience Zerto as a simple, flexible SaaS-based disaster recovery (DR) solution on HPE GreenLake, the edge-to-cloud platform.

article thumbnail

Gartner Market Guide: Embedding Automation Into the Enterprise by Joseph Mandros

PagerDuty

“Existing workload automation strategies are unable to cope with the expansion in complexity of workload types, volumes and locations driven by evolving business demand, as per Gartner. Digital business is slowed without collaboration and automation inside and outside of IT, leading to siloes of capabilities across business and IT teams.Cost optimization is an evolving challenge, driven by technical debt and requirements to demonstrate business value of investments.