Fri.Jul 09, 2021

article thumbnail

QLC: Yes, It’s Real and People Want It

Pure Storage

We’ve seen incredible momentum for quad-level cell (QLC) flash as enterprises across all industries transform and streamline their traditional storage environments, saying goodbye to the days of hybrid storage arrays. Because we are constantly listening to the needs of organizations around the globe, Pure Storage ® had the foresight years ago to optimize and innovate for QLC.

article thumbnail

Is Crisis Management Only For “Unprecedented and Extraordinary Events”?

Plan B Consulting

In this week’s bulletin, Charlie discusses the debate around the definition of crisis management and what he thinks crisis management should cover. I was chatting with one of my clients in Renfrewshire and we talked through his crisis management plan, which he had taken from the book ‘prTS 17091, Crisis Management – Guidance for Developing a Strategic Capability’ published in 2017.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Most State Legislatures Have Rejected Bans and Severe Restrictions on Facial Recognition

Security Industry Association

Facial recognition technology and related legislation have been a hot topic in the media and in policy discussions around the country. The Security Industry Association (SIA) is advocating nationwide for policies ensuring responsible use and sensible privacy protections , while urging rejection of blanket bans or unbalanced restrictions of these technologies that ignore the clear benefits of many applications and ultimately harm rather than protect Americans.

article thumbnail

Kaseya Attack: What is a supply chain cyber attack?

Plan B Consulting

The Kaseya cyber-attack has been in the news for the last few days and I thought this was an opportunity not to look at the detail of the attack itself but to look at the issue of supply chain cyber attacks. Supply chain cyber attacks are where criminals target software vendors or IT services companies in order to infect their clients. “In a typical hack, cyber criminals pick one company to target and find a unique way to break into that particular victim’s computer network.

Malware 52
article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Is Crisis Management Only For “Unprecedented and Extraordinary Events”?

Plan B Consulting

In this week’s bulletin, Charlie discusses the debate around the definition of crisis management and what he thinks crisis management should cover. I was chatting with one of my clients in Renfrewshire and we talked through his crisis management plan, which he had taken from the book ‘prTS 17091, Crisis Management – Guidance for Developing a Strategic Capability’ published in 2017.