Author name: auto feeder

Leading with Customer Choice: Cisco and Nutanix Launch a Global Partnership

You may have seen the big news from Cisco and Nutanix, who recently announced a global partnership to simplify business actions within the hybrid and multi-cloud. Veeam has had longstanding alliance relationships with both Cisco and Nutanix, working with both companies on technical-level integrations and co-innovations and business-level collaborative sales relationships. Veeam looks forward to …

Leading with Customer Choice: Cisco and Nutanix Launch a Global Partnership Read More »

Mastering Your Hybrid Cloud Strategy

Hybrid cloud infrastructures represent a strategic blend of on-premises and cloud-based resources, offering organizations the flexibility to optimize their IT environments for various workloads and business needs. This approach enables businesses to modernize, harnessing the scalability, agility and cost-efficiency of the cloud without deprecating on-premises investments.   While many didn’t “plan” or “strategize” to have …

Mastering Your Hybrid Cloud Strategy Read More »

Preview – Connect Foundation Models to Your Company Data Sources with Agents for Amazon Bedrock

In July, we announced the preview of agents for Amazon Bedrock, a new capability for developers to create generative AI applications that complete tasks. Today, I’m happy to introduce a new capability to securely connect foundation models (FMs) to your company data sources using agents. With a knowledge base, you can use agents to give …

Preview – Connect Foundation Models to Your Company Data Sources with Agents for Amazon Bedrock Read More »

Ransomware Defense: Detect and Respond to Attacks

Ransomware is malicious software that blocks access to a computer system or the data it holds until the victim transfers a specified payment to the attacker. There were 493.33 million ransomware attacks worldwide in 2022, making ransomware one of the most serious cyber threats faced by businesses today. In this guide, we’ll discuss common ransomware …

Ransomware Defense: Detect and Respond to Attacks Read More »

New – Amazon EC2 R7a Instances Powered By 4th Gen AMD EPYC Processors for Memory Optimized Workloads

We launched the memory optimized Amazon EC2 R6a instances in July 2022 powered by 3rd Gen AMD EPYC (Milan) processors, running at frequencies up to 3.6 GHz. Many customers who run workloads that are dependent on x86 instructions, such as SAP, are looking for ways to optimize their cloud utilization. They’re taking advantage of the …

New – Amazon EC2 R7a Instances Powered By 4th Gen AMD EPYC Processors for Memory Optimized Workloads Read More »

AWS Weekly Roundup: R7iz Instances, Amazon Connect, CloudWatch Logs, and Lots More (Sept. 11, 2023)

Looks like it is my turn once again to write the AWS Weekly Roundup. I wrote and published the first one on April 16, 2012 — just 4,165 short day ago! Last Week’s Launches Here are some of the launches that caught my eye last week: R7iz Instances – Optimized for high CPU performance and …

AWS Weekly Roundup: R7iz Instances, Amazon Connect, CloudWatch Logs, and Lots More (Sept. 11, 2023) Read More »

Look Closer at Each of the 2023 Veeam Innovation Award Winning Solutions

In May 2023, four customers and four partners were awarded Veeam Innovation Awards (VIAs) to celebrate their great outcomes and their amazing solutions. The VIA process kicks off each November with nominations and culminates at our annual VeeamON event. In the partner category, we had four fantastic solutions that covered a breadth of solution areas. …

Look Closer at Each of the 2023 Veeam Innovation Award Winning Solutions Read More »

What Is Azure Security? Fundamentals & Key Concepts

Microsoft Azure is a powerful cloud platform used for a variety of applications. Today, cloud services host many mission-critical services and huge amounts of data, making them a prime target for cyberattacks. As a cloud service, Azure manages the infrastructure and OS-level security. However, users of the platform will still need to protect their endpoints …

What Is Azure Security? Fundamentals & Key Concepts Read More »

Scroll to Top