Veritas, Providing Customers with Data Availability, Protection and Insights

Jyothi Swaroop, VP, Global Marketing at Veritas sits down with Mike Matchett at VMworld 2019 to talk about some of the biggest trends in the IT industry, the company’s latest work within cloud environments, and the advantage of maturity in a young, eme…

Original video (with full player and complete transcript) posted at TruthInIT.com

Browse related videos on the Small World Big Data channel at TruthInIT

NetApp talks Kubernetes and Cloud Services at VMworld 2019

We spoke with NetApp’s Ingo Fuchs, Chief Technologist of Cloud & DevOps on NetApp’s new virtual desktop infrastructure (VDI) solution for VMware, and how they’re bringing hybrid multi cloud services and solutions to help customers manage these complex …

Original video (with full player and complete transcript) posted at TruthInIT.com

Browse related videos on the Small World Big Data channel at TruthInIT

Apstra Intent-Based Networking for the Data Center and Beyond

Apstra enables digital transformation through automated software-first Intent-Based Networking. The latest version of the Apstra Operating System (AOS) includes tighter design, build, and operational interoperability between the underlying physical net…

Original video (with full player and complete transcript) posted at TruthInIT.com

Browse related videos on the Small World Big Data channel at TruthInIT

Virtual Instruments CMO Len Rosenthal Discusses What's New in VirtualWisdom 6.2

Len Rosenthal, CMO of Virtual Instruments discusses VI's new Virtual Wisdom Right Sizer and Workload Drift Analyzer technologies to help IT shops w/mission critical apps better analyze and predict performance, capacity for workloads and applications.

Original video (with full player and complete transcript) posted at TruthInIT.com

Browse related videos on the Small World Big Data channel at TruthInIT

Stopping Security Breaches in Real-Time With the Industry’s First ‘Real-time Attack Interception and Defense’ Platform

Businesses are struggling to detect and stop cybersecurity attacks. These attacks typically blend in the environment, dwell over potentially long periods and use stealthy techniques to move around the infrastructure leading to devastating data breaches…

Original video (with full player and complete transcript) posted at TruthInIT.com

Browse related videos on the Small World Big Data channel at TruthInIT