Claire Giordano
Claire Giordano is Senior Director for Emerging Storage Markets at Quantum, focused on solving the demands of big data use cases, including life sciences, geospatial, and cybersecurity. Claire has over 20 years of experience in product management, product marketing, and engineering, and earned an Sc.B. degree in Applied Mathematics and Computer Science from Brown University.

5 Ways Storage Infrastructure Can Make All The Difference In Scientific Research

Today, researchers across scientific disciplines are benefiting from technology innovations in both software and hardware. Think: High performance computing and compute acceleration technologies like GPU. Unmanned drones and robots that enable scientists to go places humans cannot go—in space, on land, and at sea. Ultra high-definition 4K and 8K video formats. Advanced sensors that collect infrared, ultraviolet, microwave, and radar data. And analytics that make it easier to make sense out of all this data.

Is Data The New Weapon Against Cyber Attacks?

Cybersecurity is in the news and for good reason. Many of us have experienced firsthand what cybercriminals can do with our credit card numbers and our personally identifiable information being sold on the black market. In government, though, the stakes are higher. So it shouldn’t be a surprise that cybersecurity is on GAO’s High Risk List. Vulnerabilities abound in today’s technology-dependent world, and cybercriminals excel at exploiting weakness. Fortunately there are weapons organizations can deploy to fight back, and they fall into three main categories: people, tools, and data.

Connecting Dots This Week At GEOINT2015

I’m on my way to Washington, D.C. for the GEOINT 2015 Symposium. I’m looking forward to spending time with customers and GEOINT’ers, along with the rest of the Quantum team. If you’re at the event, drop by Quantum booth #8058 to learn about the latest techniques in geospatial data management. I’m especially excited to attend GEOINT this year because I’ve been selected to give a Lightning Talk at the GEOINT Foreword Pre-Symposium. I will have 5 short minutes to tell a technology story and keep the audience engaged. No pressure. The title of my talk is: “Connecting Dots In Today’s World—Crayons Not Included.” Why focus on “connecting dots?" Well, the goal in GEOINT today is the same as ever: to derive useful intelligence from data. And while innovation is everywhere—in small sats, in 4K video, in sensors, in mobile, and in the analytics and data viz software that enables discovery—all this innovation is creating a ton of data that needs to be managed, analyzed, and connected. So it makes sense to talk about the challenges people face connecting all of these dots. And the bigger challenge they face recognizing which patterns of connected dots are meaningful.

7 Questions About Incident Response Every CISO Must Be Able To Answer

Anybody who has anything has something worth stealing. Today’s advanced cybersecurity threats are putting CISOs on the hot seat. And while detection and prevention remain the staples of security, effective incident response has become critical to the bottom line. When (not if) you are breached—how will you investigate, and how will you respond? This post explores 7 important questions that every Chief Information Security Officer must be able to answer about incident response.

Tips On How To Prepare for a Data Breach

The cybersecurity headlines have gotten bigger, bolder, and more prevalent as 2014 draws to a close. Not surprisingly, as a result of these costly cyber incidents, there has been much discussion about how to prevent—how to detect—and how to prepare for cyber attacks, including my recent article in InformationWeek’s Wall Street & Technology: "5 Tips On How To Prepare For A Data Breach."

7 Things the Beltway Can Learn from Hollywood About Video Workflows

Video is not just for entertainment anymore. It’s transforming how people communicate in corporations, in universities—and in government organizations. I returned home last Thursday night from the Government Video Expo in Washington D.C., where our days were chock-full of conversations with the people who create video for defense and civilian agencies alike. One highlight at the 2014 #GVExpo was Geoff Stedman’s talk ‘The 7 Things the Beltway Can Learn from Hollywood About Video Workflows.’

Government Video is Growing Like a Weed

The human brain is wired for conversation. And it’s also wired for beauty—we appreciate art and sunsets and gorgeous landscapes, architecture and racecars and winning jump shots. Perhaps that’s what makes video so powerful—it combines conversation with beautiful images. Our brains are wired for this combination of imagery and conversation, and the result is something that engages us. Today’s advances in camera, post-production, and broadcast technologies make it easier than ever to create super engaging content with video. It’s no wonder that digital storytelling is growing in both corporate America and government organizations—it gets the job done. Video tells a powerful story.

Is Network Traffic Data Better than Gold?

The theft of credit card and personal identity information is big business. We’ve all seen the headlines about data breaches at Target, Home Depot, and JPMorgan Chase. At JPMorgan Chase, personal information for 83 million households and small businesses was stolen, including names, addresses, phone numbers, and emails. The theft of this personal information is not only expensive to JPMorgan Chase (and its insurers), and not only upsetting for all the people impacted—it can also lead to more cyber attacks in the future, since personal information helps cybercriminals better target individuals. To investigate a cyber attack, you need to be able to look back in time and figure out what happened: how did the attackers get in the door? Where did they go, and what did they take once they got inside?

Telling the StorNext 5 Story

I love telling the StorNext 5 story. It’s satisfying to see a customer sit up straighter in their chair when the light bulb goes off, when they grasp what StorNext can do for them. To see them lean forward when they figure out how StorNext can address their challenges managing high-performance workflows, at scale, within budget. Without dropping a packet. Without dropping a frame. This week we rolled out a new and compelling set of StorNext 5 Scale-out Storage pages on our Quantum dot com website. If you already know and love StorNext 5, I hope you will think we did it justice. If you are wondering what StorNext 5 is, I hope the new pages answer your questions—clearly and cogently.

Talking Network Forensics and Cybersecurity on Federal News Radio

My Fed colleagues tell me that their favorite morning news station for the D.C. beltway commute is Federal News Radio (1500 on your AM dial). So I was thrilled when I was invited to talk to Tom Temin on the “Federal Drive” morning news show about Cybersecurity and Network Forensics. With the latest Home Depot breach still fresh in the news, we talked about the growing awareness that breaches are going to happen, and the importance of putting robust incident response plans in place—in advance.

Shining a Light on Government Information Workflows

Working with our federal customers and sales team to solve complex storage challenges, it’s become clear to me that government agencies are under pressure to modernize their storage infrastructure. No more silos. No more stovepipes. Yes to collaboration. Agencies face a bevy of challenges: massive data growth, shrinking budgets, increased user expectations—as well as technology advances in sensors, analytics, mobile, and cloud—all of which stress traditional IT. To modernize storage infrastructure (and to do it effectively) involves a spectrum of different tools and techniques: e.g. converging backup & archive—consolidating data centers—taking advantage of new cloud technologies—and mixing tiers of flash, disk, object, cloud, and tape to enable collaboration, within budget, at scale.

Partnering with FireEye on Network Forensics and Cybersecurity

A former FBI director is famous for saying that there are two types of companies: those that have been hacked, and those that will be. One of the rewards of working on scale-out storage for mission critical environments is that you get to work on solutions that make a difference—to national security, to financial markets, to our economy. Today we are pleased to announce Quantum’s partnership with FireEye in the area of network forensics—a critical component of any modern organization’s security operations.

1 2
page 1 of 2