Today, researchers across scientific disciplines are benefiting from technology innovations in both software and hardware. Think: High performance computing and compute acceleration technologies like GPU. Unmanned drones and robots that enable scientists to go places humans cannot go—in space, on land, and at sea. Ultra high-definition 4K and 8K video formats. Advanced sensors that collect infrared, ultraviolet, microwave, and radar data. And analytics that make it easier to make sense out of all this data.
Bioinformaticians are in demand today. With advances in biotech, next-generation sequencing, and software analytics, there is tremendous opportunity for bioinformaticians who have combined expertise in biology, statistics, and computational analysis.
Cybersecurity is in the news and for good reason. Many of us have experienced firsthand what cybercriminals can do with our credit card numbers and our personally identifiable information being sold on the black market. In government, though, the stakes are higher. So it shouldn’t be a surprise that cybersecurity is on GAO’s High Risk List. Vulnerabilities abound in today’s technology-dependent world, and cybercriminals excel at exploiting weakness. Fortunately there are weapons organizations can deploy to fight back, and they fall into three main categories: people, tools, and data.
I’m on my way to Washington, D.C. for the GEOINT 2015 Symposium. I’m looking forward to spending time with customers and GEOINT’ers, along with the rest of the Quantum team. If you’re at the event, drop by Quantum booth #8058 to learn about the latest techniques in geospatial data management. I’m especially excited to attend GEOINT this year because I’ve been selected to give a Lightning Talk at the GEOINT Foreword Pre-Symposium. I will have 5 short minutes to tell a technology story and keep the audience engaged. No pressure. The title of my talk is: “Connecting Dots In Today’s World—Crayons Not Included.” Why focus on “connecting dots?" Well, the goal in GEOINT today is the same as ever: to derive useful intelligence from data. And while innovation is everywhere—in small sats, in 4K video, in sensors, in mobile, and in the analytics and data viz software that enables discovery—all this innovation is creating a ton of data that needs to be managed, analyzed, and connected. So it makes sense to talk about the challenges people face connecting all of these dots. And the bigger challenge they face recognizing which patterns of connected dots are meaningful.
Anybody who has anything has something worth stealing. Today’s advanced cybersecurity threats are putting CISOs on the hot seat. And while detection and prevention remain the staples of security, effective incident response has become critical to the bottom line. When (not if) you are breached—how will you investigate, and how will you respond? This post explores 7 important questions that every Chief Information Security Officer must be able to answer about incident response.
The cybersecurity headlines have gotten bigger, bolder, and more prevalent as 2014 draws to a close. Not surprisingly, as a result of these costly cyber incidents, there has been much discussion about how to prevent—how to detect—and how to prepare for cyber attacks, including my recent article in InformationWeek’s Wall Street & Technology: "5 Tips On How To Prepare For A Data Breach."
Video is not just for entertainment anymore. It’s transforming how people communicate in corporations, in universities—and in government organizations. I returned home last Thursday night from the Government Video Expo in Washington D.C., where our days were chock-full of conversations with the people who create video for defense and civilian agencies alike. One highlight at the 2014 #GVExpo was Geoff Stedman’s talk ‘The 7 Things the Beltway Can Learn from Hollywood About Video Workflows.’
The human brain is wired for conversation. And it’s also wired for beauty—we appreciate art and sunsets and gorgeous landscapes, architecture and racecars and winning jump shots. Perhaps that’s what makes video so powerful—it combines conversation with beautiful images. Our brains are wired for this combination of imagery and conversation, and the result is something that engages us. Today’s advances in camera, post-production, and broadcast technologies make it easier than ever to create super engaging content with video. It’s no wonder that digital storytelling is growing in both corporate America and government organizations—it gets the job done. Video tells a powerful story.
The theft of credit card and personal identity information is big business. We’ve all seen the headlines about data breaches at Target, Home Depot, and JPMorgan Chase. At JPMorgan Chase, personal information for 83 million households and small businesses was stolen, including names, addresses, phone numbers, and emails. The theft of this personal information is not only expensive to JPMorgan Chase (and its insurers), and not only upsetting for all the people impacted—it can also lead to more cyber attacks in the future, since personal information helps cybercriminals better target individuals. To investigate a cyber attack, you need to be able to look back in time and figure out what happened: how did the attackers get in the door? Where did they go, and what did they take once they got inside?
I love telling the StorNext 5 story. It’s satisfying to see a customer sit up straighter in their chair when the light bulb goes off, when they grasp what StorNext can do for them. To see them lean forward when they figure out how StorNext can address their challenges managing high-performance workflows, at scale, within budget. Without dropping a packet. Without dropping a frame. This week we rolled out a new and compelling set of StorNext 5 Scale-out Storage pages on our Quantum dot com website. If you already know and love StorNext 5, I hope you will think we did it justice. If you are wondering what StorNext 5 is, I hope the new pages answer your questions—clearly and cogently.
Working with our federal customers and sales team to solve complex storage challenges, it’s become clear to me that government agencies are under pressure to modernize their storage infrastructure. No more silos. No more stovepipes. Yes to collaboration. Agencies face a bevy of challenges: massive data growth, shrinking budgets, increased user expectations—as well as technology advances in sensors, analytics, mobile, and cloud—all of which stress traditional IT. To modernize storage infrastructure (and to do it effectively) involves a spectrum of different tools and techniques: e.g. converging backup & archive—consolidating data centers—taking advantage of new cloud technologies—and mixing tiers of flash, disk, object, cloud, and tape to enable collaboration, within budget, at scale.
A former FBI director is famous for saying that there are two types of companies: those that have been hacked, and those that will be. One of the rewards of working on scale-out storage for mission critical environments is that you get to work on solutions that make a difference—to national security, to financial markets, to our economy. Today we are pleased to announce Quantum’s partnership with FireEye in the area of network forensics—a critical component of any modern organization’s security operations.
Data stewardship has always mattered. We humans have been recording valuable data for thousands of years—all we have to do is look at the Lascaux cave paintings in southwestern France for images that are believed to be over 17,000 years old. And sometimes, we have even invested in beautiful monuments to store our data repositories and to symbolize the knowledge within. Observing, capturing, and preserving information about this planet are behaviors that seem to be wired into our DNA. The Radcliffe Camera at the Bodleian Library at Oxford is one such beautiful monument to data stewardship. This image of the Bodleian—which I discovered through Fodor’s 20 Most Stunning Libraries—makes me stop and marvel, not only at the curves of the dome and the lines of the columns, but at the determination of the architects and builders who spent over 100 years constructing this beauty, to store and protect a wealth of knowledge for centuries to come.