Mike has spent 30 years at HP in development, product management and latterly, product marketing.
Mike's team is responsible for marketing cross-IT solutions for HP Software including cloud, application transformation, and converged infrastructure.
Inside threats have always been identified as a top source of threats in the many infosec surveys I've seen. Who better than employees to know where real damage can be done? However, attacks are getting more varied. The 2014 Data Breach report from Verizon lists nine different types of attacks. It's a must read for an CISO.
What is the tipping point to invest in converged infrastructure? And when should you stand pat in your data centers?
We're going to try and figure that out in our Thursday Twitter chat this week. We chat 2-3 p.m. ET and the hashtag is #CIOchat .
Much has been written about the benefits of converged infrastructure - reduced complexity, faster deployments, ease of management, greater capacity and how it's more geared for cloud, Big Data and mobile.
But how much does it cost and how can you figure out the ROI?
This alarming advice was about two thirds of the way down in a post Aug. 5 from Hold Security, the Milwaukee firm which disclosed that a Russian group of hackers had stolen on the order of 1.2 billion email addresses and passwords. Being told not to panic gives most mortals a very panicky feeling.
The number of small/medium businesses in the world is growing. This is, of course, recognized by governments – many Prime Ministers and Presidents are looking to SMB’s to lead their countries out of recession.
I see this trend inside HP marketing. We are increasingly using SMB’s for campaign material generation, newsletter generation, and so on.