IT resiliency: Running two different hypervisors

Having a Plan B is table stakes for any IT team. Rather than wait for a storm to hit, IT professionals map out options and build strategies to ensure business continuity. This may involve embracing redundancies or testing new tools for future operations. Following Broadcom’s late 2023 acquisition of VMware, numerous changes prompted customers and…

AI market evolution: Data and infrastructure transformation through AI

Artificial Intelligence (AI), a term once relegated to science fiction, is now driving an unprecedented revolution in business technology. From nimble start-ups to global powerhouses, businesses are hailing AI as the next frontier of digital transformation. Nutanix commissioned U.K. research firm Vanson Bourne to survey 650 global IT, DevOps, and Platform Engineering decision-makers on their…

Nutanix CEO sees multi-year opportunity after Broadcom’s VMware acquisition

Historically, data center virtualization pioneer VMware was seen as a technology leader, but recent business changes have stirred consternation since its acquisition by Broadcom in late 2023. New product bundling and pricing, reseller program adjustments, divestments, and unforeseen changes are driving CIOs and IT providers to reassess their strategies and technologies. “It’s going to change…

A strong CX ecosystem ignites innovation, accelerating next-gen customer service

Customer experience (CX) technologies are reaching new levels of innovation, enabling businesses to create deeper customer connections and new pathways to business growth. This innovation is transforming the modern contact center into dynamic Experience Centers, capable of enhancing customer interactions across text, email, chat, and voice channels – through enhanced automation, analytics, and of course,…

Camelot Secure’s AI wizard eases path to cybersecurity compliance

The Cybersecurity Maturity Model Certification (CMMC) serves a vital purpose in that it protects the Department of Defense’s data. But certification – which includes standards ensuring that businesses working with the DoD have strong cybersecurity practices – can be daunting. Fulfilling all the detailed requirements across multiple maturity levels is costly and time-consuming, especially for…