
Rob Ludeman
Articles
-
May 22, 2024 |
blog.purestorage.com | Mary Lou O'Neil |Rob Ludeman |Kirk Borne |Andy Stone
The evolution of call centers has been nothing short of monumental, from the days of private branch exchange (PBX) phone systems to cloud-based, omnichannel contact centers that seamlessly connect experiences across a growing number of communication channels. And now AI is poised to make the most sweeping advancements in contact centers yet—with the potential to revolutionize both customer and employee experiences.
-
May 21, 2024 |
blog.purestorage.com | Rob Ludeman |Kirk Borne |Andy Stone |Scott Dietzen
SummaryHigher education institutions are making IT investments to deliver exceptional digital experiences for students and faculty, but they also need solutions that can help them speed recovery from a ransomware attack, reduce complexity and costs, and be future-ready. Most higher education institutions today are on a journey to modernize and uncomplicate their IT infrastructure so they can deliver exceptional digital experiences for students and faculty learning and working from anywhere.
-
May 10, 2024 |
blog.purestorage.com | Rob Ludeman |Kirk Borne |Andy Stone |Scott Dietzen
SummarySome newer NVMe-based, software-defined storage (SDS) startups are leveraging commodity off-the-shelf (COTS) SSDs in their solutions. However, using COTS SSDs poses limitations for these vendors and for customers who choose these systems.
-
May 3, 2024 |
blog.purestorage.com | Calvin Nieh |Andy Stone |Erin Stevens |Rob Ludeman
SummaryA successful data strategy is the foundation for a successful AI strategy. If you don’t plan for the many underlying data requirements of AI, you’ll run into data problems, which will inevitably lead to AI problems. What makes an AI strategy successful? A stockpile of GPUs? The world’s top data scientists? A bottomless budget? These are all good things—but no AI project will succeed without a successful data strategy.
-
May 2, 2024 |
blog.purestorage.com | Calvin Nieh |Erin Stevens |Rob Ludeman |Andy Stone
The foundational principle of zero trust architecture (ZTA) is this: Assuming trust anywhere in network security is a flawed approach and no longer sufficient against today’s advanced cyberthreats, implicit trust should never be granted to a user, device, or application based only on that user, device, or application’s location on a secure network.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →