Author: Paul Lewis

Data – You’re Actually What Makes the World Turn

Dear Data, Remember that time we went on a whirlwind tour around the globe? In just a few weeks, we visited so many historical places. We met so many interesting people. And we ate so much delicious food!   My favorite…

Read More >

The Top Ten Data, Cloud, & Analytic Trends CIOs & CTOs Can’t Ignore: Part 2

data trends

In last week’s blog, I shared my take on five critical trends technology leaders can no longer ignore. Let’s round out the Top Ten trends in data, cloud, and analytics, from sustainability in IT to the Great Resignation.    …

Read More >

The Top Ten Data, Cloud, & Analytic Trends CIOs & CTOs Can’t Ignore: Part 1

data trends

On any given day, everything can feel like a priority when you’re a CIO or CTO. We’re responsible for balancing cloud adoption with data governance and orchestration, understanding an organization’s unique data management needs, building out robust roadmaps, and much…

Read More >

Data is the heart of business

Dear Data, Years ago, when you worked in another department, I admit that I spent only fleeting amounts of time thinking about you.   Certainly, I appreciated the fact that you were important enough to be stored securely and backed up…

Read More >

Is Your Google Workspace Environment Secure?

google workspace

Everyday productivity applications can hold a significant amount of corporate data, creating risk for an organization—particularly with remote and hybrid workforces, where data could reside at the ‘edge’ of the organization in laptops, mobile phones and even unregistered devices.  …

Read More >

How Google Cloud and Pythian Keep Your Data—and Your Reputation—Secure

data security

While more organizations are migrating their critical workloads to the cloud for scalability and agility, the ever-increasing complexity of the cloud environment makes it more challenging to secure that environment. The ramifications of a data breach or cyberattack can be…

Read More >

Zero Trust: If You Wait, It Could Be Too Late

Creating a true zero-trust environment requires a complete rethinking of the traditional approach to IT security

Today, any guidance you get about data security will almost certainly include the recommendation to adopt zero trust.  It’s good advice. It makes sense that anything accessing your network should be verified and that no device should be trusted by…

Read More >

My Top 10 to Tune In To at Google Cloud Next 21

Are you a developer wanting to integrate gamification for your colleagues’ reward strategy? Or a CEO focused on better protecting your e-commerce platforms? Maybe you’re simply interested in learning how leading organizations have approached digital transformation. If you’re like me,…

Read More >