Cloud Architecture

Discover the latest collection of talks and videos on Cloud Architecture from industry experts.

Recent talks on Cloud Architecture

Future-proofing technological innovation through strategic Managed Services partnership
Channel Logo

Future-proofing technological innovation through strategic Managed Services partnership

CIOs face an unprecedented challenge: adopting transformative technologies like agentic AI faster than competitors while managing constrained IT budgets
that will only grow from 4.21% to 4.53% of company revenue by 2031. With infrastructure spending set to become the largest budget category, replacing
applications, IT leaders must fundamentally rethink their approach to technology delivery and resource management. The solution lies in strategic partner…

Scaling Smart: From POCs to Production with AI
Channel Logo

Scaling Smart: From POCs to Production with AI

In this session, experts from AWS and SoftwareOne explore how organizations can move beyond proof of concept to fully operational AI solutions. Learn
about frameworks for scaling innovation, closing skills gaps, and accelerating enterprise adoption while maintaining efficiency and control. In this session,
you'll learn: - Best practices for scaling AI initiatives across your organization - How to close skills gaps and strengthen cross-team collaboration - How to t…

Ask The Experts: CISO Strategies to Control AI Risk
Channel Logo

Ask The Experts: CISO Strategies to Control AI Risk

Data growth, AI adoption and tightening regulations are stretching CISOs and their teams to the limit. Managing tools is one thing. The hardest part is making
sure your teams align defenses to real, material threats, especially for AI, proving it to the board and keeping pace with how fast risk is changing in the cloud.
Ross Young, creator of the OWASP Threat and Safeguard Matrix, joins Alex Martinez, Director Solutions Architecture, Global Public Sector Partners at AWS, …

Cloud Asset Blind Spots: Closing Gaps Before They're Exploited
Channel Logo

Cloud Asset Blind Spots: Closing Gaps Before They're Exploited

“What do we actually own in the cloud?” It’s a question security leaders ask every day—yet answers are rarely clear. In today’s cloud-driven world, assets,
identities, and resources change faster than manual tracking can keep up, creating critical blind spots that attackers can exploit through misconfigurations or
overprivileged accounts. For security operations, this speed demands an equally fast response. However, legacy asset management and siloed security tool…

Cloud Native Tools Aren't Enough: Cyber Recovery for Your Application-Dependent Unstructured Data
Channel Logo

Cloud Native Tools Aren't Enough: Cyber Recovery for Your Application-Dependent Unstructured Data

Your S3 buckets, EFS volumes, and Azure Blob storage are growing exponentially. Your business-critical applications – from data analytics to AI/ML pipelines –
depend on this unstructured data. But here's the problem: the cloud-native backup tools you're relying on today won't save you when sophisticated attackers
strike. Recent attacks like Codefinger have shown how easily ransomware can disable S3 versioning and purge backup history. Geographic replication fails …

The Hidden Cost of Cloud Storage — and How to Break Free
Channel Logo

The Hidden Cost of Cloud Storage — and How to Break Free

Join experts from Backblaze and Dimensional Research to explore findings from a new 2025 survey of 400+ IT leaders. Learn why nearly all organizations
face hidden storage costs, what’s driving egress and interoperability challenges, and how a transparent approach to cloud can put control back in your
hands. Key Topics: -How surprise fees erode cloud budgets and flexibility -What IT teams are doing to fight back (dataset reduction, shorter retention, hybri…

On-Prem vs. Cloud: A Practical Guide to Sizing and Deploying LLMs- A Lenovo TechCast featuring David Ellison, PhD
Channel Logo

On-Prem vs. Cloud: A Practical Guide to Sizing and Deploying LLMs- A Lenovo TechCast featuring David
Ellison, PhD

In this episode of Lenovo TechCast, David Ellison, Lenovo’s Chief Data Scientist, provides a practical guide to one of the most critical decisions in GenAI:
deploying Large Language Models (LLMs). Starting with the foundational step of correctly sizing LLMs for both training and inference, David dives into the
specific requirements and customer examples—including the impact of KV cache—that ensure your infrastructure is built for success. From there, the discu…

Managing Human Risk in Cloud Security Operations
Channel Logo

Managing Human Risk in Cloud Security Operations

Every minute your cloud infrastructure grows, it creates new entry points for potential attacks. As organizations rush to embrace cloud innovations, they're
unknowingly building digital labyrinths where traditional security measures fall short. Cloud security threats are often perceived as purely technical
challenges, but the human factor remains one of the most significant and underestimated risks. Misconfigurations, weak passwords, phishing attacks, and i…

Coming up next

From Data to Decisions: Understanding How AI Models Learn
Channel Logo

From Data to Decisions: Understanding How AI Models Learn

Join us for an insightful webinar and demonstration as we explore the foundational process of training machine learning models, with a special focus on
computer vision applications. This session will guide participants through the essential stages of model development—from data preparation to algorithm
selection—highlighting how these steps influence performance and accuracy. Through practical demonstrations and conceptual discussions, attendees will …

The Storage Security Shake-Up: Adapt Now or Get Left Behind
Channel Logo

The Storage Security Shake-Up: Adapt Now or Get Left Behind

Storage security changes and adaptations are a fact of life to deal with the ever-changing threat and regulatory landscapes. A black swan event, a new
standard, or a regulation often serves as a catalyst for organizations to review their controls and practices. The recent publication of NIST Special Publication
800-88 Rev. 2, Guidelines for Media Sanitization, is drawing attention to storage security, but it is not the only development worth noting. SNIA, Open Comp…

Shift + ALT + Disrupt (Episode 7): Building the Smart City's Nervous System
Channel Logo

Shift + ALT + Disrupt (Episode 7): Building the Smart City's Nervous System

The Network and Data Architecture for AI-Powered Urban Services A successful smart city is built on a foundation of ubiquitous connectivity and a robust
data strategy. This webinar provides a blueprint for city leaders on designing and implementing the core infrastructure for AIoT. We will cover how to leverage
fiber and 5G to connect a city-wide sensor network and how to build a data platform that can process this information in real-time to optimize services like t…

The Strategic Future of Voyence NCM with Broadcom
Channel Logo

The Strategic Future of Voyence NCM with Broadcom

Since Broadcom's acquisition of VMware, many have asked about the future of the trusted Voyence NCM. In a landscape where manual configuration errors
are the #1 cause of preventable outages and tool sprawl creates more problems than it solves, a clear strategy for network integrity is more critical than
ever. Join us for this 15-minute session where we'll show you how Broadcom is revitalizing Voyence NCM by including it as a core component of our industr…

Kaspersky Scan Engine Built to integrate, engineered to protect
Channel Logo

Kaspersky Scan Engine Built to integrate, engineered to protect

From web portals and email gateways to cloud platforms and local storage, modern businesses depend on a multi-layered IT environment. But each layer
can also become a potential entry point for cyberthreats. That’s why having a unified, robust security solution across your entire infrastructure is critical.
Kaspersky Scan Engine is designed precisely for this challenge. Whether your systems are on-premises, in the cloud, or somewhere in between, it delivers p…

Unlocking Historical Knowledge to Discover Untapped Scientific Value
Channel Logo

Unlocking Historical Knowledge to Discover Untapped Scientific Value

Over decades of research, Syngenta has accumulated vast amounts of R&D knowledge locked away in legacy systems, siloed repositories and spreadsheets.
However, the challenge has been how to make this hidden knowledge findable, accessible and reusable for today’s scientists. In this webinar, a Syngenta
expert shares how the Synapse platform, a new-generation enterprise search solution, is helping researchers uncover relevant insights from early research…

Attend Summits on Cloud Architecture

Accelerating Cloud Innovation in 2023

Accelerating Cloud Innovation in 2023

The hybrid cloud infrastructure is set to enhance agility, create new value propositions and optimise data strategies across industries and business functions.
But with a severe talent shortage and skyrocketing IT costs, developing a cloud innovation strategy that achieves these goals isn’t easy. Join this comprehen…

|20 sessions
Building a Secure Cloud Environment

Building a Secure Cloud Environment

Strengthen your cloud applications and infrastructure against threats with expert strategies and tools

|19 sessions
Complete Cloud Security

Complete Cloud Security

Cloud security accounted for 5% of cloud budgets in 2020 and is expected to rise to 7% in 2022, according to the "2022 State of IT" report by Spiceworks Ziff
Davis. No doubt caused by the shift to remote working provoked by the pandemic, it’s evident that cloud security is more top of IT security leaders’ minds t…

|16 sessions
Managing Hybrid and Multi-Cloud Environments

Managing Hybrid and Multi-Cloud Environments

Effectively managing complex hybrid and multi-cloud environments is crucial for today's organizations to make the best use of cloud and realize business
benefits.

|11 sessions
Leveraging Distributed Cloud Environments

Leveraging Distributed Cloud Environments

Moving data, applications and workloads across multiple clouds can achieve greater productivity and business benefit.

|11 sessions
Managing Hybrid and Multi-Cloud Environments

Managing Hybrid and Multi-Cloud Environments

Successfully manage complex hybrid and multi-cloud environments to make the most of cloud use and improve business outcomes.

|9 sessions