All articles from Technologent

Technologent Announces Capital and Business Partnership with ITOCHU Corporation to Drive Innovation and Growth

How AI Is Making Storage and Data Management More Intelligent

Getting Stakeholder Buy-In to Move IT Initiatives Forward

How XaaS Helps Drive Digital Transformation for AI

Why It’s Critically Important to Back Up IAM Data

Technologent Named a Winner of the Orange County Top Workplaces 2024 Award

Gaining the Visibility Needed to Detect and Respond to Network Threats

Why Your Organization May Need to Eliminate Some Security Tools

7 Automation Challenges and Tips for Overcoming Them

How Software-Defined Cloud Interconnects Simplify and Enable Multi-Cloud

Agentic AI Is Quickly Emerging as the Next Breakthrough Technology

Cisco and MGM Resorts International Sign Multi-Year Agreement (Quote from Marco Mohajer)

Why Data Resilience Should Be the Focus of Data Protection

Featured Women of Tech(nologent) for November 2024: Candyce Mayer & April Finley

Data Diodes: From Spy Networks to Mainstream Cybersecurity

Understanding the Risks of RPA and How to Minimize Them

Minimizing Complexity and Risk in a Multi-Cloud Environment

Organizations Can Reduce Gen AI Risks with the Right Security Tools

Technologent receives Regional Partner of the Year: Pacific Southwest award at Cisco’s 2024 Partner Summit

Featured Women of Tech(nologent) for October 2024: Lori Manning

Infrastructure Flexibility Key to Supporting Modern M&E Workloads

Tammy Cooper Named as a Finalist for CRN’s 2024 Women of the Year Awards

Technologent Wins Best Technology Leadership Team at High Tech Awards 2024

The Benefits of Colocation in a Hybrid IT Model

Remote Ransomware: A Significant Threat Few Organizations Are Prepared For

Hybrid Cloud Storage Is Ideal for Growing Volumes of Unstructured Data

Featured Women of Tech(nologent) for September 2024: Misty Davidson Godwin & Tina Dengenis

Overcoming the Challenges of Cloud Compliance

How Top Media Companies Manage Content Production Workflows

AI-Enabled Security Tools: Benefits and Limitations