• LinkedIn
  • Twitter
  • Instagram
  • Spotify
  • YouTube

Jason Buffington .com

  • Book Club
  • Coaching
    • Coaching Services
    • About your coach
    • Let’s get started
  • Two-Minute Mondays
  • Data Protection
  • Content Archive
    • Veeam
    • ESG
    • Microsoft
  • ScoutingForGod.org
  • vBlog: Regulatory Compliance vs Operational Readiness (3 of 4): HIPAA

    This month, I am taking a look at the differences between ‘Regulatory Compliance’ and ‘Operational Readiness’ through a series of videos. Regulatory Compliance The efforts to check the boxes before audits – often mandated by an industry (e.g. HIPAA), corporate… Read more

    BC-DR, Business Process, Regulatory Compliance, Videos and Webcasts
    April 23, 2013
  • vBlog: Regulatory Compliance vs Operational Readiness (2 of 4): SEC and SOX

    This month, I am taking a look at the differences between ‘Regulatory Compliance’ and ‘Operational Readiness’ through a series of videos. Regulatory Compliance The efforts to check the boxes before audits – often mandated by an industry (e.g. HIPAA), corporate… Read more

    BC-DR, Business Process, Regulatory Compliance, Videos and Webcasts
    April 16, 2013
  • vBlog: Regulatory Compliance vs Operational Readiness (1 of 4)

    This month, I am taking a look at the differences between ‘Regulatory Compliance’ and ‘Operational Readiness’ through a series of videos. Regulatory Compliance The efforts to check the boxes before audits – often mandated by an industry (e.g. HIPAA), corporate… Read more

    BC-DR, Regulatory Compliance, Videos and Webcasts
    April 9, 2013
  • Discussing Data Protection with IBM

    Last week, I had the opportunity to sit down with Tom Hughes and Todd Watson from IBM.  We talked about three IT trends that are disrupting traditional data protection strategies and legacy approaches: Highly Virtualized / Private Cloud Infrastructures Cloud-based… Read more

    BYOD, Cloud-powered, IBM, Videos and Webcasts, Virtualization
    March 11, 2013
  • Trends in Virtualization Protection (video)

    Easily one of the most discussed topics with me in 2012 is how virtualization is changing data protection strategies. Virtualization solves so many problems for IT that it continues to become more mainstream every day.  But the more that you… Read more

    Hyper-V, Videos and Webcasts, Virtualization, VMware-VMworld
    January 28, 2013
  • Data Protection in a BYOD World

    One of the most complicated areas of data protection in IT today has to be around securing the data on endpoint devices (laptops & tablets).  Frankly, most IT organizations weren’t able to do an effective job of protecting that data… Read more

    Cloud-powered, Consumerization of IT and BYOD, Endpoint-Devices, Predictions-and-Trends, Videos and Webcasts
    December 17, 2012
←Previous Page
1 … 6 7 8 9 10 … 13
Next Page→

.

These blog posts and tweets are my own opinions and do not necessarily represent the views of my current employer, previous employers, clients, or any other party.

Many of these articles were originally posted elsewhere on public websites, but have been re-posted here with attributions to the original location — as a centralized archive of my perspectives.

  • Facebook
  • Twitter
  • Instagram
  • YouTube

Subscribe to be notified when new content is posted.

  • Book Club
  • Coaching
    • Coaching Services
    • About your coach
    • Let’s get started
  • Two-Minute Mondays
  • Data Protection
  • Content Archive
    • Veeam
    • ESG
    • Microsoft
  • ScoutingForGod.org

Blog at WordPress.com.

  • Subscribe Subscribed
    • Jason Buffington .com
    • Already have a WordPress.com account? Log in now.
    • Jason Buffington .com
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar