Meet Our Authors

Guest Blogger

SHI has partnered with the top experts in their fields to create valuable content. Find helpful resources from our partners, peers in the industry, and even customers below.

Recent Content by Guest Bloggers

How to create an effective data center transformation strategy

July 12, 2021
Use these pointers to help you start developing an effective data center transformation strategy.

Using a hybrid cloud approach to accelerate your business

June 9, 2021
Explore three reasons to adopt hybrid cloud and how to develop an optimal hybrid environment.

VR in the workplace, part 2: How virtual reality is driving collaboration

April 29, 2021
From employee training to collaboration to data analytics, more businesses are recognizing the power of VR.

VR in the workplace, part 1:
How virtual reality is supercharging employee training

March 18, 2021
Look at the role of VR in employee training, including the various forms, the impact, and how to get started.

How identity and access management (IAM) stops hackers in their tracks:
And what you should do to lock down one of the weakest aspects of your security posture.

March 9, 2021
Look at common identity protection mistakes and best practices for implementing access management solutions.

Intelligent digital workspaces for the total workplace ecosystem

February 4, 2021
Getting IT to seamlessly support workers in a new hybrid model requires a new platform for delivering, supporting, and managing the entire end user computing experience.

Esports in education: How to cultivate a winning program:
Invest in the technologies and structure that will allow you to create a successful esports program.

January 26, 2021
In this post, we’ll detail the value of esports in education and outline how to create a successful program with an emphasis on structure.

Data encryption: How to avoid common pitfalls and improve cybersecurity:
Discover how to make sure you’re encrypting the right data

December 23, 2020
In this post, we’ll take a closer look at data encryption strategies, including how to make sure you’re encrypting the right data, how to avoid common pitfalls, and how to adhere to best practices.

Creating effective IT management: Why DASH compliance is just the start

September 8, 2020
With more people working from make-do home networks, there are greater risks that crucial software updates go uninstalled, malware creeps in, and security vulnerabilities are exploited.

Avoid public cloud repatriation: The need to create a workload placement strategy

August 25, 2020
According to a recent IDC survey, over 80% of organizations reported repatriating workloads or data from the public cloud to a private cloud or on-premises data center.

Gain control at the edge: 3 strategies for overcoming edge computing challenges

August 11, 2020
More than 75% of enterprise data will be created and processed outside the data center or cloud by 2025. Here's how to keep pace.

Automating data governance: 5 benefits of modern data mapping

July 21, 2020
Here are five reasons why it’s time to professionalize your documentation and map your data using automation.

You May Be Interested In