September 2024 Newsletter

September 2024 Newsletter Table of Contents What’s the Buzz at eGroup Enabling Technologies? ➡️ eGroup Enabling Technologies Recognized on the 2024 Inc. 5000 “We are extremely excited to be named one of the Inc. 5000 fastest-growing private companies. This honor results from our team’s incredible work and the solutions we provide for our valued customers. […]

Using AI for Transcription in Public Safety

Using AI for Transcription in Public Safety Public Safety requires meticulous documentation, processes, and record keeping. Everything is under scrutiny and can/should be considered public record. Law enforcement often requires summaries of reports, interviews, and even body camera conversations to be transcribed into readable documentation for use in court proceedings and investigations.   How much time […]

Purview’s New AI Hub: Reduce AI Risks, Improve AI Visibility

Purview’s New AI Hub: Reduce AI Risks and Improve AI Visibility I have written extensively about getting data governance programs off the ground and the fundamentals of Purview Compliance. Today, though, I would like to address the AI concerns in organizations that already have mature Purview implementations, including advanced E5 features like Endpoint DLP, Insider […]

Zerto Virtual Replication: History and Capabilities

Zerto Virtual Replication:History and Capabilities This is the first part of a series about Zerto Virtual Replication, starting with some history and capabilities of Zerto. Additional posts will follow and dive deeper into the full Zerto suite. A Deep Dive into Zerto Virtual Replication: History, vSphere, Hyper-V, and Cloud Capabilities In the world of disaster […]

Enhancing Disaster Recovery with Nutanix Hybrid Cloud and Nutanix Cloud Clusters on Azure

Enhancing Disaster Recovery with Nutanix Hybrid Cloud and Nutanix Cloud Clusters on Azure In today’s digital world, where downtime can translate to significant financial loss and damage, having an extensive Disaster Recovery (DR) strategy is no longer optional—it’s essential. Organizations have many DR options at their disposal, each with its own advantages and considerations. Traditionally, […]

Answering Your Top AI Questions… Without Using AI – Part Two

Answering Your Top AI Questions… Without Using AI PART TWO Introduction In my last post, we tackled some BIG questions around AI—what it is and how it works, along with potential dangers and benefits. Pretty heady stuff! This time, let’s shift gears and dive deeper into how to implement AI successfully. As I mentioned before, […]

Answering Your Top AI Questions… Without Using AI – Part One

Answering Your Top AI Questions… Without Using AI PART ONE Part One of a Two-Part Series: Big Questions with Not-So-Big (But Still Really Good) Answers As eGroup Enabling Technologies’ Data & AI Practice Director, I get the privilege (seriously!) of meeting with individuals and organizations every day, and together, explore how to integrate modern data […]

Dive Into Business Processes to Improve Data Governance and AI Efforts

Dive Into Business Processes to Improve Data Governance and AI Efforts We engage with a lot of small- to mid-sized organizations that are in different phases of planning or implementing data governance, compliance, or AI initiatives. I have noticed that there is a common circumstance that can slow down or frustrate these projects: The people […]

Teams Phones Major Updates Have Begun

Teams Phones Major Updates Have Begun Introduction This is a follow up to our earlier article about the major upgrades to native Teams phones taking place this year: The operating system on the phones will be upgraded to Android 12. Management of Native Teams phones in Intune will switch to the Android Open Source Project […]

Incident Response Plans: What Are They and Why Do They Matter to Your Organization?

Incident Response Plans: What Are They and Why Do They Matter to Your Organization? Consider These Facts Human error accounts for a whopping 95% of cybersecurity breaches—and contrary to common belief, cybercriminals and hackers tend to exploit vulnerabilities outside of the IT department, capitalizing on the weakest links within your company.  A mere 38% of […]