
In-memory computing has moved from experimentation to enterprise reality. The question is no longer whether it works. The real question is where it creates meaningful business value. In this CIO Talk Network conversation, host Sanjog Aul is joined by: • Dr. Jeffrey Word, Vice President of Product Strategy for Databases and Technology at SAP • Dr. Chris Nøkkentved, Chief Technology Officer of Enterprise Application Services at HP Together, they explore whether SAP HANA truly represents a transformational platform or simply a faster database. This discussion examines: • What differentiates SAP HANA from traditional disk-based architectures? • Where in-memory computing creates real business impact? • Why HANA is not a one-size-fits-all solution? • Common migration pitfalls organizations underestimate • How to build a credible business case for transformation? • The rise of event-driven, lightweight application development • Industry case studies including manufacturing, retail, automotive, and healthcare Beyond speed, this episode reframes in-memory computing as an architectural shift. The focus is not just performance. It is enabling new business models, real-time simulation, predictive planning, and decision making that were not previously possible. The key takeaway for enterprise IT leaders is clear. Think big. Start small. Anchor every step in measurable business value. Watch More CIO Talk Network Conversations Website: https://www.ciotalknetwork.com/can-sap-hana-hold-up-to-scrutiny/ About CIO Talk Network CIO Talk Network provokes thought that drives responsible leadership. We bring together CIOs, CISOs, and transformation leaders to discuss practical strategies that deliver measurable business impact. *Official Website:* https://www.ciotalknetwork.com Connect with us on: *LinkedIn:* https://www.linkedin.com/company/cio-talk-radio/ *X:* https://www.twitter.com/CIOtalknetwork *Facebook:* https://www.facebook.com/CIOtalknetwork *Apple Podcast:* https://www.ciotalknetwork.com/apple/ *Don’t forget to like, share, and subscribe for more insightful discussions.*

The global payments landscape is changing rapidly — with rising volumes, expanding rails, and growing expectations for speed, intelligence, and resilience. In this video, we explore how Temenos is helping banks, fintechs, PSPs, and EMIs modernise money movement through unified, scalable,...

The Kubernetes Steering Committee announced that the Ingress NGINX controller – a core ingress solution for roughly half of cloud‑native deployments – will be officially retired at the end of March, six weeks from the announcement. After that date the...

Plakar is an open‑source backup solution aimed at DevOps engineers who need enterprise‑level data resilience. The video explains how traditional object storage like S3 lacks point‑in‑time recovery and built‑in encryption, leaving critical workloads exposed to accidental deletion, ransomware, or corruption. Plakar...

In the video, Derek Lamartin dismantles the blanket claim that the outbox pattern, CQRS, and event sourcing are inherently over‑engineered solutions. He argues that the real question is whether these patterns address a concrete business need, not whether they belong...

Ryan Emmens presented at DEF CON 33 a case study on discovering and weaponising an unauthenticated vulnerability in Synology’s DiskStation Manager (DSM) operating system, culminating in a $40,000 Pwn2Own win. By instrumenting the login flow with eBPF tracing and inotify, he...

The video explores how domain‑driven design (DDD) is reshaping platform engineering, arguing that future internal developer platforms must be built around business domains rather than generic infrastructure abstractions. AJ Chunkermath explains that traditional platform teams often deliver one‑size‑fits‑all services, which...

The video outlines an intelligence‑driven approach to blue‑team operations, arguing that modern cyber‑threat intelligence (CTI) must evolve from static reports into an operational pipeline that turns external threat feeds and internal telemetry into concrete defensive actions. The speaker, who credits...

The presentation at Black Hat USA 2025 detailed how attackers can move laterally from a fully compromised on‑premises Active Directory into Microsoft Entra ID in hybrid environments. Speaker Dian of Outsider Security explained that once domain‑admin rights are obtained on‑prem,...