Bob Glithero

Bob is Senior Manager, Product Marketing for VMware Tanzu Data Services.

  • Upcoming: Learn 5 Key Things About Running Databases in Containers vs. VMs

    Upcoming: Learn 5 Key Things About Running Databases in Containers vs. VMs

    Join the Tanzu SQL team at Percona Live ONLINE, Wed., May 12, 2021 from 2-3 PM PDT to learn about the realities of running database workloads in containers.

    Read More
  • How VMware Tanzu Data Services Powers Development Teams Building Modern Applications

    How VMware Tanzu Data Services Powers Development Teams Building Modern Applications

    Simplify your migration to the cloud with Tanzu Data Services, a portfolio of on-demand caching, messaging, and database software on VMware Tanzu for development teams building modern applications.

    Read More
  • VMware Tanzu Greenplum PXF for federated queries gets data quickly from diverse sources

    VMware Tanzu Greenplum PXF for federated queries gets data quickly from diverse sources

    With the explosion of data stores and cloud services, data now resides across many disparate systems and in a variety of formats. Greenplum PXF is a faster way to perform queries across these sources.

    Read More
  • The Path to the Modern Data Warehouse Is a Stream

    The Path to the Modern Data Warehouse Is a Stream

    How Greenplum disrupts extract, transform, and load process (ETL) and bridges the worlds of streaming and structured data to create a modern data warehouse.

    Read More
  • Pivotal Greenplum: Innovation in Data Management for Analytics

    Pivotal Greenplum: Innovation in Data Management for Analytics

    Pivotal releases the new Pivotal Greenplum which allows for enterprise analytics at scale, and is reimagined for modern deployment strategies.

    Read More
  • Better Threat Detection and Response with Analytics for Lateral Movement

    Better Threat Detection and Response with Analytics for Lateral Movement

    To better understand anomalous user behaviors, enterprises increasingly complement their security portfolio with advanced data science methods to find signs of unauthorized activity. Here's how.

    Read More
  • loading
    Loading More...