Brian Pawlowski

Brian Pawlowski joined Quantum in 2020 as chief development officer. Pawlowski is a distinguished technologist with over 35 years of experience in building technologies and leading teams at global technology companies, such as Sun Microsystems, NetApp, and Pure Storage. Pawlowski previously served as vice president and chief architect at Pure Storage, where he focused on improving user experience for their all-flash storage platform. He also served as CTO at storage pioneer NetApp, where he joined as employee No. 18. Pawlowski began his career as a software engineer for several well-known technology companies, including Sun, driving technical analysis on alternate file system technologies. Pawlowski served on the Board of Trustees for the Anita Borg Institute for Women and Technology and was a Board member at the Linux Foundation. Pawlowski studied computer science at Arizona State University and studied physics at the University of Texas at Austin and MIT.
1 articles written
0 comments made

What Is a Computer Worm? Definition, Protection, and Recovery

Worm viruses are malicious programs that spread quickly across networks. Learn how to protect your system against worms now.

What Is Decentralized Storage? Ultimate Guide

Decentralized storage is a type of distributed storage system that is not dependent on a single storage provider. Here’s how it works—and how it can benefit your business.

6 Best Network Virtualization Software for 2023

Compare the best network virtualization software solutions. Find the right virtualization tool for your networking needs.

What Is a Rootkit? Definition, Prevention, and Removal

Rootkits are malicious software that can be difficult to detect. Learn how to prevent, find, and remove rootkits with our comprehensive guide.

What Is the OSI Model? Why It’s Still Relevant

Learn why the OSI model is still relevant in modern networking and how it can help you understand network communication.

6 Best Cloud Security Posture Management (CSPM) Tools

Find the best cloud security posture management (CSPM) tools for you. Compare features and pricing of the top CSPM vendors.

Is Red Hat Virtualization a Good Proxmox VE Alternative?

Compare Proxmox VE and Red Hat Virtualization to discover which tool fits your specific virtualization needs best.

What Are Botnets? Botnet Attacks Explained

Botnet attacks are a type of cyberattack that uses a network of compromised computers to launch malicious activities. Here’s how they work—and how to protect yourself.

14 Top IT Managed Services Providers (MSPs) for 2023

Find the best managed services provider (MSP) for your business. Compare the top solutions now.

Ransomware-as-a-Service (RaaS): Definition & Examples

Ransomware-as-a-service (RaaS) is a type of cyberattack that allows cybercriminals to rent out ransomware to other criminals—and it’s a rapidly growing business.

What Is CIDR? Subnets and CIDR Explained

CIDR is a method of allocating IP addresses and routing Internet Protocol packets. Here’s how it works — plus its history, and why it’s still in use today.

What Is Network Routing? Definition, Steps, and Types

Network routing is the process of selecting paths in a network along which to send network traffic. Here are the most common types and protocols and how they work.