Bio
Shelly is the managing director and a principal analyst at theCUBE Research.
She has been immersed in the B2B sector with an emphasis on technology for the past couple of decades and has worked with some of the world’s largest technology brands to help them embrace disruption and to successfully navigate the process of digital transformation.
She regularly advises and collaborates with senior leaders at major technology companies, covering a wide range of products and services, including Customer Experience, Artificial Intelligence and Automation, Security, ESG/Sustainability Technology, Communication Networks, Workplace Collaboration, and Enterprise Apps.
She has been widely recognised as one of the world’s leading technology analysts and industry thought leaders.
Research

Kyndryl Cloudflare, Dell’s Gen AI Solutions, NVIDIA GTC, and Nile’s AI Networking Solution

Grammarly’s Strategic Suggestions Launch Signals the Company is Far More than an Editing Solution

Databricks on Intelligent Data Apps: A Discussion with Jason Pohl

Kyndryl’s Gretchen Tinnerman on Industry Trends, Solving for Customer Challenges, and Sustainability

Four Generative AI Cyber Risks that Keep CISOs Up at Night — and How to Combat Them

A CISO’s Take on the Rise of AI-Enhanced Phishing, Smishing, and Vishing — and How to Combat

Unpacking the Google Hugging Face Partnership to Accelerate Gen AI and ML Development

Mitel CMO Eric Hanson Brings the Right Skillset at the Right Time

Cohesity-Veritas Merger, F5 App World Recap, and Security Vendors in the AI Age

Cisco Live 2024 Amsterdam Announcements — Delivering on Promises Made in 2023

Cisco Announces Cisco Identity Intelligence, Infusing Identity into Cisco Security Cloud

AI Reskilling and the Intersection of Society and Technology

The Role of Data Loss Prevention Tools in Protecting Against AI Data Exfiltration

5 Top Enterprise Risk Management Trends We’re Tracking in 2024

Webex Contact Center Powered by AI Designed for Business Optimization – the Challenge is Awareness

6 Cloud Security Trends We're Watching in 2024

6 Cloud Security Trends We’re Watching in 2024

5 Network Security Predictions for 2024

HPE and Juniper Networks and a $14B Price Tag: Smart Move or Not So Much?
