On Internet Privacy, Consumers Show ‘Split Personalities’
In all the news stories dedicated to the topic of Internet privacy lately, very little consideration has been paid to how consumers actually feel about the risks to their privacy and whether they are...
View ArticleBest Practices for Virtualizing Your Oracle Database – Datastores
By Darryl Smith — Chief Database Architect, EMC IT First off, my apologies for delaying the last part of this four part blog for so long. I have been building a fully automated application platform...
View ArticleMathematical Mission Criticality
Labeling an application as Mission Critical can actually be a contentious activity. Ask any Line of Business for a listing of which apps are mission critical and it is highly likely that the answer...
View ArticleMacBook Air (Mid 2013) Battery Drain – Firmware Update
Here’s an important firmware update (SMC 2.0) for all of you MacBook Air (Mid 2013 model) users out there. Apple have just released an SMC firmware update (2.0) for all mid 2013 MacBook Air models...
View ArticleVMware vSphere 5.5 U1 Hardening Guide Available
The VMware vSphere Hardening Guide is something you should always be familiar with and keep stashed away in your vArmory of useful things. This MS Excel based document/guide contains valuable...
View ArticleRESTBucks Evolved
The book REST in Practice: Hypermedia and Systems Architecture uses an imaginary StarBucks-like company as its running example. I think this is a great example, since most people are familiar with the...
View ArticleThe Road to Data Quality: A Journey You Can’t Afford to Miss
By Barbara Latulippe — Sr. Director, Office of Architecture and Innovation Like most organizations these days, your company has probably realized the crucial role Data Quality plays in driving...
View ArticleIt’s not just Big Data… It’s Gigantic Data: A Telecom Case Study
Okay, here it is. I know you’ve been waiting for this. So without further intro… Business Problem: A global mobile communications service provider wanted to understand customer location and travel...
View ArticleMaking the Shift to Inbound Marketing
“Time and Tide Wait for No Man”… The origins of this phrase date back to at least 1225 AD (ref: The Phrase Finder [www.phrases.org.uk]) yet what does it have to do with shifting your Digital...
View ArticleBreaking new boundaries of Innovation with DSSD
Rarely do you see the kind of excitement around a technology announcement like the DSSD acquisition announced in Joe Tucci’s keynote at EMC World, which begs the question Why is that? Especially since...
View ArticleThe Elephant In the Room: Big Data Privacy Concerns
By now, we’ve all heard the story. Target stores, through their advanced analysis of website activities, determine with some level of confidence that a visitor is a girl and that she’s likely...
View ArticleEMC Storage Simulators for your lab – Free!
Fancy running your own EMC Isilon, VNX, VNXe or ViPR installation in your own lab environment, to try out, trial and/or educate yourself with? If so, you’ve come to the right post! Here I provide...
View ArticleIn the cloud, you are still culpable.
‘You think you can run a data centre better than Amazon, Google and Microsoft can?’ The knock out punch argument from public cloud pushers everywhere. Depending on who you are the answer may be yes or...
View ArticleThe Second Machine Age: 5 Things Our Kids’ Kids Won’t Know about Healthcare
A Jawbone used to be a wearable device for geeks. Walgreens used to be a pharmacy where you went to get your prescriptions. You could only get a prescription after an in-person visit to the doctor. To...
View ArticleVirtual Value Chain of the Music Industry
In my previous blog, I made reference to Jeffrey R. Rayport and John J. Slovakia and their discussion of Exploiting the Virtual Value Chain. In their article, they defined three areas in which data...
View ArticleChallenging the Paradoxes of Online Privacy
EMC has just announced the results of research into the attitudes of consumers around the world towards privacy, particularly in terms of the often conflicting requirements of online convenience and...
View ArticleThe dread risk.
Two posts in a day. It’s like the fires of blogging have been rekindled. (Not really) Some Twittering going on about protecting against insider threats in lieu of what happened with Code Spaces, but...
View ArticleYou are ancient history.
An article over the Register paints storage folks as the Mainframe Admins of the cloudy future. At the end of this decade when some cloud company says their glorified DAS can do xyz, you’ll be able to...
View ArticleAugmenting Backup and Recovery with RecoverPoint Local
Today I want to talk about augmenting backup and recovery with RecoverPoint Local Continuous Data Protection. As a smart backup and/or storage administrator you have probably already implemented high...
View ArticleCustomer Service Matchmaker – Part 1
Recently, I was watching one of the eHarmony commercials, featuring co-founder and spokesman, Neil Clark Warren. This online dating website aims to match single men and women based on several...
View Article