Quantcast
Channel: Blog | Dell
Browsing all 17822 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

3 Keys to Securing Health Data

DoD and VA healthcare providers are responsible for managing and protecting some of the most sensitive data, which unfortunately makes them a valuable target for hackers. Patient information often...

View Article


Image may be NSFW.
Clik here to view.

Does DevOps have a “Last Mile” Problem?

Despite the endless amount of commentary on the topic of DevOps, something still seems to be missing. While the ultimate goal of DevOps is speed and agility, the linkage to business strategy is still...

View Article


Image may be NSFW.
Clik here to view.

Destination: Born in the Cloud

“No one understands the cloud. It’s a [BLEEP] mystery.” —Jason Segel Perhaps more than a few of us got a kick out of the trailer from one of this summer’s blockbuster movies. In this clip, the cloud...

View Article

Image may be NSFW.
Clik here to view.

Closing the IT Transformation Gap: Outside Help Can Bridge the Chasm

By Jon Peirce — Senior Vice President, EMC IT Making the transformation from the old, traditional IT world to the new IT as a service (ITaaS) world is about more than technology. It involves the much...

View Article

Image may be NSFW.
Clik here to view.

Turning Hybrid Cloud Conversations into Opportunities

Cloud is born to rule the IT world and it is here to stay for a very long time.  We have heard of the different cloud computing models of public, private and hybrid. However, what are the major...

View Article


Image may be NSFW.
Clik here to view.

Infrastructure Fan-Out

In a previous post I discussed EMC CTO John Roese's use of the phrase application fan-out. His definition describes a common industry trend: a vast array of applications can be placed in an...

View Article

Image may be NSFW.
Clik here to view.

Leveraging the Internet of Things for Fun and Profit

There is no doubt that companies are both bewildered and intrigued by the data spewing off connected devices and the Internet of things (IoT). They are bewildered because the volume and velocity of...

View Article

Image may be NSFW.
Clik here to view.

Introduction to EMC Hybrid Cloud Part 3: Use Cases

In the first blog in this blog series, we talked about what a hybrid cloud is in general (and why customers are interested). In the second blog, we talked specifically about the EMC Hybrid Cloud (EHC)...

View Article


Image may be NSFW.
Clik here to view.

Simple how-to install for Panamax Docker management on OS X

Panamax was released publicly earlier today, and I think it’s a really cool tool for managing, controlling and connecting Docker containers in a simple and efficient way. Panamax uses Docker best...

View Article


Image may be NSFW.
Clik here to view.

The Dragonfly Attack

At the same time that my RSA Research colleagues were uncovering the Boleto fraud in Brazil reported this week, Symantec released a Security Response describing a 2013 cyber-attack on US energy...

View Article

Image may be NSFW.
Clik here to view.

Learning lessons from the BBC’s Black Swan

The BBC’s Digital Media Initiative (DMI) was envisioned not only to replace the old tape-driven system for sharing content, but to transform the whole production process, taking the BBC into the...

View Article

Image may be NSFW.
Clik here to view.

Mobile UX: The Evolution Revolution

You don’t need to teach a child to push harder when confronted with a heavy object. She figures it out. You don’t need to teach a child to pay attention when you shake a rattle. He naturally gets...

View Article

Image may be NSFW.
Clik here to view.

A couple neat observations from 8 weeks of road travel

I’m wrapping up 8 weeks on the road with customers (more than 10 states, Australia, New Zealand, Mexico, France, Germany, Italy, UK) – a ton of amazing conversations, listening and learning. While...

View Article


Image may be NSFW.
Clik here to view.

Data LifeHack: Tips For Minimizing Costs And Maximizing Security

Data LifeHack: Tips For Minimizing Costs And Maximizing Security I was talking with a customer the other day, and he was sharing his tales of woe in regards to trying to become compliant with PCI....

View Article

Image may be NSFW.
Clik here to view.

This. Is. Awesome.

I have to say, firstly as a USER – I’m in love. I LOVE the new Syncplicity iPhone client. It’s so elegant, so smooth, and packs so much into the tiny iPhone UI constraints – it’s art. Watch the video...

View Article


Image may be NSFW.
Clik here to view.

Learning lessons from the BBC’s Black Swan

The BBC’s Digital Media Initiative (DMI) was envisioned not only to replace the old tape-driven system for sharing content, but to transform the whole production process, taking the BBC into the...

View Article

Image may be NSFW.
Clik here to view.

The (In)Security of the IoT

Several announcements in July have focused attention on security vulnerabilities and risks in the Internet of Things. Siemens announced an update to fix vulnerabilities in its SIMATIC automation...

View Article


Image may be NSFW.
Clik here to view.

It All Starts With Visibility

If you can’t see it, you aren’t seeing it. As new security breaches come to light just about every day, nothing could be more obvious to even the casual observer…the security industry has failed you....

View Article

Image may be NSFW.
Clik here to view.

The Price is Right: Predicting Cost of Support Contracts for Complex Products

By Oshry Ben-Harush — Data Scientist Manager, EMC IT One of the challenges hardware (and software) manufacturers are facing is estimating the future level of support required in maintaining their...

View Article

Image may be NSFW.
Clik here to view.

Fanning Back In with SDDC

In my last two posts I mentioned that application fan-out and infrastructure fan-out result in an M-layer stack with a number of possible choices (a0-aN) within each layer. Creating a top-to-bottom...

View Article
Browsing all 17822 articles
Browse latest View live