3 Keys to Securing Health Data
DoD and VA healthcare providers are responsible for managing and protecting some of the most sensitive data, which unfortunately makes them a valuable target for hackers. Patient information often...
View ArticleDoes DevOps have a “Last Mile” Problem?
Despite the endless amount of commentary on the topic of DevOps, something still seems to be missing. While the ultimate goal of DevOps is speed and agility, the linkage to business strategy is still...
View ArticleDestination: Born in the Cloud
“No one understands the cloud. It’s a [BLEEP] mystery.” —Jason Segel Perhaps more than a few of us got a kick out of the trailer from one of this summer’s blockbuster movies. In this clip, the cloud...
View ArticleClosing the IT Transformation Gap: Outside Help Can Bridge the Chasm
By Jon Peirce — Senior Vice President, EMC IT Making the transformation from the old, traditional IT world to the new IT as a service (ITaaS) world is about more than technology. It involves the much...
View ArticleTurning Hybrid Cloud Conversations into Opportunities
Cloud is born to rule the IT world and it is here to stay for a very long time. We have heard of the different cloud computing models of public, private and hybrid. However, what are the major...
View ArticleInfrastructure Fan-Out
In a previous post I discussed EMC CTO John Roese's use of the phrase application fan-out. His definition describes a common industry trend: a vast array of applications can be placed in an...
View ArticleLeveraging the Internet of Things for Fun and Profit
There is no doubt that companies are both bewildered and intrigued by the data spewing off connected devices and the Internet of things (IoT). They are bewildered because the volume and velocity of...
View ArticleIntroduction to EMC Hybrid Cloud Part 3: Use Cases
In the first blog in this blog series, we talked about what a hybrid cloud is in general (and why customers are interested). In the second blog, we talked specifically about the EMC Hybrid Cloud (EHC)...
View ArticleSimple how-to install for Panamax Docker management on OS X
Panamax was released publicly earlier today, and I think it’s a really cool tool for managing, controlling and connecting Docker containers in a simple and efficient way. Panamax uses Docker best...
View ArticleThe Dragonfly Attack
At the same time that my RSA Research colleagues were uncovering the Boleto fraud in Brazil reported this week, Symantec released a Security Response describing a 2013 cyber-attack on US energy...
View ArticleLearning lessons from the BBC’s Black Swan
The BBC’s Digital Media Initiative (DMI) was envisioned not only to replace the old tape-driven system for sharing content, but to transform the whole production process, taking the BBC into the...
View ArticleMobile UX: The Evolution Revolution
You don’t need to teach a child to push harder when confronted with a heavy object. She figures it out. You don’t need to teach a child to pay attention when you shake a rattle. He naturally gets...
View ArticleA couple neat observations from 8 weeks of road travel
I’m wrapping up 8 weeks on the road with customers (more than 10 states, Australia, New Zealand, Mexico, France, Germany, Italy, UK) – a ton of amazing conversations, listening and learning. While...
View ArticleData LifeHack: Tips For Minimizing Costs And Maximizing Security
Data LifeHack: Tips For Minimizing Costs And Maximizing Security I was talking with a customer the other day, and he was sharing his tales of woe in regards to trying to become compliant with PCI....
View ArticleThis. Is. Awesome.
I have to say, firstly as a USER – I’m in love. I LOVE the new Syncplicity iPhone client. It’s so elegant, so smooth, and packs so much into the tiny iPhone UI constraints – it’s art. Watch the video...
View ArticleLearning lessons from the BBC’s Black Swan
The BBC’s Digital Media Initiative (DMI) was envisioned not only to replace the old tape-driven system for sharing content, but to transform the whole production process, taking the BBC into the...
View ArticleThe (In)Security of the IoT
Several announcements in July have focused attention on security vulnerabilities and risks in the Internet of Things. Siemens announced an update to fix vulnerabilities in its SIMATIC automation...
View ArticleIt All Starts With Visibility
If you can’t see it, you aren’t seeing it. As new security breaches come to light just about every day, nothing could be more obvious to even the casual observer…the security industry has failed you....
View ArticleThe Price is Right: Predicting Cost of Support Contracts for Complex Products
By Oshry Ben-Harush — Data Scientist Manager, EMC IT One of the challenges hardware (and software) manufacturers are facing is estimating the future level of support required in maintaining their...
View ArticleFanning Back In with SDDC
In my last two posts I mentioned that application fan-out and infrastructure fan-out result in an M-layer stack with a number of possible choices (a0-aN) within each layer. Creating a top-to-bottom...
View Article