The Targeted Forensics Series: Confirming Remote Desktop Connections (Part 2)
As an Advisory Consultant for RSA’s Advanced Cyber Defense practice, one of my goals is to get our clients to focus on incident investigation and not just resolution. Of course this is easier said...
View ArticleIT as a Service: What If You Build It and No One Comes?
Jay Snyder Back in November, I hosted an event for EMC customers that we called IT Transformation week. It was actually three one-day conferences held at the Santa Clara Executive Briefing Center in...
View ArticleThree Ways to Improve Efficiency & Productivity With Your Suppliers
As the price of crude oil falls to a five-year low, it’s more critical than ever for owner operators to effectively and systematically manage the collaboration with their suppliers and vendors....
View ArticleOne Customer’s VMAX3 Beta Experience
Interested in hearing about a customer’s experience with VMAX3? Listen to the recording below to hear how VMAX3 is transforming how a Global Insurance Company looks at data storage. Coley Burke,...
View Article3 Steps to Doing Mobile App Testing the Right Way
Most of us now carry the Internet around in our pockets as mobile is rapidly becoming the primary way that we shop, work, play, interact with each other, and everything in between. Mobile does,...
View ArticleGet Back To Where You Once Belonged
In December, EMC launched the Global Data Protection Index (GDPI) which was a survey that interviewed 3,300 end users across the globe. There were many interesting findings, and I encourage you to...
View ArticleRapid ScaleIO Innovation Improves Performance and Ease of Use: New Version...
It’s here! EMC ScaleIO 1.31 is now generally available. You may be wondering about the benefits of this change—specifically, how much performance improvement is gained? This release provides a 2X...
View ArticleThe Weaponized Cyber Attack
Some tech historians point to June 2010 as the time that everything changed. This was the time when Stuxnet hit and reportedly disabled one-fifth of Iran’s nuclear centrifuges. Specifically targeting...
View ArticleMessaging and Careers
I work in EMC's Office of the CTO. As part of this team I have visibility into the technology vision of the Corporate CTO (John Roese). Last year I wrote a series of articles that represented his...
View ArticlePivotal’s Top Predictions for Data Science and Big Data in 2015
In 2015, we can expect to see the data storage and data science landscapes mature, consolidate, break our trust, and surprise us. Last year was a big year for big data, but, in 2015, more enterprises...
View ArticleNew Updates for EMC’s E-Lab Interoperability Navigator!
What if you could access everything you ever needed to know about interoperability, all in one place? Well, the time has come! I recently sat down with Ronald Fenn, Sr. Program Manager and Lead...
View ArticleSchmarzo’s 2015 #BigData Predictions!!
Bill Schmarzo Oh boy, I love this time of year! Lots of candy and cookies to eat, and time to gaze into my crystal ball and, like every other industry “expert”, make outrageous predictions for 2015....
View ArticleOrganizing for the Future: The Information Dilemma – Part 1
As a new year begins, people like me tend to take stock of what they have, get rid of what they don’t need, and organize themselves for the year ahead. Organizations experience this to a lesser...
View ArticleConnect IGA with PAM to Truly Control All Identities and Access
Organizations today are struggling with managing and governing access. Increasing regulations, a heightened threat landscape, insider threats and an explosion in the number and type of users have all...
View ArticleData Lakes Redefine Storage Infrastructure & Hybrid Clouds Come of Age
More than ever, I’m excited by the changes occurring in the IT landscape. This year, I see two major technology inflection points occurring simultaneously: data lakes and hybrid clouds. The reason I...
View ArticleHow To Develop Software Using Only SaaS
The world is fast moving to Software-as-a-Service (SaaS) and we developers are busy learning how to build SaaS applications. We can now finally do that using nothing but SaaS applications ourselves....
View ArticleEMC CTO Office Survey & Giveaway – Make your voice heard!
EMC is always working on cool things. To ensure that our solutions and services are meeting the needs of our customers, we always welcome feedback and gather research from our customers and...
View ArticleHow do you define Security?
When I chose information security as my profession, it was a conscious decision. I felt compelled towards the technology and the fascinating challenge of securing a shifting, metamorphic ecosystem....
View ArticleHow do you define Security?
When I chose information security as my profession, it was a conscious decision. I felt compelled towards the technology and the fascinating challenge of securing a shifting, metamorphic ecosystem....
View ArticleUsing Context to Find the Right Information: The Future of Document...
Last week I shared perspectives about the true definition of a document, but today we move on to consider how market trends are impacting such documents and the future of document management. I begin...
View Article