Quantcast
Channel: Blog | Dell
Browsing all 17822 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Reducing the Risk of Fraud in the 3D Secure Ecosystem – The Issuer Perspective

3D Secure is a boon to online retailers who benefit from the shift in chargeback liability to card issuers. Participation in 3D Secure is almost a no-brainer from the merchant perspective in that...

View Article


Image may be NSFW.
Clik here to view.

Live from DockerCon: It’s All About the Containers! Introducing ECS 2.0...

Hello from DockerCon! New today, EMC Elastic Cloud Storage (ECS) 2.0 is now generally available, breaking new ground in Software-Defined Storage with a range of new features and functionality,...

View Article


Image may be NSFW.
Clik here to view.

Voice Your Choice: Announcing 'Archer Community Selects' - Your Opportunity...

With a record number of speaker proposals received for consideration for this year's GRC Summit, the Summit Program Committee will no longer be the lone voice in the final Archer selection...

View Article

Image may be NSFW.
Clik here to view.

Container Persistence Part 1: State of the Art of Object Stores

DockerCon is going on today and tomorrow – and no better time to put out some new great tools for people using Containers. This will be a 3 part post – and timed intentionally with DockerCon.  Why?...

View Article

Image may be NSFW.
Clik here to view.

Why Do Hybrid Flash Arrays Matter?

Let’s face it; the use of flash drives in enterprise class storage arrays is growing at a very healthy rate. This will only accelerate with improvements in flash drive endurance, increase in...

View Article


Image may be NSFW.
Clik here to view.

VMware Support Alert – ALERT: Support for Leap Seconds in VMware Products

In our effort to provide our viewers with up to the minute information on VMware related news and topics, we’re posting the following Special Alert direct from VMware Support Insider....

View Article

Image may be NSFW.
Clik here to view.

VMware Workstation –“The host is currently using the device”

I hit a problem recently in VMware Workstation (v11) where I couldn’t connect a USB storage device to my VM, as it claimed that “The connection for the USB device x  was unsuccessful – The host is...

View Article

Image may be NSFW.
Clik here to view.

VMware KB Digest – New KB articles published for week ending 6/20/15

In our effort to provide our viewers with up to the minute information on VMware related news and topics, we’re posting the following list of new KB Entries for this week, direct from VMware Support....

View Article


Image may be NSFW.
Clik here to view.

California Department of Corrections and Rehabilitation Leads the Way

State Departments of Corrections are often one of the last agencies to receive funding for technology projects. They are running their information systems on older outdated environments and are unable...

View Article


Image may be NSFW.
Clik here to view.

New Cloud Foundry Service Broker Updates

The Cloud Foundry Services team recently discussed the platform’s Service Broker architecture and its new features during a talk at the Cloud Foundry Summit 2015. Pivotal’s David Sabeti and IBM’s...

View Article

Image may be NSFW.
Clik here to view.

Introducing ECS 2.0

ECS (Elastic Cloud Storage) provides a hyperscale, geo-distributed, software-defined cloud storage platform that is perfect for unstructured data, Big Data applications and Data Lakes. Deployed as a...

View Article

Image may be NSFW.
Clik here to view.

Thoughts from 30,000 Feet: Are You Facing These 3 Common IT Transformation...

I spend a lot time in the air traveling to customer meetings around the globe. I hear first-hand about their frustrations and challenges in getting started with IT transformation. They are beyond the...

View Article

Image may be NSFW.
Clik here to view.

Beyond Economic Data Value

Last week I introduced the concept of The Economic Value of Data as part of a keynote speech at EnterConf.  I had submitted the title of my talk during the early stages of the research being conducted...

View Article


Image may be NSFW.
Clik here to view.

Container Persistence Part 2: State of the Art of Transactional Systems

DockerCon is going on today and tomorrow – and no better time to put out some new great tools for people using Containers. This will be a 3 part post – and timed intentionally with DockerCon.  Why?...

View Article

Image may be NSFW.
Clik here to view.

Coachella for IT Professionals – A Review of Cisco Live 2015

Cisco Live 2015 rocked the city of San Diego this year. More than 25,000 people attended Cisco Live in person and over 80,000 joined online. Attendees had the opportunity to immerse themselves in...

View Article


Image may be NSFW.
Clik here to view.

FITARA in the Firing Line

Federal leaders recognize that now, more than ever, effective management and oversight for IT programs is vital for Federal mission success. The Federal IT Acquisition and Reform Act (FITARA) aims to...

View Article

Image may be NSFW.
Clik here to view.

Is Traditional IT Still Relevant?

By Vic Bhagat — EMC Chief Information Officer Traditionally, IT organizations have provided infrastructure and basic support to the business as a monopoly.  We used to think of (and deliver) projects...

View Article


Image may be NSFW.
Clik here to view.

Container Persistence Part 3: Can I have the easy button please?

DockerCon is going on monday/tuesday – and no better time to put out some new great tools for people using Containers. This will be a 3 part post – and timed intentionally with DockerCon.  Why?...

View Article

Image may be NSFW.
Clik here to view.

Banking in the Digital Era –Seamless Content in Omni-Channel (Part 1)

Digital Banking – another buzz word for paperless? Or is digital banking just simply offering electronic banking services on mobile devices with basic transactional banking – viewing...

View Article

Image may be NSFW.
Clik here to view.

Rethinking Our Approach to Security

Companies around the globe are plagued by compromises to their IT assets despite pouring considerable sums of money into their cybersecurity efforts. It’s clear, then, that naively throwing money at...

View Article
Browsing all 17822 articles
Browse latest View live