2015 RSA Archer GRC Award Submissions Now Open
Your patience has been appreciated, and we know you have great Use Cases to share, so don't delay or hesitate .. we want to hear from you.The 2015 GRC Archer Awards is now officially open and will...
View ArticleAll About Concourse For Continuous Integration
This week we take a look at Continuous Integration tooling, with a particular focus on the Concourse open source project. We will review the key design principals behind this software that makes it so...
View ArticleIDaaS in a Hybrid Computing World – Deployment Flexibility Required!!
As many enterprise decisions makers would like to leverage the cloud as much and as quickly possible, we must face the reality that we live in a world where most organizations will continue to have...
View ArticleApp Owners and Backup Admins Can Simplify Their Data Centers and Lives
When application owners and backup administrators have conflicting priorities, it can be difficult to run an efficient data center. Technical limitations of the past forced application owners to rely...
View ArticleThe Changing Mobile Worker: Balancing Productivity and Security
As an IT veteran, I have observed and helped drive tremendous change, not just in the technologies we use but how we use them. Among the more dramatic shifts has been the definition of being a mobile...
View ArticleBuilding a Software Defined Data Center: Automation, Orchestration and Agility
Despite the emergence of IT as a Service and the rise of self-service catalogues, most IT operations—including EMC’s—have remained largely manual when it comes to filling users’ requests for...
View ArticleReady, Aim, Cloud
When it comes to the cloud for content management, it is no longer enough for IT leads to search for capabilities alone. The digital enterprise must also consider how delivery of content management as...
View ArticleWhy Purpose-Built Storage Still Rules Over “Unified Storage”: How ScaleIO...
Collectively it’s clear that we’ve all had it with the cost of storage, particularly the cost to maintain and operate storage systems. The problem is that data requirements, both in terms of capacity...
View ArticleMoving Towards an Information Model for Capital Projects
My first job was as a software developer in a major Spanish EPC company. I was hired to develop a search engine able to query the myriad of different systems and in-house applications available in the...
View ArticleBi Modal IT: Escaping the Timid Middle
Dave Shepherd In my last post I talked about the need for careful, fact-based planning in assessing and delivering a digital transformation strategy and roadmap. I’d like to talk more about the...
View ArticleAre Cybersecurity Enhancements Drowning in the New Rec Center?
The trusty Jansport you’ve used for years is dilapidated and it’s time to replace those three ring binders. Paper supplies to fresh bedding are filling up the trunk. Let’s not forget the full size...
View ArticleHow to Succeed with Big Data
In the past year, my Big Data journey has evolved into a successful, revenue-generating, innovation-enabling solution. How did I get here and what recommendations can I offer? First, properly set...
View ArticleBack That SaaS Up Music Video Premiere: Lil’Cloud & Admin Funky Cheez Lay...
Spanning has been fighting the good fight to educate cloud application users on the importance of SaaS data protection for five years now. But now, two new SaaS data protection soldiers are on the...
View Articlesslip.io: A Valid SSL Certificate for Every IP Address
[Update 2015-09-08: The key for the sslip.io domain has been revoked, which means that the service is no longer usable; however, the engineering behind sslip.io is still sound, and may be of interest...
View ArticleSpotting an Attacker’s “Tell” Through Data Analysis – Part 2
In part 1 of this 2 part blog series, we took a look how data analysis could be used to spot an attacker’s “tell.” An attacker will, at some point, give away their malicious movement, and if the...
View ArticleEMC Ireland reaches over 1000 students through Junior Achievement
The 2014-2015 school year proved to be very successful for collaboration between EMC Ireland COE and Junior Achievement. 45 EMC volunteers inspired and motivated 1036 students in 22 local schools....
View ArticleAnother day. Another Ransomware.
TeslaCrypt is a ransomware trojan that targets computers with user data and specific computer games installed. Once the system is infected, the malware searches for various file types related to...
View ArticleWhy There’s More to Flash than Speed and Performance
Flash storage is rapidly becoming a mainstream technology. So much so that Gartner analysts predict one in four data centers will move all of their primary data over to flash within the next five...
View ArticleJuggling Traditional and Experimental IT to Support the Software-driven Business
Dinko Eror Businesses are entering the ring of IT disruption. To support the growing demand from consumers that rely on new digital technologies and innovations, orgnisations are having to change to a...
View ArticleE1: Enter the Maestro – The Cat Prowls
Now let me welcome everybody to the wild, wild West A state that’s untouchable like Eliot Ness Marty paused and leaned back in his chair. He closed his eyes, wondering how long he had stared at his...
View Article