Demonstrating the High-Performance Future of Hadoop at Strata
The ten- and hundred-fold gains in productivity, speed, and accessibility that Pivotal HD brings to Hadoop took center stage at an afternoon breakout session at the Strata Conference on Wednesday,...
View ArticleCalling IT Professionals: Addressing the Security Skills Gap
Art Coviello at RSA often refers to the skills gap in the number of Cyber security professionals in his keynotes. A UK National Audit Office report out today quotes it could take “up to 20 years to...
View ArticleCloudy with Restricted Visibility
In my blog Cloud Control to Major Tom I talked about the top five reasons enterprises don’t leverage cloud technology. This month I want to focus on the first bullet on that list: data privacy...
View ArticleIs High Availability Sexy?
The subject of business continuity has grown in appeal for me as my years in IT have grown, especially as I have personally experienced disasters big and small and the need to recover systems and...
View Article3 Lessons from My Son in Navigating the Complex World of Finance and Technology
6 year old becomes youtube star thanks to inspirational speech upon learning how to ride a bike I just came back from a fabulous winter break! For the first time, I was able to take an entire week off...
View ArticleVideo: Engineers Unplugged with Amy Lewis
I recently had the chance to catch up with Amy Lewis (@CommsNinja) at VMware Partner Exchange. Amy heads up a video based initiative called ‘Engineers Unplugged’ which focuses on having informal...
View ArticleVMware Partner Exchange 2013: Partner Showcase – Lumenate
... Update your feed preferences
View ArticleChannel Matters: Meet Anna Dorcey, Our New Americas Channel Marketing Director
Continuing with our Channel Matters Video Blog Series, listen in as Anna Dorcey, Senior Director of Americas Channel Marketing discusses EMC’s Channel Marketing Mix and Fiscal Year 2013 priorities....
View ArticleSubscribe to the New EMC Web Feeds Today.
Be the first to get the latest EMC information, including news, podcasts, blogs, and more. Update your feed preferences
View ArticleBeyond Robust: Resilient IT (Part 2)
Par Botes, Chief Technical Officer, EMC Asia Pacific and Japan In my first post on Resilient IT, I focused on why IT needs to inject random failures into its systems to make them stronger. Now, I...
View ArticleFrom Databases To Dataclouds
I was fortunate to sit through a wonderful, thought-provoking session given by Charles Fan, who is now the SVP of storage, data and applications at VMware. I've known Charles through many roles over...
View ArticleChannel Matters: Meet Anna Dorcey, Our New Americas Channel Marketing Director
Continuing with our Channel Matters Video Blog Series, listen in as Anna Dorcey, Senior Director of Americas Channel Marketing discusses EMC’s Channel Marketing Mix and Fiscal Year 2013 priorities....
View ArticleTransforming India into a Big Data Hub
Rajesh Janey, President, EMC India & SAARC Big Data is a goldmine of opportunity for every country but, it represents probably the biggest opportunity in the history of India. The answer lies in...
View ArticleThe Next Frontier: Solution Engineering – Part I
The trouble with big data is that there is no one single, shiny solution. One can’t just install Hadoop or predictive analytics or an appliance, and say that they have a big data solution. Our...
View ArticleInnovation and the Unexpected
In his introduction to the Innovation Sandbox at RSA Conference, Hugh Thompson remarked on the critical role that small companies have in driving innovation. That’s certainly true and it was great to...
View ArticleMust Have Competencies for Mobile in 2013
It’s no surprise that Mobile is one of the four competencies which will need to be addressed in 2013. I addressed the mobile competencies in some detail in one of my blogs last year so for the sake of...
View ArticleDamned If You Do, Damned If You Don’t
By Sandra Carielli, Senior Product Manager, Access and Data Protection If the user passwords in your organization are compromised, do you: a.) Notify your users and ask them to change their...
View ArticleTransforming Identity Assurance Through Risk-Based Authentication
Risk-based authentication is one of the simplest security technologies to understand while at the same time being one of the most intelligent and adaptable. The concept of risk-based authentication is...
View ArticleThe Three Transformations of ITaaS
Because I work for a technology company, I frequently get asked to present on "the future of the data center". I think the expectation would that I show up and start talking about shiny new...
View Article