Front Line Employees Know Service Excellence
I pulled up to the gas station near my home, eager to take advantage of a gas promotion linked to a supermarket chain. With no explanation from the checkout person at the supermarket and no listed...
View ArticleCloud Foundry Open for Business and Commits
Cloud Foundry, the Platform as a Service (PaaS) solution offered by EMC’s newly-minted Pivotal Initiative, opened itself this week to clients and the open source community. The Pivotal Initiative will...
View ArticleCool tool update: RVTools 3.5
Yes, there is it is again… an updated version of RVTools. Rob just emailed me and provided me with a nice list of enhancements: RVTools Version 3.5 (March, 2013) On vInfo tabpage new field: Resource...
View ArticleResponding When the Attacker has a Foothold – Part 1
By Tom Chmielarski, RSA Practice Lead, Advanced Cyber Defense Services (Americas) Eventually most people in IT Security will face that dreaded day when they discover the organization has been breached...
View ArticleThe Next Frontier: Solution Engineering – Part II
In my previous blog, I discussed the process for engineering business solutions. This blog will go into more detail on Step 3 of the process: Brainstorming the impact of big data on your key...
View ArticleBackup and ITaaS – Your Business Depends on It
While companies now understand that information drives their business, many have yet to consider the impact backup can have on their bottom line. IT organizations that drive a service-provider...
View ArticleUnify Data Protection Management with DPA 6
Watch this video to learn how EMC Data Protection Advisor (DPA) 6 can help accelerate transformation and read the post to learn how DPA can help you improve your backup visibility. Update your feed...
View ArticleBackup and ITaaS – Your Business Depends on It
Stephen Manley, Chief Technology Officer, EMC Backup Recovery Systems Division While companies now understand that information drives their business, many have yet to consider the impact backup can...
View ArticleBYOD: Bring Your Own . . . Disaster?
While the “Bring Your Own Device” phenomenon seems to be gathering even more momentum, few organizations seem to be working on the compliance issues that BYOD can create. BYOD is clearly an important...
View ArticleNext Generation Security Operations: Flesh and Blood
Years ago, companies had to worry about the “brick and mortar” threats – physical theft, property destruction, natural disasters. Next, it was the “bits and bytes” threats – intellectual property...
View ArticleFebruary 2013 Roundup
Stay Classy, San Diego! What was popular in February, now a few days late? If you missed RSA Conference this year in San Francisco, you missed a conference full of people charged with defense. Forget...
View ArticleThe Shape Of Today's Storage Market
So often, I talk about industry directions and future scenarios. That's to be expected, but my view is built on decent understanding of what the marketplace looks like today. IDC just released their...
View ArticleArticle 23
Three years ago, I posted a description of a representative day in my professional life. I admit that I'd saved that topic for a time when I was feeling uninspired, thinking it wouldn't interest...
View ArticlePlus Ça Change
Three years ago, I posted a description of a representative day in my professional life. I admit that I'd saved that topic for a time when I was feeling uninspired, thinking it wouldn't interest...
View ArticleDouble Whammy: EMC Elect and a New Improved ECN!
Those of you who know me, know I am running the EMC Ask the Expert program. Essentially it’s a series of events on specific technical topics. During EMC Ask the Expert events, subject matter experts...
View ArticleTop 25 bloggers 2013 results are out…
The top 25 bloggers 2013 voting results are out again. This year the competition was insane. With newcomers like Cormac Hogan and Chris Wahl, but also old-timers like Chad Sakac, Scott Lowe, Eric...
View ArticlevChat – Episode 34 – Top Virtualization Blogs 2013
In vChat #34, David, Eric and I are joined with special guest John Troyer to announce the winners of the 2013 Top Virtualization Blogs Voting over at vSphere-Land.com. This year saw more entries and...
View ArticleBeyond the Zero Day: Detecting JVM Drive-bys – Part 1 of 3
By Erik Heuser, RSA Advanced Cyber Defense Services Advisory Practice Consultant With all the recent Java Virtual Machine (JVM)exploits, a lot of attention is being focused on figuring out how best to...
View ArticleCapacity Planning for your Virtual Data Center and Cloud – Part 3
In Part 1 of this series, I spoke about the consequences of insufficient Capacity Planning while setting up a virtualization infrastructure. In Part 2, we looked at how to implement Capacity...
View ArticleModernizing Mainframe Applications – Your Code Will Thank You
It really doesn’t seem so long ago, but the IT world was quite different back when I was studying computer science at Cambridge in the mid-1980s. In those days we didn’t have tablets or laptops let...
View Article