The History of Hadoop: From Small Starts to Big Data
Named after a toy elephant belonging to developer Doug Cutting’s son, over the past decade Hadoop has proven to be the little platform that could. From its humble beginnings as an open source search...
View ArticleEMC Data Protection Advisor For As-A-Service Cloud Environments
What can you do to ensure data protection as you move to cloud? Services-based storage, infrastructure, and data protection trends and technologies are recurring topics in this blog. Awhile back I...
View ArticleWhat Happened This Week On InFocus? Find Out Here
Weekly Wrap Up 3/11 – 3/15 Greetings all! Here’s to hoping this Friday finds you well. In case you missed any of this past week’s InFocus blogs, here are the highlights. This week’s list begins with...
View ArticleHow EMC Views The Evolving Storage Market
A while back, I shared how the industry analyst firm of IDC viewed the storage market. A surprising number of people were interested in what could ostensibly be categorized as a rather boring tech...
View ArticleThis place is Xtrem!!! on so many levels....
I’ve been at EMC for almost 14 years now, and I have to say I Love it!! It’s one of the mostdynamic, energetic and Xtrem places to work. The people I get to interact with… fellow EMCers, customers...
View ArticleSubscribe to the New EMC Web Feeds Today.
Be the first to get the latest EMC information, including news, podcasts, blogs, and more. Update your feed preferences
View ArticleSubscribe to the New EMC Web Feeds Today.
Be the first to get the latest EMC information, including news, podcasts, blogs, and more. Update your feed preferences
View ArticleBook review: Consumption Economics
Consumption Economics, The New Rules of Tech, paints a detailed picture of the future of the technology business, combining vision with practical steps to realize it. Chapter 1, How Good We Had It,...
View ArticleVMworld 2013 – Call for Papers
With VMworld (Americas) 2013 fast approaching at the end of August 2013, VMware have once again calling for session/paper proposals. In recent years it has become increasingly more competitive for...
View ArticleAnalysis Techniques: Responding When the Attacker has a Foothold – Part II
By Tom Chmielarski, RSA Practice Lead, Advanced Cyber Defense Services (Americas) This is the second part in a series: refer to part one for the introduction. This blog series examines response...
View ArticleArchiving: The Secret Sauce to IT Transformation (Part 3)
Lady Backup closes the 3rd part of this series by looking at archiving solution requirements. I’ll frame this in the context of the key archiving benefits discussed in the last blog. One important...
View ArticleLeveraging Big Data To Transform Your Business Model
The North American video game market was in a massive recession in 1985. Revenues that had peaked at $3.2 billion in 1983, fell to $100 million by 1985 (a drop of almost 97 percent). The crash...
View ArticleBig Data: The Future of Massachusetts
Bill Teuber, Vice Chairman A few weeks ago, I had the opportunity to address a group of legislators, public officials, and industry leaders to launch Massachusetts’ inaugural Tech Hub Caucus, led by...
View ArticleBecause the CIO Said So
CIOs are thinking differently these days. Read the blog to find out what IDG found was top of mind for CIOs in 2013,and what your organization's "time to" may say about its IT-as-a-Service (ITaaS)...
View ArticleWhat the 1990s Were Trying to Tell Us: Services Eclipse Products
Right out of college, my first job was in sales at Forrester Research. At the time, the dot-com boom was in full effect and companies everywhere were struggling to navigate the early stages of the...
View ArticleWhen Public Cloud Isn't Cheaper
The economics of various cloud models has been hotly debated back-and-forth for over four years. Are public clouds cheaper? Are private clouds cheaper? Under what circumstances is one form of cloud...
View ArticleVirtualization & Cloud Podcast Directory
Here are a list of popular virtualization, Cloud and tech related podcasts, many of which I try and listen to on a regular basis as they provide an effective way of keeping on top of what it happening...
View ArticleSecure Crypto: “Lucky Thirteen” Attack
By Sean Parkinson, Consultant Software Engineer Once again an attack against TLS has been published and again the attack targets cipher suites that use Cipher Block Chaining (CBC) mode encryption....
View ArticleShadow IT – The Good, the Bad and the Ugly
I wrote last year about how Shadow IT exists in every company at some level, whether or not you want to admit it. These groups often develop out of necessity: IT always needs more funding, the...
View ArticleStartup Intro: SoftNAS
Last week I had a chat with Rick Braddy from SoftNAS. Some of you might know Rick from when he was the CTO of a hosted virtul desktop company called Virtual-Q and others from when he was the CTO of...
View Article