VMware vCenter Server Update 5.5.0a Update Available
VMware have released an update to the vCenter Server 5.5 product. This new release is numbered 5.5.0a and addresses a number of vCenter released bug fixes, predominantly around the area of vCenter...
View ArticleIsrael Is on Track to Have the Highest Rate of M&A since 1994
Matthew Olton talks about why Israel is a hot bed of technology ripe for M&A.
View ArticleEMC ScaleIO – The new kid on the Elastic Converged Storage Block
ScaleIO delivers something that’s all the rage right now, namely a highly scalable storage solution for things like web scale apps, databases and virtual desktops. ScaleIO ECS is software that uses...
View ArticleThe Era of Protecting by Enabling
In today’s era of protecting by enabling, users need a frictionless Ux to reduce the need to seek unauthorized paths which compromise data protection.
View ArticleModernizing Your Data Warehouse Part 2
This is a topic that I wrote about many moons ago, but is one that still comes up time and time again. It is of particular significance to organizations that already have a data warehouse and business...
View ArticleThe Payback from Backup Transformation – Part 1
Lady Backup likes to deal with facts. Instead of giving you generalizations about the benefits of backup transformation, I want to show you the facts - quantifiable facts. In our latest project, EMC...
View ArticleXpect more… Put an "X" on November 14th
14 NOVEMBER 2013 @ 11:00 AM EST/8:00 AM PST (this will be facemelting :-)
View ArticleOne perspective on the Cisco Application Centric Infrastructure launch...
FWIW - a disclaimer: I wouldn't read too much into this blog post. I have perhaps some situational perspective - no more, no less. Today was Cisco's Application Centric Infrastructure (ACI) launch -...
View ArticleThe Era of Protecting By Enabling: Securing Enterprise File Sync
By Dave Martin — Vice President and Chief Security Officer IT managers today are on the forefront of information delivery services. Users are demanding highly available and secure data transfers that...
View ArticleIn Customer Service, One Size Does NOT Fit All
A couple of years ago, EMC introduced its Agile Services model. How has this vision become a reality? In this video blog post, I discuss the model and the importance of understanding the unique needs...
View ArticleVMware Fusion 6.0.2 Update Released
VMware have just released a maintenance update (6.0.2) for their Mac based Fusion product. Although a minor update it does address a number of bug fixes to the recently released Fusion 6.x...
View ArticleThe Payback from Backup Transformation – Part 2
Lady Backup continues with Part 2 in looking at a recent IDC analysis that shows the business benefits from backup transformation with EMC. As we reviewed in Part 1, there is a clear financial benefit...
View ArticleBreaking Down the Barriers to Veteran Hiring
By Dan Dougherty, Vice President, Federal at EMC Corporation Veteran’s Day is the perfect time to think about how we are doing when it comes to veteran unemployment. Back in July I wrote that our...
View ArticleIt’s Time to Get In on the $1.7 Billion Action
The Flash market is going to boom in 2014. IT research and advisory company Gartner estimates that in 2014, Flash will be a $1.7 billion market worldwide. Flash technology has been around for quite...
View ArticleIT Security – Follow the breadcrumb trail – Indicators of compromise in Part 1
IT Security - Follow the breadcrumb trail – Indicators of compromise in Part 1 In a world where we need to be watching or monitoring our networks continuously knowing what to look out for may be just...
View Article“The Strategic CIO”: A Closer Look from EMC CIO Vic Bhagat
Implementing the latest technologies, restructuring service organizations and provisioning, cost savings, and much more are rising enterprise requirements and increasing the demand placed upon IT...
View ArticleWhat Hurts Us Does Make Us Stronger... IT Too
Disasters and extreme circumstances can change our perspective. Hear these IT professionals talk about disaster recovery after Hurricane Sandy.
View ArticlePlanning for Disaster: Not-so-Hastily Defined Network
I gave the closing presentation recently at the Judgement Day 8 cybersecurity conference in Bratislava, Slovakia. It was an interesting forum, with presentations earlier in the day by folks from...
View ArticleData Protection as a Service
Over the last few years, there has been a huge evolution of IT services becoming more and more efficient with things like internal cloud, and deep virtualization of compute, network, and storage....
View ArticleIT Security – Follow the breadcrumb trail – Indicators of compromise in Part 2
In a world where we need to be watching or monitoring our networks continuously knowing what to look out for may be just what we need to help us get started. These important indicators could protect...
View Article