Systems Thinking Application To Security and Safety
One of the invited papers at the ACSAC conference in New Orleans last week was by Dr. Nancy Leveson on “Applying Systems Thinking to Security and Safety”. I had arrived in New Orleans very late the...
View ArticleThe Art of Possible: Embracing the Third Platform
By Vic Bhagat — Chief Information Officer As IT professionals, we have never been strangers to change. New technologies have come and gone…some minor, some quite disruptive. However, the Third...
View Article3 Events That Test Customer Service Standards
It’s been a big month at the Matson household. In early November, we welcomed our second child, Caroline. A few days later, our washing machine broke. Good timing considering that we had guests...
View ArticleHigh Impact Entrepreneurial Innovation Starts Here
Sheryl Chamberlain Senior Director, Office of the CTO The official starting point of the Boston Marathon, the oldest Marathon in the world, is Hopkinton, MA where EMC’s corporate headquarters also...
View ArticleThe Big Data Filter
Any organisation must align itself with its external environment (customers, competition,, economic conditions, etc.). To do this it must understand that overarching concept whilst understanding...
View ArticleDon’t Fear Big Data: Leverage the Right People and Take It Easy
By KK Krishnakumar — Vice President and Chief IT Architect For many companies, the Big Data frontier, while promising, is fraught with pitfalls. Like any other new and powerful business tool, Big...
View ArticleBig Data Architectures – NoSQL Use Cases for Graph Databases
Again, regarding NoSQL databases: when would we use this? This post will be about the standard use cases for “graph databases,” building on my last blog post which was on “key value stores.”...
View ArticleWhy Standards matters
Do we really need standards in infrastructure? Mandelbrot by Frax for iPad Since a couple of years I have discussions with CIO`and other technology employees in global companies around standards. In...
View ArticleVNX and vSphere update important VAAI XCOPY changes
For all VNX gen 1 customers (VNX 5100, 5300, 5500, 5700, 7500 running Elias and Inyo code bases) I’m very happy to note that we’ve issued a large update that back-ports a set of fixes that are already...
View ArticleNew CISOs Top 3 Strategies for Success
The true story of a CISO in trouble At the conclusion of his first year running a security team; a team which he inherited as a new responsibility through a company merger, my client, Rick, was...
View ArticleAn Evil Hacker’s Letter to Santa
By John McCumber, Federal Technologist, RSA, the Security Division of EMC When Santa received the letter below, he was taken aback. Did this miscreant really think Kris Kringle would go against his...
View ArticleRevolution Analytics Boosts the Adoption of R in the Enterprise
The path to competitive advantage is being able to make predictions from Big Data. Therefore, the more you can build predictive analytics into your business processes, the more successful your...
View ArticleWhat’s the NEXT BIG THING?
When I meet with customers, I’m often asked this question. As the CTO of EMC Managed Services, I cross paths with some of the most intriguing engineering minds in the industry right here within EMC....
View ArticleThe Day Is Coming, Are You Ready?
This is the first in a 2 part series. With Windows XP coming to end of support, it is important for organizations to understand the effort to make the move to another platform. I will discuss some...
View ArticleProtecting Yourself As a Data Breach Target
The big news of the day is the reported data breach at Target where 40 million credit cards may have been compromised – reportedly gaining access to magnetic strip data. There seems to be a new story...
View ArticleBig Data and The Balanced Scorecard Framework – Part III
This is Part 3 of a 3-Part series on using the Balanced Scorecard methodology to help organizations identify where and how to start their big data journeys. The first part covered an introduction of...
View ArticleTech Prediction for 2014: SDx (Software-Defined Everything)
Amitabh Srivastava predicts that in 2014 the IT industry will accept software-defined definitions, real software-defined products will emerge, and IT and service prodivers will move toward a...
View ArticleTech Prediction for 2014: A Battle Cry for Protected Storage
Stephen Manley predicts that in 2014 customers will evaluate storage on how cost effectively their IT architectures deliver to their applciation SLOs across availability, performance, and protection.
View ArticleTech Prediction for 2014: Software-Defined in Two Architectures
Josh Kahn predicts that in 2014 we will see proprietary implementations of storage policy descriptors with increasing traction towards industry standards.
View ArticleTech Predictions for 2014: Bringing Hadoop to Your Big Data
Bill Richter predicts that in 2014 IT organizations will step up their efforts to identify ways to leverage Hadoop so they can transform their data faster.
View Article