Quantcast
Channel: Blog | Dell
Browsing all 17822 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Systems Thinking Application To Security and Safety

One of the invited papers at the ACSAC conference in New Orleans last week was by Dr. Nancy Leveson on “Applying Systems Thinking to Security and Safety”. I had arrived in New Orleans very late the...

View Article


Image may be NSFW.
Clik here to view.

The Art of Possible: Embracing the Third Platform

By Vic Bhagat — Chief Information Officer As IT professionals, we have never been strangers to change.  New technologies have come and gone…some minor, some quite disruptive.  However, the Third...

View Article


Image may be NSFW.
Clik here to view.

3 Events That Test Customer Service Standards

It’s been a big month at the Matson household. In early November, we welcomed our second child, Caroline. A few days later, our washing machine broke. Good timing considering that we had guests...

View Article

Image may be NSFW.
Clik here to view.

High Impact Entrepreneurial Innovation Starts Here

Sheryl Chamberlain Senior Director, Office of the CTO The official starting point of the Boston Marathon, the oldest Marathon in the world, is Hopkinton, MA where EMC’s corporate headquarters also...

View Article

Image may be NSFW.
Clik here to view.

The Big Data Filter

Any organisation must align itself with its external environment (customers, competition,, economic conditions, etc.). To do this it must understand that overarching concept whilst understanding...

View Article


Image may be NSFW.
Clik here to view.

Don’t Fear Big Data: Leverage the Right People and Take It Easy

By KK Krishnakumar — Vice President and Chief IT Architect   For many companies, the Big Data frontier, while promising, is fraught with pitfalls. Like any other new and powerful business tool, Big...

View Article

Image may be NSFW.
Clik here to view.

Big Data Architectures – NoSQL Use Cases for Graph Databases

Again, regarding NoSQL databases: when would we use this? This post will be about the standard use cases for “graph databases,” building on my last blog post which was on “key value stores.”...

View Article

Image may be NSFW.
Clik here to view.

Why Standards matters

Do we really need standards in infrastructure? Mandelbrot by Frax for iPad Since a couple of years I have discussions with CIO`and other technology employees in global companies around standards. In...

View Article


Image may be NSFW.
Clik here to view.

VNX and vSphere update important VAAI XCOPY changes

For all VNX gen 1 customers (VNX 5100, 5300, 5500, 5700, 7500 running Elias and Inyo code bases) I’m very happy to note that we’ve issued a large update that back-ports a set of fixes that are already...

View Article


Image may be NSFW.
Clik here to view.

New CISOs Top 3 Strategies for Success

The true story of a CISO in trouble At the conclusion of his first year running a security team; a team which he inherited as a new responsibility through a company merger, my client, Rick, was...

View Article

Image may be NSFW.
Clik here to view.

An Evil Hacker’s Letter to Santa

By John McCumber, Federal Technologist, RSA, the Security Division of EMC When Santa received the letter below, he was taken aback.  Did this miscreant really think Kris Kringle would go against his...

View Article

Image may be NSFW.
Clik here to view.

Revolution Analytics Boosts the Adoption of R in the Enterprise

The path to competitive advantage is being able to make predictions from Big Data. Therefore, the more you can build predictive analytics into your business processes, the more successful your...

View Article

Image may be NSFW.
Clik here to view.

What’s the NEXT BIG THING?

When I meet with customers, I’m often asked this question. As the CTO of EMC Managed Services, I cross paths with some of the most intriguing engineering minds in the industry right here within EMC....

View Article


Image may be NSFW.
Clik here to view.

The Day Is Coming, Are You Ready?

This is the first in a 2 part series.  With Windows XP coming to end of support, it is important for organizations to understand the effort to make the move to another platform.  I will discuss some...

View Article

Image may be NSFW.
Clik here to view.

Protecting Yourself As a Data Breach Target

The big news of the day is the reported data breach at Target where 40 million credit cards may have been compromised – reportedly gaining access to magnetic strip data.  There seems to be a new story...

View Article


Image may be NSFW.
Clik here to view.

Big Data and The Balanced Scorecard Framework – Part III

This is Part 3 of a 3-Part series on using the Balanced Scorecard methodology to help organizations identify where and how to start their big data journeys. The first part covered an introduction of...

View Article

Image may be NSFW.
Clik here to view.

Tech Prediction for 2014: SDx (Software-Defined Everything)

Amitabh Srivastava predicts that in 2014 the IT industry will accept software-defined definitions, real software-defined products will emerge, and IT and service prodivers will move toward a...

View Article


Image may be NSFW.
Clik here to view.

Tech Prediction for 2014: A Battle Cry for Protected Storage

Stephen Manley predicts that in 2014 customers will evaluate storage on how cost effectively their IT architectures deliver to their applciation SLOs across availability, performance, and protection.

View Article

Image may be NSFW.
Clik here to view.

Tech Prediction for 2014: Software-Defined in Two Architectures

Josh Kahn predicts that in 2014 we will see proprietary implementations of storage policy descriptors with increasing traction towards industry standards.

View Article

Image may be NSFW.
Clik here to view.

Tech Predictions for 2014: Bringing Hadoop to Your Big Data

Bill Richter predicts that in 2014 IT organizations will step up their efforts to identify ways to leverage Hadoop so they can transform their data faster.

View Article
Browsing all 17822 articles
Browse latest View live