The Top 10 Blogs of 2013
With 2014 upon us, it’s the perfect time to celebrate what made this year exceptional. Most outstanding are the insights our bloggers had to share across a spectrum of topics surrounding IT...
View ArticleTop 5 Reasons Virtualizing Business Critical Apps Will Accelerate in 2014
As we bid farewell to the end of 2013, our memories of holiday celebrations, in-laws coming over, presents being given, and blog posts that take a look back on the past year,are settling in. I didn’t...
View Article2014 Careers: Stop Playing Chess, Start Playing Risk
The year 2013 was my first full year as an EMC Fellow, and I spent quite a bit of time mentoring some of the top technical global talent within the company. The time span of each mentee engagement...
View ArticleThe right data – and make it fast!
In my previous article I argued that a Big Data Business system is required to “filter out” as much information as possible when running your organisation. But which data is that? I am reading an...
View ArticleHot Topics for 2014
In strictly avoiding making new year’s predictions in this space, in the last few years I have: Spoken with the ghosts of eDiscovery Past, Present and Future (2011) Created a New Year’s Wish List for...
View ArticleThe Decorator Pattern
One design pattern that I don’t see being used very often is Decorator. I’m not sure why this pattern isn’t more popular, as it’s quite handy. The Decorator pattern allows one to add functionality to...
View ArticleMy #BigData iPhone Visions
Maybe it was the chance meeting with Tim Cook, the CEO of Apple, at Starbucks (see photo). Maybe it was the eggnog latte. Maybe it’s the season that brings on visions of sugarplums dancing in my head…...
View ArticleTech Predictions for 2014: Service Orientation, Big Data Lakes, & Security...
In 2014 we will see the acceleration of a redefined role for corporate IT. Business has new alternatives, enabled by ever expanding public cloud and SaaS providers which continues to raise the bar for...
View Article14 Resolutions for the ’14 Revolution
It’s a new year which means it’s time to make some new resolutions. If you are responsible for data protection in your environment, it might also be time for a revolution. Revolution you say? Yes,...
View ArticlePower to the People!
I recently came across a Harvard Business Review blog, The Secret to Delighting Customers. It offers very sensible advice for providing a great customer experience—that the key to delighting customers...
View ArticleHow Product Security Protects & Enables Our Customers to Move the Ball
As a sports fan, I have a tendency to compare sports with my daily job. In the case of American football (apologies to readers who don’t follow), I always compare the role of the offensive line in...
View ArticleCloud Foundry in the Analytic Stack
In a recent post I discussed the topmost mobile layer of an analytic stack and how it can relate (securely) to the bottom-most layer of an IT infrastructure. The value proposition of Pivotal is its...
View ArticleBusiness Analytics: Moving From Descriptive To Predictive Analytics
I recently met with two organizations that had very impressive business intelligence (BI) implementations. However, they struggled to understand how predictive analytics could augment their existing...
View ArticleSmart Grid Architecture
In the ramp-up to the European Smart Grid project that I’ve mentioned in a number of earlier blogs, I often find myself paying particular attention to the security implications of energy-related...
View ArticleValue trumps vendor Olympics for SAP HANA!
I often ponder why clients, partners and internal EMCers often ask us what SAP HANA infrastructure (Appliances) we can provide for a said SAP HANA project. Many of us jump straight into the speeds and...
View ArticleThe EMC Durham Cloud Data Center Migration: Inventing a Better Way
By Stephen Doherty, Consultant IT Project Manager In my last post, (click here to read Part 5) I explained how we set up a Symmetrix Remote Data Facility (SRDF) bridge between our old and new...
View ArticleVMware PEX 2014: TOP SECRET EMC Bootcamp
It’s locked and loaded – the EMC PEX Bootcamp is on 8:30 to 4:30 Monday Feb 10th. The session number for the boot camp is : 3579-SPO. The PEX agenda builder is not going to go live for another week,...
View ArticleXmas gift from xMS!
Recently there is a set of white papers released for xMS 1.1 xMS is an utility that automates the creation and provisioning of Documentum environments on to the target infrastructure. The...
View ArticleWhat Type of IT Services Should I or Can I Offer?
Welcome to 2014 and wishing you good health and happiness! This is Part II of my Cloud Implementation Guide series. Be sure to read Part I where we discussed the implementation of the Self Service...
View Article2014 Careers: The Invisible Executive
I've been looking back at some of my mentoring engagements from 2013 and writing a few posts to summarize key insights. In my last post I encouraged readers to learn a new skill and take a risk from a...
View Article