Transforming Security for our Next Generation Systems
Cyberattacks on IT assets are reaching new highs. Just when you think you are caught up, another unforeseen attack vector has opened. Look at just about any security architecture – it has been...
View ArticleTranslating Security Leadership into Board Value
CISOs find themselves increasingly engaged directly with their Board and Executives because the Board and Execs see the volume and impact of security incidents increasing. In fact, Oxford Economics...
View ArticleYou Just Started a New Job!
In my last blog "Translating Security Leadership into Board Value" I introduced RSA's most recent Security for Business Innovation Council report along with the concept of Business Driven Security. A...
View Article4 Questions to Ask Before Starting a Data Migration
Data migrations are a pain. There I said it. They’re messy and they keep storage admins up at night. But, they’re also a necessary part of business operations. To realize the value, the performance,...
View ArticleSix Keys to Successful Identity Assurance – Broader Ecosystem
Earlier in this blog series, we discussed anomaly detection and machine learning focusing primarily on examples that included information you could expect to be available from the system that provides...
View ArticleA New IT Operating Model for Converged Infrastructure
Converged infrastructure and hyper-converged infrastructure take away the complexity of IT management, enabling rapid service deployment, and empowering IT to spend more time on innovation and less...
View ArticleHow to get the best lap time
Learn to Drive Imagine the world at 15. You’ve been riding in your parent’s car for years. You’ve been paying very close attention to where your favorite stores are, where your friends live, and the...
View ArticleWhy is Application Modernization So Compelling?
There are 2 key drivers behind application modernization: Reducing Cost & Complexity Increasing Speed & Agility In order to achieve your organizations business goals we will recommend a series...
View ArticleCan’t-Miss Services Topics at Dell EMC World 2017
It’s no secret, digital transformation is happening, and it’s happening fast. To get there efficiently and effectively you need consulting, deployment, support, and training. You need experts in your...
View ArticleHow an Owl Reminded Me Tech isn’t all Buzz Words and Self-driving Cars
My Facebook feed consists of photos of loved ones, and the occasional high school friend I haven’t seen in 20+ years, links to semi-interesting articles about adventure travel (skydiving in Thailand,...
View ArticleCan Design Thinking Unleash Organizational Innovation?
I am so blessed with smart friends, and I am fortunate to count John Morley among that group. John recently introduced me to Stanford’s Design School (d.school). To say I was blown away would be an...
View ArticleChasing the Rabbit: Cybersecurity Through the Camera Lens
Azeem Aleem and Dave Gray Nothing will work if you are not serious about it – Sam Abell This blog is intended to take a different perspective (pun intended) of how we view our security platforms and...
View ArticleBuilding a Foundation for Modern Networking
Some in IT might wince when I say this, having a modern IT network isn’t about the new and the shiny. It’s about the foundational. Before an IT organization can pursue Software Defined Networking,...
View ArticleDell EMC World 2017here we come!
We are 6 days away from getting together at #DellEMCWorld 2017 with 12,000+ of our closest friends, customers, and partners. I love that I can say “don’t just listen to me, here’s what attendees...
View ArticleHow to Bring Order to IoT’s Spaghetti Junction?
When I think about the Industrial Internet of Things (IoT), just like pretty much everyone else, I get excited about its huge potential to transform our world through new efficiencies, reduced risk...
View ArticleDisruption: Game On
Sometimes you lose your entire market share to two plumbers and a hedgehog. In this week’s Trailblazers, Walter Isaacson explores the immersive experiences and unlikely victors of the volatile video...
View ArticleYour Sensitive Data Will Be Shared, So Make Sure It’s Secure
When you think of data breaches, you probably think of anonymous attackers tapping into your secure network via malware and accessing confidential data from afar. But a new Dell survey shows that an...
View ArticleRealizing the Benefits of Digital Transformation
GE, Columbia Sportswear and Chitale Dairy are Redefining Their Businesses In my role leading Dell EMC Services and IT, I talk with customers and IT leaders every day– there is no better way to learn...
View ArticleVirtual Reality: Beyond the Hype and Ready for Business
In recent years, augmented reality (AR) and virtual reality (VR) technologies have operated with a bit of hype—and C-suite skepticism—about their potential business use in practical applications. Of...
View ArticleOne-Two Punch Drives Midrange Storage Momentum
When Dell and EMC merged, our leadership team made an important decision about our midrange portfolio to bring the best products from both companies together, raising some questions in the industry...
View Article