The Power of Technology to Transform Human Progress
Digital transformation is on every CEO’s priority list. But can emerging digital technologies benefit more than just businesses, to transform nations and drive real socio-economic change? The answer...
View ArticleIn the Global Video Security Business, Evolving Business Models Deliver Real...
Do you want to know the secret of a successful business relationship? In my book, it’s trust, complementary skills and mutual need/benefit. Both parties need to have skin in the game, play to their...
View ArticleAccelerating Into AI with Machine Learning & Deep Learning
I consistently hear from customers that one of their biggest challenges is how to best manage and learn from the ever-increasing amount of data they collect daily. It’s a significant contributor to...
View ArticleTechnology Helps Protect Society and Inform Urban Planning
Technology is no longer just a business tool – it is also helping to solve social issues. Take the question of personal and public security, which is a growing concern in today’s world. For example,...
View Article[The Source Podcast] Pizza, Elevators, Data Analytics and Business Opportunity
It all starts with data analytics. The practice of applying modern analytics software tools across data of all types, including unstructured, semi-structured, and structured data; as well as...
View ArticleMegaplus Helps Enable the Next Generation with Dell Vostro
Many Dell EMC partners are winning big with the combination of the Dell Technologies portfolio of products and solutions and the local market expertise they bring. A great example of this is Megaplus....
View ArticleDell EMC Forum: Realize Your Digital Future
Technology is advancing at an exponential rate, changing how we live and work. We’re seeing customers, in every industry, fundamentally rethink their business models. IT is at the heart of this...
View ArticleServer Disaggregation: Sometimes the Sum of the Parts Is Greater Than the...
The notion of “the whole being greater than the sum of its parts” is true for many implementations of technology. Take, for example, hyper-converged infrastructure (HCI) solutions like the Dell EMC...
View ArticleEnvisioning the Future with Titanium Black Partners
The IT industry is one of constant change, perhaps never greater than right now – from sweeping consolidation, to revolutionizing IT infrastructure. Transformation is happening all around us – at Dell...
View ArticleFive Ways to Engage With the Hyper-Connected Customer
Technology is ubiquitous and how it has taken over our lives is astounding. Today, it might be a better idea not to check whether someone is connected, but with how many devices they connect to the...
View ArticleTransforming Security Requires the Right Security Culture
4,000 ransomware attacks per day, almost five times as many attacks on the Internet of Things within only 12 months, and twice the number of DDoS attacks during the same time period: These figures are...
View ArticleOn Being Centered and Creating a Global Women’s Network for our Partners
The mission of the Dell EMC Network of Extraordinary Women is to support and empower women of the channel through networking, tools, resources and community. This initiative works in collaboration...
View ArticleMetLife Stadium Takes Their Competitive Edge from the Field to the Data Center
Pro athletes aren’t the only ones at MetLife Stadium working on their competitive edge. There’s much more to a successful fan experience than what’s happening on the field. Let’s take a look beyond...
View ArticleDell EMC Forum: Realize Your Digital Future
Technology is advancing at an exponential rate, changing how we live and work. We’re seeing customers, in every industry, fundamentally rethink their business models. IT is at the heart of this...
View ArticleMonetizing the Internet of Things (IoT)
“Why incur the expense of generating and collecting all of this IoT data if you’re not going to monetize it?” Organizations are racing to embrace the Internet of Things (IoT) as the pundits create...
View ArticleThe Security Education Paradox
The history chapter of most computer security courses includes a reference to the Morris Worm, a malicious program written in 1987 by Robert Morris that exploited weaknesses in Internet applications...
View ArticleWant to Solve Traffic Jams and Parking? Technology Can Help!
Driving Along in Your Automobile Do you find the commute to work or to the shops a drag? Research shows that you are not alone – the average US commuter wastes an incredible 42 hours in traffic...
View ArticleAutomate and Protect Your Customers’ AWS Workloads with Cloud Snapshot Manager
With more and more organizations moving workloads to the cloud, especially Amazon Web Services (AWS), a significant new data protection opportunity is opening up for Dell EMC partners. That’s because...
View ArticleStorage Protocol Stacks for NVMe
With all of the attention that NVMe has been getting recently, I wanted to provide an NVMe specific version of the original Storage Protocol Stacks diagram. Thanks for reading!
View ArticleMidrange Storage – Products, Programs and a Brand New Campaign
It’s been a busy time for us in midrange storage. We’ve enhanced the product portfolio, we’ve introduced an outstanding loyalty program featuring customer guarantees unique to the industry, and we’ll...
View Article