The Security Education Paradox
The history chapter of most computer security courses includes a reference to the Morris Worm, a malicious program written in 1987 by Robert Morris that exploited weaknesses in Internet applications...
View ArticleWant to Solve Traffic Jams and Parking? Technology Can Help!
Driving Along in Your Automobile Do you find the commute to work or to the shops a drag? Research shows that you are not alone – the average US commuter wastes an incredible 42 hours in traffic...
View ArticleAutomate and Protect Your Customers’ AWS Workloads with Cloud Snapshot Manager
With more and more organizations moving workloads to the cloud, especially Amazon Web Services (AWS), a significant new data protection opportunity is opening up for Dell EMC partners. That’s because...
View Article2 Steps for Managing RSA Archer Support Requests
Congratulations, your use case is live! You have successfully automated your business process with RSA Archer. After a team high-five and a few moments of contemplation of your team’s shear...
View ArticleHow to determine a switch's role in a Clos network with MLAG’d leaves
A group of us have been experimenting with IP Fabrics recently and I'm curious to know if anyone has used the following approach or knows of work that accomplishes the same goal in a different way....
View ArticleArchitectural Tenets of Deep Learning
Lately, I have spent large swaths of my time focused around Deep Learning and Neural Networks (either with customers or in our lab). One of the most common questions that I get is around...
View ArticleThe Power of Technology to Transform Human Progress
Digital transformation is on every CEO’s priority list. But can emerging digital technologies benefit more than just businesses, to transform nations and drive real socio-economic change? The answer...
View ArticleIn the Global Video Security Business, Evolving Business Models Deliver Real...
Do you want to know the secret of a successful business relationship? In my book, it’s trust, complementary skills and mutual need/benefit. Both parties need to have skin in the game, play to their...
View ArticleAccelerating Into AI with Machine Learning & Deep Learning
I consistently hear from customers that one of their biggest challenges is how to best manage and learn from the ever-increasing amount of data they collect daily. It’s a significant contributor to...
View ArticleTechnology Helps Protect Society and Inform Urban Planning
Technology is no longer just a business tool – it is also helping to solve social issues. Take the question of personal and public security, which is a growing concern in today’s world. For example,...
View Article[The Source Podcast] Pizza, Elevators, Data Analytics and Business Opportunity
It all starts with data analytics. The practice of applying modern analytics software tools across data of all types, including unstructured, semi-structured, and structured data; as well as...
View ArticleMegaplus Helps Enable the Next Generation with Dell Vostro
Many Dell EMC partners are winning big with the combination of the Dell Technologies portfolio of products and solutions and the local market expertise they bring. A great example of this is Megaplus....
View ArticleDell EMC Forum: Realize Your Digital Future
Technology is advancing at an exponential rate, changing how we live and work. We’re seeing customers, in every industry, fundamentally rethink their business models. IT is at the heart of this...
View ArticleServer Disaggregation: Sometimes the Sum of the Parts Is Greater Than the...
The notion of “the whole being greater than the sum of its parts” is true for many implementations of technology. Take, for example, hyper-converged infrastructure (HCI) solutions like the Dell EMC...
View ArticleEnvisioning the Future with Titanium Black Partners
The IT industry is one of constant change, perhaps never greater than right now – from sweeping consolidation, to revolutionizing IT infrastructure. Transformation is happening all around us – at Dell...
View ArticleFive Ways to Engage With the Hyper-Connected Customer
Technology is ubiquitous and how it has taken over our lives is astounding. Today, it might be a better idea not to check whether someone is connected, but with how many devices they connect to the...
View ArticleTransforming Security Requires the Right Security Culture
4,000 ransomware attacks per day, almost five times as many attacks on the Internet of Things within only 12 months, and twice the number of DDoS attacks during the same time period: These figures are...
View ArticleOn Being Centered and Creating a Global Women’s Network for our Partners
The mission of the Dell EMC Network of Extraordinary Women is to support and empower women of the channel through networking, tools, resources and community. This initiative works in collaboration...
View ArticleMetLife Stadium Takes Their Competitive Edge from the Field to the Data Center
Pro athletes aren’t the only ones at MetLife Stadium working on their competitive edge. There’s much more to a successful fan experience than what’s happening on the field. Let’s take a look beyond...
View ArticleThe Security Education Paradox
The history chapter of most computer security courses includes a reference to the Morris Worm, a malicious program written in 1987 by Robert Morris that exploited weaknesses in Internet applications...
View Article