Quantcast
Channel: Blog | Dell
Browsing all 8961 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The Security Education Paradox

The history chapter of most computer security courses includes a reference to the Morris Worm, a malicious program written in 1987 by Robert Morris that exploited weaknesses in Internet applications...

View Article


Image may be NSFW.
Clik here to view.

Want to Solve Traffic Jams and Parking? Technology Can Help!

Driving Along in Your Automobile Do you find the commute to work or to the shops a drag? Research shows that you are not alone – the average US commuter wastes an incredible 42 hours in traffic...

View Article


Image may be NSFW.
Clik here to view.

Automate and Protect Your Customers’ AWS Workloads with Cloud Snapshot Manager

With more and more organizations moving workloads to the cloud, especially Amazon Web Services (AWS), a significant new data protection opportunity is opening up for Dell EMC partners. That’s because...

View Article

Image may be NSFW.
Clik here to view.

2 Steps for Managing RSA Archer Support Requests

Congratulations, your use case is live! You have successfully automated your business process with RSA Archer. After a team high-five and a few moments of contemplation of your team’s shear...

View Article

Image may be NSFW.
Clik here to view.

How to determine a switch's role in a Clos network with MLAG’d leaves

A group of us have been experimenting with IP Fabrics recently and I'm curious to know if anyone has used the following approach or knows of work that accomplishes the same goal in a different way....

View Article


Image may be NSFW.
Clik here to view.

Architectural Tenets of Deep Learning

Lately, I have spent large swaths of my time focused around Deep Learning and Neural Networks (either with customers or in our lab).   One of the most common questions that I get is around...

View Article

Image may be NSFW.
Clik here to view.

The Power of Technology to Transform Human Progress

Digital transformation is on every CEO’s priority list.  But can emerging digital technologies benefit more than just businesses, to transform nations and drive real socio-economic change? The answer...

View Article

Image may be NSFW.
Clik here to view.

In the Global Video Security Business, Evolving Business Models Deliver Real...

Do you want to know the secret of a successful business relationship? In my book, it’s trust, complementary skills and mutual need/benefit. Both parties need to have skin in the game, play to their...

View Article


Image may be NSFW.
Clik here to view.

Accelerating Into AI with Machine Learning & Deep Learning

I consistently hear from customers that one of their biggest challenges is how to best manage and learn from the ever-increasing amount of data they collect daily. It’s a significant contributor to...

View Article


Image may be NSFW.
Clik here to view.

Technology Helps Protect Society and Inform Urban Planning

Technology is no longer just a business tool – it is also helping to solve social issues. Take the question of personal and public security, which is a growing concern in today’s world.  For example,...

View Article

Image may be NSFW.
Clik here to view.

[The Source Podcast] Pizza, Elevators, Data Analytics and Business Opportunity

It all starts with data analytics.  The practice of applying modern analytics software tools across data of all types, including unstructured, semi-structured, and structured data; as well as...

View Article

Image may be NSFW.
Clik here to view.

Megaplus Helps Enable the Next Generation with Dell Vostro

Many Dell EMC partners are winning big with the combination of the Dell Technologies portfolio of products and solutions and the local market expertise they bring. A great example of this is Megaplus....

View Article

Image may be NSFW.
Clik here to view.

Dell EMC Forum: Realize Your Digital Future

Technology is advancing at an exponential rate, changing how we live and work. We’re seeing customers, in every industry, fundamentally rethink their business models. IT is at the heart of this...

View Article


Image may be NSFW.
Clik here to view.

Server Disaggregation: Sometimes the Sum of the Parts Is Greater Than the...

The notion of “the whole being greater than the sum of its parts” is true for many implementations of technology. Take, for example, hyper-converged infrastructure (HCI) solutions like the Dell EMC...

View Article

Image may be NSFW.
Clik here to view.

Envisioning the Future with Titanium Black Partners

The IT industry is one of constant change, perhaps never greater than right now – from sweeping consolidation, to revolutionizing IT infrastructure. Transformation is happening all around us – at Dell...

View Article


Image may be NSFW.
Clik here to view.

Five Ways to Engage With the Hyper-Connected Customer

Technology is ubiquitous and how it has taken over our lives is astounding. Today, it might be a better idea not to check whether someone is connected, but with how many devices they connect to the...

View Article

Image may be NSFW.
Clik here to view.

Transforming Security Requires the Right Security Culture

4,000 ransomware attacks per day, almost five times as many attacks on the Internet of Things within only 12 months, and twice the number of DDoS attacks during the same time period: These figures are...

View Article


Image may be NSFW.
Clik here to view.

On Being Centered and Creating a Global Women’s Network for our Partners

The mission of the Dell EMC Network of Extraordinary Women is to support and empower women of the channel through networking, tools, resources and community. This initiative works in collaboration...

View Article

Image may be NSFW.
Clik here to view.

MetLife Stadium Takes Their Competitive Edge from the Field to the Data Center

Pro athletes aren’t the only ones at MetLife Stadium working on their competitive edge. There’s much more to a successful fan experience than what’s happening on the field. Let’s take a look beyond...

View Article

Image may be NSFW.
Clik here to view.

The Security Education Paradox

The history chapter of most computer security courses includes a reference to the Morris Worm, a malicious program written in 1987 by Robert Morris that exploited weaknesses in Internet applications...

View Article
Browsing all 8961 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>