The Security Education Paradox
The history chapter of most computer security courses includes a reference to the Morris Worm, a malicious program written in 1987 by Robert Morris that exploited weaknesses in Internet applications...
View ArticleWant to Solve Traffic Jams and Parking? Technology Can Help!
Driving Along in Your Automobile Do you find the commute to work or to the shops a drag? Research shows that you are not alone – the average US commuter wastes an incredible 42 hours in traffic...
View ArticleAutomate and Protect Your Customers’ AWS Workloads with Cloud Snapshot Manager
With more and more organizations moving workloads to the cloud, especially Amazon Web Services (AWS), a significant new data protection opportunity is opening up for Dell EMC partners. That’s because...
View ArticleThe Best in Hyper-Converged Infrastructure Just Got Better
One of the more popular misconceptions often mistaken for gospel truth these days is that hyper-converged infrastructure (HCI) platforms don’t scale – and can only be used for remote office or smaller...
View ArticleThe Advantages of IT Transformation: A Video Guide
“Going digital” no longer means building a basic online presence. Now, companies of all sizes are utilizing new technology to create a radically improved customer experience with focus on revenue...
View Article[The Source Podcast] Transforming the Dell EMC Forum in Vancouver with Bryan...
Technology is advancing at an exponential rate, changing how we live and work. Customers in every industry are fundamentally rethinking their business models. IT is the heart of this transformation;...
View ArticleZero Touch Infrastructure Provisioning (ZTIP)
This is part 2 of a multi-part series that describes a “side-project” a small team of us (Jean Pierre (JP), Alan Rajapa and Massarrah Tannous and I) have been working on for the past couple of years....
View ArticleIn the Global Video Security Business, Evolving Business Models Deliver Real...
Do you want to know the secret of a successful business relationship? In my book, it’s trust, complementary skills and mutual need/benefit. Both parties need to have skin in the game, play to their...
View ArticleAccelerating Into AI with Machine Learning & Deep Learning
I consistently hear from customers that one of their biggest challenges is how to best manage and learn from the ever-increasing amount of data they collect daily. It’s a significant contributor to...
View ArticleTechnology Helps Protect Society and Inform Urban Planning
Technology is no longer just a business tool – it is also helping to solve social issues. Take the question of personal and public security, which is a growing concern in today’s world. For example,...
View Article[The Source Podcast] Pizza, Elevators, Data Analytics and Business Opportunity
It all starts with data analytics. The practice of applying modern analytics software tools across data of all types, including unstructured, semi-structured, and structured data; as well as...
View ArticleMegaplus Helps Enable the Next Generation with Dell Vostro
Many Dell EMC partners are winning big with the combination of the Dell Technologies portfolio of products and solutions and the local market expertise they bring. A great example of this is Megaplus....
View ArticleDell EMC Forum: Realize Your Digital Future
Technology is advancing at an exponential rate, changing how we live and work. We’re seeing customers, in every industry, fundamentally rethink their business models. IT is at the heart of this...
View ArticleServer Disaggregation: Sometimes the Sum of the Parts Is Greater Than the...
The notion of “the whole being greater than the sum of its parts” is true for many implementations of technology. Take, for example, hyper-converged infrastructure (HCI) solutions like the Dell EMC...
View ArticleEnvisioning the Future with Titanium Black Partners
The IT industry is one of constant change, perhaps never greater than right now – from sweeping consolidation, to revolutionizing IT infrastructure. Transformation is happening all around us – at Dell...
View ArticleFive Ways to Engage With the Hyper-Connected Customer
Technology is ubiquitous and how it has taken over our lives is astounding. Today, it might be a better idea not to check whether someone is connected, but with how many devices they connect to the...
View ArticleTransforming Security Requires the Right Security Culture
4,000 ransomware attacks per day, almost five times as many attacks on the Internet of Things within only 12 months, and twice the number of DDoS attacks during the same time period: These figures are...
View ArticleOn Being Centered and Creating a Global Women’s Network for our Partners
The mission of the Dell EMC Network of Extraordinary Women is to support and empower women of the channel through networking, tools, resources and community. This initiative works in collaboration...
View ArticleMetLife Stadium Takes Their Competitive Edge from the Field to the Data Center
Pro athletes aren’t the only ones at MetLife Stadium working on their competitive edge. There’s much more to a successful fan experience than what’s happening on the field. Let’s take a look beyond...
View ArticleThe Security Education Paradox
The history chapter of most computer security courses includes a reference to the Morris Worm, a malicious program written in 1987 by Robert Morris that exploited weaknesses in Internet applications...
View Article