Quantcast
Channel: Blog | Dell
Browsing all 8963 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Software Defined Storage articles to read…

Last week there was a floodstorm of articles published around Software Defined Storage, and of course there was the SDS Tweetstorm caused by the NetApp chat (find a summary here and here). One thing...

View Article


Image may be NSFW.
Clik here to view.

Reminder: Free Kindle copy of vSphere 5 and 4.1 Clustering Deepdive

Just a reminder, if you want your free Kindle copy of the vSphere 5.0 Clustering Deepdive or the vSphere 4.1 HA and DRS Deepdive, make sure to check Amazon (US Kindle Store) today and tomorrow...

View Article


Image may be NSFW.
Clik here to view.

The Next Step in the Evolution of Big Data – Visualization

Pushpa Chandrashekaraiah, Principal Product Manager, RSA Silver Tail, RSA The Security Division of EMC Big data has evolved significantly over the last few years. One of the main drivers of this...

View Article

Image may be NSFW.
Clik here to view.

The Changing Landscape of DDoS ….

By Beth O’Brien, Senior Product Marketing Manager Gartner Research Vice President and Distinguished Analyst Avivah Litan recently blogged about DDoS business logic attacks against online ticket...

View Article

Image may be NSFW.
Clik here to view.

Battling Business Logic Abuse

By Jesse McKenna, Threat Researcher, RSA, The Security Division of EMC A couple months back, one of our customers – a very popular PC manufacturer – approached us because they noticed a dip in their...

View Article


Image may be NSFW.
Clik here to view.

Spotlighting Web Session Threats and Abuse with RSA Silver Tail 4.0 – Podcast...

With cyber criminals bent on exploiting online banking, retail and consumer-facing web sites, different behaviors and techniques have emerged that fall outside typical fraudster attack methods. And...

View Article

Image may be NSFW.
Clik here to view.

Why EMC VNX for Microsoft Exchange, SQL, SharePoint

We’re having a great week so far in New Orleans at Microsoft TechEd 2013! Yesterday I had a chance to record a couple videos including this one which describes why customers are using VNX for...

View Article

Image may be NSFW.
Clik here to view.

How Does Your (Big Data) Garden Grow?

Gardens are wonderful things. Building one can be an inordinate amount of work up front: finding space, prepping the soil, etc. You plant your seeds, and they hopefully sprout. You obsessively tend...

View Article


Image may be NSFW.
Clik here to view.

The Mechanics Of Corporate Blogging

I get a lot of questions on "how do you do this blogging thing?". I guess it must appear to be pretty difficult. Really, it's not all that hard when you break it down into pieces. There's the creative...

View Article


Image may be NSFW.
Clik here to view.

Groove Theory of GRC – Postulate #4: The Wall of Sound

I have spent that last few weeks wandering through my “Groove Theory of GRC” and am reaching my last postulate. GRC is a groove that underpins the business to optimize decisions and provides the...

View Article

Image may be NSFW.
Clik here to view.

Why IT Should Be Shamelessly Exploiting Big Data Analytics

The pattern is familiar: take any critical business question, and use big data analytics to come up with better predictive models. The effect seems near-universal across a dizzying array of...

View Article

Image may be NSFW.
Clik here to view.

Going To The Hadoop Summit? We'd Love To Chat …

It hasn't taken long for Hadoop to be added to the long list of workloads that IT groups are now potentially responsible for. While not as ubiquitous as, say, Microsoft Exchange, you can start to see...

View Article

Image may be NSFW.
Clik here to view.

See you at VMworld 2013 San Francisco and Barcelona!

I just received the news that I have sessions accepted for both VMworld 2013 San Francisco and Barcelona. Session ID: BCO4872 Speakers: Lee Dilworth, Duncan Epping Session Title: Operating and...

View Article


Image may be NSFW.
Clik here to view.

Action Plan for Small Enterprises

In my last blog we created a security baseline to help organizations adequately protect sensitive data. While this series has been focused on guidance for smaller companies, the basic principles can...

View Article

Image may be NSFW.
Clik here to view.

2013 RSA Archer Summit

The 10th RSA Archer GRC Summit is rapidly approaching, and I would like to take a moment to share some details with you about what is expected to be the most robust, exciting and valuable Summit yet....

View Article


Image may be NSFW.
Clik here to view.

The Next Step in the Evolution of Big Data – Visualization

Despite the advances in storage and technologies, leveraging Big Data for business value remains a challenge. Visualization can play a very key role in supporting those seeking answers from Big...

View Article

Image may be NSFW.
Clik here to view.

The Changing Landscape of DDoS ….

Traditional DDoS attacks such as UDP Flood, Syn Flood and ICMP Flood work by exhausting network resources. Today some DDoS attacks (like the one described by Litan or those launched by hacktivists Op...

View Article


Image may be NSFW.
Clik here to view.

Battling Business Logic Abuse

What makes business logic abuse popular is that generally it is not something that would be detected by a security process or application vulnerability scanning because the website is functioning as...

View Article

Image may be NSFW.
Clik here to view.

Spotlighting Web Session Threats and Abuse with RSA Silver Tail 4.0 – Podcast...

With cyber criminals bent on exploiting online banking, retail and consumer-facing web sites, different behaviors and techniques have emerged that fall outside typical fraudster attack methods. And...

View Article

Image may be NSFW.
Clik here to view.

Groove Theory of GRC – Postulate #4: The Wall of Sound

I have spent that last few weeks wandering through my “Groove Theory of GRC” and am reaching my last postulate. GRC is a groove that underpins the business to optimize decisions and provides the...

View Article
Browsing all 8963 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>