Live Webcast: The Data Lake: Empowering Your Data Science Team
Bill Schmarzo Topic: The Data Lake: Empowering Your Data Science Team Date and Time: November 19th, 2015, 10:00am PT / 1:00 Eastern Duration: 60 Minutes Registration: Senturus, Inc. DATA SCIENCE...
View Article7 Lessons Learned During a Large-scale IT Transformation
Mark Smith Sometimes the insight you need to resolve a problem turns out to be right in your own backyard. When EMC IT decided to transform its IT operating model almost two years ago, it made sense...
View ArticleIs It Safe to Store Your Data in the Cloud?
In the late ‘90s, when consumer internet was relatively new, there was a controversy swirling around online commerce: is it safe to use your credit card online? Fast forward to today. Online commerce...
View ArticleState of the Industrial Internet - Part 1
This week I had the opportunity to host a panel on the state of the Industrial Internet at Web Summit. My two panelists were Said Tabet from EMC and Joe Salvo from GE. They are both heavily involved...
View ArticleThe Best Way to Predict the Future is to Create It
In my 20 years of experience in the technology industry, there’s one thing that remains the same – CHANGE. Change can sometimes be daunting, causing fear and uncertainty. It can make you second-guess...
View ArticleYes, You Can Lose Data from Exchange Online
I hear this question a lot – can I really lose data if I’m using Exchange Online (via Office 365)? Doesn't Microsoft protect that data? Well, Microsoft does an AWESOME job protecting the data, for...
View ArticleHow costly is that typo?
Security products are essential for enterprises, vendors and end users to survive the current network environment. Ideally, which security products are to be deployed should depend on the costs and...
View ArticleState of the Industrial Internet - Part II
In my last post from Web Summit I discussed the advances in technology that is enabling the Industrial Internet and the financial benefits. The Industrial Internet will provide quality of life...
View ArticleRising M&A Activity Beckons a Smarter Content Management Strategy
Merger and acquisition activity continues in the Oil & Gas sector, as value investors take advantage of “bargains” to round out portfolios and enter new markets. As noted in Oil and Gas Financial...
View ArticleAnnouncing the RSA Archer Risk Intelligence Index eBook
Today’s business environment is fraught with risk. Economic, technology and market conditions affect organizations on a daily basis. The constantly “changing risk landscape” is a discussion point in...
View ArticleCountdown To Customer Service Excellence
Dave Matson For years I’ve been hearing that the customer experience is the “new marketing.” In other words, with many products and services becoming increasingly commoditized, the service and...
View ArticleImagine no VPN, it isn’t hard if you try! (Part 1)
A transformation is brewing within IT, requiring the strong need to remove all privileges granted to devices for having “corporate network addresses” and demand end-to-end encryption between apps...
View ArticleRSA Archer GRC: Introducing RSA Archer GRC 6 – Leading the Way
We often speak about the rate of change in today’s fast paced business environment and the challenges associated with trying to keep up and adapt. So why does “operating in a reactive mode” keep...
View ArticleWhat’s Your Problem?
Power-searching EMC Online Support Change is seldom easy. Even if the change is for the better… it’s still change. There’s often a learning curve involved. And when the change affects something you...
View ArticleEMC ApplicationXtender Version 8.0 is Now Available!
In my last blog, I was excited to announce EMC’s continued leadership in the latest Gartner Magic Quadrant for Enterprise Content Management. I’m really proud that we’re so consistently recognized for...
View ArticleWhat are NFV and SDN, and why should I care?
Stuart Benington Network functions virtualization (NFV) and software-defined networking (SDN) have emerged into the spotlight for telecom operators and other service providers as they make their...
View ArticleE3 – Hordes at the Gate – The Battle
The Hunter arrived on the wall of the fortress on the frontier out of breath. He had ridden through the night to get to the most active and dangerous part of the assault on the Kingdom’s walls. He...
View ArticleIntroducing RSA Archer GRC 6
We often speak about the rate of change in today’s fast paced business environment and the challenges associated with trying to keep up and adapt. So why does “operating in a reactive mode” keep...
View ArticleSee You at the Summit
Please join EMC and Carahsoft at the EMC Federal Summit, an event focused on cybersecurity, Big Data, Federal Enterprise hybrid cloud, and data protection – November 18 at the JW Marriott in...
View ArticleNew Opportunities to Expand the Data Lake—at the Edge, the Core, and the Cloud
There’s been a lot of talk around the massive growth of unstructured data and how the rise of the 3rd Platform (mobile, cloud, big data, and social) will only accelerate this expansion. The EMC Data...
View Article