Quantcast
Channel: Blog | Dell
Browsing all 8970 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Opening your EMC Isilon Service Request: What does Support want to know?

Hello again Support Community! Katie, Shane, and Dave here with some tips, tricks, and gotchas for opening an SR with Support and moving your issue to resolution quickly and accurately.   First off,...

View Article


Image may be NSFW.
Clik here to view.

A Big Leap In Unstructured Data Isilon.Next - Core, to Edge, to Cloud

Do you have an Xbox – 360 or XboxOne?  Do you use XboxLive?   I do – and as an aside, I’m looking forward to a little Rise of Tomb Raider this weekend, along with Fallout 4 until my eyes bleed :-) If...

View Article


Image may be NSFW.
Clik here to view.

Reducing Fraudulent Transactions during the Holiday Shopping Season with...

While it may seem a bit early to be addressing the holiday shopping season, the giant nutcrackers are already towering over the pumpkins at the mall so I figured it was fair game. So what can we...

View Article

Image may be NSFW.
Clik here to view.

Buy My Cloud: On-Boarding Customers to Cloud Offerings, Part 1

Dave Shepherd So you’ve got your nice new cloud offering, in fact you’ve probably got more cloud  offerings than you ever thought possible. What, with secure versions,  multi-tenant, single-tenant,...

View Article

Image may be NSFW.
Clik here to view.

3 Actions You Can Take to Positively Impact Your Customers’ IT Organizations

I think most of us try to make a difference in our customers’ businesses. And, when we understand our customers’ pain points, we are better able to provide solutions that address their needs and...

View Article


Image may be NSFW.
Clik here to view.

Big Data Insights in Healthcare, Part III: Mitigating Challenges to Adoption...

Louis Frolio In 1776, Adam Smith published, “An Inquiry into the Nature and Causes of the Wealth of the Nations” in which he introduced the “invisible hand” concept. Simply stated, Smith believed if...

View Article

Image may be NSFW.
Clik here to view.

Empower IT to Say Yes More Than No

Pity the poor (IAM) administrator in IT. They often have to juggle the needs of multiple constituents and weigh the conflicting demands of users and their network security counterparts. As users...

View Article

Image may be NSFW.
Clik here to view.

Reconstituting Our Software Development Skillset

The digital transformation of our economy is creating many challenges for CIOs and IT organizations. The development of original software at scale is near the top of that list. Over the last 15 years,...

View Article


Image may be NSFW.
Clik here to view.

What Would You Call the Market for Today’s Threat Detection and Response...

What would you call the market for security monitoring solutions that help organizations better detect investigate, and respond to advanced security threats? Five or ten years ago you could certainly...

View Article


Image may be NSFW.
Clik here to view.

Violinists to Biometrics – RSA Charge Outtakes

Actionable intelligence, anomalous patterns, 3rd platform transformation, readied response, mobile proliferation – just some of the thematic vernacular that characterized the hundreds of...

View Article

Image may be NSFW.
Clik here to view.

How to Build a Culture of Innovation: Part 1 – People

Jenny Beazley Technology is transforming the way we do business and the rate of change is accelerating—it took only a few years for half of the U.S. population to adopt smart phones versus nearly 50...

View Article

Image may be NSFW.
Clik here to view.

Thoughts on the Plane from the Cyber Education Conference- and Feeling Energized

I’m fresh off the National Institute for Cyber Education (NICE) Conference 2015, the premier gathering for academics, government and industry to advance cyber education. The mission of the conference...

View Article

Image may be NSFW.
Clik here to view.

It’s Time to Bridge the Identity Infrastructure Chasm

In a previous blog I discussed the importance of not carving a chasm into your identity infrastructure by using different systems for on-premise and cloud-based applications. I’ll continue with that...

View Article


Image may be NSFW.
Clik here to view.

2016 Predictions: Content Gets “Smarter”– Part 1

We live in very exciting times. The world is going digital and digital transformation is at the top of every CEO’s agenda. Perhaps not since the advent of the Internet has technology played such a...

View Article

Image may be NSFW.
Clik here to view.

The Paperless Personnel Proposition

Government Human Resources departments are often called Departments of Personnel.  These departments manage all the information about the employees of the federal, state or local government entity....

View Article


Image may be NSFW.
Clik here to view.

More Than Meets The Eye (Part 2): Solving the Browser Lock Ransom Page

In the original More than Meets the Eye blog, we discussed attackers’ ability to hide in plain sight.  A very successful campaign that utilizes this approach is the fake FBI ransom webpage; a...

View Article

Image may be NSFW.
Clik here to view.

The Cloud: Spot The Difference

  Cloud storage is a bit like air travel.  When flight was new, it made new things possible – distant holidays, global business, year-round seasonal produce.  But it hasn’t replaced every other form...

View Article


Image may be NSFW.
Clik here to view.

E3 – Hordes at the Gate – The Aftermath

Marty walked into the conference room and immediately sensed the buzz and tension.  He knew the debrief of the denial of service attack was going to be a long one but he didn’t anticipate this much...

View Article

Image may be NSFW.
Clik here to view.

Introducing RSA Archer GRC 6 to Our Federal Community

Through the years, as federal information assurance professionals, we’ve seen a lot of adjustments and evolution. We had an arms race in buying newer and better firewalls, more secure networking...

View Article

Image may be NSFW.
Clik here to view.

Spanning Backup for Office 365 Extends Data Protection to Calendars

We are happy to announce that Spanning Backup for Office 365 now protects Calendars in Exchange Online. With today’s announcement , Spanning now provides automated and on-demand backup along with...

View Article
Browsing all 8970 articles
Browse latest View live


Latest Images

<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>