Quantcast
Channel: Blog | Dell
Browsing all 8970 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

E5 – The Flies and the Hornet – Swatting Flies

“How’s it coming?”  Marty entered Erin’s office unannounced.  They had spent so much time shuttling back and forth between his desk and her office that they dropped all formalities and decorum. Erin...

View Article


Image may be NSFW.
Clik here to view.

Data Lake Plumbers: Operationalizing the Data Lake

Bill Schmarzo Many of my blogs promote the business benefits of the data lake, both from a “save me more money” as well as the “make me more money” perspectives. But I fear that I’m making this thing...

View Article


Image may be NSFW.
Clik here to view.

How do I feel about VSAN 6.2? Here you go :-)

Stu and the gang at Wikibon got me on tape, you can see my face, and the unbridled excitement about our next bit of news.   It’s amazing I can contain myself at all :-) For people who like moving...

View Article

Image may be NSFW.
Clik here to view.

Resiliency and The Case For Hybrid Cloud

David Edborg It seems that virtually every organization that I talk to these days is moving something to the cloud; whether it’s lightweight marketing applications, customer-facing transaction...

View Article

Image may be NSFW.
Clik here to view.

Biometrics: A Next-Generation Authentication Mechanism

The days of username and password combinations are coming to an end as next-generation authentication mechanisms come of age. Faced with having to remember old-style credentials for an ever-wider...

View Article


Image may be NSFW.
Clik here to view.

Hybrid Cloud and Digital Transformation – A Perfect Match

As I wrote at the end of last year, hybrid cloud is emerging as a key component in moving forward with digital transformation. Creating flexible, hybrid infrastructures that can connect on-premise...

View Article

Image may be NSFW.
Clik here to view.

Why “Good Enough” Is NOT Good Enough

Earlier this month, while attending a conference, I had some great conversations with EMC channel partners about EMC XtremIO and its application transformation capabilities. Throughout these...

View Article

Image may be NSFW.
Clik here to view.

Threat Detection Benchmark Part 1: Uncovering Threat Vectors

When it comes to securing modern IT environments, your strategy hinges on your ability to detect threats. Unfortunately, organizations often rely on only a few sources of threat detection data to...

View Article


Image may be NSFW.
Clik here to view.

The Wheel of Suffering: Don’t Be a Jerk to Your Future Self

Findings. Defects. Whatever you call them, your organization’s security posture is full of them. At RSA, we use the umbrella term “Issues Management”. So many organizations handle their...

View Article


Image may be NSFW.
Clik here to view.

Improving Speed of Investigation with Automation and Enrichment

It is important for security analysts to have all the details of the incident when investigating. By having the details, a security analyst can improve the speed of investigation but most importantly...

View Article

Image may be NSFW.
Clik here to view.

The Poetry of Microservices

This post is dedicated to she-who-wears-my-code-poet-shirt, my muse, my Valentine, my Angel. My favorite forms of poetry are the sonnet and the haiku. I’ve found their constraints to be helpful in...

View Article

Image may be NSFW.
Clik here to view.

The road for high-quality analytics starts with…high-quality data

The vast majority of enterprises are convinced that big data analytics are an important element of their organisation’s data management and business intelligence programs, yet only 30 percent of them...

View Article

Image may be NSFW.
Clik here to view.

Hybrid Cloud Cookbook: New Role and Skill Requirements

Harri Kallioniemi This is part of the Hybrid Cloud cookbook blog series that touches on the key concepts of building and running true hybrid cloud. By far, the biggest challenge of any Cloud...

View Article


Image may be NSFW.
Clik here to view.

The Financial Fraud Effect of Real-Time Payments

Several weeks ago, I published an article which provided a summary of the Australian Payments Council’s Australian Payments Plan.  This plan is designed as a strategic roadmap for the future of...

View Article

Image may be NSFW.
Clik here to view.

E5 – The Flies and the Hornet – The Hornet’s Sting

The Ghost waited patiently on a hill overlooking the castle and contemplated his last few days.  His journey from the Frontier had been eventful.  Hiding from shadow to shadow, he had traversed the...

View Article


Image may be NSFW.
Clik here to view.

Knowledge Articles in Online Support - New Enhancements

We have  introduced changes to our knowledgebase to improve your overall experience when searching for and viewing Knowledge articles in Online Support.   Key Changes Include:   The user interface...

View Article

Image may be NSFW.
Clik here to view.

VxRail – An Incredible Product at an Incredible Time

Listening to the market, listening to customers, and adapting is important – we all operate in a very competitive market. For any offer – there are the classic “four P’s” that a team needs to...

View Article


Image may be NSFW.
Clik here to view.

VxRail An incredible product at an incredible time.

Warning – this is a doozy of a post.  For those of you that like moving pictures with sound, tune into the launch here.   For those of you that like juicy details and want to invest time to really...

View Article

Image may be NSFW.
Clik here to view.

Driving the Next-Generation Sales Solution on SAP HANA

As EMC IT remains focused on its IT Transformation journey, we continue to take calculated risks in emerging technologies and adopt bleeding-edge solutions — but not without bumps along the way....

View Article

Image may be NSFW.
Clik here to view.

Customer Cyclical Behavioral Analytics

Bill Schmarzo In a recent Big Data Vision Workshop services engagement, our data science team explored a concept that I find very interesting and immensely actionable – uncovering and exploiting...

View Article
Browsing all 8970 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>