Documentum Capital Projects Embraces the Third Platform
Over the past four years, the EMC Documentum Capital Projects solution has evolved from a Documentum system configuration to a fully-fledged industry solution. Two years ago, we introduced Documentum...
View ArticleRansomware Rules for Payment: Do Extortionists Have the Advantage?
When an entire health system fell prey to cybercriminals and medical records were locked up by a ransomware attack in early February, there seemed no choice but to pay the sum demanded in order to...
View ArticleUsing search facets to find what’s there – and what’s not
EMC Support contains a wealth of information about our many products. There are hundreds of thousands of documents, downloads, and other assets available for searching. It can feel like you’re...
View ArticleEncouraging Women to Excel
March 8th is International Women’s Day – a day when the global community recognizes the vital contributions women make to economics, politics, and culture. Under the theme of “Pledge for Parity,”...
View ArticleOptimizing the Modern Data Center: The View from New Big Data Heights
From adapting energy use to maximizing data consolidation, Big Data (BD) analytics has taken the guesswork out of optimizing the modern data center. More than ever, the modern data center is a living,...
View ArticleHappy International Womens Day 2016!
[Warning – this is a non-technical post, but important to me, so hey, here it is. Like all Virtual Geek posts – this is my point of view, not a formal EMC position] One day a year (at a minimum!),...
View ArticleE6 – Ghost in the Machine – Honey, I’m Home
Greg and Marty exited the data center and made a beeline to their cubicles. Their smug looks made it apparent they were up to no good and enjoying it. They had just left their partners in crime – Erin...
View ArticleOperational Forensics and Visibility: It’s About Time
The information security community is well aware of the current state of play between attackers and defenders. Attackers are quick to gain access to enterprise systems and quick to start getting...
View ArticleThe Envelope Please: And the Awards Go to … RSA
What do Leonardo DiCaprio and the teams at RSA have in common? Aside from the obvious — good looks and long, distinguished careers – we share one other important characteristic: We both took home...
View ArticleWhere Are the Savings and Benefits Delivered by Hybrid Cloud?
Cloud computing is undoubtedly gaining momentum across businesses of all sizes due to its compelling promise to deliver business agility and cost savings. You might ask, “How much and where will I...
View ArticleFraud Effects of Real-Time Digital Banking Payments: Is Your Bank Ready?
When was the last time you read a news article about an ‘old school’ brick and mortar bank robbery? Or perhaps even seen a new Hollywood movie about a gang of bank robbers? I suspect the answer...
View ArticleThe Defining Issue of our Time
In his acceptance speech for the Lifetime Achievement Award at RSA Conference, Art Coviello once again, as so many times in the past, showed the exceptional insight and leadership that has been his...
View ArticleReducing The Noise
Today, enterprise infrastructures are borderless and are generating more data than ever. Coupled with the fact that more and more breaches are happening every year, it’s not a matter of “if we get...
View ArticleCan DevOps and Continuous Delivery Work with Commercial Off the Shelf Software?
The short answer is often “Yes”. However, there are limitations and constraints to the level of automation allowed, the return on investing in automation, and influence over the development lifecycle...
View ArticleTransforming Government Operations with Data Lake 2.0 Technologies
At the Cloudera Federal Forum last year, we presented ideas, solutions, and examples of how the IT landscape is constantly changing, and the evolving challenges for Federal agencies to protect their...
View ArticleReal time Analytics for Smart Government Apps
Technology and innovation move at a very fast pace these days. The Smart Cities concepts are already evolving into smart government initiatives where entire states are now moving to provide these...
View ArticleIdentity-Centric Management for Modern IT
In today’s mobile- and cloud-driven IT infrastructure, perimeters have become much harder to define. For this reason, identity management is a key point of control. An integrated user- and...
View ArticleThe Misconceptions and Realities of Data Protection in Cloud-based Office...
Speaking with customers and prospects is the Spanning product team’s number one priority, and we continue to hear some common themes related to SaaS data protection. It’s always nice to see our...
View ArticlePhishing Lives On with New Bait
The saying “Gone Fishing” on the once prosaic signs hanging from rural-based gas stations or car repair shops has evolved to mean something completely different in 2016. While phishing attacks are not...
View ArticleA Strong Start to Awards Season
This time of year, you can’t get away from awards season—you see it on TV with the Grammys and the Oscars, and you also see it across IT with a host of industry awards that kickoff as we get into...
View Article