Quantcast
Browsing all 8970 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Privacy: THE HOT TOPIC at #RSAC

Data privacy dominated the discourse at RSA Conference last week, unlike any hot-topic of years past. If you’re fascinated by this debate, as I am, and missed-out on some or all of RSAC this year,...

View Article


Image may be NSFW.
Clik here to view.

Quantum Leap: 2016 Is The Year Of All Flash In Primary Storage

Yesterday in London our market leading flash storage portfolio took a Quantum Leap forward! First, we announced a major update to our flagship high-end storage array – the VMAX All Flash – setting a...

View Article


Image may be NSFW.
Clik here to view.

Where Are the Savings and Benefits Delivered by Hybrid Cloud?

Cloud computing is undoubtedly gaining momentum across businesses of all sizes due to its compelling promise to deliver business agility and cost savings.   You might ask, “How much and where will I...

View Article

Image may be NSFW.
Clik here to view.

Encouraging Women to Excel

March 8th is International Women’s Day – a day when the global community recognizes the vital contributions women make to economics, politics, and culture. Under the theme of “Pledge for Parity,”...

View Article

Image may be NSFW.
Clik here to view.

5 Quick Tips for an Effective Virtual Learning Experience

“Digital Transformation” has become firmly established in the Learning Industry for some time now. Over the last couple of years, the addition of eLearning solutions have enhanced the traditional...

View Article


Image may be NSFW.
Clik here to view.

A Tale of One Password and Unhappily Ever After for Retailers

Do you recycle? I’m not talking here about paper, glass and aluminum waste. I mean online passwords.  For most consumers, password recycling is a given which exposes them to a wide variety of other...

View Article

Image may be NSFW.
Clik here to view.

Flash is Great, But Is Your Business Transformation at Risk?

Two weeks ago, we declared 2016 “The Year of All Flash in Primary Storage” and made some big bets with our product portfolio. Flash is revolutionizing the data center and empowering businesses to do...

View Article

Image may be NSFW.
Clik here to view.

Using Analytics to Understand and Improve User Adoption

Why are adoption rates for some enterprise applications below expectations? And what can be done about it? Long-time EMC partner Reveille Software is on a mission to help organizations answer those...

View Article


Image may be NSFW.
Clik here to view.

Best Places to Start in IT Transformation – What CIOs Are Telling Us

Part 1 in our global analysis of IT transformation To create the IT organization that will support a modern, digital business, IT organizations are examining their infrastructure, operating model, and...

View Article


Image may be NSFW.
Clik here to view.

E6 – Ghost in the Machine – Phantom Tracks

The Ghost exited the massive wagon nodding at the Guard as he passed. His trips to the wagon had been spaced out such that he knew each Guard had only seen him minimally. Once he had figured out the...

View Article

Image may be NSFW.
Clik here to view.

The State of IT Transformation: An Analysis of EMC and VMware Customers

Today, EMC releases the State of IT Transformation – the results of an analysis of more than 660 Transformation Workshops we’ve conducted with CIOs and their direct reports.  These global...

View Article

Image may be NSFW.
Clik here to view.

It’s Time for Real-Time Analytics

Particularly in highly regulated industries such as Financial Services and Healthcare, there is strong demand for real-time analytics over both structured and unstructured data. For clarity purposes,...

View Article

Image may be NSFW.
Clik here to view.

Improving Forensic Visibility Throughout a Complex Network

Being able to determine how an intruder evaded security measures is something every organization should be concerned with. Companies spend millions of dollars on security, and when there’s a breach,...

View Article


Image may be NSFW.
Clik here to view.

Perfectly Placed for a Federation Transformation – Divide & Conquer

In my last post I discussed how the CIO has multiple influencing factors / forces to compete with in their daily lives and how remaining focused on the core objectives of reducing cost, increasing...

View Article

Image may be NSFW.
Clik here to view.

Why Marketing, HR and Finance Should Have a Bigger Say in Your IDaaS Strategy...

My colleague Darren Platt recently weighed in on the undeniable upward trend of organizations moving toward Identity as a Service, or IDaaS. While only 15% of organizations report having a cloud-based...

View Article


Image may be NSFW.
Clik here to view.

How Many of Your Customers Can Afford to Miss Protection SLAs?

We know you have only one answer to that question... No customer can afford to miss strict protection service-level agreements (SLAs) on mission critical applications. Missed SLAs—including Recovery...

View Article

Image may be NSFW.
Clik here to view.

Archer Content Library Updates: Q1-2016

Hello everybody! March is a notoriously unpredictable weather month here in the midwest. Many times we've been tricked into thinking an early Spring is upon us only to get hit with a frigid snowy...

View Article


Image may be NSFW.
Clik here to view.

Doing The Math To Shatter Cloud Computing Myths

The mathematics behind cloud computing is quickly proving that Software-as-a-Service (SaaS) is a winner, especially as organizations embark on their digital journeys. By mathematics, I mean the...

View Article

Image may be NSFW.
Clik here to view.

Customer Loyalty: The Big Data Disintermediation Cure

I recently wrote about the two D’s of Big Data: Disintermediation and Disruption. As I stated in that blog: Across multiple industries, startups are coupling new big data technologies and new sources...

View Article

Image may be NSFW.
Clik here to view.

Ransomware: The New Cyber Kryptonite

And then, there was irony. While Apple has been able to hold out against the FBI demanding it produce a backdoor into the iPhone used in the recent San Bernardino attack, it was unable to render a...

View Article
Browsing all 8970 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>