Quantcast
Channel: Blog | Dell
Browsing all 8970 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The Importance of Context in an Incident Response Plan

Effective incident response is essential to minimizing the impact of a security incident and allowing the organization to return to normal operations as soon as possible. To this end, an incident...

View Article


Image may be NSFW.
Clik here to view.

DevOps: Why, What, and How – a FREE MOOC from EMC Education Services

Over the last several years, the phenomenon known as DevOps has been a topic with interest ranging from tepid to hot.  It has a lot of different definitions, has aggregated or spawned a lot of tools,...

View Article


Image may be NSFW.
Clik here to view.

IoT – Chapter I: The Things in the Internet and the connection

Why IoT now ? In the not so young past the miniaturization has cause a variety of new concepts to drive the markets. This was introduced to many markets. In the IT it is called, and was originated,...

View Article

Image may be NSFW.
Clik here to view.

The State of IT Transformation: An Analysis of EMC and VMware Customers

Today, EMC releases the State of IT Transformation – the results of an analysis of more than 660 Transformation Workshops we’ve conducted with CIOs and their direct reports.  These global...

View Article

Image may be NSFW.
Clik here to view.

Driving Transformation with Analytical Insights

The Life Sciences industry is in a state of flux. Against the backdrop of patent losses and pressure to accelerate time-to-market for new medicines, today’s business realities and governmental reform...

View Article


Image may be NSFW.
Clik here to view.

Perfectly Placed for a Federation Transformation – Abstract & Understand

My last 2 posts in this subject have centered on how the CIO has a plethora of competing forces and factors influencing their decisions and how we can help to stem some of this by looking to break the...

View Article

Image may be NSFW.
Clik here to view.

Are you easy to work with?

Recently, I was interviewed by StrataCloud for a white paper BRIDGING THE GAP – Strategies for Cultivating New IT Skills and Transforming to a Services Model on the “skills gap” IT organizations face...

View Article

Image may be NSFW.
Clik here to view.

‘No firm is ever too small’ for data backup and recovery

Data backup and recovery should play an important role at a company, no matter its size. Small businesses need to have such backup protection in place just as much as their larger counterparts, Stage...

View Article


Image may be NSFW.
Clik here to view.

Improving Your Incident Detection & Response Maturity

Just having come back from the most recent RSA Conference in San Francisco, I think I can say with confidence that the security industry has moved beyond, at least at the level of strategic planning,...

View Article


Image may be NSFW.
Clik here to view.

Thoughts From Mobile World Congress: The Next Big Opportunity for Telco and...

As I look back on my experience at Mobile World Congress (MWC) held last month in Barcelona, I’m struck by how rapidly the Telco and Service Provider industry is changing. As I mentioned in my...

View Article

Image may be NSFW.
Clik here to view.

Think you can get away with unencrypted laptops?

When you consider ways your business could break the law, some of the first things that are likely to pop into your head are fraud, false accounting and perhaps employment breaches. But have you ever...

View Article

Image may be NSFW.
Clik here to view.

Enterprise Information Retrieval: Build vs. Buy Approach

The ease with which we have long been able to retrieve information from the World Wide Web (WWW) using increasingly efficient and high quality search engines underscores a less-than-impressive...

View Article

Image may be NSFW.
Clik here to view.

Winning Customers’ Trust is the Ultimate Competitive Advantage

With the unprecedented explosion of new technologies which have created new business models and trends, IT vendors need to sharpen their competitive advantage to make sure they are not giving space to...

View Article


Image may be NSFW.
Clik here to view.

Strata+Hadoop San Jose 2016

We are happy to announce that we will be at Strata+Hadoop San Jose 2016 next week (March 29 – 31) at the San Jose Convention Center. We will be in booth #1431 and have theater presentations covering...

View Article

Image may be NSFW.
Clik here to view.

Documentum Goes Open Source to Spur Digital Transformation

Over the past 40 years, we have observed content storage and consumption shift from mainframe to application service providers, to cloud, all thanks to hardware and software being lighter weight, more...

View Article


Image may be NSFW.
Clik here to view.

IT Service Strategy: Catalogs and Portals

Part 2 in our global analysis of IT transformation IT organizations are experiencing a cultural revolution. CIOs want to run IT like a customer-focused business. They want to empower users with...

View Article

Image may be NSFW.
Clik here to view.

Big Data Business Model Maturity Index Guide

We developed the Big Data Business Model Maturity Index to help organizations measure how effective they were at leveraging data and analytics to power their business models (see Figure 1). Figure 1:...

View Article


Image may be NSFW.
Clik here to view.

E6 – Ghost in the Machine – No Longer Fun and Games

Dave Reinhardt, gritty, determined, wizard of MagnaCorp security, arranged his notes on the conference room table once more.   He sat alone briefly while the team took a break.  As he arranged the...

View Article

Image may be NSFW.
Clik here to view.

A Leap Above the Rest – EMC Announces New All-Flash Offerings

Agencies collect mountains of data each day – contributing to the still-growing Federal data center sprawl. To help turn the tide, FDCCI just announced new guidance, the Data Center Policy, which aims...

View Article

Image may be NSFW.
Clik here to view.

The Apple iMessage Encryption Vulnerability

A team of researchers at Johns Hopkins (Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, and Michael Rushanan) discovered a profound vulnerability in how Apple’s iMessage encrypts data....

View Article
Browsing all 8970 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>