Use EMC? Use VMware? Two things youd be crazy not to try
While these days I’m pretty busy with all things “converged platform” at EMC (inclusive of both the infrastructure layer and the IaaS/PaaS/Data/EuC platforms we build on top of Vblock, VxRack, and...
View ArticleDisrupting Myopia to See Customers Anew
When we look at things up close, they seem exceptionally clear. Yet stepping back a moment from our business routines and embedded ways presents an entirely different picture of how we are servicing...
View ArticleThe Pillars Of The Modern Data Center
On the heels of launching VMAX All Flash and DSSD D5, its important to round back on how critical it is to implement and run a modern data center. To deliver on the capabilities of a digital business,...
View ArticleFive Keys for Transforming Global Application Portfolios at Scale
A conversation topic that is coming up more frequently with our client CIOs is around how to transform global application portfolios that number in the thousands. This is particularly true with our...
View ArticleInterested in the Flash market transition? Want to have fun and have an...
The whole infrastructure market is in huge transition, with what would have been small ebbs and flows in the past are turning into titanic flash floods and droughts/wildfires today. In these times...
View ArticleThe Pillars Of The Modern Data Center
On the heels of launching VMAX All Flash and DSSD D5, its important to round back on how critical it is to implement and run a modern data center. To deliver on the capabilities of a digital business,...
View ArticleThe Longest and Most Rewarding Journey
One of the best parts of my job is the opportunity to travel around the world to meet with our great customers and partners. I have been fortunate to serve as an EMC Executive Sponsor for South Africa...
View ArticleBiometric Security: Making Authentication More Secure and Convenient
Concerns about biometric security, its usability, and the potential for spoofing are starting to dissapate. Fingerprint sensors are now being built into the latest smartphone models, which means more...
View ArticleUpgrading OneFS with Remote Proactive
We’ve already introduced who Remote Proactive is and what we do; Let’s talk a bit more about one of the activities we support: Isilon OneFS upgrades. OneFS upgrades contain fixes, security updates...
View ArticleMeasure your Readiness – Security Monitoring Program
In the previous post of this series “Measure your Readiness”, I depicted a framework to assess, shape and accelerate a Threat-Driven Incident Response program useful for all kind of organizations to...
View ArticleThoughts From Mobile World Congress: The Next Big Opportunity for Telco and...
As I look back on my experience at Mobile World Congress (MWC) held last month in Barcelona, I’m struck by how rapidly the Telco and Service Provider industry is changing. As I mentioned in my...
View ArticlePutting Acquisition Back in FITARA
The Federal Information Technology Acquisition Reform Act (FITARA) is the first step in driving better IT infrastructure across the Federal government. In fact, 41% of Feds say it will improve...
View ArticleMaking Smart Choices for Identity Assurance
Good news: in 2015, device makers, OS providers and authentication solution providers all picked up their momentum on initiatives tackling user authentication challenges. Cases in point: the support...
View ArticleThoughts From Mobile World Congress: The Next Big Opportunity for Telco and...
As I look back on my experience at Mobile World Congress (MWC) held last month in Barcelona, I’m struck by how rapidly the Telco and Service Provider industry is changing. As I mentioned in my...
View ArticleInternet of Things: “Connected” Does Not Equal “Smart”
The hype is huge around the Internet of Things (IoT) and the Internet of Everything (IoE), but the potential often gets lost in endless discussions about the technologies that underpin the IoT and IoE...
View Article3D Secure Innovations: New Analytics Dashboard Helps Improve Response to Fraud
The 3D Secure protocol has been much (and somewhat unfairly!) maligned for the negative impact it has on the cardholder’s online experience. Requiring cardholders to produce their password each and...
View ArticleQuestionnaires Losing Appeal? The Case for Integration
In the past couple of months, I have had the privilege of attending the RSA Conference and OpRisk North America. Across these two events I met many CISOs and Operational Risk Managers and got to take...
View ArticleThreat Intelligence Sharing: Customized Solutions to Challenges
Threat intelligence sharing is a hot and sometimes contentious topic. While its necessity and justifications are generally known, there are legitimate reasons why sharing information on a large scale...
View ArticleHow many benefits can you think of for unified storage?
There are a plethora of benefits that can be enjoyed by businesses that deploy cloud computing – but have you yet to cotton on to how this technology could transform your IT infrastructure? When asked...
View ArticleEMC Isilon’s scale-out NAS streamlines scientific big data
In order to tackle its big data requirements, the University of Utah Scientific Computing and Imaging Institute (SCI) has chosen EMC Isilon’s scale-out network-attached storage (NAS) solutions. With...
View Article