New Features for Spanning Backup for Google Apps: Help Desk Admin and Custom...
Data loss can happen in Google Apps through sync errors, user errors, malicious actions, or admin errors. In fact, according to recent research, roughly 70% of all SaaS data loss incidents are due to...
View ArticleModernize Without Compromise #ModernDataCenter
During EMC’s Quantum Leap launch, we announced 2016 as the Year of All-Flash for Primary Storage. We are laser focused on helping customers build Modern Data Centers with EMC’s industry leading All...
View ArticleExceptional Access: An ‘Exceptionally’ Bad Idea
We the people — citizens, residents, visitors — have fundamental needs and inalienable rights. To give these concepts any meaning, we need to be secure from our adversaries and free to communicate. As...
View ArticleTop 10 Tips and Tricks to Get the Most from VCE Vblock Systems
Customers I visit with often tell me how they absolutely love their Vblock Systems experience. It begins with the simplicity of buying infrastructure all in one platform, rather than traditional IT...
View ArticleReduce Fraud and Abandonment with a Risk-Based Approach to Online Sales
Sooner or later every business with an online presence is plagued by shopping cart abandonment. Sometimes a consumer changes their mind, factors in the cost of shipping and decides it’s not worth it,...
View ArticleCertifications in the IT Industry
I’m holding an IT Certification but is it still relevant? It’s a digital world and Information Technology (IT) has become embedded into nearly every aspect of our business and personal lives. Like the...
View ArticleDon’t Lose Out, Connect Already!
EMC has long recognized service & support as the most important criteria that customers use when selecting a storage vendor or solution. Since our inception, we have focused on growing a world...
View ArticleAre you Powered Up for Momentum 2016
Spring is in the air, and that must mean that EMC World is around the corner. More importantly, EMC’s Enterprise Content Division (ECD) will also be holding its annual Momentum Conference. This year’s...
View ArticleRisk Appetite Limbo
The Financial Stability Board (FSB), an international body that monitors and makes recommendations about the global financial system, published “Principles for An Effective Risk Appetite Framework” in...
View ArticleContent’s Role in Digital Transformation
We have been writing for quite a while now at IDC about digital transformation – about how “born digital” innovators are disrupting entire markets and forcing established companies in every industry...
View ArticleGartner Peer Insights - A Call to Action
Gartner is a well known and respected information technology research and advisory company. Some time ago they introduced “Gartner Peer Insights”, an online platform of ratings...
View ArticleIt’s a Bird, it’s a Plane, it’s a Bank?
Every time we get closer to customer passions and expectations, we realize the very nature of a business can go beyond anything ever seen before. What once looked and acted like a bank, today might...
View ArticlePervasive network visibility: driving the Federal security mission
Reports over the last year about catastrophic cyber breaches to Federal IT systems have been so frequent that we have been somewhat numbed to them. We have come to an almost dazed acceptance that our...
View ArticleIT Transformation is like a Lobster Crate Race
For those who don’t live in New England, let’s first define some terms. What is a lobster crate race? This is a common feature of summertime harbor festivals here. I saw one in Camden, Maine. Lobster...
View ArticleTeam FITARA – Will IT Make the Grade? Will You?
FITARA’s second round of agency self-assessments is due at the end of this month. With the last scorecard showing much room for improvement, will agencies make the grade this time? What’s still needed...
View ArticleRisk Appetite Limbo
The Financial Stability Board (FSB), an international body that monitors and makes recommendations about the global financial system, published “Principles for An Effective Risk Appetite Framework” in...
View ArticleSetting the Benchmark in the Network Security Forensics Industry
“Setting the benchmark” – “Beating thirty other products in threat detection and response capabilities” – “Outstanding achievement in product leadership, technological innovation, customer service,...
View ArticleModernizing Mobility and Migrations, oh My!
Your boss walks in Monday morning and says, “Show me your plan to get the 3rd generation storage system on to the latest and greatest, faster, better, cheaper 4th generation storage system” Ugh! Many...
View ArticleUnlock Customer Intimacy Through Big Data
What does it take to thrive in a world where customers demand an experience that is highly personalized and relevant? We believe the key is in understanding customer needs and unlocking customer...
View ArticleA Three Pronged Approach to Achieving Customer Intimacy through Big Data
Big Data capabilities are not on the horizon and only the subject of talk. It is definitely real and its impact can be seen across consumer and business-to-business markets. For some companies, Big...
View Article