Quantcast
Channel: Blog | Dell
Browsing all 8970 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How to Tailor a Continuous Monitoring Policy to Focus on Critical Assets

Many organizations want to implement a continuous monitoring policy, which combines processes and technology to ensure security systems are working efficiently and effectively. Continuous monitoring...

View Article


Image may be NSFW.
Clik here to view.

IT Execs Plan to Reduce Software Development Release Cycle Times by 75-90%

Part 5 in our global study of gaps in IT transformation In our State of IT Transformation analysis, nearly 70% of participants said that they take at least 6-12 months, and often more, to get a...

View Article


Image may be NSFW.
Clik here to view.

Unlock Customer Intimacy Through Big Data

What does it take to thrive in a world where customers demand an experience that is highly personalized and relevant? We believe the key is in understanding customer needs and unlocking customer...

View Article

Image may be NSFW.
Clik here to view.

A Three Pronged Approach to Achieving Customer Intimacy through Big Data

Big Data capabilities are not on the horizon and only the subject of talk. It is definitely real and its impact can be seen across consumer and business-to-business markets. For some companies, Big...

View Article

Image may be NSFW.
Clik here to view.

The Ultimate Purpose of Big Data: Customer Intimacy

Activity Needs Purpose While on a walk in the countryside, a man came upon a huge construction site and he asked a number of people what they were doing. The first looked up and said with a sigh, “I’m...

View Article


Image may be NSFW.
Clik here to view.

What It Takes To Deliver A Personalized Customer Experience

Customer expectations drive business. Companies that succeed are great at meeting those expectations. Companies that excel are great at changing them. Customers didn’t expect a cell phone to play...

View Article

Image may be NSFW.
Clik here to view.

How to Unlock Customer Intimacy

Imagine a world where every interaction you have with a company, either as a consumer or a B2B buyer, is personalized.  And now imagine that these companies are able to predict your level of...

View Article

Image may be NSFW.
Clik here to view.

What Keeps You Up at Night?

The 2016 U.S. election? Tom Brady’s suspension reinstatement? If you’re my son’s 4th grade teachers, the words “standardized testing” may warrant some unrest. I’m always amused by their heightened...

View Article


Image may be NSFW.
Clik here to view.

Taking a Moment to Celebrate Success

Typically, I enjoy sharing my thoughts on the trends in the ECM and technology industries, the challenges our customers are overcoming, and how we’re working with our partner ecosystem to address...

View Article


Image may be NSFW.
Clik here to view.

An Insider’s View of SQL Server Migrations

In my last blog, I talked about the top 5 reasons to migrate from Microsoft SQL Server 2005. And I promised, as a follow up, to give you an insider’s look at how EMC approaches Microsoft SQL Server...

View Article

Image may be NSFW.
Clik here to view.

New PCI Multifactor Authentication Rules: Is it Too Late?

The PCI Security Council just extended its requirements for multi-factor authentication to anyone who has access to credit card data. These requirements, which comes on the heels of the European...

View Article

Image may be NSFW.
Clik here to view.

Strata+Hadoop London 2016

London here we come… starting June 1 through June 3, we will be at the SOLD OUT Strata+Hadoop World at ExCel London.  We will be in stand #408 over the three days and on Tuesday, June 2 at 1455,...

View Article

Image may be NSFW.
Clik here to view.

How to Win as a Technology Mixologist

Did you ever notice that winners always want to win, no matter what their field or activity? This makes it easy to find inspiration for using technology to your advantage, even in the most unlikely of...

View Article


Image may be NSFW.
Clik here to view.

Monitoring Assets and Vulnerabilities: Matching Data With Action

Monitoring assets and vulnerabilities has become a high-priority security practice for many enterprises. As RSA President Amit Yoran said in his RSA Conference 2016 keynote, the inevitability of an...

View Article

Image may be NSFW.
Clik here to view.

Security at Scale: Making Security Analytics Work for the Internet of Things

This year more than 10 billion devices will connect to networks around the world. And in the next few years, that number will increase by over an order of magnitude. With the veritable explosion of...

View Article


Image may be NSFW.
Clik here to view.

Big Data Business Model Maturity Index and the Internet of Things (IoT)

Antonio Figueiredo (@afigueiredo) recently challenged me on twitter with an interesting question: How would the Big Data Business Model Maturity Index (BDBMMI) change to support the Internet of Things...

View Article

Image may be NSFW.
Clik here to view.

Making Deployment Decisions in the Energy Industry

Over the past few years, CIOs and many analysts have been predicting and observing a major trend in IT: the move to the 3rd Platform. This trend is being driven by innovation from software vendors, as...

View Article


Image may be NSFW.
Clik here to view.

Digital Transformation: What does it actually mean?

Digital Transformation has been the phrase on every CEO, CIO and IT manager’s agenda for the past few years. Just a quick Google search today illustrates the level of conversation and debate around...

View Article

Image may be NSFW.
Clik here to view.

Advanced Detection Methods: Tips for Detecting Potential Insider Threat

In the new era of information security, traditional controls designed to deter attackers and protect assets are being augmented by advanced detection methods and new capabilities for response and...

View Article

Image may be NSFW.
Clik here to view.

Technology Foundation for the Modern Data Center

As we know, the digital universe is growing 40% every year – which means the volume of data agencies collect, store, and manage will only continue to grow. Between all the video captured via body-worn...

View Article
Browsing all 8970 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>