People lead the Digital World
In the recent years more and more discussions have been arisen around Internet of Things and the professional version Industry 4.0. Mainly it is a consequent step from the cloud approach the IT...
View ArticleHacking the Mr. Robot Season 2 Premier
The psychological thriller Mr. Robot, which airs on the USA Network, is a fan favorite among cybersecurity professionals. What differentiates the show from its predecessors in the cyber-thriller genre...
View ArticleInternet of Things: Getting From Connected To Smart
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull...
View ArticleAre We Modernizing, or Running in Place?
The Federal government’s IT legacy systems are costly to maintain and difficult to secure – in fact, they eat up 80% of the Federal IT budget. This leaves agencies little room for innovation and...
View ArticleWearables leaking your passwords? We can solve that.
Recently, I wrote about a newly published white-paper showing the power of wearable devices to help determine if users are who they claim to be, on a continuous basis. The paper describes a method,...
View Article3 Misperceptions about Content Management and FinTech
One particular section of my Momentum at EMC World presentation seems to have deeply resonated with the audience – how our perceptions can hold back progress. In many institutions and enterprises, I...
View ArticleThe Power of Self-Service Big Data
From using analytics to predict how our storage arrays will perform in the field, to engineering product configurations to best meet customers’ future needs, EMC is just beginning to tap into the gold...
View ArticleModern Data Center: The MOOC
If you’ve read my tech predictions the last couple of years, you might know my thoughts on professional lectures. If not, let me summarize: professional lectures as a form of learning? On the way out....
View ArticleApplications Multi Cloud
Successful businesses are differentiating from their competition through the deployment of application software that collects valuable data that is analyzed resulting in action that influences...
View ArticleBitrix24 Interview
I was recently interviewed by Bitrix24.com for a blog titled “Interview With “Dean of Big Data” Bill Schmarzo” and thought I’d share my answers with my readers. Nothing earth shattering, but then...
View ArticleEnabling Collaborative IT With Converged Infrastructure
Changing the culture inside an IT organization is one of those chicken-and-egg propositions. It’s difficult to figure out if the culture should change before acquiring new technology that better fits...
View ArticleRSA at Black Hat 2016 — Can’t Wait!
Black Hat 2016 is fast approaching and I can’t wait! The main event will take place on August 3rd and 4th at Mandalay Bay / Las Vegas. I will be there will you? If you are there, please stop by the...
View ArticleRSA SecurID Access Takes Top Honours at Computerworld Hong Kong Awards 2016
Earlier this month, Computerworld Hong Kong recognised RSA’s identity assurance solution line, as a winner in its Computerworld Hong Kong Awards 2016. We’re humbled to have received such a prestigious...
View ArticleEnabling Collaborative IT With Converged Infrastructure
Changing the culture inside an IT organization is one of those chicken-and-egg propositions. It’s difficult to figure out if the culture should change before acquiring new technology that better fits...
View ArticleWeb Threat Detection Services Deliver SWIFT Remediation
With the dust settling on a series of high profile cyber heists against international banks SWIFT’s network used to facilitate international payments between banks, the service provider is weighing...
View ArticleActing today to tackle the diseases of tomorrow
Today’s software is only as intelligent as the information it processes. But traditional software’s rigid structure does not allow for processes to evolve, change or adapt based on individual...
View ArticleHow Do You Determine if Your Legacy App is Suitable for a Public Cloud?
In our recent analysis of the State of IT Transformation, 91% of the companies that we worked with admitted to having no organized, consistent means of evaluating applications for cloud. There is a...
View ArticleHow to Avoid “Orphaned Analytics”
I’ve heard several clients complain about the curse of “orphaned analytics”; which are one-off analytics developed to address a specific business need but never “operationalized” or packaged for...
View Article[LIVE WEBINAR] Survive a Modern Cyber-Attack with Isolated Recovery
We’ve been talking about Cyber Attacks over the past couple of months, and the feedback from readers is you want a deeper understanding of how these attacks are different and tangible actions you can...
View ArticleData to Decisions: Leveraging Advanced Data Storage and Big Data Analytics...
Through the collection, protection, and dissemination of data, advanced data storage and analysis solutions are revolutionizing Intelligence, Surveillance, and Reconnaissance (ISR) capabilities and...
View Article