Digitisation and the Automobile production line
The automotive industry is on the cusp of its biggest evolutionary change since the Far East started production in the 1960s. Car manufacturers are no longer just hardware producers; they are...
View ArticleBusinesses Should Stop Passing the Data Science Hot Potato
Data science continues to be a hot topic for two reasons: Businesses universally agree that they should be making better use of data to help them grow revenue by addressing the needs of new markets...
View ArticleEnabling Collaborative IT With Converged Infrastructure
Changing the culture inside an IT organization is one of those chicken-and-egg propositions. It’s difficult to figure out if the culture should change before acquiring new technology that better fits...
View ArticleIt’s Not About the Technology; It’s About the Strategy
No matter what the industry, any company that deals with customers has now reached a critical point in the evolution of their organization. Transformation to a new way of doing business is happening...
View Article4 Digital ‘Must Do’s’ For Retail Brands Wanting To Keep Up With Consumers
The retail sector is continuing to be revolutionized by new technologies and ambitious young digital start-ups. The lines between retail sectors, online and offline have been completely blurred....
View ArticleMaking Your ECM Worry-Free
Back in 2005 I worked at a Software as a Service or SaaS startup in the human capital management space. Large enterprise customers were worried about purchasing SaaS – because of data security risks,...
View ArticleWhat does self-disruption look like?
Yeah, sure – it looks like leaning into the flash media transition (2016 is the year of all-flash for transactional workloads), but someone who does this isn’t really “disrupting themselves”, they are...
View ArticleTales from the Black Hat NOC: The Stages of Security Adolescence (Part 1)
Maturity is often spoken of in the security community as a binary value – “Customer X is mature,” “Customer Y is immature…” This notion was not dispelled at Black Hat where one vendor after another...
View ArticleArcher Content Library Updates: Q3-2016
Hello everybody! The bad news is there's more Summer behind us than ahead of us. I hope yours has been as enjoyable as mine has been. And here in the midwest at least it's pretty hot still. So plenty...
View ArticleA New Generation of Hackers Target the Gaming Industry
Hackers love a crowd. That’s true when it comes to social media networks, government system websites, financial institutions, retailers, and, based on recent headlines, gaming sites. For an industry...
View ArticleStorage Media Transformation
2016 is the Year of Flash storage for transactional processing. The transition to flash has been journey for the industry. EMC introduced flash storage media and Fully Automated Storage Tiering...
View ArticleAfter Black Hat: Shaming is Easy (When You Don’t Encrypt)
During the Black Hat 2016 NOC outbrief session, Grifter, aka Neil Wyler made a counter-intuitive statement to the crowd of roughly 500, eager to see which of their online activities would be exposed...
View ArticleHow Much Is Your Data Worth?
According to Gartner’s Doug Laney, some 80% of executives believe the value of their company’s data is reflected on their balance sheet, yet this increasingly valuable asset is rarely managed with the...
View ArticleHow Hybrid Cloud Can Help APAC Transform Into a Digitally-Driven Knowledge...
It will come as no surprise to hear the boom years of Asian growth markets are waning. But with this comes an opportunity for the region to build a greater proportion of income from digitally driven...
View ArticleYour Step-Up Authentication Compass… NIST & SMS – Finding North
An estuary is the area where a river meets the sea (or ocean), where fresh water from the river meets salt water from the sea. The fresh draft of the NIST Digital Authentication Guidance (NIST...
View ArticleESRS v3 August Update: The New "Docker" Edition + MFT 3.0
Launched this year at EMC World 2016, the EMC Modern Customer Experience is transforming every aspect of the EMC customer experience. Combining EMC's Big Data expertise, industry-leading technology,...
View ArticleAsia First Impressions: Hungry to Excel
I recently moved from Silicon Valley, California to Australia as part of my new role supporting EMC customers across Japan and Asia Pacific (some of you read my prior blog about the start of this...
View ArticleThe next evolutionary stage of the automotive industry
In my last post, “Digitisation and the automobile production line”, I talked about how automobile manufacturers are starting to embrace digitisation and how this could be fine-tuned to improve the...
View ArticleData-Driven Cybersecurity Leveraging Intelligent Data Storage
Cybersecurity has moved front and center in technology, business, academic, and government communities. Inadequate threat protection has the potential of bringing operations to a halt, and cyber...
View ArticleImmutable Infrastructure – Myth or Must?
I am as guilty as the next person regarding slinging techno-jargon. In just the last week, I swear I have used or heard used the term “immutable infrastructure” in the context of DevOps, IaaS, and...
View Article