Quantcast
Channel: Blog | Dell
Browsing all 8970 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Mobile is Easier Than You Think: 3 Real-Life Lessons Learned

An overwhelming consensus of companies trying to extend their reach and increase engagement with customers, employees and staff, agree that mobile is — or will be — critical to their success as an...

View Article


Image may be NSFW.
Clik here to view.

Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 2)

In Part 1 of “Tales of the Black Hat NOC: The Stages of Security Adolescence,” I discussed the maturation process of the Black Hat NOC, and security strategies in general.  In the blog post below –...

View Article


Image may be NSFW.
Clik here to view.

Yes, We Really Mean Change – Case Study in Digital Transformation

When I think of digital transformation, two quotes come to mind: “the light bulb was not invented by continuously improving the candle,” and Henry Ford’s famous statement, “if I asked people what they...

View Article

Image may be NSFW.
Clik here to view.

Oracle, Im sad about you, disappointed in you, and frustrated with you.

This is starting to verge on the ridiculous, and I’m not just going to take it anymore. Look, here is the reality (at least as I see it): Anyone in their right mind is building new applications in new...

View Article

Image may be NSFW.
Clik here to view.

Three Reasons APAC Organizations Need to Nurture Data Scientists

I think we’re all in agreement that data science is crucial to business success. Unfortunately, as raised in my previous post, it is often passed around inside organizations like a hot potato as...

View Article


Image may be NSFW.
Clik here to view.

Tales from the BlackHat NOC: Learning from the right people

The week I spent in the BlackHat NOC was great exposure to both new and evolving technology and new people. As a team member of the RSA team in the BlackHat NOC I tried to approach my time there by...

View Article

Image may be NSFW.
Clik here to view.

Playing Pokemon Go? Read this.

Hands up those who would leave their front door unlocked and all their personal information like passports, identity cards, bank details, their children’s details and even passwords left out for...

View Article

Image may be NSFW.
Clik here to view.

Major Events and Hacktivism #OpOlympicHacking

Introduction As anyone who tracks attacks on the internet can tell you, Activists using hacking activity, aka “Hacktivists”, have discovered that a relatively basic hacking approach, with buy-in from...

View Article


Image may be NSFW.
Clik here to view.

Re-envisioning your Information Goldmine with Artificial Intelligence

A few weeks ago, I was in Moscow with one of our customers in the financial services industry discussing their over 1,400 legacy-application decommissioning issue. They were looking for a modern and...

View Article


Image may be NSFW.
Clik here to view.

From Factory Automation to Cloud Automation

My six-year-old son loves the show How It’s Made on the Science Channel. There are usually many episodes back-to-back on Sunday mornings, and he’ll be up at 7 a.m. or earlier ready to watch. I’ll...

View Article

Image may be NSFW.
Clik here to view.

How Cloud Foundry PaaS Enables Cloud Native

Successful companies like Ford and Netflix have deployed more than just innovative consumer service models; they also use cutting-edge cloud native IT architecture to quickly adapt to changing market...

View Article

Image may be NSFW.
Clik here to view.

Context in Risk-Based Threat Patterns

Risks come from various sources that are not always possible to identify and subsequently prevent and mitigate in advance. With the growth in cloud, social, mobile and “bring your own device”...

View Article

Image may be NSFW.
Clik here to view.

Glimpse #1: A Sneak Peek at the New ECD Educations Services

In a relatively short period, based on human standards of time, we have dramatically changed the way we acquire information and the methods by which we learn. There are resources like Wikipedia and...

View Article


Image may be NSFW.
Clik here to view.

Hyper-Converged Wars 2016-???

Warning: read the disclaimer on the blog – these are my opinions, not those of my employer.   It’s getting harder for people to take my words as my own as I move into bigger and broader roles.   But –...

View Article

Image may be NSFW.
Clik here to view.

It’s Not About the Pill. It’s About the Patient.

One of today’s current buzzwords is “digital transformation.” What does that really mean? Afterall, in the content management world, we’ve been digitizing paper and automating business processes for...

View Article


Image may be NSFW.
Clik here to view.

The Cloud is Creating a New Context for Security and Identity in Asia

In my last post, I discussed how hybrid cloud can help transform APAC into a digitally-driven knowledge economy. Yet away from the need for the region to build a greater proportion of income from...

View Article

Image may be NSFW.
Clik here to view.

Airlines woes and GRC vacuums

I was travelling to a user meeting last week and going through Logan airport in Boston, I saw very long lines at some Delta counters. This was on Wednesday, 3 full days after the IT system outage that...

View Article


Image may be NSFW.
Clik here to view.

How do you create a Zero Day vulnerability every day?

The answer is easy, don’t correctly manage the people you let into your business! I have been working in Identity and Access Management for over 10 Years, both as the leader of the Identity Services...

View Article

Image may be NSFW.
Clik here to view.

Surprise! No More Solution Customizations

Things are not always what they seem, as the earliest of Roman writers pointed out, and the same is true today in our content management-driven world. As every enterprise seeks its own digital...

View Article

Image may be NSFW.
Clik here to view.

Dual Perspectives on ITaaS: IT Transformation Storymap

Having a clear, well rationalized, and easy to consume IT Services portal is one of the entry points to IT Transformation.  The great power given to business customers to seamlessly consume IT...

View Article
Browsing all 8970 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>