Disruption, Enabling: The Tides of Change

If you followed EMCs latest earning report , Q4/2014 (http://www.emc.com/ir), one thing is clear… XtremIO is a rocket ship! The slide on the right is part of the webcast presentation; the first bullet is just remarkable.
InsideFlash XtremIO By the numbers Q4-2014
XtremIO by the Numbers
“Fastest Growing Product in EMC History”. When you consider all of the products and all of the EMC acquisitions over the years, being the fastest growing product is incredible. Interestingly enough, all of these accomplishments happened in just over a year, since XtremIO GA back in November 2013.

Sam Marraccini January 30th, 2015

Impact of the GNU glibc gethostbyname Function Buffer Overflow “GHOST” Vulnerability on EMC Isilon OneFS

The “Ghost” vulnerability (CVE-2015-0235) in the gethostbyname functions of the GNU C Library (glib), which is commonly found in Linux based operating systems, affects applications calling this function. In some special instances, the successful exploitation of this vulnerability could allow an attacker to perform remote code execution on a targeted … READ MORE

Kirsten Gantenbein January 30th, 2015

Getting to know EMC Storage Analytics 3.0

Welcome to the series of introduction to ESA 3.0 (EMC Storage Analytics). First things first, what is ESA?  Generally speaking, it’s a monitoring tool for you to keep an eye on the EMC storage resources in your data center, especially … Continue reading

Author information

Cedric Zhuang

Cedric Zhuang

I am a senior software developer and have been working in EMC for 8 years. In the latest 4 years, I focus on performance analysis tools for VNX and VNXe like analyzer, the metrics dashboard for VNXe and EMC Storage Analytics.

The post Getting to know EMC Storage Analytics 3.0 appeared first on Thin Blue Line Blog.

Cedric Zhuang January 30th, 2015

Impact of the GNU glibc gethostbyname Function Buffer Overflow “GHOST” Vulnerability on EMC/RSA Products

The “Ghost” vulnerability (CVE-2015-0235) in the gethostbyname functions of the GNU C Library (glib), which is commonly found in Linux based operating systems, affects applications calling this function. In some special instances, the successful exploitation of this vulnerability could allow an attacker to perform remote code execution on a targeted … READ MORE

Reeny Sondhi January 29th, 2015

Dare to Thrive: Dell at VMware Partner Exchange 2015

You might have heard – partners are a HUGE deal at Dell. That’s why we love the VMware Partner Exchange event in San Francisco –all channel, all the time. There will be resellers, technology alliance partners, distributors, and solution providers descending on the Moscone Center for the convention next week. … READ MORE

Jeff Sullivan January 29th, 2015

Clearing Your Clouded Mind

Feeling like your brain is clouded? No, I don’t mean that your ability to think is disabled or that you’re having trouble finding clarity in your thoughts. I mean THE CLOUD- is it on your mind?

Meredith Soper January 29th, 2015

How Will Your 2015 IT Budget Compare to Last Year’s?

New year data is starting to trickle in, and it looks like, despite rising revenue and no shortage of IT initiatives ahead, many of us may find ourselves in a “do more with less” situation this year. Spiceworks, whose professional network serves more than six million IT professionals, recently released its 2015 IT Budget Report, with some interesting … READ MORE

Heidi Biggar January 28th, 2015

The EMC Isilon Uptime Bulletin, reinvented

When we launched the EMC® Isilon® Uptime Bulletin in 2013, each issue was published in a PDF format that could be downloaded from the EMC Online Support site. Because the Uptime Bulletin contains timely information, such as OneFS target code, tips, and the latest firmware releases, we wanted to deliver … READ MORE

Kirsten Gantenbein January 27th, 2015
Click to Load More