Experiences that Meet Expectations

I recently found myself standing at one end of a large field.  People were everywhere and it was extremely loud.  It was 37 degrees Fahrenheit and raining.  I think I even saw a few snowflakes mixed in.  I stood there soaked and shaking, but didn’t mind.  I was … READ MORE

Tom Giuliano December 5th, 2016

That Familiar Enterprise Experience in the Cloud

I drive a Honda Odyssey minivan. Well, actually, it’s my wife’s van.  I use it for occasional trips to Home Depot, the landfill…that sort of thing.  And I’ll freely admit it…..I like driving the van (which I lovingly refer to as “the bus”).  It has tons of room, … READ MORE

Tom Giuliano June 16th, 2016

Will Cloud Backup Kill Tapes?

The maxim goes, “The road to hell is paved with good intentions.” Not to be satirical here, many IT pain points are the results of resolving problems the wrong way, conforming to the “good old standards and practices” that long dominated IT operations manuals. In a conformist culture … READ MORE

Sebastian Yiang March 16th, 2015

Beating the Odds of App Fatigue for Enterprise IT

Many of us may be suffering from “app fatigue”, a symptom that overwhelms us with loads of apps on your laptops or mobile devices over time. While this phenomenon emanates from the consumer world, it holds true for the enterprise IT world as well.

Sebastian Yiang January 19th, 2015

EMC SourceOne Archiving

Data Archiving in an Information Age In today’s world, astronomic amounts of data can be found everywhere. Between the birth of the world and 2003, there was only 5 Exabytes of information created; now we create 5 Exabytes of data every two days. For the majority of the … READ MORE

Jennifer Zhou November 20th, 2014

Big Data or Little Data: Do We Have To Choose?

A storm is brewing in the legal world: Should we find ways to better manage our data, enabling us to get rid of data as soon as it has expired; or should we keep all data for as long as possible , relying on storage and search improvements … READ MORE

Jim Shook November 12th, 2014

Taking Out the Digital Trash

Does your organization keep old, stale and useless data? Most do. In our practice we find that about two-thirds of data on file shares has not been accessed in at least six months. While the lack of access does not necessarily identify data that has no business value, … READ MORE

Jim Shook October 6th, 2014

Is Your Compliance Just Checking the Box?

If your organization retains data to meet regulatory requirements, then you probably have a strategy to store that data somewhere. But do you have a good strategy to access and return any part of that data that is requested? If not, your compliance might be just “check the … READ MORE

Jim Shook September 4th, 2014

How to secure a Hadoop data lake with EMC Isilon

Apache™ Hadoop®, open-source software for analyzing huge amounts of data, is a powerful tool for companies that want to analyze information for valuable insights. Hadoop redefines how data is stored and processed. A key advantage of Hadoop is that it enables analytics on any type of data. Some … READ MORE

Kirsten Gantenbein September 2nd, 2014

EMC and RainStor Optimize Interactive SQL on Hadoop

Pivotal HAWQ was one of the most groundbreaking technologies entering the Hadoop ecosystem last year through its ability to execute complete ANSI SQL on large-scale datasets managed in Pivotal HD. This was great news for SQL users – organizations heavily reliant on SQL applications and common BI tools … READ MORE

Mona Patel February 20th, 2014

EMC Isilon SmartLock: An overview and demonstration

EMC Isilon supports multiple data protection strategies for your cluster environment. Last month, we featured a video about EMC Isilon SyncIQ™, which uses snapshot technology to replicate changed blocks of data. If you want to apply Write Once Read Many (WORM) data protection to files on your cluster, consider … READ MORE

Kirsten Gantenbein January 21st, 2014

RSA Leverages Big Data to Detect and Investigate Security Threats

As cyber attacks become more advanced and damaging, organizations are looking to integrate Big Data tools and techniques into their security operations to optimize threat detection and investigation. Organizations can no longer rely on traditional security systems that monitor and analyze only a slice of information from a … READ MORE

Mona Patel January 30th, 2013
Click to Load More