February 27

Bridging the Big Data Divide between Business and IT

first_imgI spend my time working with customers trying to figure out where and how to start their big data journey. Phase one of the discussion is trying to explain what big data is and why it’s important. It’s an educational process. Phase two of the journey to big data is the experimental stage. I look at a sample of the customer’s data and start playing with it to look for potential value. Phase three is when companies try to figure out from a business perspective where they should begin. They want to know what the right catalyst is for transforming their data infrastructure and how to take advantage of their different data sources. This is the hardest part of the journey to overcome because it requires the business and IT side of the house to talk to each other and establish a shared sense of purpose. You have to drive consensus and collaboration between the business and IT.If you tackle big data as a business-only initiative without the technology there, you’re going to fail. If you tackle it as a technology initiative without the support of the business, you’re going to fail. There is often a really difficult situation where the business and the IT folks have to talk the same language and they don’t like doing it. It’s almost as if there is a civil war going on between them.If the business gets caught up in the “who controls the big data initiative” battles with IT, they are not going to get what they need to get out of the big data initiative. In other words, if the business doesn’t sponsor it, if they don’t own it and they use IT solely as an after-the-fact thought, big data will not be successful for them. It must be a joint, collaborative effort.For example, if a business unit decides to not get IT involved and builds their own little analytics sandbox, they will never be able to operationalize it back into the company’s CRM system, call center system and management dashboard. This is a huge problem!One thing I hear a lot in many of my discussions is that there is potential to transform the business side from business monitoring to business optimization, but you need to have senior-level commitment to be successful. From a business perspective, big data introduces a vocabulary of words like “optimize,” “predict,” “forecast,” and “score,” which makes business people really excited.What is important to remember when talking about how to realize the big data opportunity is that it has less to do with technology and less to do with data. It has more to do with who at the senior level can see and embrace this change, has the power to rewire the value creation processes and can champion this transformation from the top.For whatever reason, many senior executives are threatened by data and that is why so many companies are still in the phase one educational stage of the big data conversation. It’s very hard for them to let go of decisions they have traditionally made with their gut and now have to rely on the numbers. The companies who succeed and thrive are going to be the ones who have leaders who are willing to do what it takes to really be data-driven, and that includes partnering with IT.last_img read more

February 27

How Network Security Has Evolved From Saying “No” to Saying “Yes!”

first_imgIn medieval times, people relied heavily on physical security to protect their critical assets. Originally they had castles with walls and as attackers figured out how to breach those walls they added moats and draw bridges and murder holes to keep the advanced attackers out. But all of these hardened physical security measures designed to keep people out had the unfortunate side effect of making it difficult for people to get in, which in turn interfered with business and commerce. Needless to say, this type of security did not survive.Cyber security has evolved in a similar fashion. Fifteen years ago, stateful packet inspection (SPI) firewalls were considered to be best-in-class protection against external threats. These firewalls were typically configured to block peoples’ access to internal resources.  A user often had to submit a ticket to gain access to a server. Some types of communications required that specific rules were written to be allowed. This is the “castle wall” approach that many CISOs learned when they were being introduced to network security. But this approach to security is also outdated.Organizations have to attract people rather than keep people out. Retail businesses post signs saying, “These doors must remain unlocked during business hours.” Security must take a similar approach, to become more dynamic: The question now is how do you keep an eye on who is coming in and out to provide necessary protection?Unlike brick-and-mortar stores, where you keep doors open, electronic online presence never closes. Today, ecommerce is being done electronically 24 x7. Not only do you need to keep your electronic communication presence open, but also highly available and redundant. The question becomes: How do you keep an eye on what is constantly coming in and out of the network?Two parallel goals in security are to keep the malicious traffic out while also keeping employees productive. If employees want to boost their productivity but IT is slow moving, they invent ways to work around the rules to enable the productivity measures they need to do their jobs more efficiently.Fortunately, that paradigm is now shifting. Security is no longer about blocking or allowing necessary access. It is about enabling secure access on a permanent basis to enable the business. The perimeter is not only about blocking traffic, but also about easily enabling appropriate access for users. What should be allowed? Whatever enhances the environment and makes it better. For network security to detect malicious behavior, Dell SonicWALL next-generation firewalls analyze all of the network traffic, identify and eliminate what is bad, and let the good flow in and out freely.In a similar way, application control becomes important as more people rely on their own applications. With the deluge of mobility, everyone is BYOD, bringing their own cloud (BYOC) and bringing their own applications. CISOs need to know what applications are running on their networks and analyze those applications.And, with identity and access management, we need to make sure this is the right person, right level of privilege and the right level of access to critical company data. Also, for CISOs to effectively manage identities, it is important to have self-governance and self-provisioning to create, modify and revoke and renew identities without always having to call an information security administrator.The Department of Yes is about empowering business initiatives while retaining security by governing every identity and inspecting every packet. It enables security professionals to allow remote workers to be more mobile, to go to the cloud, and to go back to the corporate network – securely and productively.Visit Dell Security and open your own Department of Yes.last_img read more

February 27

Transformation Tours: Volume II, Our Internal Culture Transforming

first_imgOver these past few days, I was reminded why the internal culture at Dell Technologies is built on both diversity, and a legacy of good. I was also happy to learn that we are orchestrating an elite internship program, designed to recruit top talent from universities all around the globe.This is stop #2 on my transformation tour. If you haven’t guessed it, the key staple in this series is transformation. To be honest, it’s really all I have been thinking about lately. It’s discussed frequently in my part-time graduate school MBA program at UMass Lowell. It’s talked about in the Wall Street Journal, and other technology-centric forums. But most importantly, it’s engraved within our mission at Dell Technologies. Right now, our goal remains to accelerate transformation for our customers by enhancing their infrastructure, and setting them up to be successful in this new digital age. Michael Dell has referred to this as the next Industrial Revolution – and the coolest part about this new digital age, is that we’re still at the very beginning of it!But the more I think about transformation, the more I am realizing that it is also happening internally at Dell Technologies through various initiatives.An Absolutely Elite Internship Program I had the honor of speaking to our interns at Dell last week. My first message to them was simple, “welcome to the best intern program in technology.” As a former intern (at heritage EMC) back in 2013, I quickly realized how impact driven our program was. I left equipped with career resources, an upgraded skillset, and a network that I am still in communication with today.However, this program has been completely transformed – and in its current state right now, it is absolutely elite! I applaud the Dell University Relations team on the transformation of our internship program. To learn more about it, visit our University Relations page: https://jobs.dell.com/studentsIn speaking with our interns, I encouraged them to find ways to showcase their competitive advantages. There is no set formula to a perfect internship, but there are a few skills that can help you stand out. I challenged them to explore unique ways to add value within their teams – and most importantly, to never be afraid to ask questions or step outside their comfort zones.You can find a recap of my presentation here–take a look and let me know what you think!“Fun afternoon today chatting with the @Dell interns about hoops, social media, and building a personal brand!! #DellInterns2017 pic.twitter.com/9Qfhr3Amwf“— Greg McCarthy (@GMcCarthy24) July 20, 2017Share “The time is now ⏰ to join @GMcCarthy24 and #Dellinterns2017 to talk about building a personal brand and how to #yolo to the max! pic.twitter.com/yb2gA8umVm“— Megan Evangelista (@EvangelistaMeg) July 19, 2017Share “Loved hearing @GMcCarthy24 ‘s new definition of “real world YOLO” as it relates to professional development! #DellInterns2017“— Samantha Miller (@samanthamillerr) July 19, 2017Share “”Don’t be afraid to question the way things are done.” – @GMcCarthy24 #DellInterns2017“— Rachel E. McLean (@rachelemclean) July 19, 2017Sharecenter_img Celebrating the 6th Annual Dell STEM Day for Eureka! “Very fun Friday today leading workshops on social media and building a personal brand for the 6th Annual @Dell STEM Day for Eureka! pic.twitter.com/UDBSYUzibi“— Greg McCarthy (@GMcCarthy24) July 14, 2017Share So how is our culture being transformed? Well, we welcomed 30 girls from the Girls Inc. Eureka! program into the Dell EMC headquarters on Friday, July 14th for an interactive day filled with remarks by Chief Diversity Officer, Jackie Glenn, team building workshops on professional development + social media, and a panel discussion.Friday is always a fun day in the business world, but this was a particularly fun Friday. During my workshop with the girls, I was very impressed by their determination. As a member of the Social Business Team, it was interesting to discuss the topic of social media with them. Popular platforms amongst the younger generation included: Snapchat, Instagram, and Twitter – with no love at all for Facebook. Overall, it was an amazing day, and I had a blast interacting with the girls during our workshop.last_img read more

February 27

Black History Month Events Cultivate Inclusion

first_imgAs I reflect on Black History Month, I am humbled by the past and present accomplishments and sacrifices of Black women and men who have enabled human progress. As a beneficiary of this sacrifice, an African American man who was given the opportunity to earn education and career advancement, it is incumbent upon me to keep the momentum going and continue to open up opportunity for all. At Dell Technologies, we know the first step to opening opportunity for all is creating an inclusive environment where people want to work, team members feel they belong and our values reflect those of our customers.Inclusive environments don’t just happen, they require strategy, time, and commitment from across the company. Employee Resource Groups (ERGs) are a huge part of how we work to create an inclusive environment at Dell Technologies. ERGs connect team members around areas such as gender, ethnicity, sexual orientation and backgrounds. The groups work to not only make those with shared experiences feel welcome, but also to educate those who are seemingly different to realize the many similarities we all share.It was this effort to share experiences and culture that was such a pride point for me throughout Black History Month. Our Black Networking Alliance (BNA) ERG brought together team members from every race, religion and gender for events around the United Sates. These Black History Month events included luncheons with guest speakers and traditional “soul food”, student mentoring sessions, community service outings and so much more.  All events had a common focus to highlight the tremendous contributions people from the African Diaspora have made, and will continue to make, in society. I thank our BNA leaders for their leadership and commitment to building an inclusive environment where differences are respected, and our innovative spirit is unlocked.Once this inclusive environment is established, we shift to looking at how we can recruit team members who bring diverse perspectives to the business. Having a diverse team is not a nice to have, it’s a business imperative. We are living in a time that is being called the Fourth Industrial Revolution. Every industry, in every part of the world, is becoming a technology industry. Due to this shift, we’re in the midst of a technical skills shortage. According to the U.S. Department of Labor, by 2020, there will be 1.4 million open computer science jobs in the US alone.Businesses can’t continue to lean on the same set of homogenous workers – that’s created a labor shortage. Businesses also can’t continue to fight for the same finite set of diverse employees to ensure their company is seeing challenges from every perspective and finding the most innovative solutions.  In Silicon Valley as a whole, Blacks and Hispanics make up between 3 percent and 6 percent of workers, and women of color are 1 percent or less. These are the underrepresented populations we must train, recruit and retain to lessen the skills shortage and drive innovation and exceptional business outcomes.At Dell Technologies, we have laid the groundwork to do just that. Here are just a few initiatives we have in place to foster inclusion and increase diversity.We have a Global Diversity Council that is a senior executive group responsible for driving Dell Technologies’ diversity & inclusion strategy. Diversity & Inclusion efforts need to come from the top. We are fortunate to have Michael Dell serving as the council chair.We’re looking at how technology, including AI and ML, can eliminate unconscious bias from the talent continuum which encompasses everything from talent identification through hiring through career advancement.We are the first in our industry to roll out unconscious bias trainings company-wide to educate our teams on the biases we all have that can unintentionally harm work culture and business performance.We have programs in place with partners to build a diverse STEM talent pipeline, including Align and Reboot Representation.We are a member of coalitions committed to equal advancement for all including Catalyst CEO Champions for Change, the CEO Action for Diversity & Inclusion coalition, and the Congressional Black Caucus Foundation.We currently have more than 37,000 employees who are part of at least one ERG. We have ERGs in 60+ countries around the world.At Dell Technologies, we believe diversity & inclusion is just as important, if not arguably more important, than research and development to the future success of our company. We want Dell to be the employer of choice for ALL, where every voice is heard equally. Happy Black History Month, and thanks to all for being on this journey with us.last_img read more

February 27

Accelerating HPC and AI: From the Desktop to the Data Center

first_imgComing to NVIDIA GTCHigh-performance computing and artificial intelligence might conjure up visions of futuristic data centers. However, HPC and AI workloads — including research, CAD, and data analysis — typically begin on a laptop or desktop workstation. From there, teams can tap into data center resources.Diagram from TACC user guide for Stampede2.Dell Precision Workstations with NVIDIA GPUs can accelerate anything from gaming to data analytics, design to visualization. On my personal wish list for design, is the Dell Precision 7730 mobile workstation with up to 8.9TFLOPS with the NVIDIA Quadro P5200 GPU, and 8TB of storage! With up to 64GB of memory, it easily tackles virtual reality, analytics and graphics/design. If you don’t have enough room for the 17” display in your motorcycle backpack, check out the sleek Precision 5530 with Ubuntu® Linux. It has memory expansion capabilities up to 64GB for a good balance of price and performance in a mobile workstation.In cool new tech, the NVIDIA Quadro RTX 8000 can render complex models and scenes with physically accurate shadows, reflections, and refractions, to empower users with instant insight. And it will be available in Dell Precision 5820, 7820 and 7920 towers.Extending the gains with GPU virtualizationThe NVIDIA virtualization platform now extends the power of GPUs to support up to 32 virtual desktops running performance-hungry workloads. Often these solutions leverage NVIDIA virtual GPUs (vGPUs) and familiar VMware technologies used in data centers around the world, with everything integrated into VMware Horizon desktop and application environments.Plenty of Vroom with GPUsDell EMC PowerEdge servers including the R640, R740/xd and R7425, can get a boost from NVIDI T4 Tensor Core GPU accelerators. NVIDIA T4, with 320 Tensor Cores and 70W low-profile design, can support a wide range of workloads from machine learning to virtual desktops. From the PowerEdge T640 tower servers to R940xa rack servers, the NVIDIA V100, equipped with 640 Tensor Cores, delivers 125 teraFLOPS of deep learning performance. In the PowerEdge C4140 server, with NVIDIA NVLink interconnect technology, V100 accelerators can be interconnected at up to 300GB/s to unleash even more application performance. And there’s more good news: GPUs can accelerate more than 580 HPC applications.Take it with youVia the NVIDIA GPU Cloud (NGC), you can bring your deep learning containers with you wherever you’re working, while reducing complexity. For example, NVIDIA RAPIDS open-source software is available in containers accessible via the NGC container registry. This suite of open source software libraries is designed to give people the freedom to execute data science and analytics pipelines on GPUs.The fastest-adopted GPU now in the world’s best-selling PowerEdge ServerThe new NVIDIA T4 accelerator for distributed computing environments can accelerate training and inference, video transcoding, and virtual desktops. It can also accelerate mainstream applications in enterprise environments, enabling companies to analyze massive amounts of data and make accurate business predictions at unprecedented speed.NVIDIA reports that this next-level GPU accelerator has become the fastest-adopted server GPU. And, it is now available in one of the world’s best-selling servers, the Dell EMC PowerEdge R740. The T4 GPU is also available in PowerEdge R740xd, R640 and R7425 servers.To learn moreIf you’re attending the NVIDIA GPU Technology Conference (March 17–21) in San Jose, be sure to stop into the Dell Technologies booth #1311 for a first-hand look at systems that accelerate HPC and AI from the desktop to the data center. In the meantime, explore Dell EMC solutions for high-performance computing and artificial intelligence.last_img read more

February 27

Meet the Women of the Dell EMC Partner Program: Heather Wilcox

first_imgThis post is part of our Meet the Women of the Dell EMC Partner Program series, which provides insight into what drives the inspiring women of the Dell EMC channel. Missed the first posts? Get to know Joyce Mullen (President, Global Channel, OEM & IoT, Dell EMC), Cheryl Cook (Senior Vice President of Global Channel Marketing, Dell EMC), Julie Christiansen (Vice President, Global Channel Marketing, Dell EMC), Sheri Hedlund (Vice President, US Channel Sales, Dell EMC), Kim Lasseter (Senior Director, Global Partner Marketing Enablement & Tools, Dell EMC) and Diane Brode (Director, Global Partner Marketing, Dell EMC) now.Meet Heather Wilcox – CSG Channel Field Marketing Director                           What is your current role/area of responsibility, and how long have you worked with the channel partner community?I have more than 20 years of channel experience; and in my current role, I reside on the Client Solutions Channel Field Marketing team supporting Dell EMC’s channel organization. I assist in developing marketing programs to drive accelerated client solutions growth through the partner community. My top priorities include ensuring programs are competitive, defining an enhanced GTM strategy for customer acquisition/expansion and focus on premium product growth like rugged and workstations. I am also responsible for helping grow and develop Dell EMC’s Mid-Market partners.What are your goals for your company’s channel business over the next year?With Dell EMC’s recent investments and program enhancements, our goal is to ensure that programs for Dell EMC partners remain innovative, competitive and easily executable, while adhering to our core program tenants: Simple, Predictable, & Profitable. This year, Dell/EMC’s Client Solution’s objectives are to grow premium products where partners make the most profit, remain #1 in Precision workstations, Displays and Wyse Cloud Client Computing solutions, continue to grow our SMB customer base, and win acquisition business. Dell EMC also wants to work with partners to ensure they’re attaching Dell/EMC’s services and our best in class security solutions in addition to our top-notch ecosystem of peripherals. Cross selling is an important driver in partner profitability.Outside of your family, please name a woman you admire and why?Eleanor Roosevelt who wrote my favorite saying: “The future belongs to those who believe in the beauty of their dreams.” In addition to her most infamous role as the first lady, Eleanor was an avid women’s rights advocate, fought for human rights during her time working with the United Nations, worked for the Red Cross during the war and wrote a daily news column. Those are only a few of her many accomplishments, truly a hero on all fronts.What advice would you give to other women in the industry? Or men?Be true to yourself and do what is right for your company. Have a mentor and be a mentor – always make time for both. Never stop learning and demonstrate leadership no matter what position you hold.Please share some words to live by that have helped you throughout your career.The secret to wanting it all is knowing that you already have it. Don’t add up all the mistakes but do remember the lessons from each. Always go the extra mile when no one is expecting you to, that’s when it counts the most. What comes around, goes around-be kind, even on your worse days.What do you do for fun outside of Dell EMC? I have two children with full schedules and watching them learn and grow in their sports and extracurricular activities brings me the most joy outside of making positive contributions to Dell EMC’s client channel business.Family fun in Nantucket!last_img read more

February 27

New Dell EMC XtremIO Updates Deliver Enhanced Data Protection and Availability for Customers

first_imgSince Dell EMC XtremIO X2 was introduced at Dell Technologies World in May 2017, customers have hailed the platform’s efficient architecture, consistent availability and agile copy data management.Dell EMC XtremIO X2 6.3, the newest version of the XtremIO software, builds upon those key attributes and can help accelerate IT transformation and data center modernization.XtremIO X2 6.3 allows customers to employ advanced data protection models, protect their data from cyber and ransomware attacks and reduce cost through increased levels of consolidation.Among the new features included in Dell EMC XtremIO X2 6.3:Synchronous Replication: Application availability and service level delivery are fundamental expectations of IT support, even in the event of a major outage or disaster.  To deliver even greater availability to our customers, we are pleased to announce support for synchronous remote replication. Complementing asynchronous replication, this solution delivers zero data loss between 2 XtremIO systems within ~60 miles of each other, adding protection options for those critical applications where even loss of a single transaction is unacceptable. To maximize flexibility and efficiency, XtremIO replication can be deployed on an individual application basis – synchronous replication for the most critical applications and asynchronous for business-critical applications. Further, replication can be easily switched between modes at a single click per application. Integration with XtremIO XVC copies ensures multiple versions are available for testing and full DR failover at the target site.2x Storage Volumes: XtremIO is an ideal platform for integrated Copy Data Management (iCDM) thanks to its snap efficient shared metadata architecture, which allows the system to scale linearly regardless of primary or snap copy workloads. Now, each XtremIO system supports up to 32,000 primary/snap volumes, double the number of volumes supported by the last iteration of XtremIO software. This allows for more frequent snapshots to tighten RPOs and bring systems back online with more up-to-date data.  Additionally, application and database owners can leverage this increased scale to more actively generate and provision copies of their data to speed application development and testing.Secure Snaphots: According to the Dell EMC Global Data Protection Index, the cost of data loss is nearly 2X that of unplanned system downtime with an average cost of $996,000. With XtremIO 6.3, snapshot data can now be completely protected from deletion preventing data loss or overwrites. Customers define a retention period (for example – 7 days or 1 month) the snapshot should be kept for, after which it is automatically deleted.  Customers looking for protection against malicious intrusion, like Cyber Ransom or even accidental deletion know that their data is safe and protected. This also helps customers adhere to corporate governance and compliance requirements. To ensure the highest levels of security, even admin accounts will not be able to delete these snapshots during the retention period.Improved Efficiency and Reduction Guarantees: XtremIO now guarantees 3:1 data reduction ratio (DRR) and 5x overall data efficiency, driving additional consolidation and storage efficiency for your storage investment.“Dell EMC XtremIO is critical to our IT infrastructure and the addition of synchronous replication, additional storage volume support and secure snapshots will help support our mission-critical applications,” states Mike Hale, Executive Director, Enterprise Architecture, Information Services, Steward Health Care System, one of the nation’s fastest-growing community healthcare systems.  “The end-to-end solutions offered by Dell Technologies, including Dell EMC XtremIO, will allow us to continue delivering the world class integrated care our patients deserve — efficiently and cost-effectively.”Data availability is one of the most critical requirements for any storage platform and these new updates are designed to ensure that XtremIO continues to improve for our customers.  To date,  XtremIO platforms have a cumulative total of over 280 million lifetime run-time hours.Customer availability of the Dell EMC XtremIO 6.3 software is planned for the December timeframe. Contact your customer support team for details on planning the upgrade. For more information on this release and our XtremIO portfolio, visit the XtremIO product page.last_img read more

February 8

Officials say $44M in fake sports gear seized over past year

first_imgAs the Super Bowl approaches, officials say more than 169,000 counterfeit sports-related items worth $44 million were seized in the past year. The effort, known as Operation Team Player, begins at the end of each Super Bowl and continues through the next. It’s overseen by a unit of Homeland Security Investigations, part of the Homeland Security Department. Officials appeared at a news conference with dozens of counterfeit NFL jerseys and hats, fake Super Bowl rings and numerous other sports items. Officials say people should take care where and how they buy team merchandise and look for proper logos and other markings.last_img read more