You’ve been identified as an employee who is accessing the Education Services Customer site. If you wish to perform activities such as browse, track or consume training, please select here to be redirected. For more information about accessing the education website – please visit our FAQ.



Knowledge Sharing is a platform for certified Dell Technologies Proven Professionals to submit articles that showcase their expertise, unique deployments, best practices, or any relevant topic of interest.

Each year, the program invites certified Proven Professionals to demonstrate their thought-leadership by participating in a Knowledge Sharing competition, a fun, and slightly competitive way of sharing the vast amount of knowledge among our certified audience. Authors whose articles are selected by our panel of judges are recognized and awarded at our Dell Technologies Proven Professional Knowledge Sharing award ceremony during Dell Technologies World.

Today, the Knowledge Sharing Library is host to 500+ articles and videos covering topics from Artificial Intelligence, Data Science, Cloud Computing & Security, Storage platforms and more. We are nearing 3 million downloads from the KS Library, a true testament to the power of sharing knowledge.

Ready to join the community of published authors? Competitions generally run October – May.



2020 Knowledge Sharing Winners Announced

The 2020 Knowledge Sharing Winners accept their awards at the ceremony.


2020 Competition First Place Winner

How 5G Transforms Cloud Computing


Mikhail Gloukhovtsev
Sr. Solutions Architect
Digital Solutions, Cloud & IoT
Orange Business Services

In this article, awarded 1st Place in the 2020 Knowledge Sharing Competition, Mikhail Gloukhovtsev explores the emerging concept of 5G and cloud computing symbiosis and how it transforms cloud computing. This transformation results in new cloud computing architectures, affects various businesses using cloud services, and enables new business opportunities. Mikhail reviews key challenges in 5G-cloud solutions and provides insight on how to develop cloud-services strategies in the era of 5G.


2020 Competition Second Place Winner
Project Alvarium: The Future of Edge Data

Steve Todd
Dell Technologies Fellow
Dell Technologies
In this article, awarded 2nd Place in the 2020 Knowledge Sharing Competition, Steve Todd explores the future of edge data and how the Project Alvarium community can advance the adoption of Data Confidence Fabrics (DCF), a proposed industry standard which allows business applications to measure the "confidence" or "trustworthiness" of data created on the farthest reaches of IoT and edge deployments. Steve provides an overview of Project Alvarium, what problems it solves, and how it will be implemented.

2020 Competition Third Place Winner
Distributed Intelligent Security Agents for IoT

Sandra Mamdouh Sidhom
Sales Engineer Analyst
Dell Technologies
In this article, awarded 3rd Place in the 2020 Knowledge Sharing Competition, Sandra Mamdouh Sidhom examines an intelligent-based approach to detecting abnormal behavior in IoT systems. Sandra discusses the existing paradigms of distributed intelligent agents as well as the security threats taking place in the IoT domain, then examines whether it is feasible to utilize the distributed intelligent agents to detect abnormal behaviors in the IoT environment.

Best Of Data Storage

The Evolution of Enterprise Storage


Bruce Yellin Over the last two decades, the world of enterprise storage has gone through revolutionary changes. Concepts of performance, cost, capability, and features have taken on new meanings. Now, computer storage is on the cusp of yet another shift. Moore’s Law is being kept alive with new types of storage that doubles the performance while halving the cost. In this article, awarded Best of Data Storage in the 2020 Knowledge Sharing Competition, Bruce Yellin explores the dramatic changes in enterprise storage happening this decade through easy-to-follow explanations and examples of these developments.

Best of Data Protection

Immutable Data Protection for Any Application 


Mike van der Steen
Principal Systems Engineer
Dell Technologies


In this article, awarded Best of Data Protection in the 2020 Knowledge Sharing Competition, Mike van der Steen provides an overview of the fundamental Data Domain features leveraged to create immutable copies of backup data, the process of creating them, the recovery process and a sample script to automate the daily tasks of creating these immutable copies. While the primary focus of Mike’s article is based on backup applications, it can be extended to incorporate any application storing data on Data Domain, hence providing immutable data protection for any application.

Best of Quantum Computing

Harnessing Uncertainty


Terence Johny
Solutions Engineering Specialist
Dell Technologies


The world has been steadily pacing toward the goal of Quantum supremacy. Will it improve the quality of the human life experience, or will it add another layer of complexity to our existence? In this article, awarded Best of Quantum Computing in the 2020 Knowledge Sharing Competition, Terence Johny explores the quantum world and deciphers some of the core phenomena that govern the quantum realms, while trying to bind those concepts to modern quantum computing architecture.




2020 Publication Schedule

August Title Category Author
  Factors Influencing Anatomy of Digital Future Transformation Sabyasachi Panda
NVMe THE FUTURE Storage Abhijith M and Naga Koduru
Securing Memory Sharing for Cloud Tenants Cloud Sameh Talaat and Hussein Baligh
An Objective Use of Blockchain in Object Storage Blockchain Anthony Dutra, William Lupo and Varshith AnilKumar
September Title Category Author
  Customer Sentiment Analysis Data Science Sucheta Dhar and Prafful Kumar  
Manual Storage Sizing Storage Poorna Prashanth
Fine-Tuning Deep Neural Networks Deep Learning Rajasekhar Nannapaneni
Bridging Digital Transformations Through RPA Automation Mohammed Hashim
October Title Category Author
  Data in Driver Seat of Modern Vehicles Data Science Shankar R  
SecureMLM - Privacy Aware Machine Learning Model Machine Learning Shikha Pandey
Resource Allocation Using Reinforcement Learning Cloud Chethan Nagaraj and Manu Joshi
Enhanced NetWorker(AI) to WOW Customer Experience Storage Arvind Kumar A R
November Title Category Author
  Study of the Use of Anonymity Models Security Carmen Marcano
Use Dell Technologies to Solve Your Dark Data Challenges Data Science Sonali Singh
AI and ML Workloads Platform: Cloud or On Edge Machine Learning Harshit Dixit and Rani Priya S
Optimal Path Routing Using Reinforcement Learning Storage Rajasekhar Nannapaneni
December Title Category Author
  Innovating with Lean Six Sigma Process Improvement Animesh Gupta
Data Protection for Containers Data Protection Naveen Chandrashekar
Future of Container Native Storage Containers Sarthak Sharma and Abhisek Sharma
Faction with Isilon Isilon Sai Ganesh, Hari Narayanan S and Dhriva Kumar urajala
January Title Category Author
  Whole Genome Sequencing in Life Science Isilon Gangadhara N and Lenin Ponnappa
VMware Cloud Foundations: Re-defining Hybrid Cloud  VMware Anuj Sharma and Benedikt Mayer
Pass the Hash Security Nikhil Gowda
Y NOT VMware Cloud on Dell EMC - A one-Stop Shop Cloud Vinayak Coimbatore Sivanand
February Title Category Author
  Security Reshaped in the Digital Transformation Era Security Mohamed Sohail, Khaled Ahmed and Robert Lincourt
Three Use Cases for Storage Class Memory (SCM) Storage Hussein Baligh, Abdelrahman Elnakeeb, Ebrahim Mohamed Serag and Lina SalemEissa
Convolutional Neural Network Deep Learning Shwetha Lokesh
Isilon Sizing: Sizing For Accurate Capacity Isilon Bhupendra Singh
March Title Category Author
  Operation "Olympic Games" Security Kshitij Yadav and Abhiram T.S.
Implementation of AI/ML in M&E Vertical Artificial Intelligence Saif Al Rehman
Solving FSI Challenges with Dell EMC UDS Isilon Bhupendra Singh and Sai Ganesh
Multiple Active Data Centers Solution Storage Victor Wu
April Title Category Author
    Long-Term Retention and Archiving Digital Files Storage Vinicius Assis
PowerChain – Based on Blockchain 3.0 Blockchain Rajasekhar Nannapaneni
Validation of Isilon F800 for EDA workload Isilon Xiao-Jing Coroel Zhu
Evolution of 5G & Engineering SLA for Scalable XaaS Automation Shadaab Mohiuddin and Tabraiz Amman