July |
|
|
|
Title |
Category |
Author(s) |
Thumbnail |
Impact of 5G and Digital Transformation on Storage |
5G / Storage |
Likith P
and
Sanna Meer |
This article provides an overview of how modern businesses and technologies are or will use 5G to transform user experience. Topics such as digital transformation with 5G, various 5G industrial use-cases, taking 5G to the cloud and the impact of 5G on the economy are discussed and examined. |
Occupational Safety with AI |
Artificial Intelligence |
Dhriva Kumar,
Aruna Kolluru,
Hari Narayanan S,
and
Rahul Joseph |
This article examines how AI can help improve occupational safety in a number of industries. It focuses on using AI technology to analyze data in real-time and provide meaningful output, such as a system of warnings to ensure workplace or occupational safety. Implementation methods of this technology in various industries and advantages and disadvantages of using AI to ensure Occupational Safety are also discussed. |
Dell EMC PowerScale with Superna for Healthcare |
Cybersecurity |
Sai Ganesh,
Nidhi Shree,
and
Akshay U |
This article explores threats faced by healthcare organizations, the current status, and best practices that can help healthcare organizations defend against ransomware. Also discussed is how Dell EMC PowerScale's layered cybersecurity approach along with Superna offerings such as Superna Ransomware Defender, Superna Easy Audit, and Superna Gold Copy Virtual AirGap offers simplified and automated solutions to healthcare customers to ensure business continuity and protection against ransomware. |
August |
|
|
|
Securing Industries with Cyber Recovery |
Cybersecurity |
Sindhu Hedge
and
Varun Christian |
Protecting data and being able to recover it correctly whenever required is a top priority of businesses across all industries – financial, healthcare, education, and more. This article provides an overview of Dell Technologies' Power Protect Cyber Recovery air-gapped, vault solution and how it differs from having a backup/replicated copy. |
Infrastructure as Code |
DevOps |
Rahul Joseph
and
Rani Priya S |
Infrastructure-as-code (IaC) is the DevOps tactic of managing and provisioning infrastructure through machine-readable definition files, rather than physical hardware configuration or interactive configuration tools. This article explores how customers adopt and develop IaC, which support is currently available, i.e. typically used tools and their advantages/disadvantages, and the practitioner's needs when dealing with IaC development, maintenance, and evolution. |
DataIQ – Empowering Data-first Strategy |
Storage |
Prateek Bhat |
This article explains how Dell EMC’s DataIQ software addresses today’s data asset management needs, helping data asset managers and stakeholders discover all their unstructured data anywhere, across billions of files and objects throughout the enterprise in 3 simple steps. |
September |
|
|
|
Eliminate Risk through Data Protection Monitoring |
Data Protection |
Mike van der Steen |
Data Protection Advisor (DPA) is more than just basic backup reporting; it includes an analytic engine which can inspect data protection activities, run them against a set of predefined rules and enable compliance-based reporting to help organisations determine data protection risk exposure. This article offers a deeper understanding of the power of DPA, how reports are created – Including, a section on how reports can be customized to meet the specific requirements – and what business insights can be gleaned from them.
|
Get Ready for Edge Computing |
Edge |
Victor Wu
and
Joe Yip |
A distributed computing architecture, edge computing brings computation, data storage and enterprise applications closer to data sources such as IoT devices or local edge servers. This article introduces the strategy and technology of edge computing to perform consistent operation and management on infrastructure, data, applications and security. Recommendations for planning edge computing are featured to help readers successfully deploy edge environments, develop management strategies, create new business opportunities and successfully innovate and transform. |
Application Modernization using VMware Tanzu |
Applications |
Sathish Kumar
and
Shilpa Bhasker |
The switch to microservices architecture is on as major organizations recognize that it allows them to become more agile and responsive to consumer demands; two key aspects for success in the modern economy. This article provides a high-level overview of “Microservices”, how it differs from traditional monolithic services architecture and the advantages of adopting a microservices approach. |
October |
|
|
|
So, You Want to be a Principal Systems Engineer? |
Career Development |
Brian Dehn |
While this article does not address the specific ‘check box’ requirements that a technology vendor may mandate for achieving Principal – normally documented as part of a formal Principal program – it does provide the author’s advice, suggestions, and recommendations based on his personal experience as a Principal Systems Engineer and addresses how you might achieve the same or greater success in your career. |
Ease Operations with Tanzu Kubernetes Grid |
Containers |
Amal D Nair,
Anitha Rosely
and
Anirudh Sandur |
Tanzu Kubernetes Grid Integrated Edition (TKGI) facilitates deployment and operation of Kubernetes clusters, enabling containers to be run and managed at scale on private and public clouds. This article provides an overview of how TKGI deployment eases day one and day two operations, and ensures consistency across data center, public cloud, and edge. How Dell Technologies PowerStore is compatible with this deployment and further eases operability and management is also discussed. |
Unravel Customer Landscape with Asset Discovery |
Data Analytics |
Divya Jyothi V
and
Karishma R |
Asset discovery and management is used to plan, optimize, execute, and track the needed tech refreshes, maintenance renewal activities or digital transformation with the correlated information, budget, priorities, skills, trainings and anything pertaining to drive a business or opportunity. This article discusses asset discovery and asset management using various Dell EMC tools, the need to understand the basis of having a strong “must-have” aspects of asset discovery, and what to do with the information you’ve discovered. |
November |
|
|
|
IoT Security: Challenges and Future Trends |
Cybersecurity |
Ranjisha R
and
Sowmya S Gowda |
IoT is now mainstream and represents a significant opportunity for the global economy, society and business. With this expansion, security becomes a major concern. Adopting a security-focused mind-set helps IoT product and service providers mitigate risks ranging from cybersecurity threats to regulatory action. This artilce provides insights on cybersecurity of IoT devices, along with some major applications in industries, research challenges and trends. |
Importance of Data Integration in the Data Decade |
Data / Storage / Business Intelligence |
Bhavana Sayiram |
This article discusses the need and benefits of proper data integration, its impact on the business and how the principles of Modern Data Integration resolve bottlenecks created with the Extraction, Transform, Load (ETL) process. It addresses key areas of concern and provides foundational knowledge of an often overlooked aspect of being a data-driven organization; assembling an organization’s data into a usable structure. The detailed ETL process is very helpful and concise. |
Intelligent Spaces |
Artificial Intelligence |
Amal D Nair
and
B Ranjeeth |
This article provides an overview of how sensors and logics can be used to make a surrounding environment smarter and more efficient. The authors explore deployment of Smart Spaces using sensor tables and how automation eases operability of the space. Also discussed are operational challenges and how they can be addressed by tweaking some of the logic to improve system performance and efficiency. |
December |
|
|
|
NetWorker Clone Optimization |
Data Protection |
Anay Pathak
and
Deepak Verma |
The need to clone data is normally driven by a requirement for additional protection or the need to move data to a specific media type or location. In both cases, the priority is to secure the data as quickly as possible. Cloning and staging enables more effective use of storage devices by moving data between different types of devices. This article explains how to achieve two backup copies without Clone Controlled Replication (CCR). |
Connected Vehicle Cloud Platform |
Cloud |
Jithin Raj
and
Vaishnavi Adiyodi |
Convergence of autonomous, connected, electric and shared mobility technologies is radically altering how people and goods move, presenting a vast opportunity for the automobile industry. This article discusses how the automobile industry can leverage a cloud paltform to efficiently collect, process, analyze, and store valuable data assets to realize a number of positive business outcomes. |
Microservices: Independently Deployable Services |
Applications |
Swati Sinha,
Anirudh Sandur
and
Anuj Seth |
Microservices is a highly scalable architecture for developing software applications, enabling organizations to become more agile and responsive to consumer demands. This article serves as a reference document for anyone looking to understand Microservices and its architecture and will also provide a starting point for considering Microservices best practices. How Microservice architecture is optimized for development of cloud-native applications is also discussed along with a use-case to explore boundaries and advantages of Microservices. |
January |
|
|
|
Microsegmentation: Defense in Depth |
Cybersecurity |
Sathish Kumar
and
Varun M |
Organizations use microsegmentation – a method of creating zones in data centers and cloud environments to isolate workloads from one another and secure them individually – to reduce the network attack surface, improve breach containment and strengthen regulatory compliance. This article explores microsegmentation technology and techniques, traditional models of VM security and why the future of virtualization security is microsegmentation, with a focus on VMware NSX. |
Autodiscovery Proxy To Protect Cloud Resources |
Data Protection |
Pablo Calvo,
Rex Torti,
Claudio Jeniec
and
Norman Arteaga |
Data protection in the cloud has become more challenging and complex, as data may be geographically dispersed over multiple data centers in public, private and hybrid cloud environments as well as on-premises locations. This article discusses how to use Dell Technologies data protection products to protect any set of cloud data, discovering them dynamically through "Autodiscovery Proxy To Protect Cloud Resources", an effective, integrable, easy to deploy and low-cost solution that covers the gap in current cloud backup solutions. |
Beginner’s Guide To Storage |
Storage |
Chetan Gowda |
When customers purchase capacity for their Storage system, they may not get to use the entire capacity that they purchase; in most cases, raw capacity does not equal usable capacity. This article explains the basics of storage capacity in a Storage Area Network (SAN) environment. The article is especially helpful for non-technical people working as an analyst to understand the basic concepts around capacity in a SAN world, which will help them design technical storage solutions. |
February |
|
|
|
Digital Twins – Promises and Concerns |
Virtualization |
Srishma HS
and
Akshay A G |
A Digital Twin – a digital representation of a physical object or system – is at the core of the fourth industrial revolution (or Industry 4.0) which embraces automation, data exchange and manufacturing technologies. This article discusses the significance, concerns and unlimited possibilities surrounding this nascent technology, highlighting distinct applications including Manufacturing, Automotive, Healthcare, and Space Research. |
Being Black in Tech |
Business Strategy / Diversity |
Kevin Moore |
This article offers insight on the unique challenges Black professionals encounter in IT and suggests a framework to help companies move from promoting diversity and inclusion, to practicing it. The author explores recommendations that include tangible steps to help companies transform their stated ideals into reality. |
The Data Center of the Future |
Data Center |
Sai Ganesh |
This article evaluates various technologies that increase efficiency and decrease energy consumption in data centers. A variety of issues faced by data centers, the current status, and future technologies that can make data centers sustainable are detailed. Data center architecture design best practices are presented for consideration. The author also looks at what the Electronic Product Environmental Assessment Tool (EPEAT) program is and how manufacturers can use the EPEAT Registry to build sustainable hardware that goes into the data centers. |
March |
|
|
|
Video |
Cybersecurity |
Kurt Rybczyk |
A cyber event is no time to be looking for a runbook or searching for procedures on how to recover the backup application. This video shows how fast and simple it is to perform an automated recovery of Dell Technologies NetWorker with the Cyber Recovery software. With just a couple of clicks, the application is ready to perform restores in the vault, hastening your ability to begin to recover from a cyber event. |
Guidelines to Size DD in a Cyber Recovery Vault |
Cybersecurity |
Yashaswini N,
Abhijith M
and
Shrishti Shetty |
Destructive attacks like ransomware are on the rise. Beyond the production environment, the latest enticing target for an attacker is backup and disaster recovery data. The first step toward protecting these assets is to plan how to efficiently recover from cyber-attacks by having backups that don’t get encrypted by ransomware. This article presents guidelines on how to size Dell Technologies Cyber Recovery Vault Data Domain to achieve unparalleled protection against debilitating and costly ransomware. |
Video Surveillance Options in a Smart City |
Storage |
Varun Christian
and
Sindhu Hegde |
This article provides an overview of how Dell Technologies product portfolio plays a vital role in Video Surveillance (VS) incorporated in a smart city. Good, Better, and Best options are presented for implementing VS depending upon the scale of the smart city, along with the benefits and challenges. |
April |
Data Domain Sizing Best Practices |
Backup |
Pragathi R S,
Mohammed Moueen
Wahab,
and
Shilpa Bhasker |
This article covers key factors that affect capacity requirements of Data Domain, how the solution builder sizing toolcan be used to calculate usable capacity of Data Domain and how to avoid sizing for incorrect usable capacity and the importance of Blue-Green charts for sizing. |
Fine-Tuning Replication Using DSP |
Data Protection |
Mohammed Moueen
and
Anamika Kumari |
This article is intended for Dell Technologies sales, presales and post-sales personnel interested in acquiring high-level understanding of the Distributed Segment Processing (DSP) architecture to fine-tune customer’s current backup and replication process and making it more efficient. |
Urban Edge Computing: Server-less, Better, Cheaper |
Edge Computing |
Shadaab Mohiuddin
and
Tabraiz Amman |
The concept of Serverless Computing at the edge is still in its infancy. This article analyzes function execution times in cloudlets, edge and micro datacenter and explores integration support and scalability cost constraints associated with serverless services provided by various vendors: Google Cloud Functions, AWS Lambda@Edge , AWS Greengrass, edjx.io and Azure Functions. |