Relative Content

Monthly Archives: February 2021

A New Chapter for EMC’s New CTO

first_imgI would like to introduce myself… my name is John Roese, and I am the new Global CTO of EMC Corporation. While I have been with the company since October 2012, I am now getting time to participate in the robust social media presence of EMC. I feel that an introduction and some background on why I joined EMC would be a great topic for my first blog.I like to describe myself as a “serial CTO.” Since the late 1990s, I have mostly held the role of Global Chief Technology Officer in large corporations: initially CTO of Cabletron System (one of the larger networking companies of that time), then CTO of Enterasys Networks (a company focused on infrastructure and security), then CTO at Broadcom (one of the biggest fabless semiconductor companies), then Global CTO at Nortel (a 114-year-old telecom company) and finally leading Futurewei, the advanced technology development organization of the giant Chinese company Huawei.In all of these roles, my focus has been on innovation and the execution of R&D to move industries forward. I was fortunate to be involved in the creation of high performance networking, incorporating security into our IT systems, driving the commoditization and reach of many IT technologies, innovating in the world of mobile broadband (LTE), and even re-inventing the communications experiences we now take for granted.The most exciting work of my career started out as technical impossibilities or even “science fiction.” Now, looking back, after we solved the problems, the solutions were affordable, met customer expectations, and became mainstream. When done correctly, technology work always starts out exciting, impossible and highly aspirational. But if it works well, it ultimately serves as a foundation of the global IT environment. With more than 20 years of experience behind me, this pattern is fairly common.Last summer, my current chapter began with a call from EMC to gauge my interest in joining this company. While I was not actively looking for a new role, I was very aware that the IT industry is at the beginning of a new era. I have been very vocal that for the next decade, the industry will shift from boxes to solutions, from closed private environments to complex hybrid environments, from a distinct enterprise and consumer experience to a consumerization of IT, and from a technology orientation to a much more human and business centric focus. We will see the rise of mobility as our primary access method, we will see the Internet of Things emerge (think trillions of nodes on the internet, not billions), we will see the creation and consumption of data at levels orders of magnitude greater than ever before, and we will see rapid innovation to make all of this technology become invisible to the users and business’s through innovation on UX (user experience) and HMI (Human Machine Interaction).When the call came from EMC, the decision to join was simple. As a technologist who has a firm belief about the future, the opportunity to participate in the center of this new era was irresistible and obvious. EMC has assembled almost all of the key building blocks needed to create the future, including the tools of information infrastructure, security, data and analytics, virtualization, and a deep awareness of the customer. There is nothing more exciting than being at the beginning of what is the most exciting chapter of IT yet — armed with a fantastic arsenal of tools and capabilities and surrounded by deep intellectual capabilities and market access.I am excited to be at EMC and to have a social platform to engage others. After this introductory post, my hope is to share my views and discoveries as this new era evolves. I am truly looking forward to the transformational journey of IT that we are all a part of.last_img read more

Thoughts from 30,000 Feet: Are You Facing These 3 Common IT Transformation Headwinds?

first_imgI spend a lot time in the air traveling to customer meetings around the globe. I hear first-hand about their frustrations and challenges in getting started with IT transformation. They are beyond the point of questioning the need to transform; they are asking, “How do I get started?” And I repeatedly hear a common story around the headwinds they face.  So as I contemplated at 30,000 feet what I had just heard from customers, I found myself comparing their headwinds with the headwinds my flight encountered.Headwinds don’t have the power to stop you dead in your tracks; you power through or navigate around them and eventually make it to your destination, albeit a bit delayed and with some bumps along the way. Here are the top three headwinds I encounter.Headwind #1:  RESISTANCECIOs often face stiff resistance from their engineering organization when moving from a developer of IT services to a broker of services. Many feel threatened and believe they could develop better apps in-house.  My response to CIOs:  “Yes, perhaps they could. But what if…”  And I paint a vision of reduced costs and increased agility. My advice is to take a fact-based approach, look at the real costs and benefits of IT transformation objectively, and then deal with any resistance.I’ve found that once you share that vision with developers – specifically, what’s in it for them – they come around. If you are willing to help them build their own next-gen skills, they get excited about their role in the future state.Headwind #2:  INERTIAWhen EMC loses a transformation deal, it’s typically not to the competition. It’s to “doing nothing.” CIOs are often overwhelmed with the enormity of transformation. Among the many challenges to sort through is how to make any progress while all resources are tied up in “keeping the lights on.” They don’t know where or how to start.A good first step is to gain consensus on desired business outcomes, followed by creating an IT roadmap of achievable building blocks. Prioritize these and identify an initial quick win that can demonstrate the value and show early momentum. With each step toward building an IT-as-a-Service (ITaaS) model, you free up more time and money — resources that can be redeployed to your transformative efforts. In our experience, moving to an ITaaS model has saved companies 20 to 25 percent over legacy IT costs, and has substantially increased their agility to meet their business demands.Headwind #3:  MISALIGNMENTThe IT department has an identity issue to overcome, and some of it is fueled by the IT team itself. They often engage in technical conversations with their business partners when they should be engaging in business conversations. The IT leaders and business leaders are often flying on different levels. My advice to IT:  change your altitude! Think business outcomes first; then think about how IT can help. Understand what’s important to your business and what digital-age opportunities you can bring to the forefront.Agreeing upfront on what “good” looks like for your specific business and what business applications will be required to power success takes a lot of turbulence out of transformation. Decisions (like, which apps to replatform or retire, which to move to the cloud, and which to develop yourself or broker from a third party) will be easier to make with an aligned vision. For those who need help gaining alignment or getting started, EMC offers the IT Transformation Workshop (ITTW), facilitated by our subject matter experts; customers have told us the third-party facilitation has made a huge difference.Reverse the Headwinds!I hope this has given you some ideas on how to navigate the headwinds of IT change. And if you need extra help getting started, we’d love to conduct an ITTW with you. Part of the workshop is assessing your organization’s IT maturity level and providing you peer comparisons; this may help you get the attention of your business partners, as well.To learn more, check out these 15-minute video interviews on IT transformation from theCUBE’s coverage of EMC World 2015:Me & Mike von Slomski, IT Senior Director at Markel (insurance industry customer)Tom Roloff & Paul Conway, EMC Global ServicesHere’s to turning your headwinds into tailwinds that accelerate your IT transformation! Please share your experience in getting started and how we could help.last_img read more

Taking Dell Projectors to Places They’ve Never Been

first_imgVery few technologies have had as much long-term relevance in the workplace and classroom as the overhead projector. As workplace and classroom display technology has evolved, bigger and brighter is not only better, but expected, while also needing to be simple to connect to.While the fundamental idea remains the same, we’ve come a long way since the days of transparencies and dry erase markers. Modern projectors allow presenters to project directly from their laptops and mobile devices, and in many cases, audience members can even connect their own devices to take over presentation duties.As a result, projectors now fit more naturally into the presentation workflow, expanding rather than defining the boundaries of what’s possible. It’s with this type of expansion and enablement in mind that Dell is pleased to introduce the Dell Advanced Projector 7760, our first laser (lamp-free) projector. The 7760 stretches the boundaries of where, when and how students or professionals and their colleagues can collaborate, and it’s the latest addition to Dell’s growing Large Displays portfolio, serving conference rooms and classrooms with a strong line-up of projectors and large monitors.This high-brightness projector is an improved, lamp-free version of the current Dell 7700 FullHD, providing an excellent color gamut with rich, true colors. We designed this projector to address some of the limitations of lamp-based projectors to create a more ideal option for a few common use cases:Brightly lit roomsStandard projector images can be difficult to see in rooms with windows or bright lights, such as conference rooms and hotel meeting rooms. The Dell Advanced Projector 7760 laser projector provides 5,400 lumens for a bright, large-scale image in a wide range of lighting circumstances.It also makes it easy for anyone to present. With LAN Display, workers can present from any compatible device, including laptops, phones and tablets connected to the network, and can trade presentation duties throughout the course of a meeting. For any devices that aren’t connected by LAN, we’ve made it easy to connect wireless display dongles. And since audio is of key importance in today’s multimedia world, we’ve given the projector two 10W speakers for quality, on-board sound fit for rooms of any size.Lecture halls and auditoriumsIn addition to the bright image, centralized capabilities and quality sound, the Dell Advanced Projector 7760 laser projector can fill large screen sizes (up 300 inches diagonally), making it a good fit even for halls and auditoriums with 20-plus people.Heavy duty applicationsUnlike most projectors, the Dell Advanced Projector 7760 laser projector can be set to operate 24/7 and has 360-degree placement capabilities, so users can mount or place it in any position or angle. These capabilities, combined with the long laser life of 20,000 hours, make this projector ideal for companies that have heavy duty needs.Bigger screens, lower costsOne of the primary benefits of projectors compared with other large-format displays is the cost savings, which can be significant for small businesses and educational institutions with limited budgets. Whereas, in the past, these organizations have required the IT or facilities maintenance resources to replace lamps as they burn out. The laser projector supplants that need by providing 20,000 hours of laser life, up to 10 years for most organizations. It’s low energy consumption, means a lower operating cost as well. All of this is backed by our reliable technology and two-year, extendable Advanced Exchange warranty.The Dell Advanced Projector 7760 laser projector is a shining example of what Dell does best – bring innovative technologies to market that solve real challenges for real users. The Dell Advanced Projector 7760 is a far cry from the projectors of our childhoods, but for good reason – today’s needs are far more complex. And as those needs continue to evolve, our goal is to provide the innovative technology to support customers in working more efficiently and effectively, whether they’re presenting to a conference room of project collaborators, an auditorium of colleagues or a child’s fifth-grade classroom. We’re excited to share this device with customers and look forward to seeing it reach new audiences, while also creating unimagined possibilities for thousands of loyal Dell users.last_img read more

Cybersecurity in the Workplace Is Everyone’s Business

first_imgThis is the first in a three-part series written for National Cyber Security Awareness Month. [next post]For the IT professionals on your team, cybersecurity is a concern that’s woven into the fiber of every task, day in and day out. That’s at least partly because cybersecurity is a key job responsibility for them – their performance hinges on, and is measured by, their ability to keep company data and systems secure.But for other employees at your company, including members of your C-suite, cybersecurity can be far removed from their day-to-day consciousness. In fact, unbeknownst to them, their to-do lists may even include tasks that are in direct conflict with the airtight security the IT team is trying to achieve.The cybersecurity disconnect starts at the topAccording to the 2016 Dell Data Security Report, almost three-quarters of IT and business decision makers agree that data security is a priority for their organization’s C-suite. But despite this, IT teams still report that senior executives don’t pay enough attention to security concerns, and about 25 percent don’t feel their C-suite is informed about data security issues. Moreover, only one in three respondents feels very confident in their C-suite’s ability to budget enough for data security solutions over the next five years.The trickle-down effectsThis disconnect trickles down to the rest of the workforce. Dell’s 2017 End-User Security Survey found 72 percent of employees are willing to share sensitive, confidential or regulated company information if it helps them accomplish their day-to-day tasks. Moreover, the way employees share this information is often unsafe. More than half of employees (56 percent) use Dropbox, Google Drive, iCloud and other public cloud services for sharing or backing up their work, and 53 percent use a personal account to access these services. Forty-five percent of employees use email to share files with contractors and other third parties.And despite the fact that 63 percent of employees receive cybersecurity education training, 24 percent engage in unsecure behaviors to get their job done.So why does corporate leadership say data security is a priority but then fail to act accordingly? And why isn’t cybersecurity education keeping employees from making bad choices? Well it’s simple. Most people in an organization are not measured on their security hygiene. They’re measured – and rightly so – on a variety of metrics to demonstrate productivity and success based on their department’s and the company’s goals. So what can be done to help ingrain security throughout the entire organization?IT teams must have a seat at the table The IT team is a vital stakeholder and knowledge center for most corporate initiatives, but often they’re required to simply react to business plans that are already underway.When IT teams aren’t involved from day one in designing and vetting major company initiatives – such as BYOD programs, mobility and work-from-home programs, policies and procedures surrounding the use of contractors, and other scenarios common in today’s workplace – budgets won’t be allotted correctly and the right technology, policies and procedures won’t be implemented.Security curriculum, policies and procedures must be based on real-world scenariosEven in an ideal situation where an organization’s C-Suite is well-versed in security issues, and IT has the opportunity to weave cyber security best practices into the overall business strategy, it is crucial that education, awareness, policies and procedures trickle down to every employee at the company. Some cybersecurity risks are more obvious than others, and the assumption that everyone in the company understands all the risks is a dangerous one. Framing security risks in terms of real-world examples and scenarios can help everyone in an organization get smart on the issue.For example, most employees will recognize that they can’t share customer credit card information with anyone. However, a marketing manager may not think twice about sharing a customer list with personal identifiable information on it with a contractor – information that could be used to engage in identity theft if it fell into the wrong hands.This is why it’s vital to communicate policies and procedures using real-world examples that employees are likely to encounter:What should they do if a supervisor tells them to share a certain file?What type of information can be shared, how and with whom?What are the potential consequences of violating these policies?Employees must be empowered to be productive – safelyEducation is important, but it’s not enough. Companies must give employees the tools they need to do their jobs more securely.Dell believes effective security should embrace the way employees work, whether it’s when they are in the office, at home or on the road. That is why Dell has gone beyond protecting data at rest to protecting it no matter where it goes, controlling and tracking access along the way with Dell Data Guardian, a solution we developed-in house to provide file-level encryption and enterprise digital rights management to protect, control and monitor data both inside and outside of the network. Data Guardian goes above and beyond data encryption by protecting data when it moves to another device or is in use.In this new era of mobility and digital collaboration, cybersecurity is everyone’s business. Data security shouldn’t be a productivity-killing hassle for employees or an uphill battle for IT teams – it should be a seamless collaboration, with each team playing its part to make security best practices easy to understand and ingrained throughout the workplace.last_img read more

Unlocking Data Insights with PowerEdge and Microsoft SQL Server

first_imgUnderstanding how to uncover insights and drive value from data can give your organization a distinct competitive advantage. This can be complicated since the IT landscape is constantly evolving, especially when it comes to data management and analytics. In a recently published report, ESG surveyed IT decision makers and “nearly two-thirds (64%) said they believe IT is more complex now compared with two years ago; and another 17% said it is significantly more complex.”Organizations can navigate these complexities by focusing on unlocking data insights and bolstering their security posture to protect data.Unlocking Data Insights One of the biggest advancements in database technology came with the introduction of SQL Server 2019 and its new data analytics capabilities. Using R and Python, SQL’s Machine Learning Services can analyze data across multiple disparate data sources, not just the data contained within the SQL database. SQL is no longer just a database, it is the engine that will collect and analyze data – wherever that data lives and in whatever form – structured or unstructured. This eliminates the time and expense associated with data ingestion providing quicker insights to inform business decisions.Also key is SQL 2019’s platform compatibility. For the first time, there is full feature parity with Red Hat Enterprise Linux and Kubernetes. A Linux shop can get the full benefit of SQL without having to refactor to Windows.The reporting capabilities of SQL Server Reporting Services, along with the included Power BI Report Server, produce powerful reports that take ones and zeros and provide real information. The translation of data into knowledge gives business an edge.In order to make the most of these cutting-edge capabilities, it is worth taking a look at the hardware that houses the data estate. When time is of the essence, it is important to be able to process this data efficiently, with little to no latency. That is one of the ways PowerEdge servers with Intel® Optane™ persistent memory can add value to the SQL server environment. Optane persistent memory enables transactions to be performed directly on the memory bus, eliminating the extra time needed for data to transfer between the storage module to the processor. In simpler terms, having the option of storage available in a memory slot gives data quick access to the “brains” of the server. Consider this, a Dell EMC PowerEdge R740xd server using Intel® Optane™ persistent memory delivered 2.2 times the Microsoft SQL Server 2019 performance of a two-NVMe drive configuration and improved performance even more significantly over SATA SSDs—delivering 11.3 times the transactions per minute.¹SQL is Synonymous with SecurityProtecting the data that is the foundation of business is top of mind. In fact, ESG reports that organizations are fighting the battle on two fronts: “40% of respondents identified the need to strengthen their cyber security position, but nearly half (44%) also cite chronic skill shortages in the area of cybersecurity.”Fortunately, SQL is widely recognized as a secure data platform. It is designed with a number of security and compliance features, including the ability to encrypt sensitive data. It is important to know that security patches for SQL 2008 ended in July 2019 and SQL 2012 mainstream service life ended October 2018. Given these recent end of support dates and benefits, now is the optimal time to consider migrating to SQL Server 2019.Protecting data infrastructure starts at the hardware level. PowerEdge servers are built with integrated security features such as the “always-on” iDRAC, which can provide system monitoring and alerts. Security features are built directly into the firmware to help block malicious attacks, detect deviant activity, and restore critical operations when necessary.Additionally, Dell Technologies OpenManage systems management solutions can help simplify, automate, and optimize IT operations. For example, OpenManage Integrations for Microsoft System Center and Windows Admin Center enables visibility and control of hardware infrastructure, operating system, virtual machines, and containers.Simplifying the Data Management LandscapeDell Technologies and Microsoft have partnered for over 35 years. During that time, Dell has received numerous global competencies and over 50 Microsoft “Partner of the Year” awards. This long-standing relationship makes Dell Technologies the ideal infrastructure partner as we offer a broad suite of products to support Microsoft platforms.Choosing to implement new software does not have to be complicated. Eliminate the need to manage multiple purchase orders or vendors with a PowerEdge and SQL 2019 OEM solution. Customers who choose to purchase SQL with their PowerEdge servers will be able to easily install the software on their PowerEdge platform.Learn more about how PowerEdge servers can be the foundation for an all-in-one database solution with SQL 2019. Read the full ESG study, or join the conversation @DellEMCServers._______________________¹Based on Principled Technologies Report commissioned by Dell EMC, “Watch your transactional database performance climb with Intel® Optane™ DC persistent memory. Dell EMC PowerEdge R740xd servers with Intel® Optane™ DC persistent memory handled more transactions per minute than configurations with NAND flash NVMe drives or SATA SSDs,” November 2019, comparing a Dell EMC PowerEdge R740xd with Optane™ DC Memory to the same system with SSDs and NVMe drives. Actual result will vary.last_img read more

Mom of 15-year-old killed by Oklahoma police sues for video

first_imgOKLAHOMA CITY (AP) — The mother of 15-year-old boy who was shot to death by Oklahoma City police in November is asking a judge to order the city to “immediately furnish” footage from officers’ body cameras. A lawsuit filed Tuesday argues that the city is violating state law by failing to release the footage of the Nov. 23 shooting of Stavian Rodriguez. The Oklahoman reports that the suit contends the recordings are public records subject to disclosure. Attorney Rand Eddy initially sought the recordings in a Dec. 14 letter written on behalf of the boy’s mother, Cameo Holland. Eddy says the city has yet to produce the recordings or say why it won’t.last_img