Blog

The problem with too many VMs

The problem with too many VMs

Unlike maintaining multiple servers, which have to be manually installed and configured, deploying virtual machines (VMs) require very little effort. By making a few simple adjustments in your virtualization console, you can easily create a virtual instance with enough resources to run even the most demanding apps.

Why We’re Still Just Getting Started on the IoT Journey

Why We’re Still Just Getting Started on the IoT Journey

I’ve been working on IoT projects since before the Internet of Things became a buzzword. From the beginning, as we were connecting equipment and processes for the first time, we knew we were onto something big.

And big it is. Billions of devices are already connected to networks, and every day millions more are added.

Cloud Computing Is the next Business Platform: What This Means for Your Organization

Cloud Computing Is the next Business Platform: What This Means for Your Organization

For IT organizations, cloud computing can dramatically impact not only technical infrastructure but also skill sets, processes and operations—often in unanticipated ways. In fact, cloud computing is fundamentally changing how both IT and businesses “get things done”.  More than just a technology, cloud is now THE core business platform for all digital enterprises.

The Future of Interactive White Boards

The Future of Interactive White Boards

Craig Tranter is a former educator, and now serves as a technology presenter for Cisco. This blog is part of a series on advancements and opportunities in education. All views are his own. 

One thing that all teachers will be fairly familiar with by now is the use of Interactive White Boards (IWBs). However, the level of interaction can vary wildly between schools and between teaching staff.

Google weighs in on account hijacking

Google weighs in on account hijacking

According to experts, passwords shouldn’t be the only way you defend your accounts. After all, hackers have plenty of tricks and tools to steal them. So to help businesses fully understand the risks involved, Google conducted a study on the causes of account hijacking.

Patching Missteps Are Not an Excuse to Blame Victims of Ransomware Attacks

Patching Missteps Are Not an Excuse to Blame Victims of Ransomware Attacks

“It’s their own fault. They wouldn’t have been hit if they’d kept up with their patches and updates.”

How many times did we hear this line in the wake of WannaCry, Petya and virtually every other cyber attack that has exploited known vulnerabilities in recent years? To hear the Monday-morning quarterbacks talk, you’d think data security teams the world over were either lazy, unknowledgeable or both if they fell victim to one of these massively successful cybercriminal ventures.

Beware of sneaky Microsoft Office malware

Beware of sneaky Microsoft Office malware

Cybersecurity systems are getting better at identifying and preventing attacks coming from all directions. At the same time, hackers are coming up with new ways to bypass these systems. While online scams are the most common ways to do this, cybercriminals have discovered a new attack method using Microsoft Office.

Creating a Better World with Technology: What Government IT Leaders Told Us at the Digital Transformation Summit

Creating a Better World with Technology: What Government IT Leaders Told Us at the Digital Transformation Summit

The conversation on digital transformation in government is building and we’re excited to hear it and add to the noise. We value the thoughtful exchange of ideas and exploration of issues — it’s one of the traits that keeps Dell EMC innovative.

At the recent Dell Technologies Digital Transformation Summit in Washington, D.C., we brought together leaders from industry and the federal technology community to discuss how agencies can take action now to make digital transformation a reality.