October |
Title |
Category |
Author(s) |
Summary |
So, You Want to be a Principal Systems Engineer? |
Career Development |
Brian Dehn |
While this article does not address the specific ‘check box’ requirements that a technology vendor may mandate for achieving Principal – normally documented as part of a formal Principal program – it does provide the author’s advice, suggestions, and recommendations based on his personal experience as a Principal Systems Engineer and addresses how you might achieve the same or greater success in your career. |
Ease Operations with Tanzu Kubernetes Grid |
Containers |
Amal D Nair,
Anitha Rosely
and
Anirudh Sandur |
Tanzu Kubernetes Grid Integrated Edition (TKGI) facilitates deployment and operation of Kubernetes clusters, enabling containers to be run and managed at scale on private and public clouds. This article provides an overview of how TKGI deployment eases day one and day two operations, and ensures consistency across data center, public cloud, and edge. How Dell Technologies PowerStore is compatible with this deployment and further eases operability and management is also discussed. |
Unravel Customer Landscape with Asset Discovery |
Data Analytics |
Divya Jyothi V
and
Karishma R |
Asset discovery and management is used to plan, optimize, execute, and track the needed tech refreshes, maintenance renewal activities or digital transformation with the correlated information, budget, priorities, skills, trainings and anything pertaining to drive a business or opportunity. This article discusses asset discovery and asset management using various Dell EMC tools, the need to understand the basis of having a strong “must-have” aspects of asset discovery, and what to do with the information you’ve discovered. |
November |
Title |
Category |
Author(s) |
Summary |
IoT Security: Challenges and Future Trends |
Cybersecurity |
Ranjisha R
and
Sowmya S Gowda |
IoT is now mainstream and represents a significant opportunity for the global economy, society and business. With this expansion, security becomes a major concern. Adopting a security-focused mind-set helps IoT product and service providers mitigate risks ranging from cybersecurity threats to regulatory action. This artilce provides insights on cybersecurity of IoT devices, along with some major applications in industries, research challenges and trends. |
Importance of Data Integration in the Data Decade |
Data / Storage / Business Intelligence |
Bhavana Sayiram |
This article discusses the need and benefits of proper data integration, its impact on the business and how the principles of Modern Data Integration resolve bottlenecks created with the Extraction, Transform, Load (ETL) process. It addresses key areas of concern and provides foundational knowledge of an often overlooked aspect of being a data-driven organization; assembling an organization’s data into a usable structure. The detailed ETL process is very helpful and concise. |
Intelligent Spaces |
Artificial Intelligence |
Amal D Nair
and
B Ranjeeth |
This article provides an overview of how sensors and logics can be used to make a surrounding environment smarter and more efficient. The authors explore deployment of Smart Spaces using sensor tables and how automation eases operability of the space. Also discussed are operational challenges and how they can be addressed by tweaking some of the logic to improve system performance and efficiency. |
December |
Title |
Category |
Author(s) |
Summary |
NetWorker Clone Optimization |
Data Protection |
Anay Pathak
and
Deepak Verma |
The need to clone data is normally driven by a requirement for additional protection or the need to move data to a specific media type or location. In both cases, the priority is to secure the data as quickly as possible. Cloning and staging enables more effective use of storage devices by moving data between different types of devices. This article explains how to achieve two backup copies without Clone Controlled Replication (CCR).
|
Connected Vehicle Cloud Platform |
Cloud |
Jithin Raj
and
Vaishnavi Adiyodi |
Convergence of autonomous, connected, electric and shared mobility technologies is radically altering how people and goods move, presenting a vast opportunity for the automobile industry. This article discusses how the automobile industry can leverage a cloud paltform to efficiently collect, process, analyze, and store valuable data assets to realize a number of positive business outcomes. |
Microservices: Independently Deployable Services |
Applications |
Swati Sinha,
Anirudh Sandur
and
Anuj Seth |
Microservices is a highly scalable architecture for developing software applications, enabling organizations to become more agile and responsive to consumer demands. This article serves as a reference document for anyone looking to understand Microservices and its architecture and will also provide a starting point for considering Microservices best practices. How Microservice architecture is optimized for development of cloud-native applications is also discussed along with a use-case to explore boundaries and advantages of Microservices. |
January |
Title |
Category |
Author(s) |
Summary |
Microsegmentation: Defense in Depth |
Cybersecurity |
Sathish Kumar
and
Varun M |
Organizations use microsegmentation – a method of creating zones in data centers and cloud environments to isolate workloads from one another and secure them individually – to reduce the network attack surface, improve breach containment and strengthen regulatory compliance. This article explores microsegmentation technology and techniques, traditional models of VM security and why the future of virtualization security is microsegmentation, with a focus on VMware NSX. |
Autodiscovery Proxy To Protect Cloud Resources |
Data Protection |
Pablo Calvo,
Rex Torti,
Claudio Jeniec
and
Norman Arteaga |
Data protection in the cloud has become more challenging and complex, as data may be geographically dispersed over multiple data centers in public, private and hybrid cloud environments as well as on-premises locations. This article discusses how to use Dell Technologies data protection products to protect any set of cloud data, discovering them dynamically through "Autodiscovery Proxy To Protect Cloud Resources", an effective, integrable, easy to deploy and low-cost solution that covers the gap in current cloud backup solutions. |
Beginner’s Guide To Storage |
Storage |
Chetan Gowda |
When customers purchase capacity for their Storage system, they may not get to use the entire capacity that they purchase; in most cases, raw capacity does not equal usable capacity. This article explains the basics of storage capacity in a Storage Area Network (SAN) environment. The article is especially helpful for non-technical people working as an analyst to understand the basic concepts around capacity in a SAN world, which will help them design technical storage solutions. |
February |
Title |
Category |
Author(s) |
Summary |
Digital Twins – Promises and Concerns |
Virtualization |
Srishma HS
and
Akshay A G |
A Digital Twin – a digital representation of a physical object or system – is at the core of the fourth industrial revolution (or Industry 4.0) which embraces automation, data exchange and manufacturing technologies. This article discusses the significance, concerns and unlimited possibilities surrounding this nascent technology, highlighting distinct applications including Manufacturing, Automotive, Healthcare, and Space Research. |
Being Black in Tech |
Business Strategy / Diversity |
Kevin Moore |
This article offers insight on the unique challenges Black professionals encounter in IT and suggests a framework to help companies move from promoting diversity and inclusion, to practicing it. The author explores recommendations that include tangible steps to help companies transform their stated ideals into reality. |
The Data Center of the Future |
Data Center |
Sai Ganesh |
This article evaluates various technologies that increase efficiency and decrease energy consumption in data centers. A variety of issues faced by data centers, the current status, and future technologies that can make data centers sustainable are detailed. Data center architecture design best practices are presented for consideration. The author also looks at what the Electronic Product Environmental Assessment Tool (EPEAT) program is and how manufacturers can use the EPEAT Registry to build sustainable hardware that goes into the data centers. |
March |
Title |
Category |
Author(s) |
Summary |
Video |
Cybersecurity |
Kurt Rybczyk |
A cyber event is no time to be looking for a runbook or searching for procedures on how to recover the backup application. This video shows how fast and simple it is to perform an automated recovery of Dell Technologies NetWorker with the Cyber Recovery software. With just a couple of clicks, the application is ready to perform restores in the vault, hastening your ability to begin to recover from a cyber event. |
Guidelines to Size DD in a Cyber Recovery Vault |
Cybersecurity |
Yashaswini N,
Abhijith M
and
Shrishti Shetty |
Destructive attacks like ransomware are on the rise. Beyond the production environment, the latest enticing target for an attacker is backup and disaster recovery data. The first step toward protecting these assets is to plan how to efficiently recover from cyber-attacks by having backups that don’t get encrypted by ransomware. This article presents guidelines on how to size Dell Technologies Cyber Recovery Vault Data Domain to achieve unparalleled protection against debilitating and costly ransomware. |
Video Surveillance Options in a Smart City |
Storage |
Varun Christian
and
Sindhu Hegde |
This article provides an overview of how Dell Technologies product portfolio plays a vital role in Video Surveillance (VS) incorporated in a smart city. Good, Better, and Best options are presented for implementing VS depending upon the scale of the smart city, along with the benefits and challenges. |
April |
Title |
Category |
Author(s) |
Summary |
Data Domain Sizing Best Practices |
Backup |
Pragathi R S,
Mohammed Moueen
Wahab,
and
Shilpa Bhasker |
This article covers key factors that affect capacity requirements of Data Domain, how the solution builder sizing toolcan be used to calculate usable capacity of Data Domain and how to avoid sizing for incorrect usable capacity and the importance of Blue-Green charts for sizing. |
Fine-Tuning Replication Using DSP |
Data Protection |
Mohammed Moueen
and
Anamika Kumari |
This article is intended for Dell Technologies sales, presales and post-sales personnel interested in acquiring high-level understanding of the Distributed Segment Processing (DSP) architecture to fine-tune customer’s current backup and replication process and making it more efficient. |
Urban Edge Computing: Server-less, Better, Cheaper |
Edge Computing |
Shadaab Mohiuddin
and
Tabraiz Amman |
The concept of Serverless Computing at the edge is still in its infancy. This article analyzes function execution times in cloudlets, edge and micro datacenter and explores integration support and scalability cost constraints associated with serverless services provided by various vendors: Google Cloud Functions, AWS Lambda@Edge , AWS Greengrass, edjx.io and Azure Functions. |