You can look at business data lakes three ways:The first is as one place to put all the data you may want to use. That includes structured data drawn from traditional databases and unstructured data like text. It includes data generated by the enterprise and data imported from outside sources and services. It includes the social media and sensor and telemetry data that’s being generated in vast quantities and that most enterprises are just learning to work with.The second way is as a platform for big data analytics. A data lake isn’t just a landing zone for all sorts of data. It’s where you can analyze the data as well, and where you can find the correlations among data that you’ve never before examined together. Many of the breakthroughs with business analytics come not just through looking at more data or doing more sophisticated analyses, but through new combinations of data that reveal the drivers of business performance.The third is to use data lakes as a way to help resolve the long-standing tension between the corporate push to get standard data into warehouses and used consistently, and the business unit need for local views and combinations of data that get implemented in all those Excel spreadsheets. A data lake is a shared resource, and it may contain a lot of carefully administered data. But it also provides a platform for business units to get at the data and quickly build the views and data-driven applications they really need.To continue reading about data lakes, please click here.
Joe Tucci outlined the strategy of the EMC Federation at a forum held in New York on March 10, 2015.—This is the first post in a four-part series from EMC Federation leaders.David Goulden on the strategy for EMC Information InfrastructurePat Gelsinger on the strategy for VMwarePaul Maritz on the strategy for Pivotal
Every October, we come together as an industry to raise awareness about the importance of cybersecurity and work collectively to ensure that everyone has the information they need to be secure online. After this year’s events which redefined how we work, learn and socialize, Cybersecurity Awareness Month has never been more critical.Today’s threat landscape is evolving at an alarming rate. In order to keep pace for our customers, Dell Technologies deploys an intrinsic security approach that is intelligent, pervasive and built into the infrastructure, platforms and devices that our customers use. For years, Dell has been embedding hundreds of dedicated professional security engineers across our product lines to design and build products from the ground up with customers’ security in mind.This intrinsic security approach is the foundation of our endpoint security solutions and Dell commercial PCs, the industry’s most secure commercial PCs. We are proud to deliver endpoint security solutions to our customers that:Protect devices with layers of security below the OS. These solutions give customers added visibility to BIOS changes and tampering, along with extra assurances to keep threats at bay. Tools like Dell SafeBIOS can protect against attacks targeting the BIOS, or UEFI – like the recently reported MosaicRegressor malware – by ensuring the PC BIOS is unaltered throughout the boot process. We also offer our SafeScreen technology for digital privacy screens to prevent wandering eyes from peering over your shoulder, protecting your personal information.Secure end-user credentials with a dedicated security chip. Also below the OS is Dell SafeID, which protects end user credentials though our hardware ControlVault and is one of our differentiated, proprietary solutions.Use AI and machine learning to proactively prevent, detect and remediate endpoint attacks. Through Dell SafeGuard and Response delivered by VMware Carbon Black and Secureworks, we hunt for and remediate identified threats across the endpoint, network and cloud – giving customers assurance that unidentified threats don’t slow down their business. Integrated with Dell SafeBIOS, this powerful combination prevents, detects and remediates pervasive threats below the OS as well.Encrypt sensitive information and protect data on the device. Through Dell SafeData we also provide secure gateway access, which secures access to the web and cloud services – critical for today’s remote workforce.From delivering the industry’s most secure commercial PCs to practicing the highest levels of security within Dell, we are committed to doing our part to help organizations and customers globally. We are also proud to partner and integrate with industry leaders like VMware Carbon Black and Secureworks to push our innovations even further and stay one step ahead of the ever-evolving threat landscape. Security is everyone’s job, but with our intrinsic security approach and continued investment in security innovation, Dell Technologies is helping customers #BeCyberSmart.How will you do your part and #BeCyberSmart?
WASHINGTON (AP) — Congressional leaders have paid tribute to slain U.S. Capitol Police Officer Brian Sicknick in the building he died defending, promising his family and his fellow officers that they will never forget his sacrifice. Sicknick died after an insurrectionist mob stormed the U.S. Capitol on Jan. 6, interrupting the electoral count after then-President Donald Trump urged them to “fight like hell” to overturn his defeat. The 42-year-old officer was only the fifth person to lie in honor in the Capitol Rotunda, a designation for those who are not elected officials, judges or military leaders. He is to be interred at Arlington National Cemetery.
The 2022 Beijing Winter Olympics will open a year from Thursday. Most of the venues have been completed as the Chinese capital becomes the first city to hold both the Winter and Summer Olympics. But these Olympics are presenting some major problems and calls for boycotts and protests. They are already scarred by accusations of rights abuses including genocide against more than 1 million Uighurs and other predominantly Muslim ethnic groups in western China. Rights groups have asked the International Olympic Committee to move the event. The IOC has declined. It says awarding the Olympics does not mean that the IOC agrees with a country’s politics or human rights standards.
YANGON, Myanmar (AP) — Myanmar’s new military government has blocked access to Facebook as resistance to Monday’s coup surges amid calls for civil disobedience to protest the ousting of the elected government and its leader, Aung San Suu Kyi. Facebook is how most people access the internet in Myanmar and the company urged that it be restored. But resistance was still growing. About 70 elected lawmakers defied the military by asserting that they were the country’s legitimate legislature. The slogan “Don’t want dictatorship” was scrawled on a wall on a busy street in Yangon. And in Mandalay, a small but spirited street protest was broken up by police.