-
Data Privacy? Data Protection?
What’s the difference? I’m sure you have heard or used the terms data privacy and data protection. The two terms data privacy and data protection are often used interchangeably. However, there is an important difference between the two terms that you may not know or fully understand. To keep it…
-
Tanzu Mission Control Overview & Demo on VxRail
VMware Tanzu Mission Control is a centralized management platform for consistently operating and securing your Kubernetes infrastructure and modern applications across multiple teams and clouds. #IWORK4DELL Please note the views and opinions expressed in this video do not necessarily represent the views of Dell Technologies.
-
What the Heck is HPC?
HPC or high-performance computing has become a commonly uttered buzzword in pitch meetings and technical presentations, but what exactly do we mean by that? Dell has many server platforms marketed towards HPC workloads, and they vary significantly in their architecture and componentry. So, what exactly is HPC, why should we…
-
VxRail Video Update (VVU) – March 2022 Recap
In the second installment of the VxRail Video Update (VVU), Philip Armstrong, Curtis Edwards, Joe Mauer and Jeremy Merrill recap some of the updates that were released in March of 2022. This includes discussions around VxRail 7.0.350 and the transition to Secure Connect Gateway for dial home, the need to…
-
PowerEdge Data Science: The Edge, AI & 5G
Motivated by the pain of standing in long grocery checkout lines, David Humble pioneered the concept of the self-service till in 1984. With the resurgence of interest in artificial intelligence (AI) research during the 1980s, these initially automated cashiers evolved into sophisticated devices featuring AI-driven cameras capable of analyzing facial…
-
Cloud Foundation on VxRail Shut Down and Startup (VCF 4.X)
1. Overview For VCF (4.X) on VxRail, the sequence of steps should be first and foremost in our mind when shutting down and then starting up a VCF on VxRail environment. Not following the correct procedure could result in corruption within the environment and the loss of ability to start-up…
-
CyberTalks Episode 2 – What is Secure Component Verification (SCV)?
Welcome to CyberTalks’ second podcast episode! Today, Adam Cook will be joining us to discuss Secure Component Verification (SCV). We’re excited to hear the answers to questions like, “What is secure component verification?,” “How does it work?,” and “What are the benefits of secure component verification?” Since Secure Component Verification…
-
Dell APEX: Why Containers?
Today the team discusses the various industry trends for cloud-native applications, containers and hybrid cloud use cases. How do we sort through the noise and truly help customers and account teams put forth strategic initiatives which impact the bottom line? Join us for a 15-minute chat and share your thoughts…
-
PowerEdge PERC 11: Keeping Hardware RAID Relevant
The PowerEdge RAID Controller has come a long way since the early days, but is it still relevant in today’s world of NVMe SSDs? In today’s video we discuss the why and how of the new PERC 11 available in PowerEdge 15G servers.
-
Danger: Ransomware Attacks
If you have read some of my blogs before, you probably remember me talking about ransomware. If you haven’t, check out Data Protection Security PT. 3 – Cyber Attacks, I talked about the different types of cyber-attacks and talked briefly about ransomware. However, considering the number of ransomware attacks that…
