Join EMC at EDUCAUSE 2014

Featured

blog

EDUCAUSE is the largest conference dedicated to the Higher Education market and EMC is excited to be participating at the event, held next week in Orlando, Florida. Higher Education IT is continuously searching for ways to address new data protection requirements created by virtualized, always-on, remote and decentralized environments and EMC is looking forward to being part of the solution conversation at hand. Many important discussions will be held next week; including challenges IT administrators face as well as their priorities and new data protection requirements. Use cases to be discussed include data protection in a virtual environment, active-active site configuration, empowering application owners, infrastructure consolidation and more. EMC will be on site at EDUCAUSE participating in following activities:

Hot Topic Panel - Tuesday, September 30th at 3:40 pm in Room W204

Don’t miss our panel “Redefining IT and Data Protection for Higher Education”. EMC’s CTO for Higher Education Breck DeWitt and CTO for Data Protection & Availability Jeff Ramby will team with Link Alander and Mark Stone, CIOs from Lone Star College and Texas A&M respectively, to discuss how they are redefining their IT departments to meet the requirements of a virtualized and decentralized campus. You can find more information here.

Community & Collaboration Lounge Wednesday, October 1st at 9:10 am in Room W207A/B

If you’re looking to continue the discussion with others, stop by the Community & Collaboration Lounge and participate in our breakfast roundtable discussion. Our theme, “Redefine – Higher Education IT, For Today’s Virtualized Campus”, will be hosted by Breck DeWitt and Jeff Ramby and will discuss protecting data on a virtualized campus. We will explore challenges, trends and solutions for data protection; it’s a session you don’t want to miss. Plus we invite you to use our lounge for meetings – either impromptu or by reserving time online.

Kiosk in SHI Booth – Tuesday, 9:30 AM-6:30 pm and Wednesday, 10 AM – 4:30 PM booth #768 & #770

To get a solution deep dive stop by the SHI booth. EMC data protection subject matter experts will be on–hand to engage in detailed conversations on data protection architecture, best practices and the newest EMC data protection solutions using Avamar, DD Boost, VPLEX, ProtectPoint and RecoverPoint for VMs. We would love to answer any questions you may have, so please stop by and say hello!

See you at EDUCAUSE 2014!

Freddy Harrell

Freddy Harrell

Freddy started in the IT industry over 25 years ago – time really flies when you’re having fun! Starting with Hewlett Packard, he later gained experience with a variety of leading technology companies including Hitachi Data Systems, Cisco Systems and Oracle Corporation. Freddy has been lucky to have both product marketing and product management roles, while gaining experience in vertical markets such as Telco, Video Streaming, Media & Entertainment, Enterprise Search and finally the Storage market. When not working, he enjoy blues music, good barbecue and sci-fi books.

Pushing the Boundaries

Featured

blogOne of the things I love about running is being able to see how I am performing in terms of pace, heart rate, distance and elevation. I have a running watch which gives me this information, although it was lacking in some of the latest features, so I decided it was for an upgrade.

There are numerous models in the market which vary in terms of cost and functionality. However what really attracted me to one brand was the management software. While the watch I chose was the best-of-breed in terms of features, it was the management software and how it integrates with the hand piece that got me over the line. For example, the management software stores all of my activity details online, including running maps and personal records. It also suggests training plans and new running tracks based on my fitness. And through social media, connects me with my friends and even professional athletes to compare performance. Continue reading

Shane Moore
I have been in the IT industry for close to 20 years and started my career as an Officer in the Australian Air Force. For my first posting, I had a choice to either manage a national network of servers or run a warehouse (the physical kind). Thankfully, I chose the former and subsequently managed infrastructure in a number of public and private organizations. Later, I started selling and then marketing IT solutions for Computer Associates and now EMC. I have a passion for technology and I am excited by the way it continues to transform our lives. In my current role, I work across Asia promoting EMC’s data protection solutions, spending time with analysts and writing articles for traditional and social media. In my spare time, I provide IT support for my family and enjoy the outdoors. For the record, Top Gun is my favorite movie of all time!

Walking with Millennials: 10 Things I’ve Learned That Your Business Can’t Ignore

Featured

144956279

I feel like I was born with a computer in my hand; I embrace them both from a business and personal perspective.

But I am a Gen-Xer, so certain realities are true. I was not born with a computer in my hand, but rather a typewriter, record player, and an Atari game console. According to the folks who define the characteristics of each generation, I have different priorities, perspectives, and drivers than Millennials (a.k.a. Gen-Yers). But how different? Continue reading

Guy Churchward

Guy Churchward

President, Data Protection and Availability Division
I'm an enterprise infrastructure hack. Really, if you think of my career as a building, I’ve spent it underneath in the sewer lines and the electric plumbing, making sure things work. Invariably, my businesses end up being called boring. But that’s okay. It means they’re doing exactly what they’re supposed to do, which means their customers can do what they need to do. I come to EMC by way of BEA Systems, NetApp and most recently LogLogic, and my mission is to lead EMC Data Protection and Availability Division's efforts to deliver a protection storage architecture that leaves us all in better shape for the next guy, or gig, that comes along. Oh, and make no mistake about it, I want everyone to know who’s number one in backup, and why.

What’s New in NetWorker 8.2: Visibility and Control for Microsoft Private Cloud Administrators

Featured

This is the third in a set of blogs related to NetWorker 8.2.  This time I will delve a little deeper into the new support added in the NetWorker Module for Microsoft enabling system administrators for Microsoft Private Clouds with visibility and control over image-level recovery of virtual machines using an add-in for Microsoft System Center Virtual Machine Manager.  Continue reading

Sherry Davenport
I started in the IT industry over 30 years ago — it sure doesn’t feel like that long! I worked my way through the ranks starting at the old Digital Equipment Corporation in software sales support, sales training, channel training, product management and, ultimately, marketing. My background includes digital imaging, team productivity software, Alta Vista (remember that?), storage management, storage networking and most recently backup and recovery software. While I love my job, I love cooking and wine appreciation even more.

From Good to Great: 3 Practical Ways to Keep IT Innovation Humming

Featured

blog

Source: “Caption Contest: Data Center Evolution”, Network Computing, 13 August 2014

I was piqued by the recent caption contest entitled “Data Center Evolution” by the folks at Network Computing (see above illustration). It sets me thinking of the agents of change in the IT landscape in the last few years. If an organization’s investment in data protection infrastructure has been overshadowed by other mega infrastructure initiatives, the technology gap will put organizations in a risky and compromising position during data loss and mitigation cases.

From server and storage virtualization, data center consolidation, cloud computing and mobility, to hybrid cloud services, big data lakes, software-defined storage and flash technologies, IT professionals are kept busy orchestrating IT and business objectives. With the astounding growth of the digital universe and over half of the information in it that needs protection currently not being protected, it is some what surprising for data protection to be playing second fiddle in many enterprises’ IT blueprint or strategy. To some extent, many enterprise IT organizations are derelict in keeping data protection strategy in tandem with their IT initiatives. That is worrying.

So how do you keep IT innovation humming without undermining data protection, which is the last line of defense against data and business loss? Let’s go back to the drawing board.

  1. Take stock, prioritize and begin with the end in mind.

Now and then, you find yourself in a rut and in need of a little boost to take your IT infrastructure to the next phase of transformation. So you have heard about the trending towards data center consolidation, virtualization, hybrid cloud services and big data lakes. What’s next? How do you determine if some of these transformational strategies will benefit IT and business? More importantly, how do you ensure that you minimize any gaps in protecting your data in your data center transformational initiatives?

I strongly recommend a storage and data protection assessment be conducted on a half-yearly basis in assessing the state of health of your IT infrastructure in the areas of data capacity planning and any data protection gaps. It validates proof-points of your IT investments and priorities, and provides a basis for evaluating any critical technology gaps within your IT strategies. In essence, you have an opportunity to align your IT and business objectives after the assessments with such a function-analytical approach.

Borrowing one of Stephen Covey’s mantras on habits for effective people, it pays to “begin with the end in mind”. Creating a service-oriented consumption model and rendering IT-as-a-service to business users reaps enormous cost and user experience benefits. The EMC data protection continuum blueprint, which incorporates data protection and availability, is an excellent place to start. Enterprise IT needs to forsake the sanctum of IT control and empower business application users with self-provisioning of application access, data protection and elasticity of storage capacity required according to defined IT policies and guidelines. With the end goal in place, it makes planning and prioritization of IT initiatives easier.

  1. Move beyond the number of 9s and towards business metrics.

SLAs are great. They defines IT’s commitment to delivering quality service to their business users. However, how many IT organizations are tracking the impact of IT strategic rollout to their organizations’ overall business agility and performance? Besides operational excellence, CIOs need to incorporate user experience and other business metrics such as productivity, customer acquisition cost, gross margin and cash flow into the technology metric tracker. The real end-game is to expand enterprise IT as a brokerage service provider for both business users (consumers of IT) and customers.

  1. Tap into the M-Factor.

Organizations today, in order to attract and retain talent, need to respond to the needs of the Millennial Generation or Generation Y (a.k.a. the “Me First” generation). The Millennials are individuals born in the mid 80s and late 90s, and have the characteristics very different from their past generations. They are expert at technology and demand changes and reasons. They bring about much creativity and innovative approach to their work place yet are individualistic, lack communication and interpersonal skills. This M-factor is going to change the IT workplace with its emphasis on immediate communication, consumption, entertainment and access to knowledge.

By empowering business users, especially the Millennials with an IT self-provisioning service portal as a product of enterprise IT’s IT-as-a-service strategy, IT is now able to converge service elasticity and time-to-service in a service-oriented consumption model. This is a compelling move as it brings about cost benefits and user productivity. Millennials are also demanding IT services to be “always-on” and flexible, while at the same time giving them visibility and control over the data protection of their applications and data. Otherwise they would export their applications or even data off-premise with a third-party cloud service provider, bypassing IT and thereby posing security risks to the business.

Your IT innovation and strategy is only as strong as the weakest link. Data protection and availability strategy has to be crafted into the overall IT blueprint in future-proofing your investments. Don’t leave data protection at the mercy of chances.

Have you scheduled your storage and data protection assessments today?

 

Sebastian Yiang

Sebastian Yiang

I started out in the IT industry almost 20 years ago as a systems analyst in a large telco within its Internet Service Provider BU to drive product and business development of consumer and enterprise Internet services. I then had the opportunity to do business development and product marketing for connected consumer electronics, web hosting and data center services, and storage solutions before I joined EMC. My current role in EMC is product marketing for Data Protection and Availability Division for Asia Pacific and Japan region. I am based in sunny Singapore and enjoy traveling with my family.

How 9/11 Changed the Trajectory of Data Protection and Security

Featured

463847291

It’s been 13 years since the world changed.

While there have been no shortage of tragedies since 9/11, including other acts of terrorism home and abroad, war, hurricanes, tsunamis, and massive tornados, no single event has matched the impact of that day thirteen years ago. The transformation of the world after that event has touched all our lives in ways big and small, the technology industry included.

No, people really don’t care more about data protection now than they did then. Nor did the event set disk-based backup or VPLEX in motion. But 9/11 did help redefine the role and expectation of data protection. That day began the journey to converge data protection and security. Continue reading

Stephen Manley

Stephen Manley

CTO, Data Protection and Availability Division
Over the past 15 years at both EMC and NetApp, I have traveled the world, helping solve backup and recovery challenges - one customer at a time (clearly, I need to optimize my travel arrangements!). My professional mission is to transform data protection so that it accelerates customers’ businesses. I have a passion for helping engineers pursue technical career path(without becoming managers), telling stories about life on the road and NDMP (yes, that’s NDMP).

Say “No” to “Rogue”: Three Steps to Transform Technology into Trusted Infrastructure

Featured

482219197For many organizations, information infrastructure has become a leading corporate concern because of the expense of managing the legacy environment, poor responsiveness to business needs, and the potential for significant risk of data loss. Other than that, they’re happy.

What happens when business teams don’t get their needs met? They go rogue and bypass IT in search of better services. Despite the disruptive shifts in technology and the way IT is consumed (i.e., consumption models), IT can not only regain the confidence of the business but also position itself as trusted advisor. It’s all about trust.

What Is Trusted IT – And How Do I Make It Happen?

Trust is the contract that binds IT to the business.

When things go wrong (failure, cyber-attack, natural disaster, or stampeding alpacas), the business looks to IT. When there are issues with application performance and availability, the business looks to IT. When information accessibility is locked into one vendor, the business looks to IT. Continue reading

Stephen Manley

Stephen Manley

CTO, Data Protection and Availability Division
Over the past 15 years at both EMC and NetApp, I have traveled the world, helping solve backup and recovery challenges - one customer at a time (clearly, I need to optimize my travel arrangements!). My professional mission is to transform data protection so that it accelerates customers’ businesses. I have a passion for helping engineers pursue technical career path(without becoming managers), telling stories about life on the road and NDMP (yes, that’s NDMP).

Destination: Born in the Cloud

Featured

Untitled“No one understands the cloud. It’s a [BLEEP] mystery.” —Jason Segel

Perhaps more than a few of us got a kick out of the trailer from one of this summer’s blockbuster movies. In this clip, the cloud is the villain.

If your family is like mine, meaning not that tech savvy, so their only exposure to the cloud is limited to what’s available on their favorite Apple device, then, yes, the cloud may seem as vaporous as its heavenly counterpart.

But if you’re a tech-savvy CEO, CIO, application or data protection administrator, or business line manager, understanding the cloud and its potential value to your business has become critical. In fact, not understanding the cloud won’t be an option moving forward, which will hold true whether you’re in the IT business (like me) or a different industry altogether. We’re all on a journey, and the cloud will play a part in everything we do.

Let me explain.

To read the full post, please go to our sister site Reflections.

Guy Churchward

Guy Churchward

President, Data Protection and Availability Division
I'm an enterprise infrastructure hack. Really, if you think of my career as a building, I’ve spent it underneath in the sewer lines and the electric plumbing, making sure things work. Invariably, my businesses end up being called boring. But that’s okay. It means they’re doing exactly what they’re supposed to do, which means their customers can do what they need to do. I come to EMC by way of BEA Systems, NetApp and most recently LogLogic, and my mission is to lead EMC Data Protection and Availability Division's efforts to deliver a protection storage architecture that leaves us all in better shape for the next guy, or gig, that comes along. Oh, and make no mistake about it, I want everyone to know who’s number one in backup, and why.