Eliminate the Quagmires in Your Data Protection Strategy


Are You on Solid Ground?

According to a recent survey by Vanson Bourne to over 3300 IT decision makers globally, 87% of businesses are behind the curve for data protection maturity and 71% of businesses are not fully confident of restoring their data and applications.  Collectively, these enterprises are losing $1.7 trillion through data loss and unplanned downtime. The more data protection vendors they throw at their problems, the more data loss they experienced and the cost of downtime exploded to 5X the level of using just one vendor. Sounds like the ground is swampy to me.  Continue reading

Alyson Langon
A couple years ago, fresh out of Business School at Boston College, I started at EMC and dove head first into all things backup and archive, focusing on Data Domain systems. I love the challenge of communicating complicated technologies in innovative and engaging ways and there is certainly no shortage of inspiration at EMC’s Data Protection and Availability Division. Outside of the tech world, I am an artist, animal lover and sufferer of wanderlust. You can also find me on Twitter achieving the perfect balance of data protection and cat gifs.

Dear Server Huggers, Get Well Soon

server get wellCoughing, sneezing, shortage of breath; are you experiencing any or all of these symptoms when you hear the words “cloud computing?” You are not alone! Many people are coming forth as server huggers, better known as those who resist cloud computing or virtualization.  Accustomed to being able to see and touch the physical hardware containing their data, server huggers cringe at the thought of trusting something they cannot see. Continue reading

Meredith Soper

Meredith Soper

As a former college athlete who never lost her competitive edge, I continuously challenge myself to learn new things and become an expert on others. However, my focus is no longer basketball, but the world of data protection. My MBA and innate passion for technology led me to a career in product marketing at EMC, where I aspire to add some pizazz to the already-exciting world of backup and recovery. Outside of the office, I’m a born and raised Bostonian who has trouble pronouncing her R’s (think “pahk the cah”). I love sports, shopping, and a good glass of red wine. Follow me on Twitter @Meredith_Soper and I promise to #followback!

Cloud Thinkering: Boon or Bane for IT Pros?

Sebastian BlogThe cloud vendor list is getting crowded and vibrant these days. EMC recently made a number of announcements including EMC Enterprise Hybrid Cloud and the acquisition of 3 cloud innovators Cloudscaling, Maginatics and Spanning. Now, Enterprise IT have the capability to build out its cloud blueprints and IT-as-a-Service consumption model with greater agility, efficiency, performance, security, control and choice. With the fast maturing cloud technologies and the promise of hybrid cloud services in enabling seamless management and provisioning of private and public cloud services, it is a sign and the coming of age of cloud computing for becoming one of the decade’s most disruptive technologies. Continue reading

Sebastian Yiang

Sebastian Yiang

I started out in the IT industry almost 20 years ago as a systems analyst in a large telco within its Internet Service Provider BU to drive product and business development of consumer and enterprise Internet services. I then had the opportunity to do business development and product marketing for connected consumer electronics, web hosting and data center services, and storage solutions before I joined EMC. My current role in EMC is product marketing for Data Protection and Availability Division for Asia Pacific and Japan region. I am based in sunny Singapore and enjoy traveling with my family.

Say “No” to “Rogue”: Three Steps to Transform Technology into Trusted Infrastructure

482219197For many organizations, information infrastructure has become a leading corporate concern because of the expense of managing the legacy environment, poor responsiveness to business needs, and the potential for significant risk of data loss. Other than that, they’re happy.

What happens when business teams don’t get their needs met? They go rogue and bypass IT in search of better services. Despite the disruptive shifts in technology and the way IT is consumed (i.e., consumption models), IT can not only regain the confidence of the business but also position itself as trusted advisor. It’s all about trust.

What Is Trusted IT – And How Do I Make It Happen?

Trust is the contract that binds IT to the business.

When things go wrong (failure, cyber-attack, natural disaster, or stampeding alpacas), the business looks to IT. When there are issues with application performance and availability, the business looks to IT. When information accessibility is locked into one vendor, the business looks to IT. Continue reading

Stephen Manley

Stephen Manley

CTO, Data Protection and Availability Division
Over the past 15 years at both EMC and NetApp, I have traveled the world, helping solve backup and recovery challenges - one customer at a time (clearly, I need to optimize my travel arrangements!). My professional mission is to transform data protection so that it accelerates customers’ businesses. I have a passion for helping engineers pursue technical career path(without becoming managers), telling stories about life on the road and NDMP (yes, that’s NDMP).