Principal Product Marketing Manager, Data Protection Management Software Solutions
For 17 years, Tom has brought storage, data protection, security and wireless products to market through roles in product marketing, product management and sales. He loves to speak with customers and prospects about their business goals and challenges, their experiences and their needs, and has had a lot of opportunity to do it. Backed with a master’s degree in Engineering and an MBA, Tom is equally comfortable digging into the details with technical personnel as well as translating and delivering the business value story. But honestly – TELLING STORIES is SO much more FUN for him! Tom's current role in product marketing focuses on data protection management solutions and management strategy. He gets to spend his days thinking about how to help you simplify and enhance your experience achieving your data protection objectives. When not driving go-to-market initiatives, identifying unique and creative methods to build product awareness or launching new and innovative offerings, you’ll likely find him cycling, skiing, boating or running. And, who knows, maybe you’ll hear some of more of his interesting experiences in a future post from time to time.
Drones. Quadcopters. Small remote-controlled flying vehicles. Whatever you want to call them, they were THE hot item this holiday season. I had two orders cancelled by Amazon once they determined they were accepting orders beyond inventory capacity. It was a miracle I was finally able to find one for my son at a local store.
As an 11 year old, my son was initially challenged with the vehicle controls. The controller had 2 joysticks, 2 elevation buttons, a start button, a “trick” button, trim/elevation/turning fine-tuning buttons, takeoff and landing buttons and a LCD display. And learning how to manage the vehicle occurred only after he had manually built much of the tiny aircraft. That’s a lot for anyone to accomplish in short time before they can get value (fun!) out of it. And even then, I still needed to be in the flight area to protect pictures, lamps and the cats from being hit.
Marketing Manager, Dell EMC Data Protection Division
As a former college athlete who never lost her competitive edge, I continuously challenge myself to learn new things and become an expert on others. However, my focus is no longer basketball, but the world of data protection. My MBA and innate passion for technology led me to a career in product marketing at Dell EMC, where I aspire to add some pizazz to the already-exciting world of backup and recovery. Outside of the office, I’m a born and raised Bostonian who has trouble pronouncing her R’s (think “pahk the cah”). I love sports, shopping, and a good glass of red wine. Follow me on Twitter @Meredith_Soper and I promise to #followback!
Data protection is never a one size fits all solution. Over the next few weeks, we will demonstrate, through a series of ‘Data Protection Everywhere’ blog posts, how Dell EMC’s leading data protection portfolio is equipped to deliver complete protection for enterprises of all sizes. To kick off this series, let’s take a look at Dell EMC’s leading software offerings–the Data Protection Suite Family.
We’ve created each Suite as a direct response to the needs of your data owners and the requirements of your business, and each is designed for specific use cases within the most popular data protection environments. Whether your environment is rich with mission critical applications, fully virtualized, focused on backup and recovery with requirements for supporting many different use cases including NAS and tape-out, or a complex assortment of these, the Data Protection Suite Family offers solutions built to satisfy the needs of your business. To put it simply, Dell EMC has simplified data protection, making it easier than ever for you to take advantage of industry-leading replication, backup, recovery and archive solutions. The comprehensive data protection provided by the Suite Family is derived from the combination of components within each offering, which has been put together to meet the requirements of your business. Let’s dive deeper to better understand the unique benefits and capabilities of each of the five Suite offerings:
Alyanna is a Product Marketing Manager at Dell EMC working in data protection. She graduated from Bryant University in 2015 and has been working at Dell EMC since then. Outside of work, she enjoys illustrating and putting too much time into video games.
Your business relies on making sure all its important information is kept safe and easily recoverable if something goes wrong. When we start talking about mission critical applications, most people can’t imagine themselves not keeping that data safe. As Big Data starts to become (and has become) mission critical, there begins a growing need to protect it.
Businesses used to understand data as being structured or neatly organized in databases found within the enterprise. But then, an emergence of new data started to spread, data is now being gathered from many diverse sources. Web logs, ecommerce transactions and demographic information left behind by customer interactions with a company became a useful source of data for corporations. This rapid growth of new data sources that is characterized by high volumes of growth, generated at high velocities, and include both these structured and unstructured data sources could be analyzed and used to better the business. For instance, Chrysler uses data gathered from their manufacturing floor, which is then used to help boost operational efficiency. All fortune 100 companies are using Big Data analytics, and with rapid technology adoption, projects are maturing faster than ever. This Big Data holds great value to businesses by allowing them to better understand their customers and gain a competitive edge, but it is becoming increasingly difficult to manage and protect. (more…)
The opinions and interests expressed on Dell EMC employee blogs are the employees' own and do not necessarily represent Dell EMC's positions, strategies or views. Dell EMC makes no representation or warranties about employee blogs or the accuracy or reliability of such blogs. When you access employee blogs, even though they may contain the Dell EMC logo and content regarding Dell EMC products and services, employee blogs are independent of Dell EMC and Dell EMC does not control their content or operation. In addition, a link to a blog does not mean that EMC endorses that blog or has responsibility for its content or use.