Posts Tagged ‘Data Protection Suite’

Data Protection Everywhere: Droning on about Converged Infrastructure Data Protection

Tom Giuliano

Principal Product Marketing Manager, Data Protection Management Software Solutions
For 17 years, Tom has brought storage, data protection, security and wireless products to market through roles in product marketing, product management and sales. He loves to speak with customers and prospects about their business goals and challenges, their experiences and their needs, and has had a lot of opportunity to do it. Backed with a master’s degree in Engineering and an MBA, Tom is equally comfortable digging into the details with technical personnel as well as translating and delivering the business value story. But honestly – TELLING STORIES is SO much more FUN for him! Tom's current role in product marketing focuses on data protection management solutions and management strategy. He gets to spend his days thinking about how to help you simplify and enhance your experience achieving your data protection objectives. When not driving go-to-market initiatives, identifying unique and creative methods to build product awareness or launching new and innovative offerings, you’ll likely find him cycling, skiing, boating or running. And, who knows, maybe you’ll hear some of more of his interesting experiences in a future post from time to time.

Drones.  Quadcopters.  Small remote-controlled flying vehicles.  Whatever you want to call them, they were THE hot item this holiday season.  I had two orders cancelled by Amazon once they determined they were accepting orders beyond inventory capacity.  It was a miracle I was finally able to find one for my son at a local store.

converged infrastructure drone 1

As an 11 year old, my son was initially challenged with the vehicle controls.  The controller had 2 joysticks, 2 elevation buttons, a start button, a “trick” button, trim/elevation/turning fine-tuning buttons, takeoff and landing buttons and a LCD display.  And learning how to manage the vehicle occurred only after he had manually built much of the tiny aircraft.  That’s a lot for anyone to accomplish in short time before they can get value (fun!) out of it.  And even then, I still needed to be in the flight area to protect pictures, lamps and the cats from being hit.

converged infrastructure drone 2 (more…)

The Perfect Holiday Cookie

Meredith Soper

Marketing Manager, Dell EMC Data Protection Division
As a former college athlete who never lost her competitive edge, I continuously challenge myself to learn new things and become an expert on others. However, my focus is no longer basketball, but the world of data protection. My MBA and innate passion for technology led me to a career in product marketing at Dell EMC, where I aspire to add some pizazz to the already-exciting world of backup and recovery. Outside of the office, I’m a born and raised Bostonian who has trouble pronouncing her R’s (think “pahk the cah”). I love sports, shopping, and a good glass of red wine. Follow me on Twitter @Meredith_Soper and I promise to #followback!

What makes the perfect holiday cookie? Is it the combination of ingredients, or the manner in which they are mixed and baked? A recipe incorporates both of these things- yet data-protection-solution-holiday-cookies
the success of one without the other is never enough. Even with the main ingredients- flour, sugar, eggs-, a forgotten touch of salt or dash of vanilla leads to tasteless dough. And even if the dough is mixed to perfection, a misread oven temperature can ruin the entire baking process. (By now, you may have guessed that I am speaking from experience. I can’t be the only one who’s committed a baking blunder!) The result of these common mistakes is an imperfect holiday cookie.  Although this may not ruin your Christmas party, it surely isn’t ideal.

Fortunately for you, I won’t be baking any cookies this holiday season. However, I am thinking of mixing it up from a data protection perspective. When I think of the perfect data protection solution, I consider it a combination of both software and hardware products. Not only should data be backed up with the utmost speed, performance, and efficiency, but it should also be securely stored on protection storage you can trust. But like the ingredients of the cookie, there cannot be one without the other. In order to benefit from a complete data protection solution, the greatness of the backup application must be matched by the greatness of the protection storage device, and vice versa. And like the baking process, the data protection products must be handled with care, serviced appropriately, and backed by a company you can rely on. (more…)

Are You Ready for Dell EMC World?

Jamie Doherty

Consultant Social Media Engagement Manager, Dell EMC
Jamie brings over 20 years of experience in both traditional and digital marketing and has worked for companies like Direct to Retail Advertising, The Robb Report Magazine and Monster.com. She joined Dell EMC over four years ago to manage the Advanced Software Division’s social media strategy, and since then has taken on the challenge of managing the social media strategy for Dell EMC's Core Technologies Division. Her newest role will be managing Digital Campaigns for the Dell EMC Data Protection Division as well as leading strategy for Social Media in both the Data Protection and Storage Divisions. Jamie is also a Beachbody Coach helping to inspire others to live a healthier and more active lifestyle. When she is not Tweeting on behalf of Dell EMC or working out to Beachbody, you can find her at a live music venue watching her favorite artist or planning her next theme party. Follow her on Twitter @MnkyGrl47 or @CoachFab40

This year is a very special Dell EMC World as it is the first event we are hosting as a combined company. Three amazing days will be spent in Austin, one of this writers favorite cities, listening to industry leaders talk about the future of technology, the future of Dell EMC and of course some amazing music.

transformation
Our division, Core Technologies as known in the inner walls of the company, is especially excited about this year’s event. Just last week we had four major announcements within our product lines. If you are one of the lucky ones attending Dell EMC World you will be able to take a deep dive first hand from our experts on site. Just in case you did miss the announcements, you can view them right here:

As an attendee of Dell EMC World we do want to give you every opportunity to learn how to modernize your data center with all-flash storage and make sure your data is protected everywhere, no matter where it lives. The first place you can meet face-to-face with our experts and get live demos is in the booth. Be sure to visit our experts in the Data Center Booth B17 or the Big Data Booth F1.
The next option is to attend a session. Check out this schedule of sessions being hosted by the Core Technologies Team :
full-ct-dew-session-schedule
The team will also be hosting right in the booths a series of theater presentations led by our experts. If you get the opportunity I would highly recommend checking them out. Here is the schedule:

revised-theater-preso-no-logo

Lastly once you’ve learned all about the amazing features of the Dell EMC Core Technologies products, I bet you’ll want to get your hands on them. At Dell EMC World you can on Wednesday October 19 from 11am to 5pm and on Thursday October 20 from 8am to 10:30am. Check out all the great products you can get your hands on:
ct-dew-hol-full

For those of you who are not going to the event we do want to make sure you can experience Dell EMC World virtually. Pull out your smartphone or jump on your Dell 2-in-1, open your Twitter app, and follow @DellEMCProtect, @DellEMCStorage, and @DellEMCXtremIO. All of the activities and additional announcements (Spoiler Alert! Yes, there’s more coming) will be reported real time on these Twitter handles so be sure to follow along and get social with us!

Whether you are live at Dell EMC World or following along on Twitter – the Dell EMC Core Technologies Team looks forward to engaging with you!

Let the Transformation Begin

Jamie Doherty

Consultant Social Media Engagement Manager, Dell EMC
Jamie brings over 20 years of experience in both traditional and digital marketing and has worked for companies like Direct to Retail Advertising, The Robb Report Magazine and Monster.com. She joined Dell EMC over four years ago to manage the Advanced Software Division’s social media strategy, and since then has taken on the challenge of managing the social media strategy for Dell EMC's Core Technologies Division. Her newest role will be managing Digital Campaigns for the Dell EMC Data Protection Division as well as leading strategy for Social Media in both the Data Protection and Storage Divisions. Jamie is also a Beachbody Coach helping to inspire others to live a healthier and more active lifestyle. When she is not Tweeting on behalf of Dell EMC or working out to Beachbody, you can find her at a live music venue watching her favorite artist or planning her next theme party. Follow her on Twitter @MnkyGrl47 or @CoachFab40

You may have heard in the news that a little merger happened  a few weeks ago between Dell and EMC.  Of course I say that kiddingly.  This was the biggest merge to take place in technological history.  A major transformation has been taking place to bring these two technology power houses together as the newly formed Dell EMC.  I, for one, could not be more excited to be a part of making history as an employee of this amazing new company.

oow-small-invite

So why am I telling you all this? I want to invite you to also be a part of history in the making by getting a first-hand -view of the transformation.  How you ask? Join us for an exclusive Dell EMC event this week in San Francisco.  A three day event starting today is being hosted at 839 Howard Street right across from Moscone Center West.  My suspicion is many of you reading this are at Oracle Open World…so why not stop by?  Here are a few reasons why you should:

  • You’ve heard a lot about Dell EMC – Find out directly from the experts what that means to you
  • Dell EMC Oracle Solutions experts will be onsite conducting 1×1 demos and answering all of your questions
  • Technical experts will be running engaging sessions that will showcase Dell EMC solutions for Oracle Applications
  • Breakfast and lunch will be served AND it will be amazing! If you joined us last year you know this is no average conference food
  • Dell EMC knows how to throw a party! This Tuesday night will be one you won’t want to miss

(more…)

Purpose-Built Data Protection for Today and Tomorrow

Meredith Soper

Marketing Manager, Dell EMC Data Protection Division
As a former college athlete who never lost her competitive edge, I continuously challenge myself to learn new things and become an expert on others. However, my focus is no longer basketball, but the world of data protection. My MBA and innate passion for technology led me to a career in product marketing at Dell EMC, where I aspire to add some pizazz to the already-exciting world of backup and recovery. Outside of the office, I’m a born and raised Bostonian who has trouble pronouncing her R’s (think “pahk the cah”). I love sports, shopping, and a good glass of red wine. Follow me on Twitter @Meredith_Soper and I promise to #followback!

Buying a car can be challenging. As a buyer, there are certain things you look for and see value in. And those things differ buying personas 1according to your needs. For instance, my ideal car is an SUV with four wheel drive, has a voice-activated GPS system, and is backed by a trusted car brand. From this list of must-haves you can infer my needs; I need a vehicle that is built to withstand New England winters, provides navigation assistance, and is historically known to be reliable. I look for certain features based on my transportation needs. It’s important to note that your list of car requirements is likely different from mine. You may live in a warmer climate where it rarely snows, and therefore prefer an eco-friendly, compact car. Or you may be a NASCAR driver and require a vehicle with a manual transmission and a five-point harness, rather than a traditional seatbelt. I can confidently say your ideal vehicle looks slightly, if not completely, different from mine. Our individual buyer personas are based on each of our distinctive needs.

The same goes for many other aspects of life, as well as business, including the way in which we buy and consume data protection solutions. Each data owner has a distinct set of requirements they need to meet in order to successfully do their job. For instance, the backup admin, database admin and vAdmin each play an important role in the business’ overall data protection strategy. Each individual may be partially, or even solely, responsible for protecting their data and therefore have specific requirements for visibility and control for that protection. And for efficiency and familiarity purposes, each data owner is best empowered through using their native tools and interfaces. The 2016 EMC Global Data Protection Index (GDPI) confirms these points, indicating that management of data protection aligns with environment, meaning that the storage team focuses on storage based protection, the virtualization team on virtual environments, and so forth. And 40% of those surveyed also noted that they prefer a collaborative model, giving both IT and app owners self-service in terms of visibility and management capabilities. Although each individual is working towards the common goal of fully protected and accessible data, the way in which they manage the data protection environment is different. Each situation is unique and every role has unique needs.

In addition, as enterprises engage in implementing more modern approaches to data protection, new requirements will emerge which introduce new buyers. For instance, while self-service in the data center has brought to bear many benefits, it has also contributed largely to copy data sprawl.  The proliferation of copy data leads to increased cost and risk, detracting from an enterprise’s ability to invest in next generation apps and infrastructure. The buyer concerned with controlling copy data is probably the person held accountable for setting SLAs for both protection and storage. They may be an infrastructure or compliance manager and their requirements differ from those of an application, backup, or storage admin, because they have a unique set of needs.
(more…)

SUBSCRIBE BELOW

Categories

Archives

Connect with us on Twitter

Click here for the Cloud Chats blog