Posts Tagged ‘VMAX’

Molina Healthcare: The Story of Rapid Scale and Growth

Chhandomay Mandal

Director of Solution Marketing, EMC All-Flash Storage
Chhandomay Mandal, a 20+ year storage industry veteran, is the Director of Solution Marketing for EMC All-Flash Storage. He is currently responsible for the integrated leadership of all EMC All-Flash End User Computing (EUC) solutions enablement, partnering, and business development. Prior to EMC, Chhandomay led Dell’s storage solutions marketing efforts for desktop virtualization, server virtualization and private cloud. He spent 11 years at Sun Microsystems holding different leadership positions across marketing and engineering organizations. Chhandomay has been awarded 13 patents by US Patent and Trademark Office. He has a PhD in Computer Science from University of Florida, MBA from Kelley Business School of Indiana University, and BTech from Indian Institute of Technology, Kharagpur.

Molina Healthcare’s mission is to provide quality health services to financially vulnerable families and individuals covered by government programs. The company has health plans, medical clinics and a health information management solution. No other organization of its kind does all three.

Laboratory

Over the past five years, Molina has experienced rapid growth, moving onto the Fortune 500 list to its current number 201 spot. The company has added over 2.3 million members during the past three years. Today, Molina arranges for the delivery of healthcare services and offers health information management solutions to nearly five million individuals and families who receive their care through Medicaid, Medicare and other government-funded programs in fifteen states.

Supporting this kind of growth demands a scalable, reliable and cost-effective infrastructure. Their IT organization carefully evaluated multiple solutions from different vendors, and decided that the VMAX All Flash with the VCE Vblock 740 is the best platform for their needs.

Through VCE converged infrastructure with all-flash technology, Molina is able to consolidate multiple mission-critical workloads with high performance and reliability needs onto a single platform resulting in significant CapEx and OpEx savings. (more…)

What’s Old is New Again

Howard Rubin

Consultant Product Marketing Manager, Dell EMC Storage Division
My name is Howard and I’m a marketing guy. There I said it! Admitting to it is the first step right? Truth be known, I started “life” as a phone support guy then got promoted to Sales Engineer due to my good looks. That role dragged on far too long. Hanging out in data centers at 3am installing and troubleshooting ATM and Frame Relay gear got old; just like that technology. When I’m not marketing tech stuff, I’m either playing with my own tech gear at home or travelling to some exotic destination with my incredible wife, Mary. Fifty/Fifty chance it’s a shopping or exotic beach destination next time you get my out-of-office message.

Latest posts by Howard Rubin (see all)

At our office, we give our mainframe product managers and engineers a hard time.  When mainframe customers come in for meetings, we joke about ensuring that the customer briefing rooms have analog dial-up ports so our guests can check their AOL email during breaks. The reality is quite different. Yes, there are many grey-bearded experts who grew up with the mainframe and really understand the workings of the overall system. However, working right alongside these experts is a new generation of mainframe and application specialists – the Millennials (often called “Generation Y”). And, the exact reason why they’ve joined these companies is to work on leading edge cloud and mobile apps for the mainframe. Say what?

Photo courtesy of Wikipedia

Photo courtesy of Wikipedia

Since IBM’s introduction of the first mainframe in 1952, businesses have relied on them to run their mission-critical applications.  Over the last 60 years, mainframe hardware has gotten smaller while workloads have grown significantly larger, requiring these systems to perform even faster. This rat race is to keep up with the increasing amount of data and transaction throughput, while satisfying the decreasing tolerance for transaction latency.  So what does this all have to do with mobile apps and the cloud? The answer is EVERYTHING!

Mobile apps connected to mainframe computers bring the conveniences of just a decade ago to your mobile phone, tablet or wrist. Flash back a decade plus; were you verifying your savings account balances by driving to the local bank ATM or teller window? Were you waiting weeks for mailed or faxed paperwork on your fender bender car accident processed by your insurance agency? Or, maybe you thought nothing about waiting in line for the person ahead of you buying a gallon of milk who was filling out a check by hand (and usually extremely slowly)? Without mainframes and the Gen Y’ers developing innovative mobile applications, we might just be stuck doing these activities the same way. The good news is that mainframes enable every one of us to do away with all this waiting nonsense. (more…)

Storage Networking Performance Matters For Mainframe FICON Environments

Deirdre Wassell

Director, Dell EMC Connectrix Product Marketing
From mainframe operations, to systems programming, to storage product management, to technical product marketing, Deirdre Wassell’s career reflects her prodigious interest in technology.

A flashback to working in a house of cards…

My first role in IT was working in a data center of a reinsurance company as a Computer Operator.  I was responsible for running the company’s reporting programs on the UNIVersal Automatic Computer or “UNIVAC” mainframe.   To run a program on the UNIVAC mainframe, I’d go to the “Program Closet” and grab the pertinent program, which was a stack of punched cards, and then I’d feed the cards through the UNIVAC card reader and the report would be created.  Fun!

punchcards stacked
Not fun…sometimes a card, which represents a line of code or an instruction, would get damaged and I’d have to recreate it using a keypunch machine.  If the card were severely damaged, I’d have to go to the “Source Code Closet”.  The Source Code Closet contained the Master Program Decks.  Using the card from the Master Program Deck, I’d carefully replicate the damaged card by typing the instruction using the keypunch machine and then I’d rerun the operating deck through the card reader to produce the report.    Memories…

 Flash-forward to 2016; the cards are gone and the mainframe game has changed
Mainframe customers are expanding the role of their highly secure environments to repositories of enterprise data for web servers and web-based application services.  Every day more and more transactions originate from mobile devices that end up at mainframes for retail purchase transactional recording.   The number of transactions occurring daily along with traditional online transactions is in the millions and growing with no end in sight.

Bottom line–the mainframe has evolved to be the platform of record for 3rd platform applications. (more…)

A Variety of Webinars to Fit Your Needs

Lauren Simpson

Principal Product Marketing Manager
Lauren is a Principal Product Marketing Manager at EMC working on the Experiential Marketing team. She helps drive customer-facing activities including engagement campaigns, events, webinar programs, and tradeshows. Outside of work, she enjoys traveling and spending time with her husband and two children.

Latest posts by Lauren Simpson (see all)

Are you curious about where your use case and product questions can be addressed? The Core Technologies team here at EMC has many ways to engage with you, at your convenience, to meet your needs. The most recent way to stay connected is our newly launched webinar series – a three-part program with different content and levels of complexity. There is a webinar to specifically address each unique facet of IT challenges.  This includes everything from cyber attacks, data duplication, complex application management, and data sprawl to the inability to support multiple virtual machines. If you have IT challenges, we have a solution to fit your needs.


TechTalk-Twitter

EMC Tech Talks
The tech talk series provides you with an inside look at managing your experience with our products. The focus is primarily based on one product at a time due to the technical nature of the content. We utilize simulators, GUIs, and animated videos to drive the 30-minute conversation and address your questions as they arise.

 

Modernize-Twitter


Modernize Without Compromise”
andAre You Protected?”
These two series highlight how to efficiently store, protect, and manage your information wherever it lives. Each session is approximately 60 minutes in length, and they all offer the opportunity to ask questions via chat.

 

 

Click here to be added to the webinar distribution list, ensuring that you receive the most up to date information on scheduling, topics, etc.

To view the upcoming schedules or view all of our previously recorded events click on one of the series names below:

We look forward to having you join our upcoming events!

Security or Protection: Which One?

Vladimir Mandic

Chief Technology Officer & Distinguished Engineer Data Protection Cloud, Core Technologies Division, Dell EMC
Vladimir has been driving technical innovation and change within EMC for the past 10 years, first in the area of data protection software and, currently, in cloud technologies. Prior to that, he’s had rich industry experience as a solution integrator and in the service provider space. When not working on technology innovation, he may be difficult to locate due to his passion for world travel.

Latest posts by Vladimir Mandic (see all)

security-protection-vlad-1Ransomware
A long time ago I heard an anecdote that the highest level of security certification was given to a system that sat in a secure room and was isolated from a network. Today we live in a connected world, and that creates much bigger surface areas for security threats. As much as IT organizations would like to limit exposure, users expect unlimited access to both business and personal email, to be able to work with attachments, to surf the web, and to interact on social media.

Pandora’s Box has been opened security-protection-vlad-2.jpg
Although risk cannot be completely eliminated, it can and should be managed. In parallel, ransomware has emerged as a top cyber threat to business. The number of attacks and their complexity is unparalleled. These are not simple drive-by threats (such as a random user visiting a site that contains malware); instead, they are custom-designed to bypass an organization’s perimeter security and target specific high-value data sets.

The combination of open access and more advanced threats is something that requires far more attention!

Many organizations derive a false level of confidence from their investment in perimeter security: firewalls, authentication/authorization, antivirus solutions and encryption over-the-wire. When assessing security and protection, however, assume that the perimeter has been breached! The breach point is already beyond antivirus software and firewalls; it is now within authenticated systems where encryption becomes transparent. Do you know what your level of protection is?

How big is a Ransomware threat?
• Ransomware has headlined on FBI, DHS, DOJ, and NSA lists in 2016 and triggered multiple US Senate and Homeland Security questions that have resulted in FBI, DHS, and DOJ responses.
• It’s growing fast: At the end of Q1 2016, 93% of all phishing emails contained encryption ransomware. That’s a 763% increase year over year!

First, let’s look at the infrastructure
If you do control the infrastructure, be sure to take advantage of Isolated Recovery Solution (IRS) for systems such as EMC VMAX and Data Domain. IRS ensures that (a) you have a replica of your storage for fastest recovery, and (b) replication is enabled over a link which is air-gapped when replication is not occurring. That way, any corruption of primary data can quickly be recovered from an unaffected replica copy.

If you outsource your infrastructure (for example, by using the public cloud), does that mean security is no longer your responsibility? Remember, an IaaS provider takes responsibility for infrastructure availability and resiliency, but not for data validity. That means protecting your data on your core systems is your responsibility.

Regardless of the location or ownership of the infrastructure, you should be asking yourself these questions:
• Does it matter if we (or the provider) have certification XYZ.123 or not?
• In case of compromise, how do we recover data?
• Do we have a clean copy of the data that is isolated?
• How quickly can we recover?

Second-level safety is provided by having a well-designed data center protection strategy, including a backup solution, which provides an additional level of isolation for your data. That data should be secure and immutable, and it should be available for quick recovery to any point in time. Solutions such as EMC NetWorker or Avamar data protection software together with EMC Data Domain protection storage provide this level of protection. (more…)

SUBSCRIBE BELOW

Categories

Archives

Connect with us on Twitter

Click here for the Cloud Chats blog