Skip to main content
DISPLAY LANGUAGE
NEAREST LOCATION

We no longer support the IE11 browser. Thus, certain features may not perform as expected. We recommend that you select Chrome version 87.0 or higher, Firefox version 83.0 or higher, or Edge version 44 or higher.

X

Inspiration begins with knowledge.


Dell Technologies Proven Professional Knowledge Sharing Program

 

Annual competition has been paused until 2025

Over the past 17 years the Proven Professional program has published over 650 articles which have been downloaded over 2.5 million times. These articles continue to provide value to our audiences and the IT industry at large.

Given the significant amount of change over nearly 2 decades, and particularly with the introduction of Generative AI, we are pausing the Knowledge Sharing Competition for 2024. 

We will use this gap year to evaluate how to best incorporate new technologies into the program and still allow for the sharing of best practices and cutting edge introspectives.

In the meantime, browse the Knowledge Sharing Library for some reading nuggets you may have missed. 

We’ll restart this program in 2025.

 

2023 Knowledge Sharing Winners Announced

Click here to watch a recording of the 2023 Knowledge Sharing Awards Ceremony.
 

2023 Competition First Place Winner


Empowering Space Exploration with Datacenters

 

Parikshit Patil
Associate Sales Engineer Analyst
Dell Technologies

In this Knowledge Sharing article, awarded 1st Place in the 2023 Knowledge Sharing Competition, Parikshit Patil shares how data center technology, implemented into space missions, will completely transform multiple aspects of space exploration and research.

Parikshit helps the reader understand how important space exploration is to lead a more comfortable life on Earth, not only in terms of basic requirements such as healthcare and natural disasters prevention, but also to enhance and propel our standard of living to a greater degree by means of technology and innovation. 

2023 Competition Second Place Winner
 

Beyond Cloud Optimization: FinOps to GreenOps

Sai Ganesh
Solutions Architect
Rackspace Technology

IT practices, such as Cloud FinOps and GreenOps, can help organizations save money, reduce their environmental impact, and operate more sustainably. As more organizations become aware of the importance of sustainability, the adoption of FinOps and sustainable IT practices will become increasingly essential for companies to remain competitive and responsible.

This article awarded 2nd Place in the 2023 Knowledge Sharing Competition; Sai details the best way to handle these considerations.

2023 Competition Third Place Winner


The Hidden World of Embedded Systems

Bruce Yellin
Retired Advisory Engineer

In this Knowledge Sharing article, awarded 3rd Place in the 2023 Knowledge Sharing Competition, Bruce Yellin examines embedded systems and the miracle of the microchip. 

Bruce takes the reader through the digital world, where we are surrounded by embedded systems. He explores the enormous contributions they have made in society, and how these systems run nonstop with minimal human intervention and if done right, how these intelligent devices will improve our quality of life.

Best of Metaverse


Extending Reality into the Metaverse

 

Parikshit Patil
Associate Sales Engineer Analyst
Dell Technologies

In this Knowledge Sharing article, awarded Best of Metaverse in the 2023 Knowledge Sharing Competition, Parikshit Patil shares how after decades of dreaming, imagining, and suggesting what a Metaverse could be like, it is finally within the reach of this generation.

Parikshit discusses how the Metaverse will play a significant role in technology. Helping the reader understand the flexibility and change offered is limited by nothing but one's imagination.

Best of Internet of Things

 

Internet of Underwater Things

 

Archana Vijayan
Customer eXperience Engineer
Dell Technologies

This article is an overview on how IoUT is making a positive impact in this data era. Archana shares how this ongoing concept has researchers looking for new ways to make this work even more successful. 

You will explore the Internet of Underwater Things (IoUT). As organizations are digitally transforming and data has become more essential than ever, digital solutions like IoT for terrestrial and aerial ecosystems and IoUT for the marine ecosystem, Big Data with intelligent Machine Learning algorithms along with Cloud-based infrastructure are incorporated for innovative and efficient transmissions. 

Best of Cyber Security

 

Can’t Judge a Book by its Recover

Faisal Choudry
GEOS: Senior Principal Engineering Technologist Dell Technologies

Shreyash Nalamwar
Staff Solution Architect Cloud Infrastructure Business Group
VMware

Padraig Devane
Advisor, Solutions Architect
Dell Technologies

In this Knowledge Sharing article, awarded Best of Cyber Security in the 2023 Knowledge Sharing Competition, the authors demonstrate the different approaches needed to address a cyber-attack compared to a standard disaster event. Each solution will depend on a host of factors as discussed in this article. 

The authors investigate how these attacks have led to the direct involvement of governments and their agencies. In a number of these cases, new legislation has been created to help combat this threat and legislate how certain organizations operate and secure themselves.


 


2023 Publication Schedule

July
Title Category Author(s) Summary
A guide to protecting any data on any cloud Cloud Pablo Calvo
Services Provider
Dell Technologies
What if we could combine all the successful traditional data protection tools and practices and still maintain scalability, replication, protection and more?

This article discusses how we can adapt our data protection approach to new demands, transparently, and manage a copy of the data in a universal backup platform. It will detail how we can define a “cloud-aware” layer, for a more flexible solution that can be adapted to any cloud provider.
AutoML for Improved Customer Churn Prediction Artificial Intelligence Shriya Avasthi
Associate Sales Engineering Analyst
Dell Technologies

and

Dr. Partha Sarathi Mangipudi

Professor
Amity Centre for Artificial Intelligence (ACAI)
Amity University, Noida
Customer retention is often more valuable than customer acquisition.  The churn-rate of technical companies is historically high. Data analytics plays a critical role in predicting customer churn and understanding the latest trends and requirements for customers.

This article discusses how Automated Machine Learning (AutoML) can automate the workflow of processing these datasets, for improved results and positive business impact.
Digital Avatars - The Future's Face Emerging Technologies Anjali Jayanti
Associate Sales Engineer Analyst
Dell Technologies

Sana Kulsum Rizvi
Associate Sales Engineer Analyst
Dell Technologies

Akarsh Raj
Associate Sales Engineer Analyst
Dell Technologies
With digital avatars becoming a trendy way to represent oneself online, it may soon become the norm for Artificial Intelligence powered avatars to be used for a wide range of tasks.

This article dives into what digital avatars are, how they can be created using various technologies, what they might be used for, and other advantages. It also explores what the future may have in store for these human-like creatives as the metaverse continues to evolve.
Modernize Data Protection with Automation Automation Raghava Jainoje
Advisory Systems Engineer
Dell Technologies

Mike van der Steen
Principal Systems Engineer
Dell Technologies
Automation is a key component as organizations continue their digitization journey. It has the power to optimize and reduce effort spent on manual and repetitive tasks with automation tool sets.

This article details how automation can assist with data protection efforts by considering modern protocol supports, such as REST API.
August
Article Category Author(s) Summary
Bumpy Landing - DLTs in a Centralized World Edge Steve Todd
Fellow, P&O CTO
Dell Technologies

Frank Macha
Sr. Principal Engineering Technologist
Dell Technologies

While Distributed Ledger Technology (DLT) has enormous benefits for corporations and its impact has increased due to the changing landscape, bridging the gap from centralized IT processes to decentralized models may be difficult.

This article details a vison for implementing DLT across corporations for long-term business value and potential.
Cyber Resilient for Modern Data Center Virtualization Victor Wu
Senior Solution Expert, Business Consultation
BoardWare Information System Limited
Data backup and recovery solutions are critical for all mission-critical applications.  Planning and designing a cyber-resilient architecture ensures data availability while enabling a business to be more agile.

In this article, the author proposes a cyber resilient design solution with two core features – resilient infrastructure and resilient data recovery.
Cyber Security: What we have and What we need Cyber Security Ruthvik SJ
Associate Sales Engineer Analyst
Dell Technologies

Urja Senani
Associate Sales Engineer Analyst
Dell Technologies

Cybercrime becomes more and more prevalent as the world becomes for digital. Having solutions in place to combat different types of cyber attacks is critical to any business.

This article discusses types of cyber attacks and their impacts, why and how these attacks happen, what is available today to protect from them, and what next steps may be in order to provide better solutions.
Decarbonization: To Sustainable Data Centers Green IT Kartik Sumrani
Associate Sales Engineer Analyst
Dell Technologies
The need for powerful data centers is increasing exponentially.  This puts a huge strain on energy resources and may greatly impact our environment.

The author discusses in this article the importance of an effective data center decarbonization plan, and how sustainability leaders are working together to address all aspects of the carbon footprint.
Edge of Containerisation in Cloud Computing Cloud Ronit Mukherjee
Inside Product Specialist
Dell Technologies

Saipriya Swain

Allocating resources to hosts in a cloud-based environment poses some challenges.  Though virtualization offers many benefits, there can also be shortcomings, and containerization can help mitigate these issues.

This article dives into the benefits of implementing containers, what they are and a review of their features and  why the authors think containerization may have the upper edge.
Intelligent Process Automation - An AI Marvel Artificial Intelligence Prateek Bhat
Inside Product Specialist
Dell Technologies
Artificial Intelligence continues to adapt and offer us new ways of doing business. Intelligent Process Automation (IPA) takes different technologies associated with AI and combines them to modify comprehensive end-to-end business processes.

This article details why automation is so critical to us as we move toward the future and how IPA plays a major role in increasing speed and efficiency into existing traditional systems.
September
Article Category Author(s) Summary
A Beginner's Guide to Data Literacy Data Science Sai Ganesh
Solutions Architect
Rackspace Technology
Data literacy and data modernization are becoming increasingly vital for organizations of all sizes and industries. As data and analytics strategies become essential for all aspects of digital business, it is essential for organizations to have a workforce that can understand, communicate, and work with data effectively.

In this article, the author discusses the trend towards cloud-native technologies, containers, Kubernetes, and edge computing, which are replacing traditional data infrastructure. This shift enables organizations to store, process, and analyze their data in new ways, and to better meet the demands of today's data-driven business environment
Augmented Reality - Digitizing Datacenter Artificial Intelligence Athira Anirudhan
Specialist 2, Inside Product
Dell Technologies

B. Ranjeeth
Specialist 2, Inside Product
Dell Technologies
Augmented Reality (AR) enhances our perception of the real world by overlaying digital information, such as images, videos, or 3D models, onto the user's view of the physical environment.

In this article, the author focuses on the use of augmented reality technology in data center management. The author describes the signifcant benefits of implementing AR technology, how to maximize those benefits and the challenges to be aware of.
CXL – Gamechanger for the Data Center Server Samriddhi Jaiswal
Customer eXperience Engineer
Dell Technologies
Compute Express Link (CXL) introduces a revolutionary architectural shift, bringing new possibilities to data center performance, efficiency, and cost. CXL is an open-source interconnect for memory to connect to processing in servers and storage.

In this article, the author discuss the various CXL specifications and how it enables heterogeneous computing. Also discussed is how CXL could potentially disrupt the data center industry.
Getting Started with the Open-Source Cloud Cloud Luis Cardenas
Senior Systems Engineer,
Solutions Architect
Dell Technologies

Kartikeya Chauhan
Associate Sales Engineer Analyst Dell Technologies
Whle there are differences between public, private and hybrid cloud models, the foundation to them all is software. There are many software packages available, both commercial and open-source, to help an organization on their cloud journey.

In this article, the author provides a guide to deploying a private cloud based on the open-source projects from the OpenStack framework.
Redesign Endpoints Data Protection Strategies

Data Protection Mohamed Sohail
Advisory Consultant,
Data Center & Business Resiliency
Digital transformation is changing our lives, and cyber threats pose a significant risk to businesses of all sizes and industries. Cyber-attacks take many different forms and attackers may have a variety of motivations, techniques, and platforms. A good cyber recovery strategy takes all of these points into account. Endpoints include end-user devices, servers, mobile devices, IoT devices, and peripherals. Endpoint protection methodologies in the era of Ransomware attacks include real-time protection, backup, and air-gaping the data.

In this article, the author discusses the capabilities of Avamar Backup as a service for Endpoints. Also in included is a discussion on achieving business resiliency by integrating Avamar with Air Gap & Information security analytics.
The Crucial Relationship between IoT and ML Data Science Viraj Patel
Associate Sales Engineer Analyst Dell Technologies

David Tilak
Associate Sales Engineer Analyst Dell Technologies

Pranay Malik
Associate Sales Engineer Analyst Dell Technologies
In this article, the author discusses the importance of machine learning (ML) in data science and enabling digital transformation in various industries. Machine learning is primarily used to evaluate data with AI's assistance, spot trends, and make judgments with less human interference. IoT devices linked to the internet that gather and share data are referred to as Internet of Things (IoT) devices. IoT has improved responsiveness and intelligence throughout the world, and machine learning is expanding quickly.

By analyzing vast amounts of data with powerful algorithms, machine learning can assist in demystifying the hidden patterns in IoT data. Businesses employ machine learning for IoT to conduct predictive functions on a variety of use cases, enabling the organization to obtain fresh insights and cutting-edge automation capabilities. IoT technologies that support healthcare facilities, in-house diagnostics labs, and disease prediction tools are now being used in the healthcare sector.
October
Article Category Author(s) Summary
Business Continuity in Cloud Era Cloud Nizhamudeen Meeramoideen The advances in cloud technology are making data decentralized, and businesses need to be prepared to deal with issues ranging from simple component failures to slow system performance and outages. A comprehensive business continuity and disaster recovery strategy must identify the requirements for resiliency and availability and determine the level of financial investments and effort required to meet those requirements. Business continuity is the ability of an organization to keep its operations running in the event of a major disruptive event. There are four main types of business continuity plans: prevention, detection, response, and recovery. The cloud offers businesses a way to quickly scale up their operations and access data from anywhere in the world, but it also introduces new risks that must be addressed by business continuity strategies.
Depression detection using Machine Learning Machine Learning Shruthi Krishnakumar Depression is a common mental health disorder affecting 4.4% of the global population, with half of the in-risk individuals in South-East Asia and Western Pacific region. Social media platforms like Facebook and Twitter generate a lot of relevant information for behavior analysis, making it easy to find out which users are depressed. The main goal of this study is to analyze whether machine learning (ML) methods can effectively detect depression in people by analyzing their social media texts without relying on specific keywords. The study combines a technical description of the methods applied to identify depression using NLP and a text classification technique.
The research method includes data collection and preparation, data preprocessing, word analysis, tokenization, feature selection, extract features, and depression detection. The dataset is split into training and test datasets, and the NLP tools are used to pre-process the dataset before it is proceeded to the feature selection and training stage. The process of removing noise from the data and cleaning and simplifying the data is performed using three types of preprocessing.
IT Strategy for a Technological World Edge Kalpesh Gupta The world is changing rapidly due to advancements in computational technology and systems, including high-speed networking, IoT, machine learning, and autonomous vehicles. As the world transforms, technology becomes a need rather than a pleasure, and every industry has exploited it in some manner. A proper IT strategy must be established based on the organization's people, processes, and business goals to maximize the efficient use of technology. The healthcare sector is one of the largest and greatest sectors in terms of revenue and employment, and healthcare providers are accelerating digital transformation to deliver patient care safely and securely. Emerging technologies include edge, unified management, artificial intelligence, and comprehensive solutions.
Healthcare organizations can adapt to new routines and push the boundaries of what's possible with timely, on-demand IT that flexes to meet the healthcare demands of today and tomorrow. The article discusses the technical challenges and requirements of each industry sector and how an effective approach can be developed to design the right IT solution.
The Future of Cloud Security Cloud Nidhi Shree N Cloud adoption has led to an increase in cybercriminals targeting organizations in the cloud environment. Cloud security is a collection of procedures and technology designed to protect cloud computing resources from external and internal threats. The right cloud security tools can automate security, prevent internal threats, and lower breach risks. Future cloud security trends include a distributed cybersecurity mesh, zero trust policies, hybrid and multi-cloud environments, and merging security through DevSecOps. SASE is a framework that provides a cloud-based cybersecurity solution and supports digital enterprises' dynamic, secure access needs. Organizations need a comprehensive and robust security plan in place to remain competitive in the unstable business environment.
Zero Trust Framework Cyber Security Vishnu Rany
Specialist 2, Inside Product
Dell Technologies

Rajesh Goda
Principal Systems Engineer

The conventional paradigm of perimeter control firewalls separating trusted insiders from untrusted outsiders no longer makes sense in today's inter-linked world. The Zero Trust model is a security framework that assumes that any device or user attempting to access a network or system is potentially untrustworthy and must be thoroughly authenticated and authorized before being granted access. It is a data-centric approach to network security and is founded on the maxim "never trust, always verify." The traditional model of the Zero Trust Framework posits that organizations should verify the identity and legitimacy of every user, device, or service before allowing them access to sensitive data or systems.

Businesses must understand that perimeter-based security provides no protection against attacks stemming from insiders or from threats based on identities and credentials. To deploy a zero-trust framework, organizations need to identify all the assets that they want to protect, including devices, data, and systems. Micro segmentation uses network segmentation to divide the network into smaller, more secure zones and limit access to only those resources that are strictly required for a user or device to perform its intended function.

November
Article Category Author(s) Summary
Blockchain Revolutionizing Currency Blockchain Janani Pokkuluri
Specialist 2, Inside Product
Dell Technologies

Vagdevi Kaligotla
 
In this article, the author discusses the use of blockchain technology to address issues of data integrity, security and transparency. A SWOT analysis of Cryptocurrency is included along with a discussion on creating your own crypto chain.
Cloud Computing and Industries Transformation Cloud Mina Essam
Specialist 2, Inside Product
Dell Technologies

Shady Nagy
Specialist 2, Inside Product
Dell Technologies
There is no denying that cloud computing has introduced a new era of technology where data can be stored and accessed, instantaneously, from anywhere around the globe. Read this article to learn more about the impact of cloud computing from a business , educational institution and healthcare perspective.
Importance Of Cloud Middleware Technologies Cloud Prateek Bhat
Inside Product Specialist
Dell Technologies
This article discusses the importance of cloud middleware technologies in facilitating connection, networking, and data transfer in cloud systems. Cloud-native technologies enable firms to develop and run applications on dynamic, scalable, secure domains such as public, private, and hybrid clouds. Middleware technologies are encapsulated under these systems to facilitate smooth data transition and transport to all the different layers of the stack. The article also emphasizes the advantages and challenges that can be observed in the systems before implementing the cloud midware.
RPA Implementation: Small and Medium Business Artificial Intelligence Tejesh V
Specialist 2, Inside Product
Dell Technologies
Robotic process automation (RPA) is a software-based technology that automates business processes using structured inputs and business logic. RPA combines automation, computer vision, and machine learning. The growth of RPA in the business markets is expected to exceed $ 2.8 billion until 2023. The article discusses the benefits for Small and Medium Business (SMB) by implementing RPA effectively.
SCM for HANA- How it generates a negative TCO Storage Amal D Nair

Thejushree K

Richard Holmes
Product and Solutions Sales Specialist 4
Dell Technologies
This article discusses the market shift towards cloud-based and software-defined storage, with a growing demand for solutions that can support diverse application workloads. SAP HANA is a cutting-edge database system that utilizes in-memory technology to store and process data, making it possible to perform advanced analytics and real-time decision-making with large amounts of data. The author provides a structured approach to understanding the available subsets and data tiering options.
December
Article Category Author(s) Summary
Business impact of Web3 on Enterprise Data Science Vaishnavi Adiyodi
Associate Systems Engineer I
Dell Technologies

Charitha Srinidhi

Specialist 2, Inside Product
Dell Technologies

Muthukumaaran SK

Specialist 2, Inside Product
Dell Technologies
Read this article to learn how data centers have evolved from physical and virtual infrastructures to hybrid clouds, with speed, performance, and efficiency becoming the main concerns. The data center landscape is being shaped by ongoing technological improvements, and there will be a significant increase in demand for data centers due to investments in the cloud, 5G, and metaverse. The need for an effective computing infrastructure, distribution of data, services, and infrastructure control and management requirements must be taken into consideration when choosing the appropriate service model.
Chaos Engineering: A Journey into Resilience Infrastructure Resilience Afeefa Shaista
Supervisor, Inside Sales Management
Dell Technologies

Mahesh GR
This article explores chaos engineering is a method of testing distributed software to evaluate its ability to withstand random disruptions. It involves intentionally introducing controlled failures or disruptions into a system to test its resilience and identify weaknesses. Learn how to get started using this tecnique, what the benefits are and which challenges to be aware of.
Cloud Repatriation: What, When, And Why? Cloud Shruthi Krishnan
Specialist 2, Inside Product
Dell Technologies

Hezil Pramod
Specialist 2, Inside Product
Dell Technologies

Anirudh Biju
Specialist 2, Inside Product
Dell Technologies
In this article, the authors explore some of the challenges faced by stakeholders while adopting cloud strategies for their businesses. Cloud repatriation refers to the process of moving data, applications, or other resources that were previously hosted on a cloud computing platform. This can be a complex process that requires careful planning and consideration of a variety of factors. Stakeholders will gain an understanding of the cloud repatriation phenomenon and how to be better prepared for what is to come.
HPC for Bio-Inspired Optimization Algorithms Server Rajasekhar Nannapaneni
Senior Principal Site Reliability Engineer
Dell Technologies
The article discusses the evolution of computing and the importance of high performance computing in solving advanced computational problems. It covers the seven basic families of computing, including numerical algorithms, N-body methods, structured grids, and Monte Carlo Methods. The article also discusses particle swarm optimization and how parallel computing can improve efficiency in executing nature-inspired algorithms. The stored program computer concept, which comprises a collection of components including a control unit and arithmetic logic unit, is at the heart of every computer
IoB: Enhancing IoT with Behavioral Analytics Internet of Behavior Shruthi Sankar In this article, the author discusses the Internet of Behavior (IoB), a new field of study that combines technology, data analytics, and behavior science. It gathers and analyzes data on user behavior, interests, and preferences to enhance product suggestions and customize advertisements based on user preferences. While IOB provides a better undertanding of human behaviour which can drive business goals, it also brings up questions around privacy and security
Your Digital Twin needs Edge Computing Edge Pankaj Pande
Distinguished Engineer
Dell Technologies
This article explores the benefits and use-cases of integrating edge computing with digital twins and the challenges and considerations that need to be addressed. Learn how edge computing can enhance the performance and effectiveness of digital twins, enabling real-time data processing and analysis, improved security and privacy, and increased flexibility and scalability. Readers will gain a comprehensive understanding of how edge computing can enable the real-time, data-driven capabilities of digital twins and drive innovation in their respective fields.
January 2024
Article Category Author(s) Summary
DNA: Future of Data Storage Storage Rekha Sivakumar
Specialist 2, Inside Product Dell Technologies

Sreejith S Pai
Specialist 2, Inside Product Dell Technologies

Adithyan Rajeev
Specialist 2, Inside Product Dell Technologies
The population of the world is constantly growing, resulting in a data explosion. However, modern storage techniques have a few flaws. This article aims to explore the potential of an unconventional method of storing data, using the capabilities of Deoxyribose Nucleic Acid (DNA).
GANs – The Future of Creative Forgery Artificial Intelligence Bharath Krishnan
Specialist 2, Inside Product
Dell Technologies
This article discusses the use of Generative Adversarial Networks (GAN) in machine learning. GAN is a model that can produce an almost indubitable replica of what it is trained for. It does so by learning to blend all the discrete things it has learnt, by introducing just the right amount of random noise. This could be the new way sophisticated AI systems would advance in fields like computer vision, natural language processing, and other domains that involve human interaction. The paper introduces a layman to the topic of GAN and talks about the technical aspect of training the GAN sub-models, namely the Discriminator and the Generator. It also discusses the ethical impacts that all the technological developments in this field can have on the future of the creative/design industry.
Let your workload dictate the architecture Cloud Vinay Joel Dmonte
Supervisor, Inside Sales Management Dell Technologies

Amal D. Nair

Akshay A G
In this article, learn more about the importance of cloud adoption and its various models in supporting different business use cases. It is important to maximize resource utilization and minimize costs while choosing the right workload that best fits a set of resources. The author summarizes best practices when faced with strategic considerations for workload placement, deployment suggestions, and requirements to segregate them into specific groups. This article serves as a quick reference guide and knowledge article for anyone looking for to have parameters handy.
Proficient Storage for Blockchain 4.0 Blockchain Saiganesh Venkataraman

Sagar Sajeev

Shruthi Krishnan
Specialist 2, Inside Product
Dell Technologies
In this article, the author discusses how Blockchain has evolved from a simple ledger technology to a platform for Decentralized Applications (dApps). Blockchain 4.0 aims to address the drawbacks seen in previous versions by allowing Blockchain to be integrated with other technologies. Blockchain-as-a-Service providers help manage and maintain the IT ecosystem for enterprises keen on developing dApps. The benefits of Blockchain-as-a-Service in large deployments are discussed, as well as the pitfalls and what the future may bring.
The Cloud Age – What’s good in GCP and VCF Cloud Amal D Nair
Inside Sales Engineer
Commvault

Anirudh Sandur
Associate Systems Engineer I
Dell Technologies
Read this article to explore the benefits of using Google Cloud Platform (GCP). GCP offers Infrastructure as a Service (IaaS) and modes for serverless computing environments. It runs on the same infrastructure that Google has been using internally for its products. GCP is a subset/part of the Google Cloud, which includes advanced technology capabilities like Machine Learning and Enterprise Mapping Services. The article also discusses the integration of VxRail Manager and SDDC manager.
Zero Trust-The Future of Multi-Cloud Security Security in Multi-Cloud Pavan Gowda R
Specialist 2, Inside Product
Dell Technologies

Swati Sinha
Zero Trust is a unique IT security model that aims to eliminate the concept of trust to secure IT networks, applications, and data. It provides a continuous process of authentication and validation while easily integrating with the existing IT security infrastructure. Zero Trust architecture is eventually becoming the de facto standard in securing cloud and multi-cloud environments. Multi-cloud strategies enable organizations to support their business goals by utilizing a mix of public and private cloud providers. Read this article to see how new security trends are surfacing to address increasing IT sand cyber security concerns. To address these increasing IT and cyber security concerns, new security trends have lately surfaced.
February 2024
Article Category Author(s) Summary
AIaaS: The Future of Computing Services! Artificial Intelligence Harshitha BG
Specialist 2, Inside Product
Dell Technologies

Ritesh Agarwal
Specialist 2, Inside Product
Dell Technologies
AI is the most important breakthrough that humanity is working on currently. It is employed by organizations to perform tasks like humans. AI as a Service is a solution for companies that do not want to test, build, and implement heavy systems. While AIaaS has many advantages there are disadvantages as well. Read this article to learn more.
Cloud: To Repatriate or To Re-Evaluate Cloud Saloni Varshney
Associate Sales Engineer Analyst
Dell Technologies

Muskan Puri
This article discusses how businesses are optimizing technology to respond to the massive amount of digital transformation. Cloud hosting offers increased scalability, flexibility, and cost efficiency, but it also has disadvantages such as limited control, security concerns, and vendor lock-ins. Cloud repatriation is the process of moving data, applications, and other resources from a cloud environment back to on-premises or in-house infrastructure. Learn how this trend has been gaining popularity in recent years as companies seek to regain control over their data and improve security, compliance, and performance.
Data On-Demand with Vcinity & Dell Storage Pratyush Panda
Specialist 2, Inside Product
Dell Technologies

Anjali Jayanti
Specialist 2, Inside Product
Dell Technologies
The internet is a massive network of interconnected devices, formed by the connection of LAN, MAN, and WAN. TCP/IP has been upgraded significantly with various versions, but it still lacks the ability to produce data at real-time speeds. Storage systems have improved, but despite innovation on the network side, it has still been lagging. In this article, learn how the traditional paradigm of moving data before using it is being changed with Vcinity VDAP.
Gaining data insights for competitive edge Data Science Sarvesh Bode
Specialist 2, Inside Product
Dell Technologies

Snigdha Deepala
In this article, the authors discuss how businesses develop effective marketing strategies, improve products and services, and make informed business decisions. There are several ways to gain data insights, including business intelligence, predictive modeling, market research, A/B testing, and data visualization. Business intelligence (BI) allows companies to quickly identify trends, patterns, and opportunities in their data. 
Sustainable IT and Cloud Cloud Vivek Kumar
Specialist 2, Inside Product
Dell Technologies

Rajalakshmi Iyer
The Brundtland Commission introduced sustainable development in 1987, but its essential concepts have been forgotten. The environmental issues of today are caused by lack of development and unforeseen effects of some types of economic development. To reduce the impact on our environment, we need to find ways that make development sustainable. Read this article to discover how companies are adapting to more sustainable infrastructures.
Article Category Author(s)
March 2024
Dell and AWS for Improved Data Protection Cloud Krithika Jagannath
Timothy Jones
DNA - A Natural Realm for Data Storage Storage Parleen Oberoi
Keerthan S J
Fuzzy Classification Techniques in AI Artificial Intelligence Kartik Sumrani
Internet of Behavior (IoB) - An Overview Internet of Things Harish Subramanian
Web of Things approach for Smart Ports Microservices Jyothsna K
Kaveri Chockalingam
Datafication – A New Business Model Data Science Sneha Venkatesh