We no longer support the IE11 browser. Thus, certain features may not perform as expected. We recommend that you select Chrome version 87.0 or higher, Firefox version 83.0 or higher, or Edge version 44 or higher.
You’ve been identified as an employee who is accessing the Education Services Customer site.
Would you like to set your location to provide relevant training options
Over the past 17 years the Proven Professional program has published over 650 articles which have been downloaded over 2.5 million times. These articles continue to provide value to our audiences and the IT industry at large.
Given the significant amount of change over nearly 2 decades, and particularly with the introduction of Generative AI, we are pausing the Knowledge Sharing Competition for 2024.
We will use this gap year to evaluate how to best incorporate new technologies into the program and still allow for the sharing of best practices and cutting edge introspectives.
In the meantime, browse the Knowledge Sharing Library for some reading nuggets you may have missed.
We’ll restart this program in 2025.
Click here to watch a recording of the 2023 Knowledge Sharing Awards Ceremony.
2023 Competition First Place Winner
Empowering Space Exploration with Datacenters
Associate Sales Engineer Analyst
In this Knowledge Sharing article, awarded 1st Place in the 2023 Knowledge Sharing Competition, Parikshit Patil shares how data center technology, implemented into space missions, will completely transform multiple aspects of space exploration and research.
Parikshit helps the reader understand how important space exploration is to lead a more comfortable life on Earth, not only in terms of basic requirements such as healthcare and natural disasters prevention, but also to enhance and propel our standard of living to a greater degree by means of technology and innovation.
2023 Competition Second Place Winner
Beyond Cloud Optimization: FinOps to GreenOps
IT practices, such as Cloud FinOps and GreenOps, can help organizations save money, reduce their environmental impact, and operate more sustainably. As more organizations become aware of the importance of sustainability, the adoption of FinOps and sustainable IT practices will become increasingly essential for companies to remain competitive and responsible.
This article awarded 2nd Place in the 2023 Knowledge Sharing Competition; Sai details the best way to handle these considerations.
2023 Competition Third Place Winner
The Hidden World of Embedded Systems
In this Knowledge Sharing article, awarded 3rd Place in the 2023 Knowledge Sharing Competition, Bruce Yellin examines embedded systems and the miracle of the microchip.
Bruce takes the reader through the digital world, where we are surrounded by embedded systems. He explores the enormous contributions they have made in society, and how these systems run nonstop with minimal human intervention and if done right, how these intelligent devices will improve our quality of life.
Best of Metaverse
Extending Reality into the Metaverse
In this Knowledge Sharing article, awarded Best of Metaverse in the 2023 Knowledge Sharing Competition, Parikshit Patil shares how after decades of dreaming, imagining, and suggesting what a Metaverse could be like, it is finally within the reach of this generation.
Parikshit discusses how the Metaverse will play a significant role in technology. Helping the reader understand the flexibility and change offered is limited by nothing but one's imagination.
Best of Internet of Things
Internet of Underwater Things
Customer eXperience Engineer
This article is an overview on how IoUT is making a positive impact in this data era. Archana shares how this ongoing concept has researchers looking for new ways to make this work even more successful.
You will explore the Internet of Underwater Things (IoUT). As organizations are digitally transforming and data has become more essential than ever, digital solutions like IoT for terrestrial and aerial ecosystems and IoUT for the marine ecosystem, Big Data with intelligent Machine Learning algorithms along with Cloud-based infrastructure are incorporated for innovative and efficient transmissions.
Best of Cyber Security
Can’t Judge a Book by its Recover
GEOS: Senior Principal Engineering Technologist Dell Technologies
Staff Solution Architect Cloud Infrastructure Business Group
Advisor, Solutions Architect
In this Knowledge Sharing article, awarded Best of Cyber Security in the 2023 Knowledge Sharing Competition, the authors demonstrate the different approaches needed to address a cyber-attack compared to a standard disaster event. Each solution will depend on a host of factors as discussed in this article.
The authors investigate how these attacks have led to the direct involvement of governments and their agencies. In a number of these cases, new legislation has been created to help combat this threat and legislate how certain organizations operate and secure themselves.
The conventional paradigm of perimeter control firewalls separating trusted insiders from untrusted outsiders no longer makes sense in today's inter-linked world. The Zero Trust model is a security framework that assumes that any device or user attempting to access a network or system is potentially untrustworthy and must be thoroughly authenticated and authorized before being granted access. It is a data-centric approach to network security and is founded on the maxim "never trust, always verify." The traditional model of the Zero Trust Framework posits that organizations should verify the identity and legitimacy of every user, device, or service before allowing them access to sensitive data or systems.
Businesses must understand that perimeter-based security provides no protection against attacks stemming from insiders or from threats based on identities and credentials. To deploy a zero-trust framework, organizations need to identify all the assets that they want to protect, including devices, data, and systems. Micro segmentation uses network segmentation to divide the network into smaller, more secure zones and limit access to only those resources that are strictly required for a user or device to perform its intended function.