Today, the world celebrates #WomenInSTEM, promoting women in Science, Technology, Engineering & Math (STEM). Ada Lovelace, a British mathematician who is recognized as the first computer programmer, Sally Ride, the first American woman in space, and Limor Fried, an electrical engineer, entrepreneur, and world leader in the present day Maker community are three individuals that instantly come to mind not only as examples of Women In STEM, but also as people who inspire me.
Working here at Dell Software, we have an amazing number of co-workers that inspire and lead in every area of the business.
Some of our Women In STEM from the Dell Software Aliso Viejo office:
To see the Enterprise Software Solutions they code, support, market, sell, and maintain stop by our site.
Gain more time to do the things you love using solutions from Dell Software.
Note: This is a guest blog by Ken Fletcher, CEO of Quarterhorse Technology Inc., a Dell SonicWALL Premier Partner based in New York. http://www.iqti.com/
Security is a major concern for small and large companies. When small companies hear the term enterprise-level security, the first thing that comes to mind is how much it would cost upfront and long term. Support is not a just a dollar amount, it involves extensive management by trusted professionals.
As companies begin to outsource more of their IT needs to hosted applications and outside firms, internal staff are shifting their attention to network-centric issues. IT security has expanded from a firewall deployed at the perimeter and anti-virus installed on workstations to include mobile device security and user education. Network security has evolved to encompass securing non-company assets such as cell phones, tablets, and personal laptops that are utilized by end users to access company resources. Additionally, companies have started to invest in educating users on the multitude of ways a criminal can attempt to obtain sensitive information. This can include malware/ransomware and social engineering tactics.
The evolution of the next-generation firewalls
Firewall manufacturers are beginning to shift their focus from basic packet inspection to more intuitive and adaptive methods of traffic inspection. Security threats are constantly evolving and, as a result, firewall manufacturers have introduced next-generation firewalls (NGFW). An NGFW not only protects a network, but also its users. These firewalls go beyond packet inspection, and have the ability to scan for viruses at the gateway. They also include additional services such as content filtering (CFS) and intrusion prevention and detection (IPS/IDS). CFS can minimize the risk of employees visiting websites that contain malicious content, and increase productivity by eliminating access to non-work related websites. CFS can also be used as a liability protector by eliminating the risk of employees visiting controversial websites and subsequent lawsuits that could be filed against the company. If implemented correctly, these services can reduce the time and cost of management.
BYOD for the Real World
While some organizations are adopting a Bring Your Own Device (BYOD) model for their staff, these organizations are typically large, with significant support staff dedicated to managing the inherent issues that come with BYOD. Some organizations limit user’s remote access to company provided devices, allowing the company more control over security. Despite this, providing company-issued devices can be expensive to deploy and support. For example, companies have been inclined to provide a firewall for their employees’ home network in order to secure a device, such as a PC, that is being used for business purposes. This adds to the complexity of both the setup and support these devices for their employees. As a result, this methodology can limit the amount of personnel the company will allow to remotely access their network. Additionally, this method does not scale in an event such as Superstorm Sandy or the recent NYC blizzard to support the majority of employees that would be unable to commute to the office for work. As a solution to the drawbacks of both BYOD and company issued devices, many organizations have adopted a hybrid approach to secure BYOD devices. To accomplish this hybrid approach, companies are utilizing SSL VPN technology. This approach is less expensive, provides a high level of security and can scale quickly.
Today’s SSL VPN appliances can provide access to the network assets while performing a security checklist before allowing a connection through the use of endpoint control (EPC). EPC can determine a variety of properties about the device, including its OS version, patch level, antivirus, domain membership and equipment ID. EPC then compares the device’s properties against the predetermined requirements, and if the specified criteria is not met, access can be reduced or denied. While a technology with these advanced features sets may sound expensive, Dell SonicWALL makes a SMA Virtual Appliance with virtual SSL VPN that includes EPC for under $500. On top of these features, it also includes the ability to generate one-time passwords which adds a second layer of authentication and protects against compromised credentials. Dell SonicWALL’s SSL VPN also contains a bookmark feature that can provide user-friendly access to an employee's office PC, similar to remote control software such as LogMeIn or GoToMyPC. This feature does not require an installation of software on the office PC or monthly subscription cost.
Considering the human element
Security encompasses more than just hardware and software solutions. It is very common for companies to disregard the human element of security. Spammers are able to replicate emails from major corporations to a point that only a trained eye can tell the difference between a fake and legitimate email. Not only do these emails come from reputable names, but they can also appear to provide information which the user might be waiting for in a link or an attachment. One example would be purporting to have information about a delivery, such as a FedEx package. When the unsuspecting user click on a provided link, there is a chance that it will download malicious software that can encrypt files or applications and can give the attacker access to the company’s network. Companies are becoming aware of the need to adequately educate their employees to recognize these threats so they do not fall victim. While online training may cover a specific point, firms that specialize in awareness education generally offer a more comprehensive approach in training employees to identify these threats. These specialized firms can perform tests by sending spoofed or malicious emails to the trained users to determine if they are able to identify the threats.
As companies evaluate their IT infrastructure, they need to be cognizant of the perimeter, mobile and human elements that affect security. Implementing the correct strategy for each of these components will minimize security risks and reduce cost, while providing great flexibility.
Ken Fletcher, CEO of Quarterhorse Technology, Inc. (QTI)
Ken Fletcher is the CEO of Quarterhorse Technology Inc. (QTI) which was founded in 1999 with a vision of facilitating the relationship between vendors and clients. QTI holds certifications in Dell SonicWALL, VMWare, Symantec, Labtech, Arcserve, APC, Microsoft and Cisco. The QTI Solution Stack provides clients with complete solutions for Disaster Recovery, Virtualization, Communications, Scalability and Threat Protection. Visit his company's website to learn more: http://www.iqti.com/.
“I got, got, got, got no time.
No no no no no no time.”
In 1969, when the Guess Who released “No Time,” there was no Office 365 management, no SharePoint administration, no OneDrive for Business security. There wasn’t even a Microsoft yet. There weren’t a lot of system administrators around, and many of today’s sysadmins weren’t yet born.
So how did the Guess Who nail it, even way back then?
Office 365 Reduces Admin Time and Cost – What About Security?
Say you’re an Office 365 administrator and you’ve got, got, got, got no time. You’re looking at Office 365 as a way to get back the precious time and cost that go into migration, upgrades and hardware infrastructure. Instead of maintaining servers, you’ll be maintaining services. Office 365, SharePoint Online and OneDrive for Business will take care of centralization, automated provisioning/de-provisioning of users, reporting and self-service.
You’ll reduce the time and cost of administration.
But will your environment be more secure?
Don’t forget that a big part of the time and cost of administration is tied up in routine security tasks: pruning users, managing group membership, setting up security policies and ensuring that people have the access they need (and need the access they have) to network resources. Office 365 moves those tasks to the cloud, but it doesn’t necessarily make them easier for you.
If your shift to cloud services doesn’t make it any easier to execute those routine tasks, you and your fellow admins run the risk of putting them off and forgetting about them. What good does it do you to have more time and lower costs if you end up with poor security in the bargain?
Conversely, the easier it is for you to perform those tasks, the tighter your organization’s overall security will be.
Plug Security Gaps While Making Your Life Easier – New Paper
We’ve released a new paper called Office 365 Reduces Admin Costs, But What About Security? by Matt Nelson, one of our strategic systems consultants. The paper dives into the topic you may not yet have addressed in your implementation plans: plugging security gaps while making life easier. It describes features that sysadmins can use to round out application management in Office 365, SharePoint Online and OneDrive for Business.
Use the paper to guide your organization’s evaluation of the new cloud platforms from Microsoft. We think it will help you in supplementing app management capabilities and making sure that you get, get, get, get more time while still keeping an eye on Office 365 and SharePoint security.
About Michelle Fallon
Michelle Fallon has been with Dell Software since 2007. Michelle’s passion is developing product solutions from infancy to profitability.
View all posts by Michelle Fallon |
By Olumide Olusanya and Munira Hussain
This is the second part of this blog series. In the first post, we shared OSU Micro-Benchmarks (latency and bandwidth) and HPL performance between FDR and EDR Infiniband. In this part, we will further compare performance using additional real-world applications such as ANSYS Fluent, WRF, and NAS Parallel Benchmarks. For my cluster configuration, please refer to part 1.
Fluent is a Computational Fluid Dynamics (CFD) application used for engineering design and analysis. It can be used to simulate the flow of fluids, with heat transfer, turbulence and other phenomena, involved in various transportation, industrial and manufacturing processes.
For this test we ran Eddy_417k which is one of the problem sets from ANSYS Fluent Benchmark suits. It is a reaction flow case based on the eddy dissipation model. In addition, it has around 417,000 hexahedral cells and is a small dataset with a high communication overhead.
Figure 1 - ANSYS Fluent 16.0 (Eddy_417k)
From Figure 1 above, EDR shows a wide performance advantage over FDR as the number of cores increase to 80. We continue to see an even wider difference as the cluster scales. While FDR’s performance seems to gradually taper off after 80 cores, EDR’s performance continues to scale as the number of cores increase and performs 85% better than FDR on 320 cores (16 nodes).
WRF (Weather Research and Forecasting)
WRF is a modelling system for weather prediction. It is widely used in atmospheric and operational forecasting research. It contains two dynamic cores, a data assimilation system, and a software architecture that allows for parallel computation and system extensibility. For this test, we are going to study the performance of a medium size case, Conus 12km.
Conus 12km is a resolution case over the Continental US domain. The benchmark is run for 3 hours after which we take the average of the time per time step.
Figure 2 - WRF (Conus12km)
Figure 2 shows both EDR and FDR scaling almost linearly and also performing almost equally until the cluster scales to 320 cores when EDR performs better than FDR by 2.8%. This performance difference, which may seem little, is significantly higher than my highest run to run variation of 0.005% between three successive EDR and FDR 320-core tests.
HPC Advisory Council’s result here shows a similar trend with the same benchmark. From their result, we can see that the performances are neck and neck until the 8 and 16-node run where we see a small performance gap. Then the gap widens even more in the 32-node run and EDR posts a 28% better performance than FDR. Both results show that we could see an even higher performance advantage with EDR as we scale beyond 320 cores.
NAS Parallel Benchmarks
NPB contains a suite of benchmarks developed by NASA Advanced Supercomputing Division. The benchmarks are developed to test the performance of highly parallel supercomputers which all mimic large-scale and commonly used computational fluid dynamics applications in their computation and data movement. For my test, we ran four of these benchmarks: CG, MG, FT, and IS. In the figures below, the performance difference is in an oval right above the corresponding run.
Figure 3 - CG
Figure 4 - MG
Figure 5 - FT
Figure 6 - IS
CG is a benchmark which computes an approximation of the smallest eigenvalue of a large, sparse, symmetric positive-definite matrix using a conjugate gradient method. It also tests irregular long distance communication between cores. From Figure 3 above, EDR shows a 7.5% performance advantage with 256 cores.
MG solves a 3-D Poisson Partial Differential Equation. The problem in this benchmark is simplified as it has constant instead of variable coefficients to better mimic real applications. In addition to this, it tests short and long distance communication between cores. Unlike CG, the communication patterns are highly structured. From Figure 4, EDR performs better than FDR by 1.5% on our 256-core cluster.
FT is a 3-D partial differential equation solution using FFTs. It tests the long-distance communication performance as well and shows a 7.5% performance gain using EDR on 256 cores as seen in Figure 5 above.
IS, a large integer sort application, shows a high 16% performance difference between EDR and FDR on 256 cores. This application not only tests the integer computation speed, but also the communication performance between cores. From Figure 6, we can see a 12% EDR advantage with 128 cores which increases to 16% on 256 cores.
In both blogs, we have shown several micro-benchmark and real-world application results to compare FDR with EDR Infiniband. From these results, EDR has shown a higher performance and better scaling than FDR on our 16-node Dell PowerEdge C6320 cluster. Also, some applications have shown a wider performance margin between these interconnects than other applications. This is because of the nature of the applications being tested; communication intensive applications will definitely perform and scale better with a faster network when compared with compute-intensive applications. Furthermore, because of our cluster size, we were only able to test the scalability of the applications on 16 servers (320 cores). In the future, we plan on running these tests again on a larger cluster to further test the performance difference between EDR and FDR.
How one company known for thwarting cyber attacks made improvements to protect its own data.
Imagine a company that thwarts millions of cyber attacks for clients all over the world only to discover that its own digital property and reputation are at risk.
In our e-book, you’ll learn about how ISCI found itself facing a potential Achilles’ heel: Almost all of its intellectual property consists of digital assets, and backup turmoil was creating the threat of data loss. A wrong data protection strategy can set in motion the reversal from good fortune to bad — and mess with your organization’s integrity.
ISCI is a company with 150 patents. It knows how to detect the presence of sophisticated adversaries hiding inside enterprise networks; it also has a product line addressing some of the toughest security challenges an organization can face, including the user-identity, 8th or "human layer" in network protocol.
To make the most of these achievements, and capitalize on its victories in the global battle for cyber security, ISCI needed to face down data protection challenges on the home front: to eliminate the risk of losing data required for product development and financial auditing.
Last but not least, it had to prevent a loss of confidence in IT.
Trial by full recovery
ISC8 launched a new data protection strategy that deployed a mix of data protection solutions: a Dell DR series backup-to-disk deduplication appliance and NetVault Backup software. The two are tightly integrated to deliver automated backups and granular recovery. The new solution was subjected to a “trial by full recovery” — by copying 8 terabytes off of a server, executing a full recovery and undertaking a bit-wise comparison. The result: The full 8 terabytes were bit perfect.
By leveraging the right data protection solution, ISC8 was able to:
Data threats can be avoided
ISCI surmounted its data protection challenges and has ejected a worst-case scenario — an irreversible loss of proprietary data — from the realm of the possible. That alone represents a substantial return on its investment in a new data protection strategy.
There are other aspects of data protection ROI that we’ll be blogging about — accelerating recovery, gaining IT staff time, reducing storage costs — but they all hinge on avoiding data loss.
Companies, like heroes, are rarely perfect. But when best efforts are put forward, potential data protection threats can be avoided.
Read our e-book or more examples of how organizations like yours are protecting against data threats, and increasing their return on investment from data protection.
About James Gomez
James is a marketing content strategist for Dell Software's marketing organization.
View all posts by James Gomez |
For a long time the “Holy Grail” of identity and access management has been single sign-on (SSO) – at least when you ask end users and executives that’s what they would say. After all, nothing makes regular folks happier than easy access to everything they need, with only one password to remember, and no need to call IT – ever – to fix your mistakes, because you don’t make them anymore. It all sounds good, but as any of us who have tried to achieve SSO know, it’s not quite that simple.
Maybe “less” sign-on, or “reduced” sign-on, or “close to single” sign-on would be more accurate….and that’s fine. Anything is better than the mess of not streamlining access.
Let’s take a quick look at SSO through the ages.
So you can get single sign-on for everything but it will take a combination of tools and technologies and may not be worth the effort. Many people these days are taking advantage of SSO in pockets – maybe federation for SaaS apps and AD-based SSO for Unix and Linux, but often there are other critical systems that don’t fit the deployment.
But you can get awfully close if you choose the right solutions.
I’ve recorded a short “white board” video that details the options for Web single sign-on and provides alternatives to limited, siloed solutions that only address one of the needs detailed above.
And if you want a more detailed discussion about SSO, how to ensure your project is successful, and how to “sell” the benefits of doing it right read this white paper: Moving SSO beyond convenience
It's almost Valentine's Day! Birds are singing, love is in the air and candy bowls around the office are filled with tiny hearts. As the holiday approaches you're working hard to make your workday more efficient so you can clock out on the 14th and spend some time with that special someone! But think back to when you were a kid in elementary school. Valentine's Day was a time when you ran around giving paper hearts and candy to everyone in the class! It was a time to reach out to the people around you and let them know how special they are! Why not take that Valentine spirit with you into the work place this year?
February 14th is an opportunity for us to show a little extra love and appreciation to all the unsung heroes we work with every single day; the people who keep our IT systems going day in and day out! Don't forget about your faithful DBA, SysAdmin, and IT team that works tirelessly to keep things running smoothly. This year, rediscover the joy and appreciation that is Valentine's Day and show a little extra love to your team mates!
Here are 3 simple ways to show your DBA / SysAdmin / and IT team some extra love this Valentine's Day!
1. Surprise them with some coffee in the morning!
Nothing shows appreciation like bringing that sweet, sweet nectar of the gods... coffee.
...Bonus points if it comes with a box of donuts.
2. Stop and say "hello!"
Sometimes, all it takes is to pause for a moment and ask someone how they're doing! Life is crazy busy, true. But don't let it get so busy that you can't stop and ask someone how their day is going.
3. Ambush them with a big "Thank You!"
Two little words. That's all it takes. You can turn someone's day around with a simple, "Thank You!" So use up all those extra office supplies you have around and build someone a Thank You Valentine!
There you have it! 3 Simple ways to show your DBA / SysAdmin / IT Team some extra love this February!
Do you have any other ideas? Let us know in the comments below!
And from all of us here at Dell Software, Happy Valentines Day!
About Ryan McKinney
Ryan McKinney has been a Social Media and Communities Advisor for Dell Software since 2014.
View all posts by Ryan McKinney |
As I sit in my Columbus, Ohio office on February 9th and look out the window, I frown at the sight of my car already covered in snow. The holidays have come and gone.
I’m seeing doom and gloom weather reports of weekend storms to come. The harsh reality has hit me: winter is here! Depending upon where you live and what type of climate you’re in, you may be experiencing the same winter blues. But the best way to fight winter doldrums is to look forward to spring and all that is has to offer! Nice weather. Beautiful flowers. HBO’s Game of Throne’s show (where winter is still coming). But most importantly — NEW Microsoft releases!
Microsoft Releases Equivalent to Christmas Morning
We’ve made it easy for you to keep you current on what’s new and learn what steps you can take today to get ready for your next migration project. Register for our on-demand webcasts to learn about the latest Microsoft releases.
Today you don’t have to have thousands of employees to have serious application management and endpoint protection challenges. Organizations of all sizes have a broad mix of operating systems and applications to deploy and keep up to date; a wide variety of desktops, laptops, smartphones and other devices to manage and secure; and geographically disparate sites that make hands-on attention from IT impractical, if not impossible.
The difference is, some organizations are struggling with these challenges while others have application management well in hand. I’d like to tell you about one of the latter: online dating firm Meetic Group. (Spoiler alert: the company was able to complete an upgrade to Office 2014 without any issues in just two weeks.)
Too Many Systems Management Tools Can Be as Bad as Too Few
Meetic Group is headquartered in France but its 500 employees are spread across Europe. The small IT team was finding it challenging to manage all the company’s desktops and laptops — Windows, Mac and Linux —and maintain an up-to-date inventory of software assets. The problem wasn’t that they didn’t have tools; they had an open-source solution for desktops and asset management, as well as Active Directory Group Policy settings and the Microsoft Deployment Toolkit. The problem was that they didn’t have the right tools.
“We had multiple solutions to oversee and none of them gave us the level of insight we really needed to manage the client estate effectively,” explains Frédéric de Ascencao, internal IT manager at Meetic Group.” Ideally, we wanted a single solution that could help us obtain more value from our desktops and laptops for the business and personnel.”
Centralized Application Management Delivers a Host of Benefits
So Meetic Group went shopping. Through careful research and extensive testing, the company found a clear winner: Dell KACE K1000 and K2000 appliances. “They arrive preconfigured and can be up and running in a couple of hours,” says de Ascencao. “Furthermore, we didn’t need to spend time or money up-skilling our administrators. Using a basic knowledge of IT, an administrator can install and operate Dell KACE solutions. It’s that simple.”
Trading a hodgepodge of disparate tools for the integrated Dell solution has really paid off. Now Meetic Group enjoys:
To learn more about how efficient, centralized application management can make a real difference to your business, check out the latest chapter in our e-book, “Technology Tunnel Vision, Part 3: Expanding control of your application environment.”
About David Manks
David Manks is a Solutions Marketing Director for Dell Software focusing on endpoint management and security products.
View all posts by David Manks |
The more money you invest in IT, the greater the return you want on your investment. Estimates from IDC show that worldwide healthcare IT spending will rise from $115 billion this year to $135.7 billion by 2019. That means you and your counterparts are increasing your investment in areas like patch management software, remote administration tools and systems management, and probably expecting more and more value from it.
We’ve put together a paper called Realizing the Return on Healthcare IT Investment to highlight the way that comprehensive systems management maximizes the value of healthcare IT. It turns out that investment isn’t the only thing increasing from year to year; complexity is increasing as well, for several reasons.
Complexity in Healthcare IT
That’s why we emphasize the value of comprehensive systems management in healthcare IT, extending to patch management, physical inventory, system auditing, vulnerability scanning and configuration management.
It’s also a big part of fulfillling HIPAA requirements. Being able to see, update and account for all of the hardware and software in your organization is a long step on the path to compliance.
The Dell KACE K1000 Systems Management Appliance and the Dell KACE K2000 Systems Deployment Appliance help healthcare IT teams cut through complexity and maximize the return on their investments in IT. Have a look at our paper, Realizing the Return on Healthcare IT Investment, to gauge the fit with your healthcare environment.
About Christopher Garcia
A ten-year Dell veteran, Chris has had experience in various marketing roles within the organization. He is currently a Senior Product Marketing Manager.
View all posts by Christopher Garcia