Dell Community

Blog Group Posts
Application Performance Monitoring Blog Foglight APM 105
Blueprint for HPC - Blog Blueprint for High Performance Computing 0
Custom Solutions Engineering Blog Custom Solutions Engineering 8
Data Security Data Security 8
Dell Big Data - Blog Dell Big Data 68
Dell Cloud Blog Cloud 42
Dell Cloud OpenStack Solutions - Blog Dell Cloud OpenStack Solutions 0
Dell Lifecycle Controller Integration for SCVMM - Blog Dell Lifecycle Controller Integration for SCVMM 0
Dell Premier - Blog Dell Premier 3
Dell TechCenter TechCenter 1,858
Desktop Authority Desktop Authority 25
Featured Content - Blog Featured Content 0
Foglight for Databases Foglight for Databases 35
Foglight for Virtualization and Storage Management Virtualization Infrastructure Management 256
General HPC High Performance Computing 227
High Performance Computing - Blog High Performance Computing 35
Hotfixes vWorkspace 66
HPC Community Blogs High Performance Computing 27
HPC GPU Computing High Performance Computing 18
HPC Power and Cooling High Performance Computing 4
HPC Storage and File Systems High Performance Computing 21
Information Management Welcome to the Dell Software Information Management blog! Our top experts discuss big data, predictive analytics, database management, data replication, and more. Information Management 229
KACE Blog KACE 143
Life Sciences High Performance Computing 9
On Demand Services Dell On-Demand 3
Open Networking: The Whale that swallowed SDN TechCenter 0
Product Releases vWorkspace 13
Security - Blog Security 3
SharePoint for All SharePoint for All 388
Statistica Statistica 24
Systems Developed by and for Developers Dell Big Data 1
TechCenter News TechCenter Extras 47
The NFV Cloud Community Blog The NFV Cloud Community 0
Thought Leadership Service Provider Solutions 0
vWorkspace - Blog vWorkspace 511
Windows 10 IoT Enterprise (WIE10) - Blog Wyse Thin Clients running Windows 10 IoT Enterprise Windows 10 IoT Enterprise (WIE10) 4
Latest Blog Posts
  • Statistica

    Thought Leaders in the Mix - August 2015

    Our subject matter experts for Statistica and the Information Management Group (IMG) keep busy, staying abreast of current trends with big data and small data, predictive software and real-world analytics solutions. And they frequently comment in industry publications, professional forums and blogs--or produce videos, in Shawn Rogers' case. Here are a few of their recent articles.
    Dell Information Management Group Shawn Rogers Video: Analytics 3.0 meets analytic amateurs
    by Shawn Rogers, chief information officer

    This short video is part of Shawn's #ThinkChat video series with Tom Davenport, professor of management and IT at Babson College. Here the two briefly discuss how the landscape is evolving and how a growing community of advanced analytic users and enablers are fueling change. It’s the age of the analytic amateur and the semi-pro!



    Dell Statistica John Thompson Getting Real About Virtual Centers of Excellence
    by John K. Thompson, general manager for advanced analytics, Dell Software

    John takes a look at the many ways organizations can benefit from a decentralized, collaborative approach to analytics, an approach made realistically possible for more and more companies with the advent of simple, cloud-enabled tools.



    Dell Information Management Group David Sweenor
    Analytics Migration Series: Anticipating Business User Reaction
    by David Sweenor, analytics product marketing manager

    Change can be daunting, especially when it involves unfamiliar technology to accomplish daily tasks. So when an entire workforce must migrate to a new software platform after years with legacy code, what kinds of questions do they ask? And how are their fears replaced with curiosity? David Sweenor introduces the first chapter of a three-part e-book describing Dell’s own recent migration.


    Dell Statistica Thomas Hill
    A glimpse at the future of predictive analytics in healthcare
    by Dr. Thomas Hill, executive director analytics

    In his latest article published at, Dr. Hill discusses the technology revolution that will involve predictive analytics in thousands of healthcare applications and workflows, and he shares his perspective regarding the industry's various opportunities, disruptors and hurdles.




  • Dell TechCenter

    Dell Command | Monitor v9.1 extends support to Microsoft Windows 10 based Dell Enterprise client system

    The latest release of Dell Command | Monitor (formerly known as Dell OpenManage Client Instrumentation) v9.1 is available now. All products of the Dell Command Suite are listed here

    The Dell Command | Monitor (DC | M) enables remote management application programs to access the client's system information, monitor the status, or change the state like shutting it down remotely. Through standard interfaces, DC | M (or OMCI) exposes key system parameters, allowing administrators to manage inventory, monitor system health, and gather information on deploying Dell Enterprise Client systems like Latitude, Dell Precision Mobile, Optiplex and Dell Precision Workstation.

    New features and enhancements in DC | M v9.1 include:

    • Support for new platforms
    • Support for Windows10 Operating System
    • Installer Support for the following additional languages: German, French, Italian, Spanish (International), Japanese, Traditional Chinese - Honk Kong SAR, Simplified Chinese - China, Traditional Chinese - Taiwan, Dutch - Netherland
    • Updated SCCM MOF as per supported Attributes
    • Support for the following new tokens:
      -    Extend Post Time
      -    External WLAN Activity LED
      -    Intel Ready Mode Technology
      -    Keyboard Backlight Active Color
      -    Keyboard Backlight Enable Color
      -    Keyboard Backlight Custom Color 1
      -    Keyboard Backlight Custom Color 2
      -    Primary Video Device Slot
      -    Rugged Dock Non-Video Devices
      -    Stealth Mode Quiet Bluetooth
      -    Stealth Mode Quiet Fans
      -    Stealth Mode Quiet GPS
      -    Stealth Mode Quiet LCD
      -    Stealth Mode Quiet LEDs
      -    Stealth Mode Quiet Speakers
      -    Stealth Mode Quiet WLAN
      -    Stealth Mode Quiet WWAN
      -    Stealth Mode WiGig Radio
      -    USB Port 20
      -    USB Port 21
      -    USB Port 22
      -    USB Port 23
      -    Wireless Switch WLAN-WIGIG Control
      -    Wireless Switch GPS On WWAN Radio

    We have been engaged over the forums and have tried to address most of the major concerns to enhance the customer experience. Once again, we will love to hear from you to improve the product.

    Downloads for DC | M v9.1 are available here.

    The Dell TechCenter community has provided great feedback to the OMCI team, so we encourage you to continue that discussion in the OMCI - OpenManage Client Instrumentation forums.

  • KACE Blog

    What are Vulnerability Scans, and How Can They Help Your Security Efforts?

    We’ve posted earlier about how hackers get into your systems and steal data from your endpoints, and then how they monetize this stolen information. If you have thousands of unsecured mobile endpoints on your network, it means there are equal numbers of opportunities for hackers to breach your constituents’ information.

    As a savvy IT pro, you understand that all of your machines must have the most up-to-date security patches — both OS and application — to prevent intrusion. Still, you might be wondering if there is even more you can do to uncover holes in the armor of these endpoints. The answer is decidedly yes! There are vulnerability standards available that can help advance the goal of vulnerability detection. Scanners built upon these standards can give you predictable results, and they are continually updated as the user community at large discovers more vulnerabilities.

    One of the most well-known is the Open Vulnerability and Assessment Language (OVAL®). Before the advent of OVAL, there wasn’t a common way for IT administrators to find all software vulnerabilities, configuration issues, programs, and/or patches on their endpoints. Sure, you can and should use a patching tool to make sure all OS security patches are addressed. But, that is only part of the story. With OVAL there is a standard repository for vulnerability tests that is continually updated by the community.  The community reviews and vets new definitions before they are added to the repository.

    At the heart of the community is the OVAL Board which consists of members from industry, academia, and government organizations. OVAL is funded by the office of Cybersecurity and Communications at the U.S. Department of Homeland Security and is the summation of the efforts of a broad selection of security and system administration professionals from around the world.  

    Often, the question arises: can’t hackers use this information to break into my system? Certainly, any public discussion or availability of vulnerability and configuration information may help a hacker. However, there are several reasons why the benefits of OVAL outweigh its risks.

    OVAL Benefits

    • OVAL is restricted to identify publicly known configuration issues and associated vulnerabilities.
    • OVAL definitions help users determine the presence of vulnerabilities or configuration issues on systems before they can be exploited.
    • You must have root-level or system administrator access to actually employ the vulnerability information in an OVAL definition.
    • The detailed technical information about vulnerabilities or configuration issues made available in OVAL definitions reduces the need for releasing exploit code to the public.

    So if you truly want to decrease your exposure to outside threats, you can be proactive by performing vulnerability scans. Doing them based on OVAL definitions gives you the knowledge that the entire security community has your back. 

    We’ve been discussing the new security landscape, how it’s affecting IT processes and people, and what can be done to further protect your environment and that of your constituencies. For more information and a helpful list of controls, check out our new white paper: Protecting Your Network and Endpoints with the SANS 20 Critical Security Controls.

    Sean Musil

    About Sean Musil

    Sean Musil is a Product Marketing Manager for Dell KACE. He believes the internet should be free and secure.

    View all posts by Sean Musil  | Twitter

  • General HPC

    Congratulations to Team South Africa

    by David Detweiler

    Congratulations to Team South Africa on their second place finish in the Student Cluster Competition at the International Supercomputing Conference (ISC) in Frankfurt, Germany earlier this month. The students hailing from the University of Witwatersrand narrowly missed three-peating as champions.

    The team was comprised of Ari Croock, James Allingham, Sasha Naidoo, Robert Clucas, Paul Osei Sekyere, and Jenalea Miller, with reserve team members Vyacheslav Schevchenko and Nabeel Rajab. Together, they represented the Centre for High Performance Computing (CHPC) at the competition.


    The South African students competed against teams from seven other nations over a sleep-depriving three days. During the competition, the teams were tasked with designing and building their own small cluster computers, and run a series of HPC benchmarks and applications. In addition, the students were assigned to optimize four science applications, three of which were announced before the competition, with the fourth introduced during the event.

    The competition was sponsored by ISC and the HPC Advisory Council. Each team was scored based on three criteria:

    • Performance of the HPCC benchmark run accounted for 10%
    • A suite of test applications worth 80%
    • Explanation before a panel of experts of the strategy they used and results achieved (10%)

    With young people like team South Africa entering the field, the future of HPC looks brighter than ever. Congratulations on a job well done!

  • Dell TechCenter

    Come to Dell World Software Forum: Learn How to Manage Cloud Environments with Dell One Identity Manager

    Attend the Dell World Software User Forum to deep dive into Dell’s latest innovations – including the latest Dell One Identity Manager capabilities.

    Here is a taste of what's in store for our two IAM-focused sessions:  

    Dell One Identity Manager - Simplify access review by adopting a real-world, risk-based approach - This session covers how to reduce your exposure while increasing security and compliance through adopting a risk-based approach to this important task

    Managing Cloud Environments with Dell One Identity Manager - Learn how Dell One Identity Manager easily integrates cloud assets, such as MS Azure, Openstack and AWS, to provide enhanced governance and user-lifecycle, tenant/project and privileged-account management capabilities.

    For a complete list of Software User Forum sessions, visit the agenda page.

    Don’t hesitate - register and get a complimentary pass for a colleague.Your registration includes admission to all Dell World general sessions, solutions showcase, and the big Opening Night Concert headlined by a star you’ll love.

    Reasons You Need to Attend

    • Direct access to the Dell product engineers and experts
    • Be the first to hear Dell’s vision for the future, including product direction and roadmaps
    • Experience visionary presentations by industry experts and Dell leadership
    • Build your knowledge with more than 75 in-depth technical sessions
    • See, touch and learn at The Dell World Solution Showcase
    • Plus, it’s Austin - where you can enjoy great live music and fine food all within walking distance of the event

    We’re looking forward to meeting you and your colleagues in Austin!

  • Information Management

    In the World of Big Data Analytics, Azure Is More Than Just a Pretty Color

    In the latest issue of Statistica Monthly News (yes, you can subscribe for free), our readers found a link to a webcast that talks all about Statistica’s new partnership with Microsoft, a relationship that produces some incredible hybrid cloud functionality for data analysis using Azure Machine Learning (ML).

    We are talking about a hybrid cloud solution whose powerful functionality completely belies Azure’s namesake: a shade of bright blue often likened to that of a cloudless sky. Cloudless? Hardly. The Statistica-Microsoft partnership is all about the Cloud!

    The fun story in the webcast describes how one website was running an analytics program as an API on Azure. Designed to guess ages and genders of people in photographic images, the site was expecting a few thousand submissions, but it went from zero to 1.2 million hourly visitors within just two days of going live, and up to seven million images per hour. By day six, 50.5 million users had submitted over 380 million photos! Normally, we would hear about sites crashing with such a viral overload. But this site kept humming along even when the action ramped up so dramatically, primarily because Azure scaled dynamically as intended, handling the unforeseen load like a champ.

    Think about embedding this kind of cloud access and flexible scalability as a directly callable function inside Statistica—well, that just makes way too much sense, right? But that is what’s happened! Azure ML is really a development environment for creating APIs on Azure, with the intent to enable users to have machine learning in any application, whether that is a web app or a complex workflow driven by Statistica. For instance, you can host your complicated models in the cloud with Azure and run non-sensitive, big data analytics out there—a very practical time saver and money saver. Then you can bring those analyzed results back down to join perhaps more sensitive data and analytics output behind your firewall. You can learn more when you watch our “Cloud Analytics” webcast

  • Information Management

    #ThinkChat Analytics 3.0 meets Analytic Amateurs with @ShawnRog and @Tdav

    The user community and the landscape of advanced analyst are benefiting from dramatic change and shifts in strategy and technology. Early adopter’s, as far back as 1954 were leveraging basic analytics to drive their company forward benefiting from the age of Analytics 1.0. Today we are experiencing the early stages of Analytics 3.0 and the promise of innovation that it brings.

    In this week’s #ThinkChat segment Tom and I discuss how the landscape is evolving and how a growing community of advanced analytic users and enablers are fueling change. It’s the age of the analytic amateur and the semi-pro!! In this week’s #ThinkChat segment Tom and I discuss how the landscape is evolving and how a growing community of advanced analytic users and enablers are fueling change. It’s the age of the analytic amateur and the semi-pro!! 


    #ThinkChat Conversation with Tom Davenport Part 6 of 7