Adjusting your country selection will clear the contents of your cart.
Click here to watch a recording of the 2022 Awards Ceremony.
2022 Competition First Place Winner
|
Bruce Yellin |
Surviving ransomware’s rampage is a story of preparation. No organization, whether it leverages a local data center or has operations in the cloud, is immune from a ransomware attack. In this article, awarded 1st Place in the 2022 Knowledge Sharing Competition, Bruce Yellin explores the current state of ransomware and its dangers. He provides real life examples of attacks, how the attacks have been or can be handled and offers valuable insight into what you can expect and ways to prepare for and survive an inevitable attack. Grabbing the readers’ attention from the beginning, Bruce does a thorough job of explaining every piece of information related to ransomware. His use of tables and graphics throughout is a clever and engaging way to emphasize the content. Highly recommended as a valuable resource for all audiences; even those with limited knowledge of ransomware can quickly gain confidence on the topic after reading this article. |
2022 Competition Second Place Winner
|
Sneha Venkatesh Sai Ganesh Parikshit Patil |
Quantum computing is the next great step in the data-driven revolution, according to Knowledge Sharing authors Sneha Venkatesh, Sai Ganesh, and Parikshit Patil. This article, awarded 2nd Place in the 2022 Knowledge Sharing Competition, sets a technological and operational baseline for those new to this subject. The authors present clear differences between quantum computers and classical computers as well as a hint to what the future of the IT industry could look like with the rise of quantum computers. |
2022 Competition Third Place Winner
|
Anitha Rosely Haseeb Makarabbi |
Higher data speed is top of mind when people think of 5G, but it's not the only advantage or use case 5G offers. Due to its low latency, low power consumption, and high data capacity, 5G opens many possibilities for IoT devices to be connected on a scale never seen before. However, as common to all new technology, there will always be vulnerabilities that come with it. In this article, awarded 3rd Place in the 2022 Knowledge Sharing Competition, Anitha Rosely and Haseeb Makarabbi explore 5G attack scenarios and mitigations and detail the best way to handle all the new vulnerabilities that, if not addressed effectively, could become more dangerous in 5G. |
Best of Artificial Intelligence
|
Mohammed Hashim |
Conversational AI is a form of advanced AI that facilitates real-time human-like conversation between a human and a computer. According to Gartner, CAI adoption rates are expected to almost double over the next two to five years. In this article, awarded Best of Artificial Intelligence in the 2022 Knowledge Sharing Competition, Mohammed Hashim presents a comprehensive analysis of the current state of CAI. He discusses the fundamentals and adoption strategy of Conversational AI, the Global CAI market, CAI technology, solution models, top platforms, practical use cases, risk mitigations and the future of CAI. |
Best of Scale-out Storage
|
Sneha Venkatesh
Sai Ganesh,
Parikshit Patil |
Computer vision’s AI-based applications input huge amounts of unstructured data, consequently increasing the storage requirements for these applications. In this article, awarded Best of Scale-out Storage in the 2022 Knowledge Sharing Competition, Sneha Venkatesh, Sai Ganesh, and Parikshit Patil examine the massive amount of data utilized for training sets, as well as data created by Deep Reinforcement Learning networks. The authors then explain how the PowerScale scale-out platform leverages its powerful processors to provide an excellent solution for storage of these large amounts of data. |
January | |||
Title | Category | Author(s) | Summary |
Cyber-physical Systems Smart Data Handling | Edge | Mohamed Sohail Advisory Consultant, Data Center & Business Resiliency Dell Technologies |
IoT has dramatically increased threats to critical assets. Organizations need to expand security programs to include cyber-physical systems as IoT and other devices heavily interact with many endpoints, most having a dynamically changing security profile. This article proposes a new and efficient method to overcome many of the issues being faced in the current architectural framework. The author illustrates an efficient and tested methodology of some of the main challenges, and how to address them. |
SDN for Securing IoT Systems | Internet of Things | Gaushil Patrick, and Golla Venkata, and Harsha Vardhan |
Conventional security measures fall short of adequately protecting IoT systems without noticeable impact on performance. This article posits a software-defined network (SDN) approach to protect the network in a more efficient and flexible way. A comprehensive survey of the security features is introduced along with discussion of improvements and challenges provided by SDN. |
Decentralized Storage: Intro to Metaverse | Storage | Nidhi Shree N Specialist 2, Inside Product Dell Technologies and Sai Ganesh Specialist 2, Inside Product Dell Technologies |
Since its emergence, the World Wide Web has made significant progress. This article chronicles the evolution of the web – from version 1.0 to 2.0, to 3.0 – and the future of decentralized storage in the Metaverse and Web 3.0 technology along with its key components, applications and challenges. |
DARQ Technologies | Artificial Intelligence | Athira Anirudhan Inside Product Specialist 2 Dell Technologies Amal D Nair Inside Product Specialist 2 Dell Technologies and B Ranjeeth Inside Product Specialist 2 Dell Technologies |
DARQ is an emerging technology touted as the catalyst in the next technology disruption to deliver new capabilities for businesses. This article deep dives into subsets of DARQ to detail how each bring their own benefits and simplicity to modern problems. The authors discuss how embracing these technologies and employing them will benefit organizations in more ways than we can imagine. |