Overview


Knowledge Sharing is a platform for certified professionals to share their expertise, unique deployments or best practices through a written or video submission. Submissions are reviewed in 2 phases; 1. submission of a short abstract which briefly outlines your intended topic, and the 2nd Article phase where  your topic knowledge is shared through video or a written paper. Submissions chosen for publication in our Knowledge Sharing Program Library reap the rewards and industry recognition that comes with being published. Submissions chosen as a finalist become eligible for a free pass to Dell EMC World and cash prizes.

 

 

Proud winner of 2 industry Bronze Awards

Training Magazine's eLearning Design Challenge; Social and Collaborative (2017)

Brandon Hall Group's HCM Excellence Awards; Excellence in Learning (2017)

 

 

 

Current Knowledge Sharing Winners and Articles

The 2018 Knowledge Sharing Winners accept their awards at the ceremony.

L – R: Asha Saini, Bill Lupo, Mike Apigian, Sr. Director Dell EMC Education Services, Marina Levina, Charles Atkins, Vice President Dell EMC Education Services, Umit Dericioglu, Nelson Jiao, Rajasekhar Nannapanneni, Wei Lin, Anthony Dutra, Steve Todd, Varshith Anilkumar, Ravinder Singh.

 

Official rules

 

Title Author Overview
2018 Competition First Place Winner
 
Rock Around the Blockchain with Dell Technologies

Author Interview

Steve Todd,
Dell Technologies Fellow, Dell EMC
This article explores all the system issues that need to be considered when supporting new blockchain applications. Steve compares and contrasts leading blockchain implementations, guides us through a full spectrum of integration issues, and outlines best practices for tackling those issues.
2018 Competition Second Place Winner
 
Prediction using Artificial Neural Networks

Author Interview
Rajasekhar Nannapaneni,
Senior Advisor, Solutions Architect, Dell EMC
This article details how the benchmark called Mackey-Glass chaotic time series model is predicted using feed forward multi-layer perceptron neural network with error back propagation algorithm. The architecture and algorithm developed in this article can easily be extended to any real world time-series prediction requirements.
2018 Competition Third Place Winner

Conceptual Framework using DL for Airport CEP

Author Interview
Wei Lin, Ph.D.
Chief Data Scientist, Senior Manager, 
Americas Consulting Practice 
Application and Big Data/IoT Transformation, Dell EMC

Bill Schmarzo,
CTO, Big Data Analytics Consulting Practice, Dell EMC
This article presents a simplified airport complex event processing (CEP) scenario with an airliner on fire on the tarmac. In this conceptual framework, Deep Learning (DL) techniques are leveraged to simplify the processing by encapsulating the events sequence and responses by recognizing an event and then, generating logical responses via supervised learning.
Best of Big Data

Using Open Data to Predict Market Movements

Author Interview
Ravinder Singh, Director of Analytics, Dell EMC

Marina Levina, Data Scientist, Dell EMC

Nelson Jiao, Data Architect, Dell EMC

Asha Saini, Data Architect, Dell EMC
An IT firms’ ability to predict the movement of market players provides competitive benefits. This article explores how the archive of billions of web pages, captured monthly since 2008 and available for free analysis on AWS, can be used to mimic and predict IT trends reflected in industry-standard consulting reports.
Best of Data Protection

Optimization of VM Image Backups with Right Proxies

Author Interview
Umit Dericioglu, Senior Advisor, Delivery Specialist, Dell EMC This article explains the importance of using the right proxy and what it means. It discusses a suggested method to determine the appropriate proxy to use for backups, development of a simple Perl program using VMware Perl SDK, how to perform a periodical proxy health check and posits ideas to incorporate into Avamar or any other backup system which does not perform automatic proxy optimization.
Best of IT Transformation

Transformation in the 4th Industrial Revolution

Author Interview
Anthony Dutra, Presales Systems Engineer, Dell EMC

William Lupo, Technical Strategist, Club Benchmarking LLC.

Varshith Hakkithimmanahalli
Anilkumar
, Software Engineer, Boston University
This article explores the history of technologies’ influence on humanity, beginning with the first Industrial Revolution to how e-commerce has reshaped the way we do business. The authors discuss the influence of technologies such as virtualization, Cloud, Big Data, Internet of Things (IoT), cryptocurrencies, and VR/AR in shifting social consciousness.

 

 

 

 

 

 

Current Articles Selected for Publishing
 

  Title Category Author Summary
July IoT Security: Challenges, Solutions & Future Prospects Internet of Things Mikhail Gloukhovtsev
Sr. Solutions Architect
Digital Solutions, Cloud & IoT
Orange Business Services
IoT attack vectors can target devices, gateways, SIM/Cell, transceivers, wearables and take advantage of weak passwords, lack of encryption, backdoors, etc. This article considers IoT security challenges, security requirements for IoT architecture, current security solutions and new evolving technologies. I hope my article will help the readers in selecting secure IoT technologies for their businesses.
Solving Educational Pitfalls with Big Data Big Data Zeehasham Rasheed
Principal Software Engineer Data Science
Verizon
Adjunct Professor - George Mason University
This article discusses the need for educational institutions to utilize more data to improve their performance. The author highlights the opportunity that adoption of data science and big data technologies presents to improve data gathering and analysis in education.
NVMe over Fabrics: New Class of Storage Emerging Technologies Ravi Kumar Sriramulu
Manager
Sales Engineer Analyst
Dell EMC

Chethan Nagaraj
Sales Engineer Analyst
Dell EMC

Narendra Nekkanti
Senior Sales Engineer
Analyst
Dell EMC
Non-volitile memory (NVMe) devices have a limitation of being local to the host over its PCIe bus which makes it difficult to extend its potential to different use cases. This article discusses ‘NVMe over Fabrics’, a new technology that alleviates this limitation by enabling the use of alternate transports to PCIe and acts as alternative to SCSI standards.
August Blockchain Enabling IT Transformation Blockchain Dahab Shafik 
Ahmed Abdelaal
Abdelrahman Elnakeeb
Moustafa Abdelkader
Blockchain technology is clearly impacting many industries. This article examine three of the biggest – FinTech, supply chain management and  distributed cloud – where applying Blockchain is ground breaking or has the potential to be ground breaking in the future. The authors conclude their article with a discussion on how the Dell Technologies portfolio can help leverage the recent prominence of Blockchain.
EEG Report to Recordings Matching and Text Mining Machine Learning Tony Ku
M. Brandon Westover, 
M.D., Ph.D.
Yu-Ping Shao
Manohar Ghanta
To take advantage of advanced machine learning and deep learning techniques to accelerate clinical diagnoses such as Electroencephalography (EEG), supervised learning is typically the most time-consuming, expensive, and least scalable process. This article examines how to streamline the data pipeline of curating labeled data sets of neurological events to patient waveform files.
Advancement in Database Access Technologies for Java Projects DevOps Manzar Chaudhary Persistence layer is required in almost every project. As data access technologies rapidly evolve, new frameworks are being written to make development of persistence layer easier and faster. This article classifies database access technologies (for java) into various generation as per the chronological order as they evolve. It also highlights the features and presents a comparative study of each generation.
September Human-Computer Interaction and the User Interface Emerging Technologies Bruce Yellin This Knowledge Sharing article examines the world of user interfaces and innovations that have allowed us to more fully benefit from the computing world around us. Readers will be taken on a fascinating adventure, touching on the beginning of the user interface, and diving into the world of voice, gesture and brain control of technology.
Storage Migration – Hybrid Array to All-Flash Array Core Technologies Victor Wu This article discusses how to migrate data from EMC VNX storage into EMC Unity All-Flash storage. A sample of the environment is presented that includes Microsoft Windows platform and VMware Hypervisor which are running on Cisco UCS Unified Computing System. Determining the best migration methodology and how to prepare for data migration is also discussed.
Encroachment and Advancement of IOT Internet of Things Varuni Rv This article explores IoT in industry segments that are interesting as well as those that are sensitive and need improvement to ease the common problems that occur in daily life. Topics covered include healthcare, agriculture, advertising, transportation, and more.
October Electronic Voting System using Blockchain Blockchain Raghavendra Ganji
Yatish BN
This article explains how blockchain can be securely employed in mass electoral procedures without the need of a central authority body. The authors examine a voting system using blockchain that is robust, tamper proof and cost effective. Blockchain technologies available to use in the voting system such as Ethereum, Multichain, etc. are reviewed along with a discussion on the architecture, design and design constraints and implementation implications of such voting mechanism in our society.
Isilon SWIFT Made Easy! (OneFS 8.x and later) Emerging Technologies Akshay Kumar This article describes the best practices for setting up and managing Isilon SWIFT services on Dell EMC Isilon cluster as object storage interface compatible with the OpenStack Swift 1.0 application programming interface (API).
Non-Intrusive Load Monitoring for Smart Grid Decision Support Big Data William Schneider
Fernanda Campello de Souza
Unsupervised Non-Intrusive Load Monitoring (NILM) disaggregates high-level aggregate measurements to contributions of individual appliances, based on a single metering point (smart meter at main breaker level). This offers a cheaper method of implementation through its low setup cost and short training phase. This article examines sub-metering data collected over one year for 20 houses in the UK, to evaluate the potential of NILM techniques in supporting smart grid analytics.
November Fidelity of the Digital Twin Internet of Things Marina Levina
Bryan Duerk
This article describes the origins and types of Digital Twins, explores specifications for data type and amount of data needed based on the industry verticals and use cases, discusses the need for new economic and business models; analyzes limitations and requirements (including data sources, tools, and technologies) for accurate modeling of a high fidelity Digital Twin.
AI Web Engine Project Big Data
Phil Hummel
Gene Chesser
This article describes a project currently underway to develop an intelligent application to support a community of employees, customers, partners and researchers with interest in machine learning, deep learning and artificial intelligence.Readers will gain a deeper appreciation for how ML/DL/AI can be used in a real-world business scenario.
Are We Coding Our Way to Extinction? Machine Learning Krishna Kant This article traces the development of compute power over the years and extrapolates it to the future. It deciphers the key elements which constitute AI and also explores from a technical standpoint whether human beings have the potential to achieve singularity, and if singularity is achieved, what lies beyond it.
December Exchange, NetWorking & Repair Core Technologies Sinan Caliskan  This troubleshooting/how-to article provides a restore alternative when the primary restore with NetWorker does not work.
Threats and Challenges in Machine Learning Big Data Dayne Sorvisto This article explores vulnerabilities in a few machine learning algorithms used in software applications today. The author describes how to mitigate many common security vulnerabilities in the age of big data with a simple common sense approach.
Distributed Cloud Model through Blockchain Technology Blockchain Kanishk Kumar This article takes a deep look at blockchain technology and how it can be used to implement a successful Distributed Cloud model to store and protect user data.
The Importance of Transition Process in a Managed Service Business Process Charles Weeks In any IT Managed Services (MS) organization, the success of the "transition" engagement depends upon an MS group’s ability to follow a methodology of activities and tasks. This article describes the steps and activities that are essential to attain a successful IT MS transition.
January Artificial Intelligence (AI): New Face of IT Machine Learning Sandesh Sudhakaran K S This article provides an overview of AI, and explains how it can be used to build smart apps that help organizations be more efficient and enrich people’s lives.
graphR. - Analyzing VMware Environments Made Easy Virtualization Stephan Michard RVTools is a VMware utility that connects to a vCenter and gathers detailed information on the VMware environment Analyzing RVTool exports manually can be time-consuming, error-prone and cumbersome. This Knowledge Sharing video illustrates how a webapp called graphR. simplifies and automates analysis of RV-Tool exports.
IoT & Block Chain - a Wallet of Secrets Blockchain Mohamed Sohail
Fidel Kaldas
Architecting an IoT ecosystem is often a complex undertaking. This articles examines the challenges to keeping the IoT secure, and ensuring that a particular instance of the IoT cannot be used as a jumping off point to attack another enterprise.
February Epilepsy Prediction using Deep Learning in HPC Machine Learning Ronaldo Lopes 
Mauro Damo
Srinivasan Sivaramakrishnan
Wei Lin
The articles explores how automating detection and prediction of seizures based on various key indicators or patterns can revolutionize the physicians’ approach to diagnose and understand seizures and epilepsies.
Unleash Customer challenges with Isilon Gen 6 Emerging Technologies Bhupendra Singh 
Sriram Chandrasekar
Ravi Sriramulu
Vivek Dharmalingam
This article provides a technical overview and positioning of new generation GEN 6 Isilon hardware products; its design purpose, advantages of using Gen 6 nodes, its value proposition, and how it differs from GEN 5 product family and use cases for each of the Gen 6 node types.
ECS, Hortonworks & Kerberos; a Big Data Solution Big Data Cristina Alvarez 
Denis Jannot
This article describes how to perform the complex configuration and integration among Kerberos, Hortonworks and ECS, how to run functional tests (including Distcp, Hive, Spark, HBase and Sqoop frameworks, using ECS as internal or external file system in the Hadoop cluster), and how to run benchmarks that demonstrate that ECS is a good fit for Hadoop frameworks where latency is not critical, like Hive or Spark.
March VMware vSAN and NSX: Design & Deploy Guidelines Virtualization Anuj Sharma This article serves as quick reference for Enterprise Architects to understand the core concepts of VMware vSAN and NSX.
Decrypting Practical AI: Empowering or Enslaving Humans Machine Learning Mohammed Hashim This article will help organizations, business consultants, technology partners, solution architects, futurists and the education community understand AI and its complex ecosystem, its practical applications; discover newer AI based business opportunities, design DAI solutions and adopt AI at large without fear of killer bots dominating mankind in the upcoming AI revolution.
Swarm Intelligence & EC- based Image Segmentation Big Data Rajasekhar Nannapaneni Computational Intelligence based genetic algorithm from evolutionary computing paradigm and particle swarm optimization algorithm from swarm intelligence paradigms are newer approaches to address multidimensional optimization problems. In this article, a hybrid approach is developed using these algorithms which improves the way to tackle the multilevel thresholding based image segmentation problem when the dimensionality of thresholding increases in image processing and analytics.
Starting a DevOps Journey in a Telco in Brazil DevOps Julio Pereira
Felipe Miziara
Gerson Graciani
Ricardo Herrmann
This article shares the authors’ experiences and accumulated knowledge about establishing a healthy strategic and technical relationship with a big client who faces internal resistance from legacy software development models, and how they help them move forward using modern DevOps practices.
April The Importance of Hardware Raising All Boats
Core Technologies Paul Brant New hardware technologies, architectures and processes are providing new influential approaches in catering to the ravenous appetite of new applications. This article discusses the opportunities and approaches that new hardware solutions provide in sustaining the appetite of software as it continues trying to eat the world.
The Power of Proactive Log Analysis with ELK & ECS Big Data Cristina Alvarez 
Denis Jannot
This article covers deployment and use of ELK with ECS, including several scenarios depending on the customer needs. From manually collecting the logs, to automatically do it with a tool specifically created to enhance the content of the logs, to configure syslog to collect the ECS data in real-time; ways to use the logs once they are collected
Isilon Gen6 and Comparison with Gen5 (for Newbies) Emerging Technologies Akshay Kumar This article provides a high level comparison of Isilon Gen5 and Gen6. The author highlights new design and architecture changes in Gen6 and explains how it works.

 

 

 

FAQs

 

What is Knowledge Sharing?

Knowledge Sharing is a platform for you to share your expertise, unique deployments, best practices, or any relevant topic of your interest. Written exclusively by Dell, VCE and Dell EMC Proven Professional certified individuals, anyone can benefit from these Knowledge Sharing articles. If you are not Dell, VCE and Dell EMC Proven Professional certified, take the next step and get certified! Then you, too, can enter the Knowledge Sharing Competition, publish your work, receive industry recognition, and become eligible for a free pass to Dell EMC World and cash prizes.

 

How does the Proven Professional Knowledge Sharing Competition work?

Each year the competition is announced in the Dell EMC Proven Professional community; typically early October time frame. The announcement post will direct you to a short form allowing us to share with you the current program details and deadlines.

There are 2 phases to the competition. In phase one, you will have an opportunity to submit an abstract; a short summary (3-6 paragraphs) of what you intend to share in your article. In the second phase of the competition, selected authors are invited to write their complete article (less than 50 pages).

There are 2 judging processes; one each for abstract and article submissions. This process is completely anonymous. All identifying details of the author are removed from the submission before being judged by a panel of our subject matter experts.

 

How are winners announced?

Finalists are notified of their status, but not their placement, and extended a complimentary admission to Dell EMC World. Official announcement of the finalists and their placement is made at the Knowledge Sharing ceremony held during Dell EMC World each year. This is a prestigious event hosted by our most senior management and allows us to congratulate you - the authors - on a personal note.

 

I'm not Dell, VCE or Dell EMC Proven Professional. Can I still participate?

Certification is a requirement for participation. If you're not yet Dell, VCE or Dell EMC Proven Professional certified, this is a great opportunity to become certified! Check out the details of our program here.

 

How can I see the published articles?

A link to the Book of Abstracts for each competition year (10 and counting!) can be found here

 

Can I submit an article outside of a competition cycle?

Yes. We invite you to submit out of cycle by emailing your Abstract & Article submissions to EMCProvenHelpDesk@emc.com. Submissions found to be publish worthy will automatically be entered into the next competition cycle.

Each competition cycle typically begins in the early fall. Details regarding the EMC Proven Professional Knowledge Sharing program will be shared in the community - be sure to check back for details regarding the current competition, updates and more! 

 

Still have questions?

Email us at EMCProvenHelpDesk@emc.com