Inside the Briefcase


Federating Identities for a Successful Enterprise IdP Deployment

Federating Identities for a Successful Enterprise IdP Deployment

by Lisa Grady, Radiant Logic
When customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security...

Protecting Your Data at Each Step of the Networking Path

Protecting Your Data at Each Step of the Networking Path

by Bill Manning, APC by Schneider Electric
As the amount of business critical data grows, the importance of data availability surges – businesses simply cannot afford to lose precious data due to instances of downtime.
Read More >>>

Efficient Data Automation for Financial Firms

Efficient Data Automation for Financial Firms

By Jim Manias, Advanced Systems Concepts
For modern companies, apps and systems (not pigeons) are carrying the data, and it falls on IT to be sure this movement happens quickly and accurately.Timeliness and efficiency in the delivery of...

To Cloud or Not to Cloud, That is the Question

To Cloud or Not to Cloud, That is the Question

By Joe Caserta, Caserta Concepts
One of the biggest decisions any business will need to make this year is where to store the company’s data. Is renting space in the Cloud the answer, or is it best to...

How can Big Data cross the Oceanic Gap?

How can Big Data cross the Oceanic Gap?

By Yves de Montcheuil, Talend
Big data technologies are definitely California-born. The Internet giants invented Hadoop and most NoSQL databases. Over the years, adoption has spread from “new economy” companies to almost all industries.
Read More >>>

Where does Security fit in DevOps?

Where does Security fit in DevOps?

By Eric Minick and Diana Kelley, IBM
Organizations are under increased pressure to continuously create and deploy innovative products, software, and apps. This added pressure makes it increasingly important to embed security throughout the entire development process.




Briefcase Highlights


APPLICATION INTEGRATION

Understanding Deep Packet Inspection Once and For All

November 21, 2014 No Comments

Today’s IT is one of convergence, applications and a demand for constant availability. And when it comes to downtime, all of these elements combined with the fact that many new applications are being provisioned with SaaS providers have created the perfect storm for IT pros tasked with getting to the root of problems and keeping business running. The question, “Is it the network or the app?” has never been more critical, nor more difficult to answer.

Part 2 – The 2014 Application & Service Delivery Handbook: Network and Application Optimization

November 18, 2014 No Comments

In this second of four installments, this handbook focuses on describing the technologies, products and services that are available to improve the performance of applications and services.

Delivering Next-Gen Customer Experiences: How to Quickly Build the Apps Your Business Needs

October 31, 2014 No Comments

As customer-focused executives, you understand all too well that success today is based on delivering great customer experiences. Increasingly, this means that you need next generation applications to support new processes, products/services and even business models. These applications aid a variety of functions, including serving customers across channels, assisting with sales and marketing operations, supporting customer communities, and enabling e-commerce and other digital services.

BYOD: California Court Decides Who’s Wearing the Pants

October 22, 2014 No Comments

The workplace trend of BYOD (Bring Your Own Device) is nothing new. What remains unclear, however, is the burden of ownership, cost and security. When employees bring their own cell phones, laptops or tablets to work, there’s a fair chance they’ve personally purchased those devices—data plans and all. In fact, some employers today require a BYOD policy, with no intention of paying for any of it. As one CIO bluntly put it, “Well, we don’t buy their pants either, but they’re required for the office.”

Fishing for Data in a Digitalized Tourism Industry

October 22, 2014 No Comments

By Yves de Montcheuil, TalendAmong the most digitalized industries, travel and hospitality is changing fast. Travel agents, airlines, airports, hotel chains – the entire industry is fishing for value in a seemingly-unlimited ocean of data. Read More >>>

Federating Identities for a Successful Enterprise IdP Deployment

October 15, 2014 No Comments

by Lisa Grady, Radiant LogicWhen customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security but also productivity and simplicity for your users. Read More >>>

Innovation in the enterprise: How can CIOs ensure its success?

September 29, 2014 No Comments

How CIOs can handle the disruption caused by increased innovation in the enterprise. Ten years ago, mobile consisted of email, voice and SMS. Any innovation was very much behind the firewall, in a closed environment. If new developments were needed, resources would have to be allocated and as a result, any CIO would have to be very sure of a return on the investment before innovation projects could go ahead.

Got Big Data Problems? So Do Most Companies…

September 25, 2014 No Comments

Data analytics is not a new concept, but why are today’s businesses still grasping at how to use this information source to create more efficient and effective businesses? A recent survey by Lavastorm Analytics of 495 analytics professionals and C-level executives looked at current analytic usage, trends and future initiatives of businesses when it comes to big data solutions. What we uncovered is that most businesses are not fully harnessing big data analytics benefits, even though more than half of those surveyed are rapidly growing their investment in analytics tools.

Driving Enterprise Transformation with Box and Office 365

September 23, 2014 No Comments

Download this white paper and read how IT needs a transformation to a more user-centric, mobile-aware and agile model, and the best-of-breed architecture the cloud affords is key to unlocking this next evolution of enterprise technology.

Protecting Your Data at Each Step of the Networking Path

September 18, 2014 No Comments

by Bill Manning, APC by Schneider ElectricAs the amount of business critical data grows, the importance of data availability surges – businesses simply cannot afford to lose precious data due to instances of downtime. Read More >>>

Panaya Enables Greater Agility in ERP Changes with Big Data Analytics

September 18, 2014 No Comments

Panaya is proud to announce the launch of Panaya CloudQuality™ Suite, a cloud-based SaaS that provides a suite of services needed to deploy changes in ERP systems. From day-to-day changes to the most complicated upgrades, Panaya CloudQuality™ suite applies big data analytics to predict what will break, how to fix it and what to test for every change made.

The Four Phases of Cloud Optimization

September 12, 2014 No Comments

with Joe Kinsella, CloudHealthSeveral years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to over $350K. Read More >>>

How far is too far when it comes to outsourcing IT?

September 8, 2014 No Comments

with Mike Decker, Annese & Associates, Inc.With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in Telecommunications, I started my career inside a NOC located in the basement of a major bank in Buffalo, NY. Read More >>>

8 Things You Need to Do Before, During, and After Migrating to Office 365

September 4, 2014 No Comments

with Robert Berlin, OneLoginWith Windows Server 2003 hitting its end of life next year, the push is on for even faster migration. But the path is a complex one, and careful planning will be your best friend. Having spent a number of years helping customers along this road, here are my top tips for a safe journey. Read More >>>

Does your Company Really Need BPM?

September 3, 2014 1 Comment

with Mac McConnell, BonitaSoftDoes everybody need BPM? Are there companies out there that would have no use for the kinds of solutions we provide? Hate to say it, but there might be a few. In the spirit of a Letterman “Late Show Top 10” list, here are 8 types of companies that simply don’t need BPM.Read More >>>

You Can’t Win the Data Loss Blame Game – So End It

September 3, 2014 No Comments

By Omer Eiferman, CellroxIn a world of desktops, tracking data leaks was much easier. If an employee digitally leaked corporate data or insider information, IT could usually pin down when and where it happened. However, with personal smartphones now being used for business, the blame game is not so simple. Read More >>>

Efficient Data Automation for Financial Firms

August 26, 2014 No Comments

By Jim Manias, Advanced Systems Concepts For modern companies, apps and systems (not pigeons) are carrying the data, and it falls on IT to be sure this movement happens quickly and accurately.Timeliness and efficiency in the delivery of relevant data translates into increased revenues and reduced risks for all financial firms. Read More >>>

IT Briefcase Interview: Mobile Website and Custom APIs Monitoring

August 11, 2014 No Comments

In this interview, Zaheeruddin Ahmed B, marketing analyst at Site24x7, a ManageEngine cloud service, discusses the need for a way to monitor mobile apps and mobile-optimized websites — from the perspective of the mobile user — and his company’s efforts to do just that with its industry-first mobile monitoring solution.

To Cloud or Not to Cloud, That is the Question

August 11, 2014 No Comments

By Joe Caserta, Caserta ConceptsOne of the biggest decisions any business will need to make this year is where to store the company’s data. Is renting space in the Cloud the answer, or is it best to keep data in-house by investing in the appropriate infrastructure? Read More >>>

Context-Aware Security: A Key to Successful BYOD

August 4, 2014 No Comments

by Neal Foster, DELL SoftwareHow can IT give users what they want and protect data assets at the same time? By implementing context-aware security. Context awareness is something most of us practice every day. Read More >>>

The 2014 Application and Service Delivery Handbook

July 28, 2014 No Comments

This is the eight edition of what had previously been called the Application Delivery Handbook.

Got WiFi? Free App Helps You Meet Basic User Needs

July 28, 2014 No Comments

Did you hear the one about the teacher who asks a group of students to name something they need but can’t see or feel? The hip-hop loving, smart-gadgets sporting, what’s-apping generation answer in unison, “WiFi.” Increasingly, WiFi is becoming indispensable and, apparently, a candidate for inclusion in Maslow’s hierarchy of basic human needs.

Assessing the Cloud to Find its Silver Lining

July 24, 2014 No Comments

by Russ Loignon, TangoeBusiness moves at the speed of light, and the ability to stay competitive in today’s global workplace dictates that enterprises rely on the technology available today, yet be prepared to adapt quickly for future technologies. Read More >>>

Globalizing the Continuous Delivery Pipeline

July 23, 2014 No Comments

by Rob Vandenberg, LingotekThanks to trends like BYOD and cloud computing, devops now works together as a unified organization, rather than throwing code over an invisible wall. It’s a necessary and timely evolution—especially for today’s sophisticated global IT environments. Read More >>>

Stream vs. Batch Processing – Which One is the Better Business Operations GPS?

July 10, 2014 No Comments

by Dale Skeen, VitriaMany organizations across industries leverage “real-time” analytics to monitor and improve operational performance. Essentially this means that they are capturing and collecting data in lots from various systems and analyzing it in batches through periodic on-demand queries. Read More >>>

How can Big Data cross the Oceanic Gap?

July 2, 2014 No Comments

By Yves de Montcheuil, TalendBig data technologies are definitely California-born. The Internet giants invented Hadoop and most NoSQL databases. Over the years, adoption has spread from “new economy” companies to almost all industries. Read More >>>

Harnessing the Power of Smarter IT Infrastructure to Increase Efficiency

June 30, 2014 No Comments

By Alex Yost, IBMThe US Energy Information Administration expects global energy use to increase 56 percent between 2010 and 2040 – the equivalent of 4,000 power plants. But not all that energy will be put to good use. Much of it will be lost through inefficient systems and processes.Read More >>>

Where does Security fit in DevOps?

June 24, 2014 No Comments

By Eric Minick and Diana Kelley, IBMOrganizations are under increased pressure to continuously create and deploy innovative products, software, and apps. This added pressure makes it increasingly important to embed security throughout the entire development process. Read More >>>

Simplifying the Development and Publishing of Apps for Businesses Today

June 24, 2014 No Comments

As digitization and mobility in companies become all pervasive, and IT departments continue to strive to do more with less, the shortage of IT skills to support Mobile Apps development and publishing is an increasingly acute issue.

Business Continuity Meets the Cloud: Protecting Your Reputation in the Always-on World

June 11, 2014 No Comments

By Laurence Guihard-Joly, IBMNot so long ago, a system outage equaled a forced recess for employees while a member of the IT team rebooted a server. There were consequences of course including the loss of data, inconvenienced customers, angry managers and more. Read More >>>

ADVERTISEMENT

TDWI

Gartner Identity & Access

Gartner Data Center

Red Hat JBoss Busines Automate

ACI Customer Experience Management Summit

ManageEngine

ITBriefcase Comparison Report

IBM Data