Inside the Briefcase


Federating Identities for a Successful Enterprise IdP Deployment

Federating Identities for a Successful Enterprise IdP Deployment

by Lisa Grady, Radiant Logic
When customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security...

Protecting Your Data at Each Step of the Networking Path

Protecting Your Data at Each Step of the Networking Path

by Bill Manning, APC by Schneider Electric
As the amount of business critical data grows, the importance of data availability surges – businesses simply cannot afford to lose precious data due to instances of downtime.
Read More >>>





Briefcase Highlights


CLOUD COMPUTING

IT Briefcase Exclusive Interview with IBM: Managing Big Data through Storage

December 18, 2014 No Comments

with Bernie Spang, IBM’s Systems & Technology GroupIn this interview, Bernie Spang from IBM’s Systems & Technology Group speaks with IT Briefcase on how users are adopting a more agile software defined storage approach, and how this philosophy prepares them for 2015 and the future. Read More >>>

Dispelling Five Myths about Cloud Storage, Retrieval and File Transfer in Healthcare

December 17, 2014 No Comments

When I speak with healthcare IT leaders about cloud-based data storage, retrieval, and transfer—the responses are often mixed. Some are steadfast believers in the power, scalability and cost-savings afforded by the cloud, having experienced these benefits first-hand with implementations at their own hospital or health system. Others raise questions ranging from security and data ownership to patient protection and affordability.

4 Predictions for the 2015 IT Market Space

December 10, 2014 No Comments

Now that cloud services have become part of IT’s “new normal”, commonly referred to as “Hybrid”, it seems obvious that the approaches and tools we use to manage IT would also evolve and mature, though the pace of evolution varies amongst companies, of course. According to a Website Magazine article quoting a Gartner survey, more than 55% of CIOs indicate they would host all critical apps in the cloud by 2020. Cloud services use cases can vary greatly, but often hold common themes around converting traditional application to SaaS, or adding disaster recovery to your existing datacenter with RaaS.

Data Management in the Cloud: Five Fundamentals of Cloud Services Design

December 9, 2014 No Comments

by Robert Kaloustian, CommVaultWith adoption rates soaring, it’s safe to say that the “cloud” is here to stay. While companies of all shapes and sizes rush to jump on the cloud bandwagon, data management miscues could make their journey a long and bumpy ride. Read More >>>

Made in IBM Labs: Using Analytics to Optimize Cloud Computing Performance and Cost Savings

December 9, 2014 No Comments

IBM inventors have patented a technique that uses analytics to increase cloud computing performance and reduce costs by dynamically moving workloads — between or within cloud datacenters — based on an automatic analysis that determines the most efficient and effective use of available resources.

What’s in Store for 2015 – Technology Edition

December 4, 2014 No Comments

by Dan Pickett, nfrastructureWe predict that through next year, technology will only continue to become “consumerized” as devices become more connected, everything becomes software-defined and the Internet of Things becomes completely engrained in our everyday life. Read More >>>

Eliminate the Barriers to Your Cloud Adoption

December 4, 2014 No Comments

Learn how IBM, our Technology Partners and clients are reinventing data availability for the hybrid cloud era, so you can embrace cloud with confidence.

2015 Predictions for Cloud Security

December 3, 2014 No Comments

2014 will go down in history as the year of the data breach. 2015 will be the year of the “digital enterprise” – as the adoption of cloud, mobility and IoT will continue to flourish. Bitglass, a cloud access security broker (CASB), offers its top tech predictions for 2015.

What Globalization Means in the Age of Real-Time, Mobile and Cloud

December 3, 2014 No Comments

by Rob Vandenberg, LingotekRemember when people first started talking about globalization in the 1980s? Branching out into new markets usually meant physically expanding to somewhere in Europe or the U.K. It required opening new offices, growing new markets through direct sales and having dedicated translators interpret content by hand. Read More >>>

IT Briefcase Exclusive Interview with SIOS Technology: SANS-based vs. Cloud Clusters

December 3, 2014 No Comments

with Jerry Melnick, SIOS TechnologyIn this interview, Jerry Melnick, COO, SIOS Technology discusses the difference between SAN-based and Cloud data storage clusters, and the benefits and drawbacks of each approach. Read More >>>

Cloud is SMBs Competitive Edge

November 13, 2014 No Comments

In today’s small business world, the common reasons why businesses fail are out-of-control growth, poor accounting and operational inefficiencies. Small businesses are constantly dealing with inefficient back-end processes that result in increased costs – as well as reduced employee productivity and revenue. Because of this, often times small businesses find it difficult to take on new projects as they do not know their financial standing, availability of resources or their pipeline in real-time.

2015 Cloud Hosting Predictions & Forecasts

November 12, 2014 No Comments

With 2015 right around the corner, now is a great time to identify what the big trends for next year are going to be in the world of cloud computing and virtualization. With growth across the board for cloud service providers this year – in compute and storage, archiving, messaging/email and specialized applications – we can expect more of the same in 2015. Here are some ideas for the larger trends taking shape for next year.

New IBM Entrepreneur Program Accelerates Collaborative Innovation in the Cloud

November 10, 2014 No Comments

IBM today announced the launch of the IBM Global Entrepreneur Program for Cloud Startups, which will help startups and entrepreneurs harness the power of IBM Cloud, as well as deeply connect and embed them into IBM’s vast global network of enterprise clients, consultants, Innovation Centers and more to rapidly build innovations, scale quickly and accelerate growth.

Metalogix Launches Cloud Acceleration Suite and Partner Program to Help Clients Rapidly Migrate Email, Files and SharePoint to Any Cloud

November 6, 2014 No Comments

Today Metalogix announced the launch of the Cloud Acceleration Suite and Partner Program to help clients successfully deploy collaboration capabilities in the cloud platform of their choice, including Microsoft Office 365, Microsoft Azure, Amazon Web Services, and hybrid and private cloud. The program brings together Metalogix’ trusted migration and management tools for mission-critical collaboration platforms.

How to Navigate Data into the Cloud

October 31, 2014 No Comments

By Dave Wagner, TeamQuestThe increase in businesses moving their data into the cloud has created several new challenges for data center managers. Many departments and employees are increasingly using the public cloud to host unpredictable applications with unknown resource requirements. Read More >>>

Infographic: Revolutionize Cloud Backup

October 22, 2014 No Comments

The traditional model of multi-tiered server backup is highly inefficient, often involving backups to staging servers, tapes and off-site long-term archives. Phoenix eliminates these inefficiencies with a high-performance, born-in-the-cloud solution that’s built for today’s enterprise needs and engineered to be future-proof.

BYOD: California Court Decides Who’s Wearing the Pants

October 22, 2014 No Comments

The workplace trend of BYOD (Bring Your Own Device) is nothing new. What remains unclear, however, is the burden of ownership, cost and security. When employees bring their own cell phones, laptops or tablets to work, there’s a fair chance they’ve personally purchased those devices—data plans and all. In fact, some employers today require a BYOD policy, with no intention of paying for any of it. As one CIO bluntly put it, “Well, we don’t buy their pants either, but they’re required for the office.”

It’s Time to Go All-in on the Cloud

October 22, 2014 1 Comment

By Joe Manuele, AvayaToday, enterprises and their IT departments are migrating to cloud services faster than ever before. In fact, no other technology in our industry is associated with such dramatic triple-digit growth as cloud. By 2020, the cloud computing industry will be a $40 billion market. Read More >>>

Fishing for Data in a Digitalized Tourism Industry

October 22, 2014 No Comments

By Yves de Montcheuil, TalendAmong the most digitalized industries, travel and hospitality is changing fast. Travel agents, airlines, airports, hotel chains – the entire industry is fishing for value in a seemingly-unlimited ocean of data. Read More >>>

Five Best Practices for Backing up the Cloud

October 20, 2014 No Comments

Despite their falling costs and usually stellar security, recent large-scale data breaches showcase some of the cloud’s vulnerability, so firms should be careful about storing large amounts of customer data within the cloud. Another drawback with the cloud can be the issues that arrive when there isn’t reliable Internet connectivity. You can access data from an external drive if you have it with you, but you can’t pull from the cloud without Internet access. Many cloud services also make it possible to have mistakes occur.

The Internet of Things Won’t Take Off Until These 3 Things Happen

October 15, 2014 No Comments

by Rob Vandenberg, Lingotekf your smartphone can’t read your mind yet, it will soon. Innovators and early adopters are sprinting towards the dream of a connected world, connecting everything from cars to toasters. Their exuberance is contagious. Read More >>>

Federating Identities for a Successful Enterprise IdP Deployment

October 15, 2014 No Comments

by Lisa Grady, Radiant LogicWhen customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security but also productivity and simplicity for your users. Read More >>>

Sophos Advances Cloud Mobile, and Web Security with Acquisition of Mojave Networks

October 7, 2014 No Comments

Sophos today announced that it has acquired cloud-based security firm Mojave Networks of San Mateo, Calif. This acquisition will strengthen Sophos cloud-managed and appliance-based security solutions. To Sophos Cloud, an integrated cloud-managed security offering, Mojave will add a rich cloud-based web security solution. And to Sophos’ line of network security hardware it will enable hybrid deployment options (SaaS and non-SaaS) to meet diverse web security needs.

8 Excellent Benefits of Using Cloud Computing

October 6, 2014 No Comments

Cloud computing has become the new benchmark in the world of technology, and has become one of the favorites for businesses across the world. This technology is growing by leaps and bound. What started on a small scale is today a whooping $45 billion industry worldwide.

Got Big Data Problems? So Do Most Companies…

September 25, 2014 No Comments

Data analytics is not a new concept, but why are today’s businesses still grasping at how to use this information source to create more efficient and effective businesses? A recent survey by Lavastorm Analytics of 495 analytics professionals and C-level executives looked at current analytic usage, trends and future initiatives of businesses when it comes to big data solutions. What we uncovered is that most businesses are not fully harnessing big data analytics benefits, even though more than half of those surveyed are rapidly growing their investment in analytics tools.

Internet Safety by Top IT Security Experts

September 25, 2014 No Comments

The recent string of media reports about phishing or email password hacking security breeches,like the iCloud celebrity nude picture leak, have caused a media frenzy. This particular case received worldwide attention because the leak involved celebrities. However the reality is that email hacking happens all the time in personal and professional email accounts.

Why VMI is the future for our BYOD Generation

September 24, 2014 No Comments

While many approaches are being used to control the impact of the mobile age on IT, VMI technology shows your organization can both embrace and thrive in this new world.

Case Study: Box is a critical component in Rosetta Stone’s new cloud strategy.

September 23, 2014 No Comments

Download this white paper and see how Rosetta Stone’s files are no longer stored on-premise in Tokyo, San Francisco, or any of the company’s offices.

How Storage Infrastructure Can Help You Differentiate and Add Value to Your Cloud Storage Services

September 22, 2014 No Comments

This roundtable discussion with a successful Service Provider and an IBM expert offers great insights on how the right choice of infrastructure impacts your ability to deliver on those expectations.

Protecting Your Data at Each Step of the Networking Path

September 18, 2014 No Comments

by Bill Manning, APC by Schneider ElectricAs the amount of business critical data grows, the importance of data availability surges – businesses simply cannot afford to lose precious data due to instances of downtime. Read More >>>

ADVERTISEMENT

TDWI

Gartner Identity & Access

Gartner Data Center

Red Hat JBoss Busines Automate

ACI Customer Experience Management Summit

ManageEngine

ITBriefcase Comparison Report

IBM Data