Inside the Briefcase






Briefcase Highlights


CLOUD COMPUTING

The Four Phases of Cloud Optimization

September 12, 2014 No Comments

with Joe Kinsella, CloudHealthSeveral years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to over $350K. Read More >>>

Transform your IT department into a self-service cloud application provider with IBM Cloud Orchestrator

September 9, 2014 No Comments

According to a Forrester survey of Fortune 1000 IT leaders, 83% do not think they deliver cloud services fast enough. The problem lies within finding the right balance between system optimization and innovation.

Simplifying Cloud Enabled Enterprise Environments

September 9, 2014 No Comments



Join us for this webcast and learn how Ubuntu’s orchestration and deployment tools work on all clouds to drive simplicity and quick return on investment.

State of the Art of Single System Availability Report

September 9, 2014 No Comments

Almost every enterprise has a set of systems running workloads that need to be highly available (such as CRM or ERP). If these types of applications fail for a significant amount of time, an organization might find itself making the evening news.

How far is too far when it comes to outsourcing IT?

September 8, 2014 No Comments

with Mike Decker, Annese & Associates, Inc.With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in Telecommunications, I started my career inside a NOC located in the basement of a major bank in Buffalo, NY. Read More >>>

You Can’t Win the Data Loss Blame Game – So End It

September 3, 2014 No Comments

By Omer Eiferman, CellroxIn a world of desktops, tracking data leaks was much easier. If an employee digitally leaked corporate data or insider information, IT could usually pin down when and where it happened. However, with personal smartphones now being used for business, the blame game is not so simple. Read More >>>

Raising the game – The IBM Business Tech Trends Study

August 26, 2014 No Comments

IBM has evaluated the current adoption landscape of 4 key technologies in the enterprise: Big Data & Analytics, Cloud, Mobile and Social

Tata Consultancy Services and Cloudera Join Forces to Deliver Big Data and Analytics Services Globally

August 26, 2014 No Comments

Partnership Helps Customers Fully Harness Big Data by Implementing Cloudera Enterprise Data Hub

Efficient Data Automation for Financial Firms

August 26, 2014 No Comments

By Jim Manias, Advanced Systems Concepts For modern companies, apps and systems (not pigeons) are carrying the data, and it falls on IT to be sure this movement happens quickly and accurately.Timeliness and efficiency in the delivery of relevant data translates into increased revenues and reduced risks for all financial firms. Read More >>>

Deconstructing big time data breaches: Where the big boys failed and what your business can learn

August 14, 2014 No Comments

These days, it seems not a day goes by without a data breach story appearing in the news. As these security incidents become more prevalent – not to mention more costly – one of the best things that small businesses can do to prevent them is to learn from others’ mistakes.

IT Briefcase Interview: Mobile Website and Custom APIs Monitoring

August 11, 2014 No Comments

In this interview, Zaheeruddin Ahmed B, marketing analyst at Site24x7, a ManageEngine cloud service, discusses the need for a way to monitor mobile apps and mobile-optimized websites — from the perspective of the mobile user — and his company’s efforts to do just that with its industry-first mobile monitoring solution.

To Cloud or Not to Cloud, That is the Question

August 11, 2014 No Comments

By Joe Caserta, Caserta ConceptsOne of the biggest decisions any business will need to make this year is where to store the company’s data. Is renting space in the Cloud the answer, or is it best to keep data in-house by investing in the appropriate infrastructure? Read More >>>

Context-Aware Security: A Key to Successful BYOD

August 4, 2014 No Comments

by Neal Foster, DELL SoftwareHow can IT give users what they want and protect data assets at the same time? By implementing context-aware security. Context awareness is something most of us practice every day. Read More >>>

Assessing the Cloud to Find its Silver Lining

July 24, 2014 No Comments

by Russ Loignon, TangoeBusiness moves at the speed of light, and the ability to stay competitive in today’s global workplace dictates that enterprises rely on the technology available today, yet be prepared to adapt quickly for future technologies. Read More >>>

Fortune Favors the Brave CIO

July 24, 2014 No Comments

There’s no doubt that the current shift to digital is disrupting the telecoms industry. Yet, major shake-ups of this kind do create opportunities for businesses that are bold enough to make the changes needed to succeed.

Globalizing the Continuous Delivery Pipeline

July 23, 2014 No Comments

by Rob Vandenberg, LingotekThanks to trends like BYOD and cloud computing, devops now works together as a unified organization, rather than throwing code over an invisible wall. It’s a necessary and timely evolution—especially for today’s sophisticated global IT environments. Read More >>>

Taking the Leap to Virtualization

July 22, 2014 No Comments

Tweet Many mid-market companies have invested significant time and resources to secure and back up their servers, client computers, data, and overall network infrastructure in what was the traditional client-server setup. Now, what were considered emerging technologies just a few years ago, cloud computing and virtualization have arrived on the scene, bringing both significant benefits […]

A Quick Guide to Disaster Recovery in the Cloud

July 22, 2014 No Comments

Create and implement the most effective DR strategy for your organization with the help of Bluelock’s action-packed guide to Disaster Recovery in the cloud. This helpful guide will help you set your DR plan in motion with a comprehensive checklist and detailed information to follow during each step.

How can Big Data cross the Oceanic Gap?

July 2, 2014 No Comments

By Yves de Montcheuil, TalendBig data technologies are definitely California-born. The Internet giants invented Hadoop and most NoSQL databases. Over the years, adoption has spread from “new economy” companies to almost all industries. Read More >>>

InfinityQS Debunks Cloud Computing Myths in New eBook

June 24, 2014 No Comments

InfinityQS International, Inc., the global authority on real-time quality and Manufacturing Intelligence, today announces the release of its eBook, “Cloud Mythbusters: Dispelling the Myths of Manufacturing in the Cloud.” In this eBook, InfinityQS experts combat cloud computing fiction with fact, and encourage quality and IT professionals to consider cloud-based tools as a solution for enabling supply chain-wide quality, efficiency and productivity.

Simplifying the Development and Publishing of Apps for Businesses Today

June 24, 2014 No Comments

As digitization and mobility in companies become all pervasive, and IT departments continue to strive to do more with less, the shortage of IT skills to support Mobile Apps development and publishing is an increasingly acute issue.

Top Tips for an Effective Cloud Migration

June 11, 2014 No Comments

By Sarah Lahav, SysAid TechnologiesFor organizations built on in-house IT solutions, making too many changes too quickly can introduce unknown risks and frustrate end users who need to learn new software. The transition to the cloud therefore calls for a strategy. Read More >>>

Business Continuity Meets the Cloud: Protecting Your Reputation in the Always-on World

June 11, 2014 No Comments

By Laurence Guihard-Joly, IBMNot so long ago, a system outage equaled a forced recess for employees while a member of the IT team rebooted a server. There were consequences of course including the loss of data, inconvenienced customers, angry managers and more. Read More >>>

Three Ways Retailers Can Benefit from the Cloud

June 10, 2014 No Comments

It’s no secret that cloud computing is playing a major role in the transformation of several industries, and retail is among the fields capitalizing most on its benefits. From breaking down silos between legacy systems to revolutionizing the Point of Sale (POS) model, cloud computing has helped both e-commerce and storefront retailers alike streamline operations and improve business outcomes.

How Greed, Generosity and the Defense of Civil Liberties Can Put Your Data at Risk

June 10, 2014 No Comments

By Cam Roberson, Beachhead SolutionsSome human traits are security hazards – but not always because they are faults. As a matter of fact, some traits directly and deliberately engineer situations in which data leaks are more likely. Read More >>>

Five Ways Box Makes SharePoint Better

June 8, 2014 No Comments

Businesses around the world have made significant investments in Microsoft SharePoint for content management. However, these same companies are struggling with making the transition to a more mobile, more collaborative workplace. Download this white paper to learn five ways Box can make SharePoint better.

4 Industries Bringing Big Ideas to Life through IT Infrastructure

June 6, 2014 No Comments

It’s clear that any company, regardless of industry, is reliant on – or stands to improve its business through – the use of technology. Concepts like Big Data, Cloud and the Internet of Everything are relatively new pieces of the technology puzzle, but are quickly becoming vital to modern consumers and the businesses that serve them.

The Most Common Governance Mistakes in SharePoint and How to Avoid Them

June 5, 2014 No Comments

by Steve Marsh, Metalogix Defining governance is not easy and many organizations skip this task and move forward without a clear understanding or plan for what governance means. So when SharePoint administrators have to enact ill-defined governance, mistakes inevitably follow. Read More >>>

THE INTRANET OF EVERYWHERE: Deploying a search-driven architecture to address intranet challenges

June 4, 2014 No Comments

The purpose of this document is not to compare or evaluate the many intranet solutions on the market today. Instead, we want to shine a light on a challenge organizations face regardless of the intranet solution they ultimately choose.

Cloud Security Readiness Tool

June 3, 2014 No Comments

The Cloud Security Readiness Tool evaluates whether cloud adoption will meet their business needs.

ADVERTISEMENT

Gartner Identity & Access

TDWI World Conf San Diego

Gartner IT Financial Procurement Asset Mgmt Summit

Gartner Catalyst

Red Hat JBoss Busines Automate

ACI Customer Experience Management Summit

ManageEngine

ITBriefcase Comparison Report

IBM Data