Inside the Briefcase






Briefcase Highlights


DATA and ANALYTICS 

Protecting Your Data at Each Step of the Networking Path

September 18, 2014 No Comments

by Bill Manning, APC by Schneider ElectricAs the amount of business critical data grows, the importance of data availability surges – businesses simply cannot afford to lose precious data due to instances of downtime. Read More >>>

Panaya Enables Greater Agility in ERP Changes with Big Data Analytics

September 18, 2014 No Comments

Panaya is proud to announce the launch of Panaya CloudQuality™ Suite, a cloud-based SaaS that provides a suite of services needed to deploy changes in ERP systems. From day-to-day changes to the most complicated upgrades, Panaya CloudQuality™ suite applies big data analytics to predict what will break, how to fix it and what to test for every change made.

The Four Phases of Cloud Optimization

September 12, 2014 No Comments

with Joe Kinsella, CloudHealthSeveral years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to over $350K. Read More >>>

CIO Infographic: Big Data Through the Eyes of Your IT Staff

September 10, 2014 No Comments

CSC has created an interesting infographic on how big data could be so much more – a vision of what could be.

State of the Art of Single System Availability Report

September 9, 2014 No Comments

Almost every enterprise has a set of systems running workloads that need to be highly available (such as CRM or ERP). If these types of applications fail for a significant amount of time, an organization might find itself making the evening news.

How far is too far when it comes to outsourcing IT?

September 8, 2014 No Comments

with Mike Decker, Annese & Associates, Inc.With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in Telecommunications, I started my career inside a NOC located in the basement of a major bank in Buffalo, NY. Read More >>>

TECH BRIEF: YES, CRIMINALS ARE TARGETING YOUR DATA: HERE ARE 7 MUST DO DEFENSIVE MEASURES

September 5, 2014 No Comments

Download this white paper and learn 7 defensive measures to protect your data.

8 Things You Need to Do Before, During, and After Migrating to Office 365

September 4, 2014 No Comments

with Robert Berlin, OneLoginWith Windows Server 2003 hitting its end of life next year, the push is on for even faster migration. But the path is a complex one, and careful planning will be your best friend. Having spent a number of years helping customers along this road, here are my top tips for a safe journey. Read More >>>

Does your Company Really Need BPM?

September 3, 2014 No Comments

with Mac McConnell, BonitaSoftDoes everybody need BPM? Are there companies out there that would have no use for the kinds of solutions we provide? Hate to say it, but there might be a few. In the spirit of a Letterman “Late Show Top 10” list, here are 8 types of companies that simply don’t need BPM.Read More >>>

You Can’t Win the Data Loss Blame Game – So End It

September 3, 2014 No Comments

By Omer Eiferman, CellroxIn a world of desktops, tracking data leaks was much easier. If an employee digitally leaked corporate data or insider information, IT could usually pin down when and where it happened. However, with personal smartphones now being used for business, the blame game is not so simple. Read More >>>

Raising the game – The IBM Business Tech Trends Study

August 26, 2014 No Comments

IBM has evaluated the current adoption landscape of 4 key technologies in the enterprise: Big Data & Analytics, Cloud, Mobile and Social

Tata Consultancy Services and Cloudera Join Forces to Deliver Big Data and Analytics Services Globally

August 26, 2014 No Comments

Partnership Helps Customers Fully Harness Big Data by Implementing Cloudera Enterprise Data Hub

Efficient Data Automation for Financial Firms

August 26, 2014 No Comments

By Jim Manias, Advanced Systems Concepts For modern companies, apps and systems (not pigeons) are carrying the data, and it falls on IT to be sure this movement happens quickly and accurately.Timeliness and efficiency in the delivery of relevant data translates into increased revenues and reduced risks for all financial firms. Read More >>>

Beyond ad clicks: using ‘Big Data’ for social good

August 25, 2014 No Comments

There is a growing interest in “big data,” the science of collecting large amounts of information and making sense of it. In 2008 and 2012, data science became a major part of political campaigns. Now, governments and nonprofits are beginning to see it as a way to tackle social problems.

How to use Virtualization to Create a Simple and Highly Reliable Disaster Recovery Plan

August 18, 2014 No Comments

Disaster Recovery isn’t just a buzzword, it’s the difference between surviving a data breach, data loss, or catastrophic event like a hurricane; or ending up as one added statistic to the list of organizations that closed their doors after something goes wrong. Yet, according to a recent study, most organizations do not have an adequate DR plan in place. One underutilized DR solution is to leverage virtualization the right way. Learn more about how Backup Exec can help.

IT Briefcase Interview: Mobile Website and Custom APIs Monitoring

August 11, 2014 No Comments

In this interview, Zaheeruddin Ahmed B, marketing analyst at Site24x7, a ManageEngine cloud service, discusses the need for a way to monitor mobile apps and mobile-optimized websites — from the perspective of the mobile user — and his company’s efforts to do just that with its industry-first mobile monitoring solution.

To Cloud or Not to Cloud, That is the Question

August 11, 2014 No Comments

By Joe Caserta, Caserta ConceptsOne of the biggest decisions any business will need to make this year is where to store the company’s data. Is renting space in the Cloud the answer, or is it best to keep data in-house by investing in the appropriate infrastructure? Read More >>>

Context-Aware Security: A Key to Successful BYOD

August 4, 2014 No Comments

by Neal Foster, DELL SoftwareHow can IT give users what they want and protect data assets at the same time? By implementing context-aware security. Context awareness is something most of us practice every day. Read More >>>

Threat Intelligence: The Key to a Complete Vulnerability Management Strategy

July 29, 2014 No Comments

Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.

Thunder ADC: 10 Reasons to Select A10

July 28, 2014 No Comments

The A10 Thunder™ ADC product line of high-performance, next-generation application delivery controllers enables customers’ applications to be highly available, accelerated and secure.

The 2014 Application and Service Delivery Handbook

July 28, 2014 No Comments

This is the eight edition of what had previously been called the Application Delivery Handbook.

Data Centers in the Crosshairs: Today’s Most Dangerous Threats

July 28, 2014 No Comments

This paper analyzes the top five most dangerous threats to your data center.

How to do SIEM on a Shoestring Budget

July 28, 2014 No Comments

by Nicole Pauls, SolarWindsSecurity information and event management (SIEM) software can seem like the perfect solution to smaller IT shops where resources are at a premium and where IT pros are constantly asked to do more with less. However, the reality they encounter is often anything but. Read More >>>

Assessing the Cloud to Find its Silver Lining

July 24, 2014 No Comments

by Russ Loignon, TangoeBusiness moves at the speed of light, and the ability to stay competitive in today’s global workplace dictates that enterprises rely on the technology available today, yet be prepared to adapt quickly for future technologies. Read More >>>

Globalizing the Continuous Delivery Pipeline

July 23, 2014 No Comments

by Rob Vandenberg, LingotekThanks to trends like BYOD and cloud computing, devops now works together as a unified organization, rather than throwing code over an invisible wall. It’s a necessary and timely evolution—especially for today’s sophisticated global IT environments. Read More >>>

Charting Your Analytical Future- BI Reporting and Dashboard Webinar

July 17, 2014 No Comments

Everyone needs BI reports and dashboards, but not everyone wants the same information. Learn how incorporating other analytical capabilities can increase the value of your reports and dashboards.

Stream vs. Batch Processing – Which One is the Better Business Operations GPS?

July 10, 2014 No Comments

by Dale Skeen, VitriaMany organizations across industries leverage “real-time” analytics to monitor and improve operational performance. Essentially this means that they are capturing and collecting data in lots from various systems and analyzing it in batches through periodic on-demand queries. Read More >>>

State of the Art Availability: IBM X6

July 9, 2014 No Comments

Join us to hear Dan Olds, Founder of Gabriel Consulting discuss how new technology from IBM System x, featuring Intel Xeon processors push availability to new heights providing business with the system reliability they need for their mission critical workloads.

How can Big Data cross the Oceanic Gap?

July 2, 2014 No Comments

By Yves de Montcheuil, TalendBig data technologies are definitely California-born. The Internet giants invented Hadoop and most NoSQL databases. Over the years, adoption has spread from “new economy” companies to almost all industries. Read More >>>

Where Do You Fall Within the Data Protection Divide?

July 1, 2014 No Comments

Ipswitch recently conducted a survey of more than100 IT professionals unveiling that employees feel an overwhelming sense of personal responsibility to protect corporate information or data. While accountability was high (84 percent) from an individual standpoint, 42 percent of respondents indicated that their organization does not mandate methods for securely transferring corporate files or have an automated system in place to mitigate the risk of human error.

ADVERTISEMENT

Gartner Identity & Access

TDWI World Conf San Diego

Red Hat JBoss Busines Automate

ACI Customer Experience Management Summit

ManageEngine

ITBriefcase Comparison Report

IBM Data