Inside the Briefcase






Briefcase Highlights


DATA and ANALYTICS 

Taking a Data First Approach to Real Time Applications

June 30, 2016 No Comments

Leading companies that are getting the most out of their data are not focusing on queries and data lakes, they are actively integrating analytics into their operations. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency and rely on a variety of data sources. In fact, real time is at the foundation of many transformational applications.

Recruiting Software: A Game Changer for Small Business

June 28, 2016 No Comments

Finding top talent has become something of a surgical process in the modern tech era. Fortunately, recruitment tools have come of age. With numerous helpful features and putting an organized spin on recruitment efforts, the benefits of operating with recruitment software far outweighs flying blind as an employer. To help you better appreciate why recruitment software is right for your small business hiring needs, here are a few points to consider.

Four Ways to Boost IT Performance with Application-Aware Network Performance Monitoring

June 28, 2016 No Comments

In an era of unified IT, you can no longer afford to take a silo-based approach to monitoring and troubleshooting IT problems. It’s time for network engineers, server admins and application engineers to expand beyond their particular domains and department-specific tools. It’s time to embrace a new, integrated approach to network and application monitoring that lets you view your entire IT infrastructure from a single console and resolve issues before they affect end users. It’s time for applications-aware network performance monitoring (AANPM).

Choosing IaaS Or A Cloud-Enabled Managed Hosting Provider?

June 27, 2016 No Comments

We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a Cloud IaaS or SaaS provider with that of a Cloud-Enabled Hosting Provider. These types of providers are very different and while each services a particular need effectively and efficiently; by no means should their solutions be compared from a price perspective. A simple illustration is when the costs of Azure or AWS are compared with those of a true Cloud-Enabled Hosting Provider.

Don’t Let Scattered Information Destroy Your Business

June 20, 2016 No Comments

The disorganization of information presents a serious challenge for businesses, one that can have a significant impact. With data located in multiple locations, both on-premises and in the cloud, the potential is high for inefficient processes, and use of time and money. Finding a way to combat this burden is a key component to success.

Prefabricated Construction or Traditional Build for Ultra-High Performance Data Centres?

June 16, 2016 No Comments

The modern datacentre is a fully integrated machine. Systems that previously simply co-existed under the same roof are now expected to work seamlessly together; With the growing importance of DCIM (data center infrastructure management), ultra fine-tuning of a data centre’s performance is the new norm.

Bioinformatics Market is Expected to Reach Revenue of $12.8 Billion Globally by 2020

June 16, 2016 No Comments

Allied Market Research, today published a new market research report titled “Bioinformatics Market As per the study, the global Bioinformatics market was valued at$3.4 billionin 2013, and it is expected to reach$12.8 billionby 2020. The market is expected to grow at a CAGR of 21.2% during 2014-2020.

Harnessing the Power of Agile: Why Your Organization Needs a Modern Requirements Tool

June 13, 2016 No Comments

The technology to support Agile requirements has undergone significant transformation in the past few years. Yet many organizations aren’t aware of all of the capabilities that best of breed Agile requirements tools possess. That includes visualization, collaboration, reuse and management analytics.

How Real Time Analytics Wall Boards Help Contact Centres Control Performance

June 9, 2016 No Comments

Contact centres are truly crucial to many businesses, as a way to give customers a quick and easy way to get answers from a real person when they experience problems or want to make changes to their service accounts. The more successful the business, the higher the demand for their contact centres, and the more a bad customer experience could impact their brand’s reputation. Many organisations who have deployed Skype for Business or Lync as their Unified Communications platform are also using the basic contact centre functionality presented through the use of Response Groups.

Storage Infrastructure Strategies for Successful SaaS Businesses

June 8, 2016 No Comments

The cloud’s momentum just keeps building, as seen by Amazon’s recent quarterly financial performance, aided by its fast growing Amazon Web Services business – which offers public cloud infrastructure. The company also announced that April was its most profitable quarter since the company started 22 years ago. With all this in mind, offering public cloud infrastructure has become a big business. Not only has it boosted Amazon, but also Microsoft with its Azure business.

SIEM in the Age of Digital Transformation, Part 2

June 7, 2016 No Comments

In the first of this two-part series, we examined the current SIEM market and factors to consider before selecting a SIEM solution for your network. The second article focuses on what it means to have cybersecurity through visibility, as well as how advanced threat detection, threat intelligence integration and other elements can spell success or disaster for your SIEM strategy.

Top 5 Big Data Misconceptions

June 6, 2016 No Comments

Big Data is a game-changer that has already transformed specific business functions, and further applications of Big Data-driven analytics are expected to continue to take the world by storm over the next few years, utterly changing the way data is used and consumed. A huge number of companies today are sitting on massive amounts of data coming from multiple sources, including point-of-sale information, digital and social data, mobile/app data, financial data, research data and other information sources.

IT Briefcase Exclusive Interview: Rethink and Replace VPNs with Workspace-as-a-Service Solutions

June 6, 2016 No Comments

with Jon Senger, VertiscaleIn this interview, Jon Senger, co-founder and CTO of Vertiscale, speaks with IT Briefcase about the weaknesses of VPN-based remote access solutions and describes how new cloud-based Workspace-as-a-Service platforms support much higher levels of data security along with vastly greater convenience for end-users. Read More >>>

Shifting Left: Knowledge Centered Support for Improved Customer Service

June 6, 2016 No Comments

Reaching customers more efficiently. Educating users on the use of product and features. Engaging in conversations time and time again, covering the same ground. How best to bottle these conversations up and provide the best and most relevant information to the right users when they need the most appropriate information.

OWASP Top 10 & Open Source Code: Why Watching Your Back Means Watching Everyone Else’s

June 6, 2016 No Comments

At times, being a developer can feel a little bit like being back in school and getting partnered up on projects. You would work your butt off, fastidiously checking and rechecking your part of the assignment until you’re sure it’s perfect only to show up at school on Monday and find that your partner hasn’t fulfilled his end of the deal. And there goes the project.

Continuous Delivery: The Atlassian Way

June 2, 2016 No Comments

Sonatype’s Mark Miller (@TSWAlliance) caught up with Developer Advocate Ian Buchanan (@devpartisan) for our 2016 DevOps Leadership Series to discuss his experiences at Atlassian, including continuous delivery, ChatOps, and use of tools like Bamboo, Nexus, Puppet, and Datadog. We captured it on video https://www.youtube.com/watch?v=MgRaYKHGqeQor you follow our discussion below.

IT Briefcase Exclusive Interview: Data Migration with Globanet

June 1, 2016 No Comments

with Globanet In this interview, Globanet discusses how data migration industry has matured with Enterprise Class offerings, and in what ways clients are now trying to find the right technology to meet their requirements now and for years to come. Read More >>>

Best Practices for Efficiently Preventing and Managing Incidents

May 26, 2016 No Comments

There are few things worse for an IT Operations executive than a mission-critical application outage. The operations team must address it immediately, and as the clock ticks, the bottom line shrinks. The pressure is on to reduce the mean time to repair (MTTR), but when the application is up again, it’s time to consider how this fire drill could have been avoided.

SIEM in the Age of Digital Transformation

May 26, 2016 No Comments

As digital transformation and the Internet of Things (IoT) gain momentum, enterprises will be exposed to new forms of incoming data and external connections that can potentially create pinholes in existing network security environments. Meanwhile, network and security operations teams are struggling to gain visibility into the landscape while attempting to manage and secure any number of moving endpoints and analyze trends and anomalies in real time – a monumental challenge, to say the least.

Finding Value in Your Unstructured Data

May 24, 2016 No Comments

It can be a challenge to find value in data that’s without structure. Rather than let this information sit unused in a dark silo, enterprises can gather valuable customer insights with a bit of out-of-the-box thinking and the right tools for the job. Not only is data left ‘in the dark’ a waste of company resources given the ever-increasing costs of data storage, it defeats the purpose of collecting customer information entirely if not capitalized on to further company-wide action.

It’s 12 O’Clock – Do You Know Where Your Data Is?

May 23, 2016 No Comments

It’s estimated that 90 percent of the world’s data has been created in the last two years. Data is flowing in a virtual avalanche that will likely only continue in volume and speed. It flows between colleagues and work groups and among the proliferation of network and cloud repositories. The ease and convenience of data sharing today means that your sensitive data could be anywhere. Collaboration is a pivotal component of business, but it must be tempered by the need for data protection.

Six Things You Didn’t Know About Your Company’s Cloud Apps

May 23, 2016 No Comments

When building a cloud app security strategy, it’s easy for most IT leaders within a company to assume that blocking all risky file sharing apps is the answer. It’s an understandable assumption to make, given that 91 percent of apps aren’t enterprise-ready and lack in important areas like security and privacy, according to Netskope’s latest cloud report.

Why Simplicity is Key to Scale

May 23, 2016 No Comments

That one sentence can strike a sense of helplessness – or even fear – into the hearts of technology executives everywhere. And it should, because changes in technological approaches can be time consuming, expensive and may even require breaking down years and years of legacy processes and equipment—not to mention the headaches that arise with the implementation of new technology.

How To Do Enterprise Security like Bond…James Bond

May 17, 2016 No Comments

In the era of crippling state-sponsored hacks, cybercrime rings and data breaches, businesses are looking at all forms of preventative measures to keep attackers at bay. Even a modern-day James Bond would find it challenging to keep his data, and identity, a secret in the Information Age. And unlike in the famous films, the real-life ‘villains’ capable of stealing trade secrets, personal information and other forms of sensitive data are oftentimes anonymous and numerous. Reports estimated more than 317 million new pieces of malware were created within 2015 alone. Imagine what they can do today!

IT Briefcase Exclusive Interview: Understanding the Evolution of Enterprise Mobility

May 16, 2016 No Comments

with Wes Gyure, IBM SoftwareIn this interview, Wes Gyure, MaaS360 Portfolio Offering Manager, IBM, helps us understand the evolution of enterprise mobility and the challenges organizations are facing as they look to enable their mobile workforce. Read More >>>

Big Data And E-Commerce: Making The Most Of New Insights

May 13, 2016 No Comments

The e-commerce market is growing, averaging a 250-percent increase per year. However, just 8 percent of all product page traffic converts to sales — in other words, it’s still a challenge for retailers to move past the research stage and convince users to “buy now.” One way to improve e-commerce is through the use of big data. Here’s a look at how you can leverage new insights to boost your bottom line.

The Ins and Outs of TLS Encryption

May 11, 2016 No Comments

Transport Layer Security (TLS) is a protocol that offers a high level of security to help authenticate and encrypt information between a client and server for both inbound and outbound email (and website) traffic. Encryption protocols such as TLS help create secure connections for communications that must transfer across unsecured networks. Although there are others, SSL and TLS are two of the most popular security protocols of their kind.

Using Big Data in Small Ways for Huge ROI in SEO

May 10, 2016 No Comments

We create 2.5 quintillion (a trillion billion) data bytes every day. And, 90 percent of the data in the world was created in just the last few years. Big Data has become so big that we need new avenues of artificial intelligence research, such as machine learning and natural language processing, to begin to sort out the information. Current Big Data technology, such as Hadoop and Big Data SQL, allows users to process and understand data better.

Webcast: The Phantom Identity Menace

May 10, 2016 No Comments

Attackers are moving away from direct assault, and instead are hijacking and exploiting user credentials to thwart security tools, and gain easy access to business data. How can you strike back and stop breaches that attack your users far, far away?

Webcast: They have all our passwords. It’s time for MFA everywhere.

May 10, 2016 No Comments

Let’s face it. With so many credentials having been compromised and made available to attackers, password-based security is no longer effective. We know that eliminating passwords is the right thing to do, but that takes time, and the bad guys are already inside our networks.

ADVERTISEMENT

Women in Technology Summit San Jose

TDWI Orlando 2015

Gartner Identity & Access Management Summit

Gartner Data Center Las Vegas

ITBriefcase Comparison Report

Cyber Security Exchange