Inside the Briefcase

Briefcase Highlights


With Mozilla Persona on Its Deathbed, Where Is Identity Management Heading?

May 2, 2016 No Comments

Five years ago, Mozilla launched its new identity management system, Persona (originally called BrowserID). At the time, a sense of optimism was in the air. Everyone thought that the new technology would ease the strain of remembering numerous passwords to gain access to various websites. The alternative — outsourcing unified identity management to social media giants including Twitter, Facebook and Google — raised data privacy and reliability concerns. So everyone hoped that Persona would emerge as a strong unified authentication system and a credible alternative.

Forrester Market Overview: Use Project Services To Accelerate Infrastructure Transformation

May 2, 2016 No Comments

The pace of digital transformation and cloud migration is forcing IT professionals to review their current infrastructure and force change to accommodate new business demands brought on by the age of the customer. Many organizations are motivated by fear, such as of the potential business disruption in their industries from new digital startups like airbnb or uber; more optimistically, they’re motivated by the opportunities brought by digital technologies to improve their customers’ experience.

Scale-Out NAS: Best Practices to Implement Tomorrow’s Storage Today

April 29, 2016 No Comments

by Stefan Bernbo, CompuverdeAs the data deluge continues on unabated, vertically scaling legacy approaches to storage are falling short. Organizations need to find a way to store high volumes of data without busting the budget, all while maintaining high levels of performance… Read More >>>

Gartner MQ on Disaster Recovery as a Service

April 29, 2016 No Comments

Among providers of disaster recovery as a service there is wide variance in experience and service quality, together with other key differentiating factors. Data center managers should use this Magic Quadrant to help them evaluate providers of DRaaS services.

13 Essential Log Management Sources: Infographic

April 28, 2016 No Comments

Presented here is a list of log collections and alerts that can help support the infrastructure security of an automated log management system.

Aberdeen Report: What Drives Success for Best-in-Class Product Developers?

April 28, 2016 No Comments

Based on the experiences of 148 respondents, this report will explore what makes a product development company successful. It will look at the differences between the Best-in-Class and their competitors.

6 barriers blocking your success

April 28, 2016 No Comments

This guide will show you how you can positively in uence innovation in your team, department or organization through something you do everyday: learning.

Top Tech Trends in 2016

April 28, 2016 No Comments

To get a sense for what you can expect in 2016, we talked to our course authors, internal experts and customers. We gained some valuable insights into what your team will need to know for the dev, IT and creative industries.

A New Method for Today’s Network Infrastructure

April 26, 2016 No Comments

Network infrastructure today is under increasing pressure from the shifting bandwidth and latency requirements of modern applications. Wide area networks (“WANs”) in particular must address this demand, especially when they use many technologies from a variety of providers, are distributed geographically and suffer strain from the ever-expanding popularity of video and cloud application services. That’s why hybrid WAN architectures with advanced application-level traffic routing are an attractive option; they marry the cost savings of broadband/Internet connectivity for non-critical traffic with the reliability of private lines for critical business applications.

IT Briefcase Exclusive Interview: The rise of cloud application control technology

April 26, 2016 No Comments

with Ed Macnair, CEO, CensorNetIn this interview, Ed Macnair, CEO of CensorNet, speaks with IT Briefcase on how security technologies needs to evolve to meet the challenge and opportunities of cloud computing.Read More >>>

Rugged DevOps: Making Invisible Things Visible

April 26, 2016 No Comments

You might already know them from, but let me introduce you to two of the leading minds in the Rugged DevOps movement: James Wickett and Ernest Mueller. Both James and Ernest are active leaders in the DevOps space, in addition to helping organize events like DevOpsDays Austin and LASCON. Our conversation covered a lot of bases from the founding of Rugged DevOps to aligning organizational silos to lessons learned from W. Edwards Demings.

Customer Best Practices for SAP HANA on IBM Power and SUSE Linux

April 25, 2016 No Comments

In this session, you will learn about how a real cutting edge client has deployed the SAP HANA infrastructure using SUSE Linux and the Power Platform to deliver a value service to their client.

Choose the Right Platform for Your SAP HANA Strategy, from SUSE & IBM

April 25, 2016 No Comments

In this session, you will learn about new, pre-sized IBM Power configurations that are optimized for SAP HANA.

The Big Data Necessity: It’s Here to Stay and You Need to Understand

April 19, 2016 No Comments

One of the biggest challenges in the late 1960s at NASA was figuring out how they were going to store all the telemetry from their spacecraft. Scientists and astronauts knew this information would be crucial to not only the current mission but future missions. The problem was they just didn’t have the storage capacity to capture it all.


Four Trends for Data Centres in 2016

April 15, 2016 No Comments

The proliferation of smart handsets, constant roll out of new applications and the on-going expansion of mobile networks into previously under- or entirely un-served communities in developing regions like Africa is driving exponential data growth that shows no signs of abating any time soon. To cope with this data boom, increasing numbers of new mega data centers are being built by the Internet giants and we expect this trend to continue.

Interview – The DevOps Equation: Agility + Empathy = Quality

April 12, 2016 No Comments

I had the chance to catch up with Jeff Sussna ahead of his keynote address on continuous design, scheduled for DevOpsDays Atlanta, April 26-27. Jeff discussed the importance of designing for service, responding to the unexpected, and the importance of building empathy across teams.

Redbook: Make Your System Highly Available and Recoverable Using PureApplication System

April 7, 2016 No Comments

This IBM® Redbooks Solution Guide describes how to use the strategies and the capabilities of IBM PureApplication® System to provide system high availability (HA) and disaster recovery (DR).

Redbook: Implementing High Availability and Disaster Recovery in IBM PureApplication Systems V2

April 7, 2016 No Comments

This IBM Redbooks publication describes and demonstrates common, prescriptive scenarios for setting up disaster recovery for common workloads using IBM WebSphere Application Server, IBM DB2, and WebSphere MQ between two IBM PureApplication System racks using the features in PureApplication System V2.

Understanding Patterns of Expertise: Virtual Application Patterns

April 7, 2016 No Comments

This article offers a gateway of understanding into the IBM PureSystems™ family of expert integrated systems by providing a tour of the structure of the PureApplication System and virtual patterns of expertise.

Payment Security Best Practices

March 31, 2016 No Comments

Accepting a variety of payment forms — including credit and debit cards, and mobile and Web-based payments — is beneficial to all business owners. Not only does payment flexibility give customers the right to choose how to pay, based on the size and nature of their purchase, it can level the playing field between small business owners and well-established competitors.

Faster, Smarter DevOps

March 29, 2016 No Comments

Call it DevOps or not, if you are concerned about releasing more code faster and at a higher quality, the resulting software delivery chain and process will look and smell like DevOps. But for existing development teams, no matter what the velocity objective is, getting from here to there is not something that can be done without a plan.

Are You Equipped to Win the Latest Battle Facing IT?

March 23, 2016 No Comments

Delivering what people expect from their technology while maintaining the secure environment for which IT is responsible. It’s called People-Centric IT as a Service (ITaaS) and this infographic will show you just how effective it can be in resolving your everyday, every way battles.

Through The Looking Glass: Data Visualization and Decision-Making

March 23, 2016 No Comments

Big data is a big deal. Enterprises and small businesses alike are looking for ways to manage this unending flood of information, mine it for actionable insights, and make it a key driver of ROI. Yet with so much data generated moment to moment, it’s easy for IT pros and C-suite executives to get bogged down in the details instead of seeing the big picture. The result? Increased emphasis on data visualization — charts, diagrams and infographics that distil complex concepts down into easily understood, bite-sized pieces. The problem? Not all data visualizations are created equal — here’s how they can all go wrong and how your company can find the right fit.

5 Startling IT Stats for Small Businesses

March 22, 2016 No Comments

In an ever changing economy, businesses need to keep up with the evolution of technology. Luckily, solutions have emerged that allow business owners to outsource their IT efforts. Activities such as IT security, Hosting, IT Support and Data centre infrastructure maintenance can be handed over to an external company who are proficient at what they do. Below is an infographic constructed by Couno that details what small business are missing in this day and age of IT.

Security and Compliance: How Utilities Meet NERC CIP v5 Requirements

March 22, 2016 No Comments

As soon as the global panic incited by the events of September 11, 2001 settled into public sector anti-terrorism initiatives, experts brought to light grave concerns about the security of the nation’s energy infrastructure. Even so, 15 years later, many energy organizations find themselves scrambling to meet the security measures set forth by NERC in their Critical Infrastructure Protection standards (CIP, Version 5). The new, much more comprehensive standards went into effect July 1, 2015, but the looming compliance deadline on July 1, 2016 is the real deal—an enforcement deadline that means auditors are on their way.

4 Desktop Disruptions: The computing Workspace as we know it will never be the same

March 20, 2016 No Comments

This paper will cover four imminent upheavals in end user computing that IT needs to be prepared to address in 2015 and beyond.

What Does a 5G World Mean for the IoT Industry?

March 18, 2016 No Comments

It seems like it wasn’t that long ago when people and businesses alike were excitedly talking about the possibilities and potential that accompanied the introduction of 4G networks. There’s little doubt that 4G has transformed how people use mobile devices and take advantage of internet connections, but already many experts are dreaming of what lies ahead with the fifth generation of mobile networks: 5G. Verizon may introduce the first 5G network as early as next year, while Samsung may show off its own 5G capabilities at the 2018 Winter Olympic Games.

Aberdeen Group Report: Product Development Success = Tools, Talent and Eliminating Waste

March 15, 2016 No Comments

The report, which looked closely at the habits of 148 product design firms, found that the right tools, the right talent, and a focus on eliminating waste in workflow processes are the keys to becoming a “Best-in-Class” product developer.

IT Briefcase Exclusive Interview: Top Skills Needed to Manage Hybrid IT Environments

March 14, 2016 No Comments

with Kong Yang, SolarWindsIn this interview, Kong Yang, Head Geek and technical product manager at SolarWinds, speaks with IT Briefcase on how hybrid environments are changing the role of the IT professional. Read More >>>

SSH User Keys: Strategies for Taking Control

March 10, 2016 No Comments

A common misperception about SSH user key management concerns the need to find and control all the private keys in an environment. The idea here is that, since private keys are like passwords, it’s possible to manage them using the same methods. Once all the private keys are well controlled, safety has been achieved. What may initially seem like common sense does not hold up under inspection.


Women in Technology Summit San Jose

TDWI Orlando 2015

Gartner Identity & Access Management Summit

Gartner Data Center Las Vegas

ITBriefcase Comparison Report

Cyber Security Exchange