Inside the Briefcase

Briefcase Highlights


To Converge or to Hyperconverge: Why Not Both?

August 24, 2016 No Comments

It’s no big news that enterprise data center environments are in the midst of multiple transformations. Intersecting trends like mobile, Big Data, advanced virtualization and cloud computing have caused many IT organizations to rethink how they can deliver their IT services faster, better and more affordably to both internal and external users. As part of these efforts, many have chosen to redefine their data center’s traditional hardware “stack” of underlying compute, network and storage resources. This involves the increasing use of converged infrastructures (CI) and hyperconverged infrastructures (HCI).

The Three Pillars of Successful SSH User Key Management Projects

August 24, 2016 No Comments

Whenever I visit customers who are seeking to get SSH user key and access management challenges under control, I see them approaching the issue from one of the three angles. The project is being led as an extension of a cryptography team, which may already be managing certificates and other PKI related issues, or the issue is being addressed as an extension of a privileged access management project or, in some cases, I see customers attempting to address the issue as part of their configuration management system processes.

ESG Lab Review: IBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments

August 22, 2016 No Comments

This ESG Lab Review documents remote hands-on testing of IBM Spectrum Protect solutions for virtual environments.

ESG Lab Validation Report: IBM Spectrum Protect – Simplified Data Protection for the Modern Enterprise

August 22, 2016 No Comments

This ESG Lab Validation documents remote hands-on testing of IBM Spectrum Protect.

Ten ways to save money with IBM data protection

August 22, 2016 No Comments

This white paper describes 10 ways that IBM data protection solutions can help organizations save money while addressing mod- ern data protection challenges.

Prefabricated or ISO container – which way for ultimate data centre flexibility?

August 22, 2016 No Comments

It is clear that traditionally built brick and mortar ultra-high performance data centres in African environments are increasingly a thing of the past. Prefabricated facilities represent the future of data centre design worldwide. That said, what exactly is a prefabricated data centre?

How Modern BPM Can Transform Your Business

August 18, 2016 No Comments

Business transformation isn’t about going digital; it’s about empowering people to work at their best in a digital world. Modern BPM is what makes that possible.

Three Practical Ideas That You Can Action Upon To Build Links

August 18, 2016 No Comments

As every marketer knows, it is extremely important to generate inbound links not only for directly generating inbound traffic but also to become more visible to search engines that factor in the number and quality of such links to arrive at a search page ranking. Among the more popular ways of creating backlinks is to promote guest blogging. Consistent blogging can lead to the generation of almost double the organic links that would have otherwise been generated.

Hybrid IT and the Database: The Key to Cost Savings is Performance

August 16, 2016 No Comments

With hybrid IT paving the way to the cloud, organizations have more options than ever before to provision and deploy workloads in a way that will best benefit business and end-users. However, IT budgets are expected to decrease throughout this year, according to Gartner, and as IT professionals look for the best place to host their application workloads—whether on-premises, in the cloud or both—it is critical to strategize around maximizing available funds to realize the full benefits of a hybrid approach and leave money for other important projects.

The Challenge of Binding the SDN Evolution

August 11, 2016 No Comments

According to research from Ericsson, we’re on pace for 50 billion connected devices by 2020. Underpinning this Internet of Things ecosystem will be a sea of fixed and wireless networks that require the flexibility to deal with a huge diversity of use cases, network resiliency demands, and operating models. And yet the IoT represents just one of many applications that Software Defined Networking may well be called upon to address (and at the moment, the technology is still very much in an early stage of adoption).

IDC Report: Achieving Flash Storage Nirvana

August 10, 2016 No Comments

This IDC Flash discusses Nimble Storage’s introduction of an all-flash array (AFA), the AF-Series, as an addition to the company’s already very successful CS-Series line of hybrid-flash arrays (HFAs), on February 23, 2016. This Flash discusses Nimble’s entry into the AFA space and updates IDC’s view of the company’s competitive position in the overall enterprise storage market, based on this announcement.

Whitepaper: Can Machine Learning Prevent Application Downtime?

August 10, 2016 No Comments

Business users expect immediate access to data, all the time and without interruption. But reality does not always meet expectations. IT leaders must constantly perform intricate forensic work to unravel the maze of issues that impact data delivery to applications. This performance gap between the data and the application creates a bottleneck that impacts productivity and ultimately damages a business’ ability to operate effectively. We term this the “app-data gap.”

eBook: Overcoming the Obstacles to the All Flash Data Center

August 10, 2016 No Comments

Achieving the all flash data center is like climbing a mountain: it takes planning, organization and hard work— but it doesn’t have to be painful. If you’re ready to set out for the summit, keep reading.

Video: Nimble Storage InfoSight Redefines IT Infrastructure Management

August 10, 2016 No Comments

Every four hours, InfoSight collects and analyzes more sensor data points from our customers’ arrays than there are stars in our galaxy. Predictive Analytics are then used to correlate vast amounts of information to find the needle in the haystack and solve your most complex issues. It’s like having an army of IT experts keeping your infrastructure running perfectly, 24×7, without you lifting a finger!

InfoSight Report: Can Machine Learning Prevent Application Downtime

August 10, 2016 No Comments

Nimble Labs report outlining the top causes of the app-data gap.

Mind the Gap Study – Oxford Economics

August 10, 2016 No Comments

“Mind the Gap” study reveals the impact of application performance delays on company performance and financial results.

What Makes a Great Business App?

August 9, 2016 No Comments

If your apps are not easy, they will take too long to build…never be adopted…never be up-to-date…And they will never reach their potential.

The App-Data Gap Infographic

August 9, 2016 No Comments

Developing an app is an exciting and innovative process. But what happens when mistakes aren’t caught in time, and the app’s already been released?

Global Load Balancing: A Reliable Solution for Conquering Cloud Computing Challenges

August 8, 2016 No Comments

Want to ensure that your systems remain up and running smoothly all the time? Is downtime making it difficult for you to align your computing resources with growing business demands? If you are managing multiple data centers and have a cluster of servers then employing a load balancing software will divert all your incoming connections to the healthiest cluster while ensuring compliance with region-specific laws. The benefits of global load balancing extend across several app deployments offering an end-to-end view into delivery and SLAs for the efficient handling of workloads and improved end-user experience.

Finding the Right Fit in the Crowded Container Platform Market

August 4, 2016 No Comments

In other words, there doesn’t have to be one supreme ruler of this landscape. And that’s fine. Think about any other technology sector out there – there are always multiple solutions in every space. The same goes for container technology. When you create something that is super scalable, the drawback is that it’s not going to be a one-size-fits-all approach. However, one person’s drawback is another person’s advantage.

Shifting Tides in ERP Spending Focuses More On Customer Delight

August 2, 2016 No Comments

The EPR market across different countries has observed an average of about 12% growth, each year since 2007. Current economic slowdown, will affect the growth pattern of this sector negatively. However, research analysts at Allied Market Research (AMR) reveal that investing in ERP would be a safe bet as the overall trend would sustain. For those worried about Eurozone crises will be glad to know that the EPR industry will bounce back surprising as soon as the quandary subsides, explain AMR researchers eyeing the growth, share and size of the sector.

Gartner Report: Critical Capabilities for Wired and Wireless LAN Access Infrastructure

August 1, 2016 No Comments

Does your wired or wireless LAN access solution have the right capabilities for your enterprise? See how Gartner ranked 14 vendors in six common enterprise use case scenarios in this report.

Three Key Ways Big Data and HPC are Joining Forces

August 1, 2016 No Comments

Big data is becoming much more than just widespread distribution of cheap storage and cheap computation on commodity hardware. Big data analytics may soon become the new “killer app” for high performance computing (HPC).

IT Briefcase Exclusive Interview: The Rise of Machine Learning Analytics

July 28, 2016 No Comments

with Jerry Melnick, SIOSIn this interview, SIOS Technology President and CEO Jerry Melnick speaks with IT Briefcase about optimizing infrastructure operations and application performance in complex VMware environments. Read More >>>

3 Productivity Killers That Wreak Havoc On Your Workflow

July 28, 2016 No Comments

Automation, cloud technology, and mobile business solutions are the latest tech tools in the corporate arsenal for streamlining operations, improving efficiency, and holding the line on skyrocketing costs. The proliferation of content management systems (CMS), customer relationship management (CRM), marketing automation, and integrated applications reflect the widespread belief that companies who embrace innovative business tools will gain a competitive advantage in the marketplace.

Best Tips from Remote DBA Experts to Help Keep Your Business Data Safe

July 28, 2016 No Comments

Keeping your business data safe is crucial to the success of your business. The last thing you want is for your competitors to gain insight into your product secrets or for sensitive client information to be leaked. Protecting your data is not only important to the success of your business but can also keep you from hefty fines and lawsuits. How can you keep your data safe? This post looks at a couple of things you need to use in order to keep your business data secure.

Why Python for Big Data – Remote DBA Experts Explain

July 25, 2016 No Comments

Python has evolved over the years to become one of the most loved open source language by programmers. Among the many reasons for this is its flexibility, ease in using and its massive library that provides for powerful data analysis and manipulation. Thanks to the simple syntax and easy compilation feature, Python has reduced the development time by 50%.

When it Comes to DNS, Redundancy is a Good Thing

July 25, 2016 No Comments

Business used to be simpler. It used to be possible—in fact, it was the norm—for enterprises to run their Domain Name Service (DNS) from just one data center. They placed their servers within its confines and went on their way without a care. After all, if their one data center went down, the DNS server would be useless.

Why containers – why now?

July 21, 2016 No Comments

In retrospective – the key desired goals for consolidation, CAPEX and OPEX optimization, have not been met. In fact, it can be said that consolidation contributed to VM sprawl and in many cases worsened performance issues. Container technology has been around for a few years and in fact, heavily used in large scale production by Google.

IT Briefcase Exclusive Interview: Decoding Encryption with Sophos’ Dan Schiappa

July 21, 2016 No Comments

with Dan Schiappa, SophosIn this interview, Dan Schiappa, senior vice president and general manager of Enduser Security Group at Sophos, outlines some of the current IT security topics being addressed by businesses today. Read More >>>


Gartner Catalyst Conference San Diego 2016

American Customer Festival 2016 New York

ITBriefcase Comparison Report

Cyber Security Exchange