Inside the Briefcase


Federating Identities for a Successful Enterprise IdP Deployment

Federating Identities for a Successful Enterprise IdP Deployment

by Lisa Grady, Radiant Logic
When customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security...

The New Rhythm of IT: 5 Hurdles to Overcome in 2014

The New Rhythm of IT: 5 Hurdles to Overcome in 2014

by Ken Berryman, BMC Software, Inc.
The Federal Reserve estimates that in 2012 one in six checks were deposited as a digital image rather than in physical form. For consumers, almost 50 percent of these image-based deposits were through...

The Ins and Outs of Secure Fax and Document Delivery Solutions for the Enterprise

The Ins and Outs of Secure Fax and Document Delivery Solutions for the Enterprise

by Bill Ho, Biscom
Data center annual budgets today are often devoted to securing an organization’s IT networks. One of the most important security considerations IT personnel face is the need to protect sensitive information, such as data exchanged...

Protecting Your Data at Each Step of the Networking Path

Protecting Your Data at Each Step of the Networking Path

by Bill Manning, APC by Schneider Electric
As the amount of business critical data grows, the importance of data availability surges – businesses simply cannot afford to lose precious data due to instances of downtime.
Read More >>>

Efficient Data Automation for Financial Firms

Efficient Data Automation for Financial Firms

By Jim Manias, Advanced Systems Concepts
For modern companies, apps and systems (not pigeons) are carrying the data, and it falls on IT to be sure this movement happens quickly and accurately.Timeliness and efficiency in the delivery of...

To Cloud or Not to Cloud, That is the Question

To Cloud or Not to Cloud, That is the Question

By Joe Caserta, Caserta Concepts
One of the biggest decisions any business will need to make this year is where to store the company’s data. Is renting space in the Cloud the answer, or is it best to...

How can Big Data cross the Oceanic Gap?

How can Big Data cross the Oceanic Gap?

By Yves de Montcheuil, Talend
Big data technologies are definitely California-born. The Internet giants invented Hadoop and most NoSQL databases. Over the years, adoption has spread from “new economy” companies to almost all industries.
Read More >>>

Where does Security fit in DevOps?

Where does Security fit in DevOps?

By Eric Minick and Diana Kelley, IBM
Organizations are under increased pressure to continuously create and deploy innovative products, software, and apps. This added pressure makes it increasingly important to embed security throughout the entire development process.




Briefcase Highlights


Fresh Ink

It’s Time to Go All-in on the Cloud

October 22, 2014 1 Comment

By Joe Manuele, AvayaToday, enterprises and their IT departments are migrating to cloud services faster than ever before. In fact, no other technology in our industry is associated with such dramatic triple-digit growth as cloud. By 2020, the cloud computing industry will be a $40 billion market. Read More >>>

Fishing for Data in a Digitalized Tourism Industry

October 22, 2014 No Comments

By Yves de Montcheuil, TalendAmong the most digitalized industries, travel and hospitality is changing fast. Travel agents, airlines, airports, hotel chains – the entire industry is fishing for value in a seemingly-unlimited ocean of data. Read More >>>

The Internet of Things Won’t Take Off Until These 3 Things Happen

October 15, 2014 No Comments

by Rob Vandenberg, Lingotekf your smartphone can’t read your mind yet, it will soon. Innovators and early adopters are sprinting towards the dream of a connected world, connecting everything from cars to toasters. Their exuberance is contagious. Read More >>>

Federating Identities for a Successful Enterprise IdP Deployment

October 15, 2014 No Comments

by Lisa Grady, Radiant LogicWhen customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security but also productivity and simplicity for your users. Read More >>>

The New Rhythm of IT: 5 Hurdles to Overcome in 2014

October 8, 2014 No Comments

by Ken Berryman, BMC Software, Inc.The Federal Reserve estimates that in 2012 one in six checks were deposited as a digital image rather than in physical form. For consumers, almost 50 percent of these image-based deposits were through mobile devices. Read More >>>

The Ins and Outs of Secure Fax and Document Delivery Solutions for the Enterprise

October 8, 2014 No Comments

by Bill Ho, BiscomData center annual budgets today are often devoted to securing an organization’s IT networks. One of the most important security considerations IT personnel face is the need to protect sensitive information, such as data exchanged within the healthcare, financial, and legal sectors. Read More >>>

Data Back-up vs. Replication vs. Disaster Recovery

October 1, 2014 No Comments

by Ken Donoghue, Peak 10We often hear the three concepts expressed in the title above used interchangeably. For example, it’s not uncommon for someone to say, “I have a disaster recovery (DR) plan. We back up our files once a day.” Or, “We replicate our data to tape and store it offsite.” Read More >>>

Guiding Customer Relationships with an Integrated IT Approach

September 29, 2014 No Comments

by Dennis van der Veeke, SDLThere is no denying that brands have taken an increased interest in technology for marketing efforts. In fact, Gartner reported earlier in the year that 81 percent of organizations now have the equivalent of a chief marketing technologist position. Read More >>>

Protecting Your Data at Each Step of the Networking Path

September 18, 2014 No Comments

by Bill Manning, APC by Schneider ElectricAs the amount of business critical data grows, the importance of data availability surges – businesses simply cannot afford to lose precious data due to instances of downtime. Read More >>>

The Four Phases of Cloud Optimization

September 12, 2014 No Comments

with Joe Kinsella, CloudHealthSeveral years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to over $350K. Read More >>>

How far is too far when it comes to outsourcing IT?

September 8, 2014 No Comments

with Mike Decker, Annese & Associates, Inc.With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in Telecommunications, I started my career inside a NOC located in the basement of a major bank in Buffalo, NY. Read More >>>

8 Things You Need to Do Before, During, and After Migrating to Office 365

September 4, 2014 No Comments

with Robert Berlin, OneLoginWith Windows Server 2003 hitting its end of life next year, the push is on for even faster migration. But the path is a complex one, and careful planning will be your best friend. Having spent a number of years helping customers along this road, here are my top tips for a safe journey. Read More >>>

Does your Company Really Need BPM?

September 3, 2014 1 Comment

with Mac McConnell, BonitaSoftDoes everybody need BPM? Are there companies out there that would have no use for the kinds of solutions we provide? Hate to say it, but there might be a few. In the spirit of a Letterman “Late Show Top 10” list, here are 8 types of companies that simply don’t need BPM.Read More >>>

You Can’t Win the Data Loss Blame Game – So End It

September 3, 2014 No Comments

By Omer Eiferman, CellroxIn a world of desktops, tracking data leaks was much easier. If an employee digitally leaked corporate data or insider information, IT could usually pin down when and where it happened. However, with personal smartphones now being used for business, the blame game is not so simple. Read More >>>

Efficient Data Automation for Financial Firms

August 26, 2014 No Comments

By Jim Manias, Advanced Systems Concepts For modern companies, apps and systems (not pigeons) are carrying the data, and it falls on IT to be sure this movement happens quickly and accurately.Timeliness and efficiency in the delivery of relevant data translates into increased revenues and reduced risks for all financial firms. Read More >>>

To Cloud or Not to Cloud, That is the Question

August 11, 2014 No Comments

By Joe Caserta, Caserta ConceptsOne of the biggest decisions any business will need to make this year is where to store the company’s data. Is renting space in the Cloud the answer, or is it best to keep data in-house by investing in the appropriate infrastructure? Read More >>>

Context-Aware Security: A Key to Successful BYOD

August 4, 2014 No Comments

by Neal Foster, DELL SoftwareHow can IT give users what they want and protect data assets at the same time? By implementing context-aware security. Context awareness is something most of us practice every day. Read More >>>

How to do SIEM on a Shoestring Budget

July 28, 2014 No Comments

by Nicole Pauls, SolarWindsSecurity information and event management (SIEM) software can seem like the perfect solution to smaller IT shops where resources are at a premium and where IT pros are constantly asked to do more with less. However, the reality they encounter is often anything but. Read More >>>

Assessing the Cloud to Find its Silver Lining

July 24, 2014 No Comments

by Russ Loignon, TangoeBusiness moves at the speed of light, and the ability to stay competitive in today’s global workplace dictates that enterprises rely on the technology available today, yet be prepared to adapt quickly for future technologies. Read More >>>

Globalizing the Continuous Delivery Pipeline

July 23, 2014 No Comments

by Rob Vandenberg, LingotekThanks to trends like BYOD and cloud computing, devops now works together as a unified organization, rather than throwing code over an invisible wall. It’s a necessary and timely evolution—especially for today’s sophisticated global IT environments. Read More >>>

Stream vs. Batch Processing – Which One is the Better Business Operations GPS?

July 10, 2014 No Comments

by Dale Skeen, VitriaMany organizations across industries leverage “real-time” analytics to monitor and improve operational performance. Essentially this means that they are capturing and collecting data in lots from various systems and analyzing it in batches through periodic on-demand queries. Read More >>>

How can Big Data cross the Oceanic Gap?

July 2, 2014 No Comments

By Yves de Montcheuil, TalendBig data technologies are definitely California-born. The Internet giants invented Hadoop and most NoSQL databases. Over the years, adoption has spread from “new economy” companies to almost all industries. Read More >>>

Harnessing the Power of Smarter IT Infrastructure to Increase Efficiency

June 30, 2014 No Comments

By Alex Yost, IBMThe US Energy Information Administration expects global energy use to increase 56 percent between 2010 and 2040 – the equivalent of 4,000 power plants. But not all that energy will be put to good use. Much of it will be lost through inefficient systems and processes.Read More >>>

Where does Security fit in DevOps?

June 24, 2014 No Comments

By Eric Minick and Diana Kelley, IBMOrganizations are under increased pressure to continuously create and deploy innovative products, software, and apps. This added pressure makes it increasingly important to embed security throughout the entire development process. Read More >>>

Top Tips for an Effective Cloud Migration

June 11, 2014 No Comments

By Sarah Lahav, SysAid TechnologiesFor organizations built on in-house IT solutions, making too many changes too quickly can introduce unknown risks and frustrate end users who need to learn new software. The transition to the cloud therefore calls for a strategy. Read More >>>

Business Continuity Meets the Cloud: Protecting Your Reputation in the Always-on World

June 11, 2014 No Comments

By Laurence Guihard-Joly, IBMNot so long ago, a system outage equaled a forced recess for employees while a member of the IT team rebooted a server. There were consequences of course including the loss of data, inconvenienced customers, angry managers and more. Read More >>>

How Greed, Generosity and the Defense of Civil Liberties Can Put Your Data at Risk

June 10, 2014 No Comments

By Cam Roberson, Beachhead SolutionsSome human traits are security hazards – but not always because they are faults. As a matter of fact, some traits directly and deliberately engineer situations in which data leaks are more likely. Read More >>>

IT Briefcase Exclusive Interview with Pete Malcolm, President and CEO of Power Assure

June 10, 2014 No Comments

with Pete Malcolm, Power AssureNumerous systems management software both for IT and facilities have been commonly deployed in data centers. In this interview, Pete Malcolm from Power Assure outlines top trends in data center management today. Read More >>>

3 Tips for Deploying “Systems of Engagement” Practices for the Benefit of your Customers

June 6, 2014 No Comments

by Mac McConnell, BonitaSoftOne unintended consequence of employing customer-focused software systems is they view the world through a singular lens, which can quickly become a problem. These systems are generally geared toward providing general information to the users, without necessarily including recommendations for action. Read More >>>

The Most Common Governance Mistakes in SharePoint and How to Avoid Them

June 5, 2014 No Comments

by Steve Marsh, Metalogix Defining governance is not easy and many organizations skip this task and move forward without a clear understanding or plan for what governance means. So when SharePoint administrators have to enact ill-defined governance, mistakes inevitably follow. Read More >>>

ADVERTISEMENT

Gartner Identity & Access

Gartner Data Center

Red Hat JBoss Busines Automate

ACI Customer Experience Management Summit

ManageEngine

ITBriefcase Comparison Report

IBM Data