Inside the Briefcase


Efficient Data Automation for Financial Firms

Efficient Data Automation for Financial Firms

By Jim Manias, Advanced Systems Concepts
For modern companies, apps and systems (not pigeons) are carrying the data, and it falls on IT to be sure this movement happens quickly and accurately.Timeliness and efficiency in the delivery of...

To Cloud or Not to Cloud, That is the Question

To Cloud or Not to Cloud, That is the Question

By Joe Caserta, Caserta Concepts
One of the biggest decisions any business will need to make this year is where to store the company’s data. Is renting space in the Cloud the answer, or is it best to...

How can Big Data cross the Oceanic Gap?

How can Big Data cross the Oceanic Gap?

By Yves de Montcheuil, Talend
Big data technologies are definitely California-born. The Internet giants invented Hadoop and most NoSQL databases. Over the years, adoption has spread from “new economy” companies to almost all industries.
Read More >>>

Where does Security fit in DevOps?

Where does Security fit in DevOps?

By Eric Minick and Diana Kelley, IBM
Organizations are under increased pressure to continuously create and deploy innovative products, software, and apps. This added pressure makes it increasingly important to embed security throughout the entire development process.

Sabermetrics for the Data Center

Sabermetrics for the Data Center

by Dave Wagner, TeamQuest
Today, cost-effective and winning teams today are being built by integrating holistic understandings and measurements that look to yield a result greater than the sum of the parts -- measuring what matters.
Read...





Briefcase Highlights


Fresh Ink

Guiding Customer Relationships with an Integrated IT Approach

September 29, 2014 No Comments

by Dennis van der Veeke, SDLThere is no denying that brands have taken an increased interest in technology for marketing efforts. In fact, Gartner reported earlier in the year that 81 percent of organizations now have the equivalent of a chief marketing technologist position. Read More >>>

Protecting Your Data at Each Step of the Networking Path

September 18, 2014 No Comments

by Bill Manning, APC by Schneider ElectricAs the amount of business critical data grows, the importance of data availability surges – businesses simply cannot afford to lose precious data due to instances of downtime. Read More >>>

The Four Phases of Cloud Optimization

September 12, 2014 No Comments

with Joe Kinsella, CloudHealthSeveral years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to over $350K. Read More >>>

How far is too far when it comes to outsourcing IT?

September 8, 2014 No Comments

with Mike Decker, Annese & Associates, Inc.With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in Telecommunications, I started my career inside a NOC located in the basement of a major bank in Buffalo, NY. Read More >>>

8 Things You Need to Do Before, During, and After Migrating to Office 365

September 4, 2014 No Comments

with Robert Berlin, OneLoginWith Windows Server 2003 hitting its end of life next year, the push is on for even faster migration. But the path is a complex one, and careful planning will be your best friend. Having spent a number of years helping customers along this road, here are my top tips for a safe journey. Read More >>>

Does your Company Really Need BPM?

September 3, 2014 No Comments

with Mac McConnell, BonitaSoftDoes everybody need BPM? Are there companies out there that would have no use for the kinds of solutions we provide? Hate to say it, but there might be a few. In the spirit of a Letterman “Late Show Top 10” list, here are 8 types of companies that simply don’t need BPM.Read More >>>

You Can’t Win the Data Loss Blame Game – So End It

September 3, 2014 No Comments

By Omer Eiferman, CellroxIn a world of desktops, tracking data leaks was much easier. If an employee digitally leaked corporate data or insider information, IT could usually pin down when and where it happened. However, with personal smartphones now being used for business, the blame game is not so simple. Read More >>>

Efficient Data Automation for Financial Firms

August 26, 2014 No Comments

By Jim Manias, Advanced Systems Concepts For modern companies, apps and systems (not pigeons) are carrying the data, and it falls on IT to be sure this movement happens quickly and accurately.Timeliness and efficiency in the delivery of relevant data translates into increased revenues and reduced risks for all financial firms. Read More >>>

To Cloud or Not to Cloud, That is the Question

August 11, 2014 No Comments

By Joe Caserta, Caserta ConceptsOne of the biggest decisions any business will need to make this year is where to store the company’s data. Is renting space in the Cloud the answer, or is it best to keep data in-house by investing in the appropriate infrastructure? Read More >>>

Context-Aware Security: A Key to Successful BYOD

August 4, 2014 No Comments

by Neal Foster, DELL SoftwareHow can IT give users what they want and protect data assets at the same time? By implementing context-aware security. Context awareness is something most of us practice every day. Read More >>>

How to do SIEM on a Shoestring Budget

July 28, 2014 No Comments

by Nicole Pauls, SolarWindsSecurity information and event management (SIEM) software can seem like the perfect solution to smaller IT shops where resources are at a premium and where IT pros are constantly asked to do more with less. However, the reality they encounter is often anything but. Read More >>>

Assessing the Cloud to Find its Silver Lining

July 24, 2014 No Comments

by Russ Loignon, TangoeBusiness moves at the speed of light, and the ability to stay competitive in today’s global workplace dictates that enterprises rely on the technology available today, yet be prepared to adapt quickly for future technologies. Read More >>>

Globalizing the Continuous Delivery Pipeline

July 23, 2014 No Comments

by Rob Vandenberg, LingotekThanks to trends like BYOD and cloud computing, devops now works together as a unified organization, rather than throwing code over an invisible wall. It’s a necessary and timely evolution—especially for today’s sophisticated global IT environments. Read More >>>

Stream vs. Batch Processing – Which One is the Better Business Operations GPS?

July 10, 2014 No Comments

by Dale Skeen, VitriaMany organizations across industries leverage “real-time” analytics to monitor and improve operational performance. Essentially this means that they are capturing and collecting data in lots from various systems and analyzing it in batches through periodic on-demand queries. Read More >>>

How can Big Data cross the Oceanic Gap?

July 2, 2014 No Comments

By Yves de Montcheuil, TalendBig data technologies are definitely California-born. The Internet giants invented Hadoop and most NoSQL databases. Over the years, adoption has spread from “new economy” companies to almost all industries. Read More >>>

Harnessing the Power of Smarter IT Infrastructure to Increase Efficiency

June 30, 2014 No Comments

By Alex Yost, IBMThe US Energy Information Administration expects global energy use to increase 56 percent between 2010 and 2040 – the equivalent of 4,000 power plants. But not all that energy will be put to good use. Much of it will be lost through inefficient systems and processes.Read More >>>

Where does Security fit in DevOps?

June 24, 2014 No Comments

By Eric Minick and Diana Kelley, IBMOrganizations are under increased pressure to continuously create and deploy innovative products, software, and apps. This added pressure makes it increasingly important to embed security throughout the entire development process. Read More >>>

Top Tips for an Effective Cloud Migration

June 11, 2014 No Comments

By Sarah Lahav, SysAid TechnologiesFor organizations built on in-house IT solutions, making too many changes too quickly can introduce unknown risks and frustrate end users who need to learn new software. The transition to the cloud therefore calls for a strategy. Read More >>>

Business Continuity Meets the Cloud: Protecting Your Reputation in the Always-on World

June 11, 2014 No Comments

By Laurence Guihard-Joly, IBMNot so long ago, a system outage equaled a forced recess for employees while a member of the IT team rebooted a server. There were consequences of course including the loss of data, inconvenienced customers, angry managers and more. Read More >>>

How Greed, Generosity and the Defense of Civil Liberties Can Put Your Data at Risk

June 10, 2014 No Comments

By Cam Roberson, Beachhead SolutionsSome human traits are security hazards – but not always because they are faults. As a matter of fact, some traits directly and deliberately engineer situations in which data leaks are more likely. Read More >>>

IT Briefcase Exclusive Interview with Pete Malcolm, President and CEO of Power Assure

June 10, 2014 No Comments

with Pete Malcolm, Power AssureNumerous systems management software both for IT and facilities have been commonly deployed in data centers. In this interview, Pete Malcolm from Power Assure outlines top trends in data center management today. Read More >>>

3 Tips for Deploying “Systems of Engagement” Practices for the Benefit of your Customers

June 6, 2014 No Comments

by Mac McConnell, BonitaSoftOne unintended consequence of employing customer-focused software systems is they view the world through a singular lens, which can quickly become a problem. These systems are generally geared toward providing general information to the users, without necessarily including recommendations for action. Read More >>>

The Most Common Governance Mistakes in SharePoint and How to Avoid Them

June 5, 2014 No Comments

by Steve Marsh, Metalogix Defining governance is not easy and many organizations skip this task and move forward without a clear understanding or plan for what governance means. So when SharePoint administrators have to enact ill-defined governance, mistakes inevitably follow. Read More >>>

Sabermetrics for the Data Center

June 3, 2014 No Comments

by Dave Wagner, TeamQuestToday, cost-effective and winning teams today are being built by integrating holistic understandings and measurements that look to yield a result greater than the sum of the parts — measuring what matters. Read More >>>

Cloud Computing: A Painkiller for IT Managers

June 3, 2014 No Comments

by Mark Miller, dinCloudCloud computing continues to gain a good reputation among IT professionals worldwide. According to analyst research firm Gartner, Inc., “The use of cloud computing is growing, and by 2016 this growth will increase to become the bulk of new IT spend. Read More >>>

IT Briefcase Exclusive Interview with Sai Sundhar Padmanabhan, ManageEngine

June 3, 2014 No Comments

with Sai Sundhar Padmanabhan, ManageEngineBelow, Sai Sundhar Padmanabhan, marketing analyst at ManageEngine, discusses the state of network traffic flows, why the ability to monitor high flow rates is critical to IT and business, and how to make sure you can handle high flows. Read More >>>

Upskilling for the Modern Data Center

May 28, 2014 No Comments

by Antonella Corno, CiscoToday’s data center bears very little resemblance to the data center of just a few years ago. The rapid evolution of technology, while an overall boon for business, has created a dual challenge for many IT departments. Read More >>>

Managing IT Points of Failures: Separating a Fire Drill from a Fire

May 21, 2014 No Comments

by Deepak Kanwar, ZenossA red flag on the IT operations dashboard at many organizations still means “All Hands on Deck,” a failure has been detected, it’s time to grab the safety gear and ready the hoses for what could be hours of intense fighting. Read More >>>

How to Leverage the Knowledge in Your Networks to Drive Innovation

May 19, 2014 No Comments

by Alex Saric, Ariba, Inc.The knowledge that’s now intrinsic to our networks can drive innovation—in products, processes, business models, and more. But to leverage network knowledge for innovation, you have to know where to find the knowledge and how to put it to use. Read More >>>

IT Briefcase Exclusive Interview with Ed Brill, Director, Mobile Enterprise Marketing, IBM

May 9, 2014 No Comments

with Ed Brill, IBM Social BusinessIn this interview, Ed Brill from IBM Social Business discusses mobile as a business transformation tool and considerations for the ‘upwardly mobile’ enterprise. Read More >>>

ADVERTISEMENT

Gartner Identity & Access

TDWI World Conf San Diego

Red Hat JBoss Busines Automate

ACI Customer Experience Management Summit

ManageEngine

ITBriefcase Comparison Report

IBM Data