A common approach to addressing any number of performance issues in IT environments is to throw a bunch of potential solutions at the wall and see what sticks. However, IT environments are becoming increasingly complex and varied, making the dart-on-the-wall strategy even less effective than it already was. As such, here I will cover what IT troubleshooting should look like in the hybrid IT world we now find ourselves in, and will continue to be encompassed by into the future.
IT Briefcase Interview: Why Increasing Demand for Always-on Connectivity is Driving Advances in Network ResiliencyMarch 9, 2017 No Comments
with Gary Marks, OpengearIn this interview, Opengear CEO Gary Marks offers analysis into why network resilience has become such a challenge for today’s enterprises, as well as how businesses are improving the management of their remotely-located network sites. Read More >>>
The marriage of artificial intelligence and the open-source concept is still very new, and we’re beginning to see its production come to fruition. After a few years, outsiders have been able to help play with other’s open-sourced AI technology and in turn, send these improvements back to the original creators.
To create a success, marketing teams have to move fast! Moving the business forward means completing the next project, campaign or launch flawlessly. But keeping every stakeholder aligned and informed has never been easy. Read this article to discover top five ways marketing teams benefit from using Box.
Western Union has always been on the forefront of technological innovation. The company launched in 1851 with the invention of the telegraph. Now, 165 years later, we are digitally transforming ourselves and devising new and easier ways for our customers to move money around the world.
Curl, an open source application installed on hundreds of thousands of servers, was found to have several serious security vulnerabilities in a voluntary audit. The vulnerabilities were quickly fixed, but the incident exemplifies the importance of external auditing of the open source projects on which we all depend.
IT Briefcase Exclusive Interview: Evolving the Enterprise with the Service Desk and Improved Workflows through IT Service ManagementDecember 26, 2016 No Comments
with Nancy Van Elsacker, Top DeskIn this Interview, Nancy Van Elsacker Louisnord, president of TOPdesk US, discusses the value of IT Service Management within the ever evolving IT Enterprise. Read More >>>
A lot of great software is being built using open source, and each year Black Duck reviews open source projects started during the past 12 months to recognize those whose mission, community growth, and market impact make them particularly notable. We call our selections the “Open Source Rookies,” and the process begins with an average 100-200 projects that meet those requirements of intriguing vision, ability to build a community, and value to the marketplace.
In many organizations, IT support seems to follow a corollary of Moore’s Law in which the number of support tickets — rather than the number of transistors — doubles every two years. Even companies that experience slower growth find that tickets ultimately proliferate and threaten to overwhelm their IT support teams if they haven’t kept their ticket management systems and processes up to date. You can avoid that fate by following the 10 steps below to keep tickets manageable, resolve them quickly and provide an amazing help desk and ticket management experience.
The direction of technology both follows and influences the direction of business. The tools enterprises need to compete, improve, adapt, solve problems, and succeed are supplied by technology. Sometimes, technology even supplies new opportunities, such as when a technological advance leads to the creation of a new marketplace. The Internet is by far the most powerful example of this in the past 50 years.
One of the buzzwords that has been floating around tech circles for the past several years is “open source.” Open source software has been around for quite a while, now, but there are still several misconceptions about it. Many people aren’t even quite sure what it means. Is it just freeware? Is it copyrighted material? How secure is it? Is it just cheap, low-quality junk that you use because you don’t want to shell out the money for a real program?
There are more online stores than ever as we get nearer to 2017; far more than when we experienced a dot-com boom back in 2000. People are appreciating the advantages offered by maintaining online businesses, which is why the market is saturated and very competitive.
Are you prepared for a network outage? Many companies have invested heavily in disaster-recovery solutions designed to mitigate the effects of catastrophic storms, earthquakes or power outages. However, Information Age notes that the cause of disruptions isn’t always so obvious — software updates gone awry or day-to-day human errors can also precipitate continuity problems. Here are five tips to help your company dodge network disruptions.
It seems as though the world has gone mobile. Everywhere you look someone has their smartphone out doing everything from playing Pokémon Go to shopping on the QVC online store. From texting to checking Facebook to keeping abreast of the news and weather forecasts, there is always something to do and see on that handy little gadget we wouldn’t leave home without. Not only are our cell phones a source of entertainment, but also a source of information and even function.
IT executives today expect they will need to provide more rigorous cost and ROI calculations to justify spending on services. At the same time, digital technology is increasingly the means for delivering profit-generating business services, so keeping technology in optimal working order is critical. This paradoxical imperative with the dual mandate of reducing cost and increasing value needs an effective strategy to drive toward “zero maintenance IT.”
Every day, organizations and individuals are experiencing the power of custom apps to improve productivity, increase efficiency and achieve desired outcomes. For those uninitiated, getting your first custom app off the ground can be intimidating. However, there are a few concrete steps that you can take to move your idea from imagination to implementation. These steps and core concepts have been distilled from the best practices of many people – and teams – who have planned their own custom apps and are using them to their advantage. By following these steps, you’ll be harnessing the power of custom apps in no time.
Big data, analytics, and especially mobile are disrupting the marketplace, and your customers need to understand the implications and opportunities inherent in the new marketplace. This webcast outlines ways to become a trusted source of knowledge and information on storage options for your customers.
This IDC Flash discusses Nimble Storage’s introduction of an all-flash array (AFA), the AF-Series, as an addition to the company’s already very successful CS-Series line of hybrid-flash arrays (HFAs), on February 23, 2016. This Flash discusses Nimble’s entry into the AFA space and updates IDC’s view of the company’s competitive position in the overall enterprise storage market, based on this announcement.
Business users expect immediate access to data, all the time and without interruption. But reality does not always meet expectations. IT leaders must constantly perform intricate forensic work to unravel the maze of issues that impact data delivery to applications. This performance gap between the data and the application creates a bottleneck that impacts productivity and ultimately damages a business’ ability to operate effectively. We term this the “app-data gap.”
At times, being a developer can feel a little bit like being back in school and getting partnered up on projects. You would work your butt off, fastidiously checking and rechecking your part of the assignment until you’re sure it’s perfect only to show up at school on Monday and find that your partner hasn’t fulfilled his end of the deal. And there goes the project.
with Jeremy Moskowitz, Founder and CEO, PolicyPak SoftwareIn this interview, Jeremy Moskowitz, founder and CEO of PolicyPak, speaks with IT Briefcase on the challenges and opportunities of using a virtual desktop infrastructure (VDI.)Read More >>>
by Stefan Bernbo, CompuverdeAs the data deluge continues on unabated, vertically scaling legacy approaches to storage are falling short. Organizations need to find a way to store high volumes of data without busting the budget, all while maintaining high levels of performance… Read More >>>
IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by migrating from open source Java EE application servers to WebSphere Application Server (WAS) Liberty.
with Kong Yang, SolarWindsIn this interview, Kong Yang, Head Geek and technical product manager at SolarWinds, speaks with IT Briefcase on how hybrid environments are changing the role of the IT professional. Read More >>>
No longer a catchphrase or a vague notion, the Internet of Things is in full swing. McKinsey & Company estimates that the IoT has a total potential economic impact of $3.9 trillion to $11.1 trillion a year by 2025. Manufacturers are already spending considerable amounts of money on mobilizing the enterprise, including connecting employees, products, services and machines/vehicles. Digging deeper, we can see what functions in the business they’ve tackled first.
IT Briefcase Analyst ReportThis product guide allows you to quickly assess — current products in the market, deployment options, basic differences by monitoring features, the stability of suppliers and more. Read More >>>
In part one of this series, “Rugged DevOps: Survival is Not Mandatory”, I shared news that 1 in 16 open source and third-party components downloaded last year included a known vulnerability. That may not seem like too many until you realize the average company downloads well over 200,000 components annually. These components are electively downloaded by development teams, often unaware of the vulnerabilities that come with them.
Deming, the patron saint of DevOps once advised, “It is not necessary to change. Survival is not mandatory.” To survive, application development teams are constantly pressured to deliver software even faster. But fast is not enough. The best organizations realize that security, quality and integrity at velocity are mandatory for survival. Hence, DevOpsSec.
“Software is eating the world.” The now-classic quote from Marc Andreessen needs some updating, since it’s now more accurate to say software as a service (SaaS) is consuming the world, but the core statement is spot on: Companies can’t survive (and thrive) without the regular influx of new software. The problem? Many employees struggle to keep pace with changing environments and workflows — here are four tips for executives looking to streamline the software training process.
Learn how an integrated security strategy can secure and simplify access to Hadoop environments, while leveraging your existing identity management infrastructure.