Inside the Briefcase






Briefcase Highlights


DATA and ANALYTICS 

When it Comes to DNS, Redundancy is a Good Thing

July 25, 2016 No Comments

Business used to be simpler. It used to be possible—in fact, it was the norm—for enterprises to run their Domain Name Service (DNS) from just one data center. They placed their servers within its confines and went on their way without a care. After all, if their one data center went down, the DNS server would be useless.

Why containers – why now?

July 21, 2016 No Comments

In retrospective – the key desired goals for consolidation, CAPEX and OPEX optimization, have not been met. In fact, it can be said that consolidation contributed to VM sprawl and in many cases worsened performance issues. Container technology has been around for a few years and in fact, heavily used in large scale production by Google.

IT Briefcase Exclusive Interview: Decoding Encryption with Sophos’ Dan Schiappa

July 21, 2016 No Comments

with Dan Schiappa, SophosIn this interview, Dan Schiappa, senior vice president and general manager of Enduser Security Group at Sophos, outlines some of the current IT security topics being addressed by businesses today. Read More >>>

The 5 Key Storage Drivers for SaaS Success

July 13, 2016 No Comments

SaaS – known by its full name, “software as a service” is one of the three principal branches of cloud computing alongside IaaS (infrastructure as a service) and PaaS (platform as a service). Shortly put, it’s a form of software distribution that brings to the table a third-party willing to host the particular service. This is a good way out for certain entities, particularly companies, that would otherwise need to install the applications in their own data centers and invest in the management of the required hardware to run it.

How to set up an Enterprise FTP Server on Windows in 10 minutes or less

July 12, 2016 No Comments

Today, file transfer and sharing is one of the major areas of concern for enterprises because employees often use readily available non-IT sanctioned freeware and cloud services, such as Dropbox, to transfer corporate data via email, cloud drives, mass storage devices, USB devices, etc. But this is a challenge for IT departments who still need to ensure that this transferred data is not susceptible to leakage, loss and hacking. Enterprises must come up with solutions that allow their employees to conveniently deploy file transfer solutions that meet their security and compliance requirements.

Get to Know the Latest Jobs in Big Data

July 11, 2016 No Comments

Job predictions can get pretty tricky. Figuring out what the job market will be like in a year is difficult enough, let alone five or ten years down the line. Few things are guaranteed, but if there’s one area that has shown a great deal of promise in the past few years, it’s the big data industry. Of course, simply naming it the “big data industry” is something of a misnomer. While there are certainly plenty of big data technologies and big data-centric businesses, what makes big data so popular is how easy it can be used in pretty much any industry out there.

Even In Complex Education Environments, Access Management Doesn’t Have to Be a Boondoggle

July 11, 2016 No Comments

Education entities of all stripes – small to large, independent to charter and primary to post-secondary – share many of the same challenges, certainly in regard to the administration of information and access to it. Perhaps no more important to the information being shared with students is providing access to it, through the use of education and learning portals, grading systems and even student information systems. But information in education doesn’t just from the organization to students, but also staff and educators must be considered when conceiving an effective information loop, and sometimes, parents.

5 Mobile Development Pitfalls – and How to Avoid Them

July 6, 2016 No Comments

The mobile web is going through an exciting growth phase as consumers and businesses shift their interests toward the “second screen.” Even the media is taking notice of the trend: Forbes declared 2015 the “Year of the Mobile Web.” If your business is not yet treating mobile web and app development as a priority, now is the time to start. But do not get swept away by the excitement: Your business should not build an app just for the sake of having one.

Aligning Big Data and Data Center Infrastructure Strategies

July 5, 2016 No Comments

Big data has become a de facto part of business, and there is no reason to treat it otherwise. Despite the mainstream nature of leveraging big data, many organizations struggle to adopt and align a big data mindset with their day-to-day business. By grasping the basics of big data and facing the obstacles head-on, IT leaders can take advantage of all that big data has to offer.

3 Steps to Building Container Security

July 5, 2016 No Comments

Containers are one of the hottest areas in IT. The use of containers in production environments has skyrocketed, and container technology is poised to become the dominant architecture for application development and deployment in the very near future. A new report from the Cloud Foundry Foundation shows that while 16 percent of the 700+ companies surveyed are already using containers in production, that figure is expected to grow to a staggering 64 percent moving into production by 2017. Another survey of global IT professionals commissioned by Red Hat through TechValidate backs those figures, with 67 percent of respondents planning production roll-outs over the next two years.

Taking a Data First Approach to Real Time Applications

June 30, 2016 No Comments

Leading companies that are getting the most out of their data are not focusing on queries and data lakes, they are actively integrating analytics into their operations. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency and rely on a variety of data sources. In fact, real time is at the foundation of many transformational applications.

Recruiting Software: A Game Changer for Small Business

June 28, 2016 No Comments

Finding top talent has become something of a surgical process in the modern tech era. Fortunately, recruitment tools have come of age. With numerous helpful features and putting an organized spin on recruitment efforts, the benefits of operating with recruitment software far outweighs flying blind as an employer. To help you better appreciate why recruitment software is right for your small business hiring needs, here are a few points to consider.

Four Ways to Boost IT Performance with Application-Aware Network Performance Monitoring

June 28, 2016 No Comments

In an era of unified IT, you can no longer afford to take a silo-based approach to monitoring and troubleshooting IT problems. It’s time for network engineers, server admins and application engineers to expand beyond their particular domains and department-specific tools. It’s time to embrace a new, integrated approach to network and application monitoring that lets you view your entire IT infrastructure from a single console and resolve issues before they affect end users. It’s time for applications-aware network performance monitoring (AANPM).

Choosing IaaS Or A Cloud-Enabled Managed Hosting Provider?

June 27, 2016 No Comments

We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a Cloud IaaS or SaaS provider with that of a Cloud-Enabled Hosting Provider. These types of providers are very different and while each services a particular need effectively and efficiently; by no means should their solutions be compared from a price perspective. A simple illustration is when the costs of Azure or AWS are compared with those of a true Cloud-Enabled Hosting Provider.

Don’t Let Scattered Information Destroy Your Business

June 20, 2016 No Comments

The disorganization of information presents a serious challenge for businesses, one that can have a significant impact. With data located in multiple locations, both on-premises and in the cloud, the potential is high for inefficient processes, and use of time and money. Finding a way to combat this burden is a key component to success.

Bioinformatics Market is Expected to Reach Revenue of $12.8 Billion Globally by 2020

June 16, 2016 No Comments

Allied Market Research, today published a new market research report titled “Bioinformatics Market As per the study, the global Bioinformatics market was valued at$3.4 billionin 2013, and it is expected to reach$12.8 billionby 2020. The market is expected to grow at a CAGR of 21.2% during 2014-2020.

Harnessing the Power of Agile: Why Your Organization Needs a Modern Requirements Tool

June 13, 2016 No Comments

The technology to support Agile requirements has undergone significant transformation in the past few years. Yet many organizations aren’t aware of all of the capabilities that best of breed Agile requirements tools possess. That includes visualization, collaboration, reuse and management analytics.

How Real Time Analytics Wall Boards Help Contact Centres Control Performance

June 9, 2016 No Comments

Contact centres are truly crucial to many businesses, as a way to give customers a quick and easy way to get answers from a real person when they experience problems or want to make changes to their service accounts. The more successful the business, the higher the demand for their contact centres, and the more a bad customer experience could impact their brand’s reputation. Many organisations who have deployed Skype for Business or Lync as their Unified Communications platform are also using the basic contact centre functionality presented through the use of Response Groups.

Storage Infrastructure Strategies for Successful SaaS Businesses

June 8, 2016 No Comments

The cloud’s momentum just keeps building, as seen by Amazon’s recent quarterly financial performance, aided by its fast growing Amazon Web Services business – which offers public cloud infrastructure. The company also announced that April was its most profitable quarter since the company started 22 years ago. With all this in mind, offering public cloud infrastructure has become a big business. Not only has it boosted Amazon, but also Microsoft with its Azure business.

SIEM in the Age of Digital Transformation, Part 2

June 7, 2016 No Comments

In the first of this two-part series, we examined the current SIEM market and factors to consider before selecting a SIEM solution for your network. The second article focuses on what it means to have cybersecurity through visibility, as well as how advanced threat detection, threat intelligence integration and other elements can spell success or disaster for your SIEM strategy.

Top 5 Big Data Misconceptions

June 6, 2016 No Comments

Big Data is a game-changer that has already transformed specific business functions, and further applications of Big Data-driven analytics are expected to continue to take the world by storm over the next few years, utterly changing the way data is used and consumed. A huge number of companies today are sitting on massive amounts of data coming from multiple sources, including point-of-sale information, digital and social data, mobile/app data, financial data, research data and other information sources.

IT Briefcase Exclusive Interview: Rethink and Replace VPNs with Workspace-as-a-Service Solutions

June 6, 2016 No Comments

with Jon Senger, VertiscaleIn this interview, Jon Senger, co-founder and CTO of Vertiscale, speaks with IT Briefcase about the weaknesses of VPN-based remote access solutions and describes how new cloud-based Workspace-as-a-Service platforms support much higher levels of data security along with vastly greater convenience for end-users. Read More >>>

Shifting Left: Knowledge Centered Support for Improved Customer Service

June 6, 2016 No Comments

Reaching customers more efficiently. Educating users on the use of product and features. Engaging in conversations time and time again, covering the same ground. How best to bottle these conversations up and provide the best and most relevant information to the right users when they need the most appropriate information.

OWASP Top 10 & Open Source Code: Why Watching Your Back Means Watching Everyone Else’s

June 6, 2016 No Comments

At times, being a developer can feel a little bit like being back in school and getting partnered up on projects. You would work your butt off, fastidiously checking and rechecking your part of the assignment until you’re sure it’s perfect only to show up at school on Monday and find that your partner hasn’t fulfilled his end of the deal. And there goes the project.

Continuous Delivery: The Atlassian Way

June 2, 2016 No Comments

Sonatype’s Mark Miller (@TSWAlliance) caught up with Developer Advocate Ian Buchanan (@devpartisan) for our 2016 DevOps Leadership Series to discuss his experiences at Atlassian, including continuous delivery, ChatOps, and use of tools like Bamboo, Nexus, Puppet, and Datadog. We captured it on video https://www.youtube.com/watch?v=MgRaYKHGqeQor you follow our discussion below.

IT Briefcase Exclusive Interview: Data Migration with Globanet

June 1, 2016 No Comments

with Globanet In this interview, Globanet discusses how data migration industry has matured with Enterprise Class offerings, and in what ways clients are now trying to find the right technology to meet their requirements now and for years to come. Read More >>>

Best Practices for Efficiently Preventing and Managing Incidents

May 26, 2016 No Comments

There are few things worse for an IT Operations executive than a mission-critical application outage. The operations team must address it immediately, and as the clock ticks, the bottom line shrinks. The pressure is on to reduce the mean time to repair (MTTR), but when the application is up again, it’s time to consider how this fire drill could have been avoided.

SIEM in the Age of Digital Transformation

May 26, 2016 No Comments

As digital transformation and the Internet of Things (IoT) gain momentum, enterprises will be exposed to new forms of incoming data and external connections that can potentially create pinholes in existing network security environments. Meanwhile, network and security operations teams are struggling to gain visibility into the landscape while attempting to manage and secure any number of moving endpoints and analyze trends and anomalies in real time – a monumental challenge, to say the least.

Finding Value in Your Unstructured Data

May 24, 2016 No Comments

It can be a challenge to find value in data that’s without structure. Rather than let this information sit unused in a dark silo, enterprises can gather valuable customer insights with a bit of out-of-the-box thinking and the right tools for the job. Not only is data left ‘in the dark’ a waste of company resources given the ever-increasing costs of data storage, it defeats the purpose of collecting customer information entirely if not capitalized on to further company-wide action.

It’s 12 O’Clock – Do You Know Where Your Data Is?

May 23, 2016 No Comments

It’s estimated that 90 percent of the world’s data has been created in the last two years. Data is flowing in a virtual avalanche that will likely only continue in volume and speed. It flows between colleagues and work groups and among the proliferation of network and cloud repositories. The ease and convenience of data sharing today means that your sensitive data could be anywhere. Collaboration is a pivotal component of business, but it must be tempered by the need for data protection.

ADVERTISEMENT

DTX ExCeL London

WomeninTech