July 25, 2016
Business used to be simpler. It used to be possible—in fact, it was the norm—for enterprises to run their Domain Name Service (DNS) from just one data center. They placed their servers within its confines and went on their way without a care. After all, if their one data center went down, the DNS server would be useless.
July 21, 2016
In retrospective – the key desired goals for consolidation, CAPEX and OPEX optimization, have not been met. In fact, it can be said that consolidation contributed to VM sprawl and in many cases worsened performance issues. Container technology has been around for a few years and in fact, heavily used in large scale production by Google.
July 21, 2016
with Dan Schiappa, SophosIn this interview, Dan Schiappa, senior vice president and general manager of Enduser Security Group at Sophos, outlines some of the current IT security topics being addressed by businesses today. Read More >>>
July 13, 2016
SaaS – known by its full name, “software as a service” is one of the three principal branches of cloud computing alongside IaaS (infrastructure as a service) and PaaS (platform as a service). Shortly put, it’s a form of software distribution that brings to the table a third-party willing to host the particular service. This is a good way out for certain entities, particularly companies, that would otherwise need to install the applications in their own data centers and invest in the management of the required hardware to run it.
July 12, 2016
Today, file transfer and sharing is one of the major areas of concern for enterprises because employees often use readily available non-IT sanctioned freeware and cloud services, such as Dropbox, to transfer corporate data via email, cloud drives, mass storage devices, USB devices, etc. But this is a challenge for IT departments who still need to ensure that this transferred data is not susceptible to leakage, loss and hacking. Enterprises must come up with solutions that allow their employees to conveniently deploy file transfer solutions that meet their security and compliance requirements.
July 11, 2016
Job predictions can get pretty tricky. Figuring out what the job market will be like in a year is difficult enough, let alone five or ten years down the line. Few things are guaranteed, but if there’s one area that has shown a great deal of promise in the past few years, it’s the big data industry. Of course, simply naming it the “big data industry” is something of a misnomer. While there are certainly plenty of big data technologies and big data-centric businesses, what makes big data so popular is how easy it can be used in pretty much any industry out there.
July 11, 2016
Education entities of all stripes – small to large, independent to charter and primary to post-secondary – share many of the same challenges, certainly in regard to the administration of information and access to it. Perhaps no more important to the information being shared with students is providing access to it, through the use of education and learning portals, grading systems and even student information systems. But information in education doesn’t just from the organization to students, but also staff and educators must be considered when conceiving an effective information loop, and sometimes, parents.
July 6, 2016
The mobile web is going through an exciting growth phase as consumers and businesses shift their interests toward the “second screen.” Even the media is taking notice of the trend: Forbes declared 2015 the “Year of the Mobile Web.” If your business is not yet treating mobile web and app development as a priority, now is the time to start. But do not get swept away by the excitement: Your business should not build an app just for the sake of having one.
July 5, 2016
Big data has become a de facto part of business, and there is no reason to treat it otherwise. Despite the mainstream nature of leveraging big data, many organizations struggle to adopt and align a big data mindset with their day-to-day business. By grasping the basics of big data and facing the obstacles head-on, IT leaders can take advantage of all that big data has to offer.
July 5, 2016
Containers are one of the hottest areas in IT. The use of containers in production environments has skyrocketed, and container technology is poised to become the dominant architecture for application development and deployment in the very near future. A new report from the Cloud Foundry Foundation shows that while 16 percent of the 700+ companies surveyed are already using containers in production, that figure is expected to grow to a staggering 64 percent moving into production by 2017. Another survey of global IT professionals commissioned by Red Hat through TechValidate backs those figures, with 67 percent of respondents planning production roll-outs over the next two years.
June 30, 2016
Leading companies that are getting the most out of their data are not focusing on queries and data lakes, they are actively integrating analytics into their operations. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency and rely on a variety of data sources. In fact, real time is at the foundation of many transformational applications.
June 28, 2016
Finding top talent has become something of a surgical process in the modern tech era. Fortunately, recruitment tools have come of age. With numerous helpful features and putting an organized spin on recruitment efforts, the benefits of operating with recruitment software far outweighs flying blind as an employer. To help you better appreciate why recruitment software is right for your small business hiring needs, here are a few points to consider.
June 28, 2016
In an era of unified IT, you can no longer afford to take a silo-based approach to monitoring and troubleshooting IT problems. It’s time for network engineers, server admins and application engineers to expand beyond their particular domains and department-specific tools. It’s time to embrace a new, integrated approach to network and application monitoring that lets you view your entire IT infrastructure from a single console and resolve issues before they affect end users. It’s time for applications-aware network performance monitoring (AANPM).
June 27, 2016
We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a Cloud IaaS or SaaS provider with that of a Cloud-Enabled Hosting Provider. These types of providers are very different and while each services a particular need effectively and efficiently; by no means should their solutions be compared from a price perspective. A simple illustration is when the costs of Azure or AWS are compared with those of a true Cloud-Enabled Hosting Provider.
June 20, 2016
The disorganization of information presents a serious challenge for businesses, one that can have a significant impact. With data located in multiple locations, both on-premises and in the cloud, the potential is high for inefficient processes, and use of time and money. Finding a way to combat this burden is a key component to success.
June 16, 2016
Allied Market Research, today published a new market research report titled “Bioinformatics Market As per the study, the global Bioinformatics market was valued at$3.4 billionin 2013, and it is expected to reach$12.8 billionby 2020. The market is expected to grow at a CAGR of 21.2% during 2014-2020.
June 13, 2016
The technology to support Agile requirements has undergone significant transformation in the past few years. Yet many organizations aren’t aware of all of the capabilities that best of breed Agile requirements tools possess. That includes visualization, collaboration, reuse and management analytics.
June 9, 2016
Contact centres are truly crucial to many businesses, as a way to give customers a quick and easy way to get answers from a real person when they experience problems or want to make changes to their service accounts. The more successful the business, the higher the demand for their contact centres, and the more a bad customer experience could impact their brand’s reputation. Many organisations who have deployed Skype for Business or Lync as their Unified Communications platform are also using the basic contact centre functionality presented through the use of Response Groups.
June 8, 2016
The cloud’s momentum just keeps building, as seen by Amazon’s recent quarterly financial performance, aided by its fast growing Amazon Web Services business – which offers public cloud infrastructure. The company also announced that April was its most profitable quarter since the company started 22 years ago. With all this in mind, offering public cloud infrastructure has become a big business. Not only has it boosted Amazon, but also Microsoft with its Azure business.
June 7, 2016
In the first of this two-part series, we examined the current SIEM market and factors to consider before selecting a SIEM solution for your network. The second article focuses on what it means to have cybersecurity through visibility, as well as how advanced threat detection, threat intelligence integration and other elements can spell success or disaster for your SIEM strategy.
June 6, 2016
Big Data is a game-changer that has already transformed specific business functions, and further applications of Big Data-driven analytics are expected to continue to take the world by storm over the next few years, utterly changing the way data is used and consumed. A huge number of companies today are sitting on massive amounts of data coming from multiple sources, including point-of-sale information, digital and social data, mobile/app data, financial data, research data and other information sources.
June 6, 2016
with Jon Senger, VertiscaleIn this interview, Jon Senger, co-founder and CTO of Vertiscale, speaks with IT Briefcase about the weaknesses of VPN-based remote access solutions and describes how new cloud-based Workspace-as-a-Service platforms support much higher levels of data security along with vastly greater convenience for end-users. Read More >>>
June 6, 2016
Reaching customers more efficiently. Educating users on the use of product and features. Engaging in conversations time and time again, covering the same ground. How best to bottle these conversations up and provide the best and most relevant information to the right users when they need the most appropriate information.
June 6, 2016
At times, being a developer can feel a little bit like being back in school and getting partnered up on projects. You would work your butt off, fastidiously checking and rechecking your part of the assignment until you’re sure it’s perfect only to show up at school on Monday and find that your partner hasn’t fulfilled his end of the deal. And there goes the project.
June 2, 2016
Sonatype’s Mark Miller (@TSWAlliance) caught up with Developer Advocate Ian Buchanan (@devpartisan) for our 2016 DevOps Leadership Series to discuss his experiences at Atlassian, including continuous delivery, ChatOps, and use of tools like Bamboo, Nexus, Puppet, and Datadog. We captured it on video https://www.youtube.com/watch?v=MgRaYKHGqeQor you follow our discussion below.
June 1, 2016
with Globanet In this interview, Globanet discusses how data migration industry has matured with Enterprise Class offerings, and in what ways clients are now trying to find the right technology to meet their requirements now and for years to come. Read More >>>
May 26, 2016
There are few things worse for an IT Operations executive than a mission-critical application outage. The operations team must address it immediately, and as the clock ticks, the bottom line shrinks. The pressure is on to reduce the mean time to repair (MTTR), but when the application is up again, it’s time to consider how this fire drill could have been avoided.
May 26, 2016
As digital transformation and the Internet of Things (IoT) gain momentum, enterprises will be exposed to new forms of incoming data and external connections that can potentially create pinholes in existing network security environments. Meanwhile, network and security operations teams are struggling to gain visibility into the landscape while attempting to manage and secure any number of moving endpoints and analyze trends and anomalies in real time – a monumental challenge, to say the least.
May 24, 2016
It can be a challenge to find value in data that’s without structure. Rather than let this information sit unused in a dark silo, enterprises can gather valuable customer insights with a bit of out-of-the-box thinking and the right tools for the job. Not only is data left ‘in the dark’ a waste of company resources given the ever-increasing costs of data storage, it defeats the purpose of collecting customer information entirely if not capitalized on to further company-wide action.
May 23, 2016
It’s estimated that 90 percent of the world’s data has been created in the last two years. Data is flowing in a virtual avalanche that will likely only continue in volume and speed. It flows between colleagues and work groups and among the proliferation of network and cloud repositories. The ease and convenience of data sharing today means that your sensitive data could be anywhere. Collaboration is a pivotal component of business, but it must be tempered by the need for data protection.