May 23, 2016
When building a cloud app security strategy, it’s easy for most IT leaders within a company to assume that blocking all risky file sharing apps is the answer. It’s an understandable assumption to make, given that 91 percent of apps aren’t enterprise-ready and lack in important areas like security and privacy, according to Netskope’s latest cloud report.
May 23, 2016
That one sentence can strike a sense of helplessness – or even fear – into the hearts of technology executives everywhere. And it should, because changes in technological approaches can be time consuming, expensive and may even require breaking down years and years of legacy processes and equipment—not to mention the headaches that arise with the implementation of new technology.
May 17, 2016
In the era of crippling state-sponsored hacks, cybercrime rings and data breaches, businesses are looking at all forms of preventative measures to keep attackers at bay. Even a modern-day James Bond would find it challenging to keep his data, and identity, a secret in the Information Age. And unlike in the famous films, the real-life ‘villains’ capable of stealing trade secrets, personal information and other forms of sensitive data are oftentimes anonymous and numerous. Reports estimated more than 317 million new pieces of malware were created within 2015 alone. Imagine what they can do today!
May 16, 2016
with Wes Gyure, IBM SoftwareIn this interview, Wes Gyure, MaaS360 Portfolio Offering Manager, IBM, helps us understand the evolution of enterprise mobility and the challenges organizations are facing as they look to enable their mobile workforce. Read More >>>
May 13, 2016
The e-commerce market is growing, averaging a 250-percent increase per year. However, just 8 percent of all product page traffic converts to sales — in other words, it’s still a challenge for retailers to move past the research stage and convince users to “buy now.” One way to improve e-commerce is through the use of big data. Here’s a look at how you can leverage new insights to boost your bottom line.
May 11, 2016
Transport Layer Security (TLS) is a protocol that offers a high level of security to help authenticate and encrypt information between a client and server for both inbound and outbound email (and website) traffic. Encryption protocols such as TLS help create secure connections for communications that must transfer across unsecured networks. Although there are others, SSL and TLS are two of the most popular security protocols of their kind.
May 10, 2016
We create 2.5 quintillion (a trillion billion) data bytes every day. And, 90 percent of the data in the world was created in just the last few years. Big Data has become so big that we need new avenues of artificial intelligence research, such as machine learning and natural language processing, to begin to sort out the information. Current Big Data technology, such as Hadoop and Big Data SQL, allows users to process and understand data better.
May 10, 2016
Attackers are moving away from direct assault, and instead are hijacking and exploiting user credentials to thwart security tools, and gain easy access to business data. How can you strike back and stop breaches that attack your users far, far away?
May 10, 2016
Let’s face it. With so many credentials having been compromised and made available to attackers, password-based security is no longer effective. We know that eliminating passwords is the right thing to do, but that takes time, and the bad guys are already inside our networks.
May 10, 2016
In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. Read this white paper to learn more.
May 9, 2016
To improve management of component vulnerabilities, consider these five steps, which mimic a number of the supply chain management concepts originated by quality guru W. Edwards Deming to improve quality, accelerate feedback loops, and increase efficiencies of manufacturing operations.
May 6, 2016
with Jeremy Moskowitz, Founder and CEO, PolicyPak SoftwareIn this interview, Jeremy Moskowitz, founder and CEO of PolicyPak, speaks with IT Briefcase on the challenges and opportunities of using a virtual desktop infrastructure (VDI.)Read More >>>
May 5, 2016
In this new omnichannel world, simply ordering a standalone ecommerce channel isn’t enough. Companies need a platform that unites their channels and supports a more fluid model of customer engagement.
May 5, 2016
A popular eyewear company wanted a unique ecommerce channel designed exclusively for this market segment to promote and sell the products that aren’t available to the general public.
May 2, 2016
Five years ago, Mozilla launched its new identity management system, Persona (originally called BrowserID). At the time, a sense of optimism was in the air. Everyone thought that the new technology would ease the strain of remembering numerous passwords to gain access to various websites. The alternative — outsourcing unified identity management to social media giants including Twitter, Facebook and Google — raised data privacy and reliability concerns. So everyone hoped that Persona would emerge as a strong unified authentication system and a credible alternative.
May 2, 2016
The pace of digital transformation and cloud migration is forcing IT professionals to review their current infrastructure and force change to accommodate new business demands brought on by the age of the customer. Many organizations are motivated by fear, such as of the potential business disruption in their industries from new digital startups like airbnb or uber; more optimistically, they’re motivated by the opportunities brought by digital technologies to improve their customers’ experience.
April 29, 2016
by Stefan Bernbo, CompuverdeAs the data deluge continues on unabated, vertically scaling legacy approaches to storage are falling short. Organizations need to find a way to store high volumes of data without busting the budget, all while maintaining high levels of performance… Read More >>>
April 29, 2016
Among providers of disaster recovery as a service there is wide variance in experience and service quality, together with other key differentiating factors. Data center managers should use this Magic Quadrant to help them evaluate providers of DRaaS services.
April 28, 2016
Presented here is a list of log collections and alerts that can help support the infrastructure security of an automated log management system.
April 28, 2016
Based on the experiences of 148 respondents, this report will explore what makes a product development company successful. It will look at the differences between the Best-in-Class and their competitors.
April 28, 2016
This guide will show you how you can positively in uence innovation in your team, department or organization through something you do everyday: learning.
April 28, 2016
To get a sense for what you can expect in 2016, we talked to our course authors, internal experts and customers. We gained some valuable insights into what your team will need to know for the dev, IT and creative industries.
April 26, 2016
Network infrastructure today is under increasing pressure from the shifting bandwidth and latency requirements of modern applications. Wide area networks (“WANs”) in particular must address this demand, especially when they use many technologies from a variety of providers, are distributed geographically and suffer strain from the ever-expanding popularity of video and cloud application services. That’s why hybrid WAN architectures with advanced application-level traffic routing are an attractive option; they marry the cost savings of broadband/Internet connectivity for non-critical traffic with the reliability of private lines for critical business applications.
April 26, 2016
with Ed Macnair, CEO, CensorNetIn this interview, Ed Macnair, CEO of CensorNet, speaks with IT Briefcase on how security technologies needs to evolve to meet the challenge and opportunities of cloud computing.Read More >>>
April 26, 2016
You might already know them from theagileadmin.com, but let me introduce you to two of the leading minds in the Rugged DevOps movement: James Wickett and Ernest Mueller. Both James and Ernest are active leaders in the DevOps space, in addition to helping organize events like DevOpsDays Austin and LASCON. Our conversation covered a lot of bases from the founding of Rugged DevOps to aligning organizational silos to lessons learned from W. Edwards Demings.
April 25, 2016
In this session, you will learn about how a real cutting edge client has deployed the SAP HANA infrastructure using SUSE Linux and the Power Platform to deliver a value service to their client.
April 25, 2016
In this session, you will learn about new, pre-sized IBM Power configurations that are optimized for SAP HANA.
April 19, 2016
One of the biggest challenges in the late 1960s at NASA was figuring out how they were going to store all the telemetry from their spacecraft. Scientists and astronauts knew this information would be crucial to not only the current mission but future missions. The problem was they just didn’t have the storage capacity to capture it all.
DATA and ANALYTICS
April 15, 2016
The proliferation of smart handsets, constant roll out of new applications and the on-going expansion of mobile networks into previously under- or entirely un-served communities in developing regions like Africa is driving exponential data growth that shows no signs of abating any time soon. To cope with this data boom, increasing numbers of new mega data centers are being built by the Internet giants and we expect this trend to continue.
April 12, 2016
I had the chance to catch up with Jeff Sussna ahead of his keynote address on continuous design, scheduled for DevOpsDays Atlanta, April 26-27. Jeff discussed the importance of designing for service, responding to the unexpected, and the importance of building empathy across teams.