Inside the Briefcase






Briefcase Highlights


DATA and ANALYTICS 

Redbook: Make Your System Highly Available and Recoverable Using PureApplication System

April 7, 2016 No Comments

This IBM® Redbooks Solution Guide describes how to use the strategies and the capabilities of IBM PureApplication® System to provide system high availability (HA) and disaster recovery (DR).

Redbook: Implementing High Availability and Disaster Recovery in IBM PureApplication Systems V2

April 7, 2016 No Comments

This IBM Redbooks publication describes and demonstrates common, prescriptive scenarios for setting up disaster recovery for common workloads using IBM WebSphere Application Server, IBM DB2, and WebSphere MQ between two IBM PureApplication System racks using the features in PureApplication System V2.

Understanding Patterns of Expertise: Virtual Application Patterns

April 7, 2016 No Comments

This article offers a gateway of understanding into the IBM PureSystems™ family of expert integrated systems by providing a tour of the structure of the PureApplication System and virtual patterns of expertise.

Payment Security Best Practices

March 31, 2016 No Comments

Accepting a variety of payment forms — including credit and debit cards, and mobile and Web-based payments — is beneficial to all business owners. Not only does payment flexibility give customers the right to choose how to pay, based on the size and nature of their purchase, it can level the playing field between small business owners and well-established competitors.

Faster, Smarter DevOps

March 29, 2016 No Comments

Call it DevOps or not, if you are concerned about releasing more code faster and at a higher quality, the resulting software delivery chain and process will look and smell like DevOps. But for existing development teams, no matter what the velocity objective is, getting from here to there is not something that can be done without a plan.

Are You Equipped to Win the Latest Battle Facing IT?

March 23, 2016 No Comments

Delivering what people expect from their technology while maintaining the secure environment for which IT is responsible. It’s called People-Centric IT as a Service (ITaaS) and this infographic will show you just how effective it can be in resolving your everyday, every way battles.

Through The Looking Glass: Data Visualization and Decision-Making

March 23, 2016 No Comments

Big data is a big deal. Enterprises and small businesses alike are looking for ways to manage this unending flood of information, mine it for actionable insights, and make it a key driver of ROI. Yet with so much data generated moment to moment, it’s easy for IT pros and C-suite executives to get bogged down in the details instead of seeing the big picture. The result? Increased emphasis on data visualization — charts, diagrams and infographics that distil complex concepts down into easily understood, bite-sized pieces. The problem? Not all data visualizations are created equal — here’s how they can all go wrong and how your company can find the right fit.

5 Startling IT Stats for Small Businesses

March 22, 2016 No Comments

In an ever changing economy, businesses need to keep up with the evolution of technology. Luckily, solutions have emerged that allow business owners to outsource their IT efforts. Activities such as IT security, Hosting, IT Support and Data centre infrastructure maintenance can be handed over to an external company who are proficient at what they do. Below is an infographic constructed by Couno that details what small business are missing in this day and age of IT.

Security and Compliance: How Utilities Meet NERC CIP v5 Requirements

March 22, 2016 No Comments

As soon as the global panic incited by the events of September 11, 2001 settled into public sector anti-terrorism initiatives, experts brought to light grave concerns about the security of the nation’s energy infrastructure. Even so, 15 years later, many energy organizations find themselves scrambling to meet the security measures set forth by NERC in their Critical Infrastructure Protection standards (CIP, Version 5). The new, much more comprehensive standards went into effect July 1, 2015, but the looming compliance deadline on July 1, 2016 is the real deal—an enforcement deadline that means auditors are on their way.

4 Desktop Disruptions: The computing Workspace as we know it will never be the same

March 20, 2016 No Comments

This paper will cover four imminent upheavals in end user computing that IT needs to be prepared to address in 2015 and beyond.

What Does a 5G World Mean for the IoT Industry?

March 18, 2016 No Comments

It seems like it wasn’t that long ago when people and businesses alike were excitedly talking about the possibilities and potential that accompanied the introduction of 4G networks. There’s little doubt that 4G has transformed how people use mobile devices and take advantage of internet connections, but already many experts are dreaming of what lies ahead with the fifth generation of mobile networks: 5G. Verizon may introduce the first 5G network as early as next year, while Samsung may show off its own 5G capabilities at the 2018 Winter Olympic Games.

Aberdeen Group Report: Product Development Success = Tools, Talent and Eliminating Waste

March 15, 2016 No Comments

The report, which looked closely at the habits of 148 product design firms, found that the right tools, the right talent, and a focus on eliminating waste in workflow processes are the keys to becoming a “Best-in-Class” product developer.

IT Briefcase Exclusive Interview: Top Skills Needed to Manage Hybrid IT Environments

March 14, 2016 No Comments

with Kong Yang, SolarWindsIn this interview, Kong Yang, Head Geek and technical product manager at SolarWinds, speaks with IT Briefcase on how hybrid environments are changing the role of the IT professional. Read More >>>

SSH User Keys: Strategies for Taking Control

March 10, 2016 No Comments

A common misperception about SSH user key management concerns the need to find and control all the private keys in an environment. The idea here is that, since private keys are like passwords, it’s possible to manage them using the same methods. Once all the private keys are well controlled, safety has been achieved. What may initially seem like common sense does not hold up under inspection.

Home Security and the Internet of Things

March 10, 2016 No Comments

The future, it seems, is one of connectivity — not only between people from across the globe thanks to things like social media and wireless technology, but between devices too. It’s no longer just our phones or computers that access the internet, but our light bulbs, coffee-machines, refrigerators, and microwaves. As a community, we’re welcoming the “Internet of Things” into our lives — encouraging a world of constant connection to each other, and the internet. As a result, estimates suggest that by 2020, the sum of IoT (Internet of Things) devices will reach 25 to 30 billion.

Overcoming the IoT’s Security Challenges

March 9, 2016 No Comments

Governments, utilities and businesses from every sector are embracing the possibilities of the Internet of Things (IoT). This interconnected environment promises safer public parks, more efficient factories, better healthcare – imagination seems to be the only limit when it comes to applying the IoT to today’s needs. However, for the positive action of all these improvements to work and life, there is at least an equal negative reaction. Gartner analysts recently revealed that by 2020, firms will have increased annual security budgets by 20 percent (up from less than one percent in 2015) in order to address security compromises in the IoT.

LogicNow Global IT Service Providers Harmony Report

March 7, 2016 No Comments

Based on the views of over 1,300 IT departments and almost 700 IT Service Providers, this report delivers the data and vital insights that will help every IT Service Provider to focus on improving sales figures, growing their portfolio and ensuring their service matches customer expectations.

A Starter Guide to IT Managed Services: MSP eBook

March 4, 2016 No Comments

This highly popular ebook introduces the MSP to the business of positioning, marketing, selling and operating Managed Services.

IT Briefcase Featured Interview: How To Be A Digital Master in 2016

March 4, 2016 No Comments

What sets digital masters apart, and how can you cultivate these capabilities within your own organization? In this Q&A, Derek Roos, CEO at Mendix, prompts George Westerman, Principal Research Scientist with MIT Sloan’s Initiative on the Digital Economy, to discuss the secrets of digital mastery. Find out how George responded to Derek’s questions. And learn what it means to be digital and the importance of collaboration between business and IT.

Key Technical Support Considerations for Smart IT Infrastructures

March 2, 2016 No Comments

We are entering a new era of computing. Following the programmable and tabulating systems eras, cognitive computing represents a huge leap forward. This new era brings with it fundamental differences in how systems are built and interact with humans.

eBook: Top Ten Tips for Selecting a Managed Services Provider

March 2, 2016 No Comments

Everyone’s looking to IT to create business value and innovation. But you’re short on resources. How do you pull that off? A cloud and managed services provider can help. The right vendor should show you that it can provide skills, processes and resources that exceed your in-house capabilities. Does it have what it takes to help your business transform?

Understanding Cloud Desktop and its Many Benefits

February 29, 2016 No Comments

A majority of businesses are moving critical applications from physical personal computers to the virtual environment. A 2015 IT priorities survey confirms this where 76% of the IT decision makers surveyed indicated their preference for cloud bases productivity applications. About 57% stated they would roll out enterprise file sharing and synching services on the cloud.

Is IT Prepared for the Changes in Enterprise Mobility?

February 29, 2016 No Comments

Mobile devices are quickly becoming the primary devices among enterprises. Their great user experience, increased computing capabilities, explosion of apps, and always-on connectivity combined with agility, make them ideal replacements for PCs. Mobility these days, is not just a tool enabling employees access to email and a handful of corporate applications, but rather a tool to improve employee productivity and ease of working by enabling them with real-time connectivity to customers, partners, suppliers and workers.

Are You Prepared for the Top Three Compliance Issues?

February 26, 2016 No Comments

by Fouad Khalil, SSH Communications SecurityNo matter what an enterprise’s major market is, it is probably subject to regulatory compliance requirements, such as PCI, SOX, FISMA and HIPAA. PCI requirements in particular demand a high level of auditability and controls. Read More >>>

Beyond SD-WAN: Network-Aware Orchestration

February 26, 2016 No Comments

It is becoming increasingly harder to maintain network reliability and consistent service levels across the organization. The adoption of cloud services, business application-focused requirements and evolving security policies require IT organizations to continuously deploy configuration changes.

How to use Data to Improve Employee Satisfaction

February 25, 2016 No Comments

As a business owner, you know how important it is to collect and use data to drive your company forward. But did you know that you can also utilize data to increase the level of satisfaction that your employees feel with their jobs? Keeping your employees happy means they’ll be willing to go the extra mile to help you and your company succeed, and it also means that they’ll be willing to stay with you for the long haul. Check out the tips below for using data to improve employee satisfaction.

How to Increase IT Self-Service Adoption

February 24, 2016 No Comments

Self-service is everywhere. More and more consumers are using do-it-yourself stations to book movie or flight tickets, withdraw cash from ATMs or simply make other banking transactions. Embracing this trend, many IT organizations have a self-service portal to the help desk to catch up with the increasing ticket volumes, to reduce efforts and costs, and most importantly, to automate routine incidents that don’t require a technician’s assistance. This is so organizations can handle more business-critical responsibilities.

The Network: Still the Foundation of IT

February 24, 2016 No Comments

Managing a modern enterprise network is not for the faint of heart: with more devices on the network; the always-present threat of data breach; and the challenges brought about by trends such as software-defined networking (SDN), the Internet of Things (IoT), and the cloud (including hybrid IT), there’s more pressure than ever on today’s network administrators. Yet, even under these high-stakes circumstances (and, in some cases, because of them), network performance must still be maintained to the highest standards.

Making the Business Case for Big Data in Insurance

February 23, 2016 No Comments

If it feels like every industry is being greatly affected by the mainstream arrival of big data analytics, that’s probably because it’s truly happening. Few businesses have been left untouched by big data’s ever expanding hand. There’s good reason for this of course. Big data is a transformative technology that carries with it lots of potential, provided it’s used correctly. As with any industry, many insurance companies have looked at big data analytics as a way to benefit their organizations.

The IoT Is Reinventing Manufacturing

February 18, 2016 No Comments

No longer a catchphrase or a vague notion, the Internet of Things is in full swing. McKinsey & Company estimates that the IoT has a total potential economic impact of $3.9 trillion to $11.1 trillion a year by 2025. Manufacturers are already spending considerable amounts of money on mobilizing the enterprise, including connecting employees, products, services and machines/vehicles. Digging deeper, we can see what functions in the business they’ve tackled first.

ADVERTISEMENT

DTX ExCeL London

WomeninTech