Inside the Briefcase


WHEN IT COMES TO PROTECTING DATA – TAKE YOUR HEAD OUT OF THE CLOUDS

WHEN IT COMES TO PROTECTING DATA – TAKE YOUR HEAD OUT OF THE CLOUDS

In the last five years, Cloud hosts such as Amazon Web Services, Google, Microsoft, Box and Dropbox have become increasingly popular and cost effective for storing and sharing data. That said, data theft has never been greater with network...

Wanted: Guardians of the Data

Wanted: Guardians of the Data

Today's IT Needs Heroes to Keep Sensitive Data Safe & Protected. Over 78% of data breaches occur from employee negligence or maliciousness according to a recent study.

EMV Hits The US – Now What?

EMV Hits The US – Now What?

Fewer than half of all payment cards and PoS terminals in the US are currently EMV-ready. Moreover, US merchants and card issuers have been slow to migrate to the new technology. In the wake of EMV’s worldwide implementation, a...

Making Mobile Wallets Safer

Making Mobile Wallets Safer

Consulting firm Chadwick Martin Bailey found in a recent survey that 15 percent of U.S. consumers have used a mobile wallet in the past six months, up from nine percent in the same period in 2013. The numbers may...





Briefcase Highlights


DATA and ANALYTICS 

WHEN IT COMES TO PROTECTING DATA – TAKE YOUR HEAD OUT OF THE CLOUDS

October 26, 2015 No Comments

In the last five years, Cloud hosts such as Amazon Web Services, Google, Microsoft, Box and Dropbox have become increasingly popular and cost effective for storing and sharing data. That said, data theft has never been greater with network and cloud security becoming more porous. As the need for information sharing increases, the network domain and cloud-based model become more inadequate.

Build an efficient control center for your digital business

October 26, 2015 No Comments

E-commerce is governed by a number of key performance indicators (KPIs) that should be measured on a daily basis. The most important and common ones are: total sales, number of unique visitors, number of placed orders, conversion rates (the percentage of visitors who place an order), return rates and delivery times.

Wanted: Guardians of the Data

October 23, 2015 No Comments

Today’s IT Needs Heroes to Keep Sensitive Data Safe & Protected. Over 78% of data breaches occur from employee negligence or maliciousness according to a recent study.

The Internet of Things Is Killing Your Storage: Best Practices for the Brave New World

October 23, 2015 No Comments

IDC points to several factors that are enabling the rise of the Internet of Things (IoT), including a global culture that has embraced and now expects greater connectivity; ongoing interest in and development of smart cars, homes and cities; and advances in connectivity infrastructure. Consequently, the analyst firm anticipates that IoT technology and services spending will generate global revenues of $8.9 trillion by 2020.

How SaaS-Safe Time Clock Software Can Benefit Your Business

October 20, 2015 No Comments

If you’re not familiar with the term, SaaS is a distribution method that hosts powerful software on a network or via the cloud, and manages it by a remote vendor or service provider. Once subscribed to the service, you can tap in and manage exactly what you need to, and so can your employees should the system call for it. Troubleshooting, service time and installation are all handled by the vendor or service provider.

Five Places to Focus Your Privacy Efforts

October 20, 2015 No Comments

by Agathe Caffier, DMIThese days, there’s just no telling who’s accessing your data. It could be a social network, an ad retargeting campaign, or even a cyber criminal who’s bought your private information on the dark Web. Read More >>>

IT Briefcase Exclusive Interview with Napatech: The Future of Network Appliances

October 19, 2015 No Comments

Daniel Joseph Barry, NapatechIn this interview, Dan Joe Barry speaks with IT Briefcase about the results of a recent Heavy Reading survey of communications service provider (CSP) and network equipment provider (NEP) registrants regarding the current use of both traditional hardware and virtualized network appliances. Read More >>>

EMV Hits The US – Now What?

October 19, 2015 No Comments

Fewer than half of all payment cards and PoS terminals in the US are currently EMV-ready. Moreover, US merchants and card issuers have been slow to migrate to the new technology. In the wake of EMV’s worldwide implementation, a wave of technologies – including near-field communication (NFC), tokenization and cloud-based wallets – is having an accelerating impact on the industry.

Making Mobile Wallets Safer

October 13, 2015 No Comments

Consulting firm Chadwick Martin Bailey found in a recent survey that 15 percent of U.S. consumers have used a mobile wallet in the past six months, up from nine percent in the same period in 2013. The numbers may seem small at first glance, but do the math: that’s a 66 percent increase in usage in just two years. In terms of awareness of mobile wallets, the percentage jump is even higher. Their Mobile Wallet in 2015 and Beyond report found that 18 percent of consumers are “very familiar” with mobile wallets, compared to eight percent in 2013.

Prepare your e-commerce site for the Christmas shopping rush

October 13, 2015 No Comments

The Christmas shopping rush is soon upon us and the only thing we can be certain of, is that online shopping of gifts will continue to increase. But also that many e-customers will be disappointed with their online shopping experiences. “Response time is money”, claims Sven Hammar, CEO of Apica, a company offering solutions for testing, monitoring, and optimizing the performance of cloud and mobile applications like e-commerce platforms.

How to deliver hybrid apps in two weeks

October 12, 2015 No Comments

Attend this on-demand webcast and learn how you can accelerate application delivery to provide new capabilities and new features on demand via continuous delivery for hybrid cloud applications.

Rethinking Big Data Platforms like Hadoop with Open Technology

October 12, 2015 No Comments

This webinar with Dr. Srini Chari, Managing Partner, Cabot Partners and IBM Distinguished Engineer Linton examines how organizations can derive high value insights by framing strategic business questions and combining systems of records with systems of engagement and how these can be achieved by implementing a high-performance, scalable and agile information foundation to support both real-time and large-scale analytics capabilities.

Transforming Business with Enterprise Mobility

October 12, 2015 No Comments

In this webcast, we answer those questions and more with two of the industry’s leading experts. Gartner VP and Distinguished Analyst, Ken Dulaney and Microsoft Services Director of Devices and Mobility, Brad Smith. They’ll reveal how mobility can transform your business.

How to Ease the Pain of Data Lineage Collection Mandated by BCBS 239

October 12, 2015 No Comments

Join this webcast to review this and other BCBS 239 mandates and the challenges they pose. We will offer some ideas on making compliance easier and less expensive ideas based on a combination of technical expertise and deep industry experience. If you are dealing with the headaches caused by BCBS 239, you won’t want to miss this!

How Developers Can Understand the Relationship Between Users and Hits Per Second

October 8, 2015 No Comments

Load testing is important for the overall functionality and speed of a website. Throughput, or the difference between Concurrent Users and Hits and Requests per Second, plays a big role in website functionality and performance goals. However, it’s often unclear what numbers teams should be shooting for in terms of performance goals, as the relationship between Concurrent Users and Requests per Second is not always understood. This post examines how to look at the relationship between these two values to strive for optimal website performance.

How to Tear Down Corporate Silos

October 5, 2015 No Comments

It has been reported throughout many different businesses how silos, no matter the size, can be detrimental to an organization’s ability to succeed in a rapidly changing world. Having silos in place can cause a barrier between the individual employee and senior level management. Often times, senior leadership can be completely isolated from lower management levels.

Top 7 Tools for Analyzing and Parsing Your PHP Code

September 30, 2015 No Comments

PHP is a powerful scripting language that is especially designed for website development. The scripting language powers everything from millions of simple blog sites to the most popular websites such as Facebook, Digg, and many others. Most website developers prefer using PHP language to other server side scripting languages such as Ruby and Python. The reason for its immense popularity in the online community is that it is open source and allows development of dynamic websites with flexible features and robust security options. There are so many different PHP tools available online that finding the best ones is a difficult task indeed.

Analytics Recruiting: A Balancing Act

September 30, 2015 No Comments

by Joe DeCosmo, Enova InternationalWhile many believe the analytics talent crunch is real, others think there’s more hype behind this story than substance. The need for this particular talent set is growing, but in some instances companies have scrambled to hire data scientists and analysts at all levels . Read More >>>

Critical Choices: Tips on Choosing the Best Management Institutes for IT Courses among Others

September 25, 2015 No Comments

The business industry in all its various facets is very competitive. New developments in technology, manufacturing, communication and law have made significant changes in the way we do business locally, nationally and globally.

Big Data, BI Tools and the Rebirth of the Insurance Industry

September 23, 2015 No Comments

Insurance is an industry already drowning in data. Some large insurance companies struggle to manage their in-house data as is, upgrading their internal data management systems every few years in hopes of finally getting it all under control. It might seem like they would be the last industry to welcome the era of big data, but think again. Just the opposite is true.

How To Effectively Protect Your Computer And Data From Malicious Software

September 22, 2015 No Comments

Attacks on business computers and data are more prevalent today than a few years ago. Hackers can use malicious software embedded in emails, websites and downloadable files to infect your computer, or to steal valuable financial information, business records, and research data. Therefore, protecting your companies network, computers, and mobile devices must be a top priority. Here are some things you can do to shield your business from hackers and malicious software.

IT Briefcase Exclusive Interview: Technology Recruiting with Bram Daly

September 22, 2015 No Comments

with Bram Daly, Alexander Mann SolutionsIn the below interview, Bram Daly, Information Technology Client Services Manager for Alexander Mann Solutions, shares insights on the recruiting process in the technology sector. He offers advice for companies looking to attract and retain top talent. Read More >>>

Drilling Into the Data Iceberg: How Unified, Intelligent Storage Can Fix the ‘Dark Data’ Problem

September 17, 2015 No Comments

by Mohit Aron, CohesityThis article will focus on a key data issue that companies today face: how to intelligently manage and use every byte of corporate data—even the vast stores of untapped data hidden beneath the surface. Read More >>>

Big Data Startup Aims to Shake up the Analytics Market

September 10, 2015 No Comments

Tweet SOURCE: Dataiku Big Data analytics is so popular as a concept right now that some Fortune 500 companies are bombarding the airwaves with commercials touting their capabilities. But for most, hiring the services of IBM Watson to bring sanity and strategic value to their data is beyond their means. Other software packages and services […]

Learning from the NYSE & United Tech Outages: Five Things to Ask Yourself About IT Automation

September 9, 2015 No Comments

It happened to the New York Stock Exchange, the Wall Street Journal, and United Airlines — all on the same day: technology outages that led to hours of downtime, numerous losses, and exasperating inconveniences for these companies, as well as their customers.

Growth of identity and access management explained

August 31, 2015 No Comments

The identity and access management (IAM) industry is currently one the fastest growing IT sectors with more than a 500 percent growth expected by the start of the next decade. This market expansion will likely remain steady as companies of all sizes, from small startups to large enterprise entities, are seeing and experiencing the benefits of these solutions. The (obvious) return on investment is evident, they are finding, and those from all industries including healthcare, education, the financial sector, government agencies, manufacturing and others, to name a few.

Infographic: How Big is a Gig?

August 31, 2015 No Comments

If you need to send a file to someone, size is usually a big concern. Will it take forever to send or slow down my company’s network? Signiant specializes in developing software for fast and efficient large file transfers. And, after over a decade of moving extremely large files for their customers — from the high resolution footage of feature filmmakers to the huge data sets of life science researchers — they’ve found that it’s often difficult to relate to the full scale of data sizes being transferred over the Internet. Signiant made this infographic to help put a single gigabyte of data in perspective, illustrate some of the largest file types they see, and show some of the various options for moving large files around.

Why You Should Embrace Virtualization

August 31, 2015 No Comments

Virtualization touches all of the main corporate technology disciplines, from networking to cloud computing, and is therefore a crucial skill for IT practitioners. The latest trend powered by virtualization is “software-defined everything,” which in turn is challenging IT practitioners to adopt new software-related skills, such as scripting, packaging, and API programming. Ultimately, embracing virtualization is about so much more than understanding virtual machines and if an IT practitioner fails to grasp this industry’s evolution, and adapt, then they potentially risk facing a challenging future in the technology industry.

7 Tips for Cloud Preparedness

August 31, 2015 No Comments

September is National Preparedness Month, which in part, is designed to help businesses plan for and protect against natural or human-caused disasters. Certainly, CISOs and information security pros working in the healthcare industry know that the importance of preparedness extends to the management and security of networks, systems and assets. Aggressive cloud adoption in the U.S., in particular, requires awareness of a specific set of challenges and opportunities in order to build a secure and resilient cloud program.

IT Briefcase Exclusive Interview: The Value of a Two-tier Application Strategy

August 31, 2015 No Comments

with Rahul Asthana, KenandyIn this interview, Rahul Asthana, Senior Director of Product Marketing at Kenandy, speaks with IT Briefcase about why some enterprises pursue a two-tier application strategy and how they transition fully to new systems. Read More >>>

ADVERTISEMENT

DTX ExCeL London

WomeninTech