Inside the Briefcase


IT Briefcase Exclusive Interview with SIOS Technology: SANS-based vs. Cloud Clusters

IT Briefcase Exclusive Interview with SIOS Technology: SANS-based vs. Cloud Clusters

with Jerry Melnick, SIOS Technology
In this interview, Jerry Melnick, COO, SIOS Technology discusses the difference between SAN-based and Cloud data storage clusters, and the benefits and drawbacks of each approach.
Read More >>>

Federating Identities for a Successful Enterprise IdP Deployment

Federating Identities for a Successful Enterprise IdP Deployment

by Lisa Grady, Radiant Logic
When customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security...

The New Rhythm of IT: 5 Hurdles to Overcome in 2014

The New Rhythm of IT: 5 Hurdles to Overcome in 2014

by Ken Berryman, BMC Software, Inc.
The Federal Reserve estimates that in 2012 one in six checks were deposited as a digital image rather than in physical form. For consumers, almost 50 percent of these image-based deposits were through...

The Ins and Outs of Secure Fax and Document Delivery Solutions for the Enterprise

The Ins and Outs of Secure Fax and Document Delivery Solutions for the Enterprise

by Bill Ho, Biscom
Data center annual budgets today are often devoted to securing an organization’s IT networks. One of the most important security considerations IT personnel face is the need to protect sensitive information, such as data exchanged...





Briefcase Highlights


DATA and ANALYTICS 

What’s in Store for 2015 – Technology Edition

December 4, 2014 No Comments

by Dan Pickett, nfrastructureWe predict that through next year, technology will only continue to become “consumerized” as devices become more connected, everything becomes software-defined and the Internet of Things becomes completely engrained in our everyday life. Read More >>>

What Globalization Means in the Age of Real-Time, Mobile and Cloud

December 3, 2014 No Comments

by Rob Vandenberg, LingotekRemember when people first started talking about globalization in the 1980s? Branching out into new markets usually meant physically expanding to somewhere in Europe or the U.K. It required opening new offices, growing new markets through direct sales and having dedicated translators interpret content by hand. Read More >>>

IT Briefcase Exclusive Interview with SIOS Technology: SANS-based vs. Cloud Clusters

December 3, 2014 No Comments

with Jerry Melnick, SIOS TechnologyIn this interview, Jerry Melnick, COO, SIOS Technology discusses the difference between SAN-based and Cloud data storage clusters, and the benefits and drawbacks of each approach. Read More >>>

Hiring the Right People for Your IT Service Desk

December 3, 2014 No Comments

By Arvind Parthiban, ManageEngineHiring people for a service desk is a major challenge but an important one. Without good people, even the best processes and tools will fail to deliver high quality services and support. So where do you start? Planning a recruitment process is critical to helping you find the right person quickly. Read More >>>

Understanding Deep Packet Inspection Once and For All

November 21, 2014 No Comments

Today’s IT is one of convergence, applications and a demand for constant availability. And when it comes to downtime, all of these elements combined with the fact that many new applications are being provisioned with SaaS providers have created the perfect storm for IT pros tasked with getting to the root of problems and keeping business running. The question, “Is it the network or the app?” has never been more critical, nor more difficult to answer.

Cloud and Data Protection Trends 2015

November 17, 2014 No Comments

This webcast will take a high-level look at technology trends within several major Data Protection domains, such as data loss prevention, storage system recovery, and data security.

How Retailers Can Still Improve Security before Black Friday

November 17, 2014 No Comments

Each year, retailers hustle and strain to get their online and in-store merchandise ready to entice shoppers for the annual Black Friday rush. Their main concern, of course, is whether this season’s merchandise will prove popular. But what might get overlooked, is whether they’ve done enough to ward off the worst kind of shopper: the Cyber Hacker — who preys on stores at peak holiday season and can cause serious financial and reputational damage.

2015 mobile computing trends

November 13, 2014 No Comments

There are now roughly two billion smartphone users in the world, and several hundred million tablet users. Add to that laptops and you get a considerable chunk of the world’s population that is always connected, on the go, everywhere, with their work and private lives in their pockets and handbags. But mobility has side effects… The cracked display is a common sight these days.

IBM Predicts Record Mobile Holiday Shopping as Consumers Browse and Buy on the Go

November 6, 2014 No Comments

IBM (NYSE: IBM) today released its predictions for the 2014 holiday shopping season based on billions of online and in-store transactions analyzed by the IBM Digital Analytics Benchmark and IBM Quarterly Retail Forecast.

How to Navigate Data into the Cloud

October 31, 2014 No Comments

By Dave Wagner, TeamQuestThe increase in businesses moving their data into the cloud has created several new challenges for data center managers. Many departments and employees are increasingly using the public cloud to host unpredictable applications with unknown resource requirements. Read More >>>

Smarter Data Protection for your Evolving Business

October 29, 2014 No Comments

If your business is like many organizations that need to deliver 100% data availability, manage rapid data growth; yet control costs, now is the time to discover how modernized data protection can help your organization deliver better outcomes.

Behold, pathetic mortals, a vampire’s data visualization dashboard

October 28, 2014 No Comments

Greetings, insignificant souls. You may call me … Gregor Castamere. It is not my true name. I stalked this strip of land when it was called New Amsterdam. My family’s name is well known. I have lived for more than 600 years, concealing my terrible secret. I am a vampire.

BYOD: California Court Decides Who’s Wearing the Pants

October 22, 2014 No Comments

The workplace trend of BYOD (Bring Your Own Device) is nothing new. What remains unclear, however, is the burden of ownership, cost and security. When employees bring their own cell phones, laptops or tablets to work, there’s a fair chance they’ve personally purchased those devices—data plans and all. In fact, some employers today require a BYOD policy, with no intention of paying for any of it. As one CIO bluntly put it, “Well, we don’t buy their pants either, but they’re required for the office.”

It’s Time to Go All-in on the Cloud

October 22, 2014 1 Comment

By Joe Manuele, AvayaToday, enterprises and their IT departments are migrating to cloud services faster than ever before. In fact, no other technology in our industry is associated with such dramatic triple-digit growth as cloud. By 2020, the cloud computing industry will be a $40 billion market. Read More >>>

Fishing for Data in a Digitalized Tourism Industry

October 22, 2014 No Comments

By Yves de Montcheuil, TalendAmong the most digitalized industries, travel and hospitality is changing fast. Travel agents, airlines, airports, hotel chains – the entire industry is fishing for value in a seemingly-unlimited ocean of data. Read More >>>

Taking Control of Data Debris Benefits IT and Beyond

October 20, 2014 No Comments

In this webinar based on his article in ComputerWorld, CGOC faculty member David White describes how data retention is getting out of hand at many organizations.

Talking Results: Nuance Communications and IBM Harness Big Data with Elastic Storage

October 20, 2014 No Comments

Please Join IBM and Nuance Communications Inc. to learn how Nuance uses IBM Elastic Storage to improve the power of their voice recognition applications by managing storage growth, cost and complexity while increasing performance and data availability.

The Internet of Things Won’t Take Off Until These 3 Things Happen

October 15, 2014 No Comments

by Rob Vandenberg, Lingotekf your smartphone can’t read your mind yet, it will soon. Innovators and early adopters are sprinting towards the dream of a connected world, connecting everything from cars to toasters. Their exuberance is contagious. Read More >>>

Federating Identities for a Successful Enterprise IdP Deployment

October 15, 2014 No Comments

by Lisa Grady, Radiant LogicWhen customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security but also productivity and simplicity for your users. Read More >>>

Tales of the Unexpected: How Hackers Trick Web Sites into Sharing Your Data

October 9, 2014 No Comments

Recent months have seen a run of high-profile security breaches: social media sites losing phone numbers, retail stores skimming credit cards, healthcare organizations leaking patient records, and even celebrity voicemails and photo streams being hacked.

The New Rhythm of IT: 5 Hurdles to Overcome in 2014

October 8, 2014 No Comments

by Ken Berryman, BMC Software, Inc.The Federal Reserve estimates that in 2012 one in six checks were deposited as a digital image rather than in physical form. For consumers, almost 50 percent of these image-based deposits were through mobile devices. Read More >>>

The Ins and Outs of Secure Fax and Document Delivery Solutions for the Enterprise

October 8, 2014 No Comments

by Bill Ho, BiscomData center annual budgets today are often devoted to securing an organization’s IT networks. One of the most important security considerations IT personnel face is the need to protect sensitive information, such as data exchanged within the healthcare, financial, and legal sectors. Read More >>>

A Vision for Converged Backup Infrastructure

October 2, 2014 No Comments

IT is evolving at an accelerated pace today, thanks in large part to virtualization, cloud computing and big data. While these trends can lower costs and increase efficiency, they are too often delivered via point products that offer only marginal improvements to the traditional approach.

Data Back-up vs. Replication vs. Disaster Recovery

October 1, 2014 No Comments

by Ken Donoghue, Peak 10We often hear the three concepts expressed in the title above used interchangeably. For example, it’s not uncommon for someone to say, “I have a disaster recovery (DR) plan. We back up our files once a day.” Or, “We replicate our data to tape and store it offsite.” Read More >>>

Guiding Customer Relationships with an Integrated IT Approach

September 29, 2014 No Comments

by Dennis van der Veeke, SDLThere is no denying that brands have taken an increased interest in technology for marketing efforts. In fact, Gartner reported earlier in the year that 81 percent of organizations now have the equivalent of a chief marketing technologist position. Read More >>>

Innovation in the enterprise: How can CIOs ensure its success?

September 29, 2014 No Comments

How CIOs can handle the disruption caused by increased innovation in the enterprise. Ten years ago, mobile consisted of email, voice and SMS. Any innovation was very much behind the firewall, in a closed environment. If new developments were needed, resources would have to be allocated and as a result, any CIO would have to be very sure of a return on the investment before innovation projects could go ahead.

Got Big Data Problems? So Do Most Companies…

September 25, 2014 No Comments

Data analytics is not a new concept, but why are today’s businesses still grasping at how to use this information source to create more efficient and effective businesses? A recent survey by Lavastorm Analytics of 495 analytics professionals and C-level executives looked at current analytic usage, trends and future initiatives of businesses when it comes to big data solutions. What we uncovered is that most businesses are not fully harnessing big data analytics benefits, even though more than half of those surveyed are rapidly growing their investment in analytics tools.

Internet Safety by Top IT Security Experts

September 25, 2014 No Comments

The recent string of media reports about phishing or email password hacking security breeches,like the iCloud celebrity nude picture leak, have caused a media frenzy. This particular case received worldwide attention because the leak involved celebrities. However the reality is that email hacking happens all the time in personal and professional email accounts.

Why VMI is the future for our BYOD Generation

September 24, 2014 No Comments

While many approaches are being used to control the impact of the mobile age on IT, VMI technology shows your organization can both embrace and thrive in this new world.

The Threat of Disruptive Technology and Business Models to Traditional IT

September 24, 2014 No Comments

New technologies and business models from innovative, fledgling cloud vendors will have a staggering impact on the IT industry as these vendors compete against established vendors using a maverick approach to business operations. Large traditional IT vendors are suffering from stagnant revenues and experiencing further disruption as new tech offerings from smaller cloud companies change the consumption of IT.

ADVERTISEMENT

DTX ExCeL London

WomeninTech