Inside the Briefcase


Where does Security fit in DevOps?

Where does Security fit in DevOps?

By Eric Minick and Diana Kelley, IBM
Organizations are under increased pressure to continuously create and deploy innovative products, software, and apps. This added pressure makes it increasingly important to embed security throughout the entire development process.

Sabermetrics for the Data Center

Sabermetrics for the Data Center

by Dave Wagner, TeamQuest
Today, cost-effective and winning teams today are being built by integrating holistic understandings and measurements that look to yield a result greater than the sum of the parts -- measuring what matters.
Read...

IT Briefcase Exclusive Interview with Sai Sundhar Padmanabhan, ManageEngine

with Sai Sundhar Padmanabhan, ManageEngine
Below, Sai Sundhar Padmanabhan, marketing analyst at ManageEngine, discusses the state of network traffic flows, why the ability to monitor high flow rates is critical to IT and business, and how to make...

Info-tech Vendor Landscape: Virtual Backup Software

Info-tech Vendor Landscape: Virtual Backup Software

This independent report from Info-Tech evaluates and scores 14 companies in the Virtual Machine Backup market. It can help you understand what's new in the virtual backup market, evaluate virtual backup vendors and products for your needs and determine...

Conquering the Top 5 Enterprise Data Protection Challenges

Conquering the Top 5 Enterprise Data Protection Challenges

Today's datacenters face a gauntlet of challenges including protection of physical and virtual environments, fast recovery of data, reducing backup times and storage requirements, server consolidation, and disaster recovery. How are savvy CIO's conquering these types of challenges? Find...

Virtual Machine Backup: Is Your Organization Doing It Right?

Virtual Machine Backup: Is Your Organization Doing It Right?

If you're not virtualizing, you're missing reduced equipment, management, and utilities costs, along with increased server utilization rates and the right path to cloud computing. But when you virtualize, backup becomes even more of an issue. Traditional agent-based backup...

BYOD Security: 5 Tips for IT Professionals

BYOD Security: 5 Tips for IT Professionals

by Rick DelGado, Independent Author
Personal devices have become a common part of the working environment now. More and more, companies are adopting Bring Your Own Device (BYOD) policies, allowing employees to use their own devices both inside and outside...





Briefcase Highlights


DATA and ANALYTICS 

Harnessing the Power of Smarter IT Infrastructure to Increase Efficiency

June 30, 2014 No Comments

By Alex Yost, IBMThe US Energy Information Administration expects global energy use to increase 56 percent between 2010 and 2040 – the equivalent of 4,000 power plants. But not all that energy will be put to good use. Much of it will be lost through inefficient systems and processes.Read More >>>

Where does Security fit in DevOps?

June 24, 2014 No Comments

By Eric Minick and Diana Kelley, IBMOrganizations are under increased pressure to continuously create and deploy innovative products, software, and apps. This added pressure makes it increasingly important to embed security throughout the entire development process. Read More >>>

Simplifying the Development and Publishing of Apps for Businesses Today

June 24, 2014 No Comments

As digitization and mobility in companies become all pervasive, and IT departments continue to strive to do more with less, the shortage of IT skills to support Mobile Apps development and publishing is an increasingly acute issue.

Top Five Considerations: Ensure Business Continuity for Your Website

June 18, 2014 No Comments

How do you ensure your website stays secure? What are the best methods for preventing DDoS, DNS, and application layer attacks? And more importantly, what security method will work best for your organization?

Charting Your Analytical Future – Creating effective visualizations to harness insight from increasingly complex data Webinar

June 18, 2014 No Comments

See how to take advantage of new visualization capabilities in the Business Analytics portfolio to address business requirements and learn about the next-generation data discovery solution that can help your business users independently uncover insights and answers from their data.

Implementing Successful Business Intelligence Projects: What the 2014 World Cup Can Teach Us

June 18, 2014 No Comments

After years of planning, the 2014 World Cup is set to kick off in Brazil this week. Here we look at what it takes to pull off a global sporting event – and what this can teach us about delivering successful Business Intelligence projects.

Top Tips for an Effective Cloud Migration

June 11, 2014 No Comments

By Sarah Lahav, SysAid TechnologiesFor organizations built on in-house IT solutions, making too many changes too quickly can introduce unknown risks and frustrate end users who need to learn new software. The transition to the cloud therefore calls for a strategy. Read More >>>

Business Continuity Meets the Cloud: Protecting Your Reputation in the Always-on World

June 11, 2014 No Comments

By Laurence Guihard-Joly, IBMNot so long ago, a system outage equaled a forced recess for employees while a member of the IT team rebooted a server. There were consequences of course including the loss of data, inconvenienced customers, angry managers and more. Read More >>>

How Greed, Generosity and the Defense of Civil Liberties Can Put Your Data at Risk

June 10, 2014 No Comments

By Cam Roberson, Beachhead SolutionsSome human traits are security hazards – but not always because they are faults. As a matter of fact, some traits directly and deliberately engineer situations in which data leaks are more likely. Read More >>>

IT Briefcase Exclusive Interview with Pete Malcolm, President and CEO of Power Assure

June 10, 2014 No Comments

with Pete Malcolm, Power AssureNumerous systems management software both for IT and facilities have been commonly deployed in data centers. In this interview, Pete Malcolm from Power Assure outlines top trends in data center management today. Read More >>>

Five Ways Box Makes SharePoint Better

June 8, 2014 No Comments

Businesses around the world have made significant investments in Microsoft SharePoint for content management. However, these same companies are struggling with making the transition to a more mobile, more collaborative workplace. Download this white paper to learn five ways Box can make SharePoint better.

3 Tips for Deploying “Systems of Engagement” Practices for the Benefit of your Customers

June 6, 2014 No Comments

by Mac McConnell, BonitaSoftOne unintended consequence of employing customer-focused software systems is they view the world through a singular lens, which can quickly become a problem. These systems are generally geared toward providing general information to the users, without necessarily including recommendations for action. Read More >>>

4 Industries Bringing Big Ideas to Life through IT Infrastructure

June 6, 2014 No Comments

It’s clear that any company, regardless of industry, is reliant on – or stands to improve its business through – the use of technology. Concepts like Big Data, Cloud and the Internet of Everything are relatively new pieces of the technology puzzle, but are quickly becoming vital to modern consumers and the businesses that serve them.

The Most Common Governance Mistakes in SharePoint and How to Avoid Them

June 5, 2014 No Comments

by Steve Marsh, Metalogix Defining governance is not easy and many organizations skip this task and move forward without a clear understanding or plan for what governance means. So when SharePoint administrators have to enact ill-defined governance, mistakes inevitably follow. Read More >>>

Sabermetrics for the Data Center

June 3, 2014 No Comments

by Dave Wagner, TeamQuestToday, cost-effective and winning teams today are being built by integrating holistic understandings and measurements that look to yield a result greater than the sum of the parts — measuring what matters. Read More >>>

Cloud Computing: A Painkiller for IT Managers

June 3, 2014 No Comments

by Mark Miller, dinCloudCloud computing continues to gain a good reputation among IT professionals worldwide. According to analyst research firm Gartner, Inc., “The use of cloud computing is growing, and by 2016 this growth will increase to become the bulk of new IT spend. Read More >>>

IT Briefcase Exclusive Interview with Sai Sundhar Padmanabhan, ManageEngine

June 3, 2014 No Comments

with Sai Sundhar Padmanabhan, ManageEngineBelow, Sai Sundhar Padmanabhan, marketing analyst at ManageEngine, discusses the state of network traffic flows, why the ability to monitor high flow rates is critical to IT and business, and how to make sure you can handle high flows.      Read More >>>

Advice for IT departments During Severe Weather Season

May 30, 2014 No Comments

In light of severe weather season, DriveSavers Data Recovery has put together a list of tips to keep top of mind in the event your company is threatened by damaging weather. These preventative and post storm measures could help save vital data and expensive devices.

Upskilling for the Modern Data Center

May 28, 2014 No Comments

by Antonella Corno, CiscoToday’s data center bears very little resemblance to the data center of just a few years ago. The rapid evolution of technology, while an overall boon for business, has created a dual challenge for many IT departments. Read More >>>

The Files Ruining Your Sharing Policies

May 27, 2014 1 Comment

According to Ponemon’s 2013 Cost of Data Breach Study, the majority of information leaks aren’t caused by malicious or criminal attacks. Rather, about two-thirds of data breaches are actually due to system glitches and human factors. You can’t afford to let users break important information-sharing policies. The study found the average cost of a data breach in the United States is US$188 per record, which makes the average organizational cost more than $5.4 million.

Managing IT Points of Failures: Separating a Fire Drill from a Fire

May 21, 2014 No Comments

by Deepak Kanwar, ZenossA red flag on the IT operations dashboard at many organizations still means “All Hands on Deck,” a failure has been detected, it’s time to grab the safety gear and ready the hoses for what could be hours of intense fighting. Read More >>>

Innovative Trends Make Mobile App Development More Responsive

May 19, 2014 No Comments

As the array of mobile devices flourish in the market and as mobile applications coded in HTML5 start appearing in abundance, it becomes more essential for mobile app developers to concentrate progressively on the aspect of responsive app schemes. Why? Because amidst an overwhelming number of mobile options/solutions existing in the current hour, the singular code of a responsive design looks like the most tempting universal answer for mobile optimization.

How to Leverage the Knowledge in Your Networks to Drive Innovation

May 19, 2014 No Comments

by Alex Saric, Ariba, Inc.The knowledge that’s now intrinsic to our networks can drive innovation—in products, processes, business models, and more. But to leverage network knowledge for innovation, you have to know where to find the knowledge and how to put it to use. Read More >>>

Meeting Healthcare’s Requirements for Effective Data Protection

May 14, 2014 No Comments

Electronic Health Records (EHR) hold the key to higher quality and more accurate patient care. But they also cause healthcare providers, pharmaceutical firms and insurance payers to generate massive volumes of data. Imaging, diagnostics, prescriptions, patient records, claims and other protected health information — all must be safely backed up and kept quickly restorable to assure that they are protected, available and securely accessible as needed by providers and as required by law.

IT Briefcase Exclusive Interview with Ed Brill, Director, Mobile Enterprise Marketing, IBM

May 9, 2014 No Comments

with Ed Brill, IBM Social BusinessIn this interview, Ed Brill from IBM Social Business discusses mobile as a business transformation tool and considerations for the ‘upwardly mobile’ enterprise. Read More >>>

Info-tech Vendor Landscape: Virtual Backup Software

May 6, 2014 No Comments

This independent report from Info-Tech evaluates and scores 14 companies in the Virtual Machine Backup market. It can help you understand what’s new in the virtual backup market, evaluate virtual backup vendors and products for your needs and determine which products are most appropriate for your organization. Find out why Symantec was named a “Champion” in virtual backup software.

Conquering the Top 5 Enterprise Data Protection Challenges

May 6, 2014 No Comments

Today’s datacenters face a gauntlet of challenges including protection of physical and virtual environments, fast recovery of data, reducing backup times and storage requirements, server consolidation, and disaster recovery. How are savvy CIO’s conquering these types of challenges? Find out how in this white paper by vExpert, David Davis!

Virtual Machine Backup: Is Your Organization Doing It Right?

May 6, 2014 No Comments

If you’re not virtualizing, you’re missing reduced equipment, management, and utilities costs, along with increased server utilization rates and the right path to cloud computing. But when you virtualize, backup becomes even more of an issue. Traditional agent-based backup and recovery won’t work in a virtual environment. Going without a solid backup and recovery plan for your virtualized data is an unacceptable business risk. Check out this easy-to absorb infographic to learn the five things to look for in a virtual machine backup solution.

The New IT for Small Businesses: The Costs and Benefits of Utilizing Emerging Technologies to Drive Competitive Advantage

May 6, 2014 No Comments

by Suaad Sait, SolarwindsThe practice of IT is in a constant state of change – from the birth of the mainframe to the personal computer explosion to the data center boom. We are now in an era where IT is a part of every business, not just big business or those placed squarely in the tech industry. Read More >>>

BYOD Security: 5 Tips for IT Professionals

May 5, 2014 No Comments

by Rick DelGado, Independent AuthorPersonal devices have become a common part of the working environment now. More and more, companies are adopting Bring Your Own Device (BYOD) policies, allowing employees to use their own devices both inside and outside the office.Read More >>>

ADVERTISEMENT

DTX ExCeL London

WomeninTech