Inside the Briefcase


Data Center Transformation and its Impact on the Branch IT

Data Center Transformation and its Impact on the Branch IT

Enterprises increasingly seek to deploy complex branch networks and services while having minimal infrastructure and IT personnel onsite. Riverbed's Steelhead and Granite products show that, with time, many of the enabling capabilities that have led to datacenter efficiencies –...

Analyst Report: The Importance of Performance Management in Software-defined Networking

Analyst Report: The Importance of Performance Management in Software-defined Networking

Organizations have achieved significant benefit from virtualizing servers and storage environments, and now face the daunting task of deploying new network architectures to keep pace. Software-defined networking holds significant promise to deliver a new network architecture that is abstracted...

Community Hospitals Can Benefit from an Enterprise Data Warehouse

Community Hospitals Can Benefit from an Enterprise Data Warehouse

When it comes to the implementation of an Enterprise Data Warehouse (EDW), there is a tendency to believe large health care systems stand to benefit the most. Community hospitals, however, face the same challenges as larger health care systems,...

Beginners Guide to SSL

Beginners Guide to SSL

Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. This guide will de-mystify the technology involved and give you the...

How Extended Validation SSL Brings Confidence to Online Sales and Transactions

How Extended Validation SSL Brings Confidence to Online Sales and Transactions

Symantec EV SSL turns address bars green in high-security browsers for an extra layer of website security that customers can see and trust.

Choosing a Cloud Supplier with Confidence

Choosing a Cloud Supplier with Confidence

The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting...

Fraud alert – Phishing – The latest tactics and potential business impacts 2012

Fraud alert – Phishing – The latest tactics and potential business impacts 2012

As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years.

Internet Security Threat Report 2012

Internet Security Threat Report 2012

These resources give Symantec’s analysts’ unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. The result is the annual Symantec Internet Security Threat Report....

Energy Efficient Cooling for Data Centers: A Close-Coupled Row Solution

Energy Efficient Cooling for Data Centers: A Close-Coupled Row Solution

In recent years, traditional cooling systems design has proven inadequate to remove concentrated heat loads (20 kW per rack and higher). This has driven an architectural shift in data center cooling. The advent of a newer cooling architecture designed...

Fundamental Principles of Network Security

Fundamental Principles of Network Security

Security incidents are rising at an alarming rate every year. As the complexity of the threats increases, so do the security measures required to protect networks. Data center operators, network administrators, and other data center professionals need to comprehend...

Avoiding Costs From Oversizing Data Center and Network Room Infrastructure

Avoiding Costs From Oversizing Data Center and Network Room Infrastructure

Featured Whitepaper by The physical and power infrastructure of data centers and network rooms is typically oversized by more than 100%. Statistics related to oversizing are presented. The costs associated with oversizing are quantified. The fundamental reasons why oversizing...

Ten Cooling Solutions to Support High-Density Server Deployment

Ten Cooling Solutions to Support High-Density Server Deployment

This paper provides ten approaches for increasing cooling efficiency, cooling capacity, and power density in existing data centers.

Analyst Report on Mobile End User Experience

Analyst Report on Mobile End User Experience

New analyst brief published by Enterprise Management Associates

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

Choosing the right security solution is critical to the success of an online business. Look for trust-based security solutions that deliver protection and consumer peace-of-mind through cutting edge technology and integration with complementary third-party solutions.

Choosing a Cloud Hosting Provider with Confidence: Symantec SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers

Choosing a Cloud Hosting Provider with Confidence: Symantec SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers

In this must read white paper, “Choosing a Cloud Hosting Provider with Confidence: VeriSign SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers”, you will learn about cloud computing, the new opportunities, the new security challenges and...

WHITE PAPER:  Worst Practices In Business Intelligence: Why BI Applications Succeed Where BI Tools Fail

WHITE PAPER: Worst Practices In Business Intelligence: Why BI Applications Succeed Where BI Tools Fail

This paper provides insight into the top four worst practices for business intelligence

White Paper: Virtualization Business Benefits

White Paper: Virtualization Business Benefits

Tweet Intel and VMware discuss the business benefits of virtualization including the increased utilization of hardware resources by having more virtual machines per single server. Reducing hardware costs and data center footprint, virtualization enables businesses to save in energy...

Reduce Your Breach Risk: File Integrity Monitoring for PCI Compliance and Data Security

Reduce Your Breach Risk: File Integrity Monitoring for PCI Compliance and Data Security

This paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of malware as well as insider threats in identifying data breaches. It also discussed file integrity monitoring as a critical component of Payment Card Industry...

Whitepaper: Benefiting from Server Virtualization

Whitepaper: Benefiting from Server Virtualization

Tweet Increasing the use of server virtualization is a top priority for small and midsize businesses. According to ESG’s 2010 Spending Intentions Survey, it is nearly tied as the top priority for SMBs over the next 12 to 18...





Briefcase Highlights


Featured White Papers

Data Center Transformation and its Impact on the Branch IT

November 9, 2012 No Comments

Enterprises increasingly seek to deploy complex branch networks and services while having minimal infrastructure and IT personnel onsite. Riverbed’s Steelhead and Granite products show that, with time, many of the enabling capabilities that have led to datacenter efficiencies – such as consolidation, application server virtualization and cloud services – will extend to branch sites, too.

Analyst Report: The Importance of Performance Management in Software-defined Networking

November 9, 2012 No Comments

Organizations have achieved significant benefit from virtualizing servers and storage environments, and now face the daunting task of deploying new network architectures to keep pace. Software-defined networking holds significant promise to deliver a new network architecture that is abstracted and virtualized; however, organization would be well served to learn from previous efforts to virtualize other domains in order to avoid making the same mistakes.

Community Hospitals Can Benefit from an Enterprise Data Warehouse

October 8, 2012 No Comments

When it comes to the implementation of an Enterprise Data Warehouse (EDW), there is a tendency to believe large health care systems stand to benefit the most. Community hospitals, however, face the same challenges as larger health care systems, and they also need access to organizational data for decision making.

Maximizing the Customer Experience by Generating and Managing Simultaneous Customer Engagement

October 2, 2012 No Comments

Omnichannel retailing is a term increasingly used to describe the maximization of the customer experience through the variety of communications technologies currently available

Ten Questions You Should Ask Before Implementing An mHealth Solution

September 14, 2012 No Comments

This Mobile Health and Security white paper analyzes HIPAA security requirements and mobile health security best practices to assist healthcare organizations in evaluating and implementing secure and fully compliant mobile health solutions.

Application Visibility – A Recipe for Conducting Successful Virtualization Projects

September 10, 2012 No Comments

Organizations are increasingly striving to improve their utilization of their enterprise infrastructures and to provide their IT teams with tools allowing them to gain more management flexibility when delivering business-critical data to end-users. One of the key strategies that organizations are implementing to achieve this goal is virtualization of their servers, storage, and desktops.

Actionable Content: A Framework for Better Decision-Making

August 27, 2012 No Comments

All clinical content is “actionable” to some degree, meaning it can be absorbed, understood and acted upon. However, significant barriers exist that limit the degree to which content can be used to change behavior and drive positive clinical and financial outcomes.

Featured White Papers

Beginners Guide to SSL

August 22, 2012 No Comments

Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.

How Extended Validation SSL Brings Confidence to Online Sales and Transactions

August 21, 2012 No Comments

Symantec EV SSL turns address bars green in high-security browsers for an extra layer of website security that customers can see and trust.

Choosing a Cloud Supplier with Confidence

August 21, 2012 No Comments

The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting the ways in which SSL from a trusted Certificate Authority (CA) can help enterprises conduct business in the cloud with confidence.

Fraud alert – Phishing – The latest tactics and potential business impacts 2012

August 21, 2012 No Comments

As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years.

Internet Security Threat Report 2012

August 21, 2012 No Comments

These resources give Symantec’s analysts’ unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. The result is the annual Symantec Internet Security Threat Report.

Microsoft Sharepoint in the Cloud: Bluelock Helps Codesigned Deliver for WellStar Health Systems

August 14, 2012 No Comments

Codesigned is a technology services firm focused on high quality, branded collaboration solutions, specializing in Microsoft SharePoint. With a team of experienced consultants, system engineers, SharePoint Architects, .NET developers and web developers, Codesigned provides enterprise-class collaboration consulting, large-scale implementation planning and installation, design and deployment of custom features and customized private cloud and mobile solutions.

Large Scale Analytics in the Enterprise

August 9, 2012 No Comments

The growth of Internet businesses led to a whole new scale of data processing challenges. Companies like Google, Facebook, Yahoo, Twitter, and Quantcast now routinely collect and process hundreds to thousands of terabytes of data on a daily basis.

E-Payables 2012: The State of the AP Market

July 25, 2012 No Comments

Ardent Partners surveyed 220 finance executives who overwhelmingly agree: The evolution of AP from a tactical department to a strategic operation is paying off for best-in-class companies around the globe.

Litéra White Paper Describes Risk From Hidden Information Leaked on Mobile Devices

July 20, 2012 No Comments

The white paper, “Risks in a Mobile World of Hidden Data in Documents”, describes the implications of increasing mobile device usage at companies and the “bring your own device” (BYOD) trend. These workplace realities compound the risks associated with sharing damaging information via mobile devices.

Integrated Performance Management for Physical, Virtual and Cloud Infrastructure

July 17, 2012 No Comments

Today’s businesses increasingly use software applications that run in a wide variety of environments, everything from physical to virtual to cloud. As organizations look for ways to reduce costs, improve efficiency, and increase scalability, cloud computing and virtualization are playing a vital part in their IT strategies. However, these new technologies also present new challenges for organizations in the areas of application monitoring and application performance.

Predictive Analytics Project Design: A Nine-Step Guide to Realizing Business Value

July 16, 2012 No Comments

Predictive analytics continues to develop as a key decision technology across virtually every type of business because of its promise to enhance business performance and derive significant competitive advantage.

Everything You Know About Digital Measurement is Wrong…..and What to Do About It

July 12, 2012 No Comments

Think you know all there is to know about digital measurement? What you probably don’t know about the key best practices in digital measurement, is that every single one of these “best-practices” is wrong. Deeply, fundamentally, and completely wrong. What you probably don’t know is that virtually every digital dashboard you look at is poorly con¬structed, deeply misleading and fundamentally flawed. Indeed, the common best practices in digital measurement are so ill conceived that it will take no more than the next 1500 words to convince you that you should flush not just the reports, but the people who make them, out of your organization.

Energy Efficient Cooling for Data Centers: A Close-Coupled Row Solution

June 29, 2012 No Comments

In recent years, traditional cooling systems design has proven inadequate to remove concentrated heat loads (20 kW per rack and higher). This has driven an architectural shift in data center cooling. The advent of a newer cooling architecture designed for these higher densities has brought with it increased efficiencies for the data center. This article discusses the efficiency benefits of row-based cooling compared to two other common cooling architectures.

Fundamental Principles of Network Security

June 29, 2012 No Comments

Security incidents are rising at an alarming rate every year. As the complexity of the threats increases, so do the security measures required to protect networks. Data center operators, network administrators, and other data center professionals need to comprehend the basics of security in order to safely deploy and manage networks today. This paper covers the fundamentals of secure networking systems, including firewalls, network topology and secure protocols. Best practices are also given that introduce the reader to some of the more critical aspects of securing a network.

Avoiding Costs From Oversizing Data Center and Network Room Infrastructure

June 28, 2012 No Comments

Featured Whitepaper by The physical and power infrastructure of data centers and network rooms is typically oversized by more than 100%. Statistics related to oversizing are presented. The costs associated with oversizing are quantified. The fundamental reasons why oversizing occurs are discussed. An architecture and method for avoiding oversizing is described.

Ten Cooling Solutions to Support High-Density Server Deployment

June 28, 2012 No Comments

This paper provides ten approaches for increasing cooling efficiency, cooling capacity, and power density in existing data centers.

Analyst Report on Mobile End User Experience

June 26, 2012 No Comments

New analyst brief published by Enterprise Management Associates

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

June 4, 2012 No Comments

Choosing the right security solution is critical to the success of an online business. Look for trust-based security solutions that deliver protection and consumer peace-of-mind through cutting edge technology and integration with complementary third-party solutions.

Choosing a Cloud Hosting Provider with Confidence: Symantec SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers

June 4, 2012 No Comments

In this must read white paper, “Choosing a Cloud Hosting Provider with Confidence: VeriSign SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers”, you will learn about cloud computing, the new opportunities, the new security challenges and how to ensure your data is safe.

WHITE PAPER: Worst Practices In Business Intelligence: Why BI Applications Succeed Where BI Tools Fail

June 3, 2012 1 Comment

This paper provides insight into the top four worst practices for business intelligence

White Paper: Virtualization Business Benefits

June 2, 2012 No Comments

Tweet Intel and VMware discuss the business benefits of virtualization including the increased utilization of hardware resources by having more virtual machines per single server. Reducing hardware costs and data center footprint, virtualization enables businesses to save in energy costs, while also increasing performance. Click here to learn more about this whitepaper

Reduce Your Breach Risk: File Integrity Monitoring for PCI Compliance and Data Security

June 1, 2012 No Comments

This paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of malware as well as insider threats in identifying data breaches. It also discussed file integrity monitoring as a critical component of Payment Card Industry Data Security Standard (PCI DSS) compliance, and shows how NetIQ addresses both security and compliance challenges through the NET IQ Change Guardian family of products.

Whitepaper: Benefiting from Server Virtualization

May 29, 2012 No Comments

Tweet Increasing the use of server virtualization is a top priority for small and midsize businesses. According to ESG’s 2010 Spending Intentions Survey, it is nearly tied as the top priority for SMBs over the next 12 to 18 months. There are good reasons for this: virtualization can help reduce costs, simplify management, and improve […]

ADVERTISEMENT

DTX ExCeL London

WomeninTech