December 8, 2015
Smartphones, tablets, phablets, laptops and connected devices have begun a mobile revolution that is impacting society, specifically changing business as we know it. How companies operate, market themselves, interact with customers and understand their consumers has been completely affected by the emergence of mobile everything. Business today isn’t as usual—the practices taking place within as a result of mobile technology are in the midst of normalization.
December 2, 2015
with Mike Martin, nfrastructureIn this interview, Mike Martin, CTO, nfrastructure, speaks with IT Briefcase about what he believes will be the top IoT trends and predictions for organizations of all sizes and their IT teams for the coming year. Read More >>>
November 24, 2015
This year that annual shopping frenzy in the U.S. known as Black Friday will take place on November 27, the day after Thanksgiving. Sales, according to the Black Friday website, will actually start early on Thanksgiving Day and extend throughout the weekend. Total sales are expected to top $80 billion. Also, the number of bargain hunters will increase this year to well over 300 million. Sales channels will include both brick and mortar stores as well as online retailers.
November 23, 2015
As the holiday shopping season approaches, the American Bankers Association is educating consumers about the new chip technology embedded in many credit and debit cards.
The new chip cards offers bank customers an added layer of security just in time for the holidays. The chip – a small metallic square on the front of the payment card – assigns a one-time code for each transaction, and makes it nearly impossible for fraudsters to create counterfeit cards.
November 19, 2015
by Antoine Mottier, BonitasoftUnderstanding customer need is more important today than ever as millennials enter the workforce. According to Goldman Sachs, millennials are one of the largest generations in history and are about to move into their prime spending years – poised to reshape the economy. Read More >>>
November 19, 2015
You must be spending a lot of time on your Android phone by just browsing through pictures or playing some tap-tap games. Instead, if you can spend some time for your money management through apps it can definitely be much more worthy. Let us go through some financial apps that can help in effective money management process.
November 19, 2015
Cybrary, the world’s first and only no-cost cyber security massive open online course (MOOC) provider, announced the availability of its Android-based mobile app that allows users with limited Web access – particularly in developing countries – to learn hacking, forensics and other cyber security skills on the go.
November 16, 2015
If you’re not using Workspace as a Service (WaaS) yet, it may be because you don’t fully grasp what it really is, how much it does, and how hot the global market is projected to become. As with many emerging technologies in a growth phase, WaaS is often underestimated and misunderstood. But if industry forecasts hold true, WaaS just may be the next big thing in the IT services space. To help shed light on why this is so, here are six busted myths about WaaS.
November 11, 2015
Cybercrime is thriving … as demonstrated by several high-profile, online data breaches in the press recently. As static, on-premise security measures are increasingly becoming ineffective against attempts to steal data and take web services offline, many security professionals are left unsure how to best mitigate these evolving threats.
November 11, 2015
In this webcast, authentication and fraud experts from Gartner and Verint Systems discuss passive authentication for the contact center.
November 4, 2015
Thinking about a move away from traditional phone lines to a voice over Internet Protocol (VoIP) solution? You’re not alone: According to Business Wire, the market is on track to reach almost 350 million subscribers by 2020 and generate $136 billion in revenue. However, before ditching your plain old telephone service (POTS) for a VoIP, it’s important to ask a few critical questions.
November 3, 2015
Many small and midsized enterprises are struggling to get by without a proper business management solution (BMS). Instead, they stitch together a combination of systems that end up leading to inefficient processes and a series of information silos. However, an increasing number of CIOs are embracing cloud-computing options. Indeed, nearly 30 percent of companies plan to move their systems to the cloud by 2018. With that in mind, the following are some questions SMBs need to ask during their shift from a messy, disparate system, to a fluid business management solution that is up to the task of growing their company lean.
October 29, 2015
Why is it that 75% of the business and IT executives anticipate their software projects will fail? Why is failure rate often a planned expense that is written off long before development ever begins? Below is a fun infographic to not only understand the major friction points in delivering successful enterprise applications, but also learn how to tackle these monsters and speed custom app creation. Do tell us about the monsters that scare you the most and any other ghouls we may have missed.
October 23, 2015
IDC points to several factors that are enabling the rise of the Internet of Things (IoT), including a global culture that has embraced and now expects greater connectivity; ongoing interest in and development of smart cars, homes and cities; and advances in connectivity infrastructure. Consequently, the analyst firm anticipates that IoT technology and services spending will generate global revenues of $8.9 trillion by 2020.
October 20, 2015
If you’re not familiar with the term, SaaS is a distribution method that hosts powerful software on a network or via the cloud, and manages it by a remote vendor or service provider. Once subscribed to the service, you can tap in and manage exactly what you need to, and so can your employees should the system call for it. Troubleshooting, service time and installation are all handled by the vendor or service provider.
October 19, 2015
Daniel Joseph Barry, NapatechIn this interview, Dan Joe Barry speaks with IT Briefcase about the results of a recent Heavy Reading survey of communications service provider (CSP) and network equipment provider (NEP) registrants regarding the current use of both traditional hardware and virtualized network appliances. Read More >>>
October 19, 2015
Fewer than half of all payment cards and PoS terminals in the US are currently EMV-ready. Moreover, US merchants and card issuers have been slow to migrate to the new technology. In the wake of EMV’s worldwide implementation, a wave of technologies – including near-field communication (NFC), tokenization and cloud-based wallets – is having an accelerating impact on the industry.
October 13, 2015
Consulting firm Chadwick Martin Bailey found in a recent survey that 15 percent of U.S. consumers have used a mobile wallet in the past six months, up from nine percent in the same period in 2013. The numbers may seem small at first glance, but do the math: that’s a 66 percent increase in usage in just two years. In terms of awareness of mobile wallets, the percentage jump is even higher. Their Mobile Wallet in 2015 and Beyond report found that 18 percent of consumers are “very familiar” with mobile wallets, compared to eight percent in 2013.
October 12, 2015
Attend this on-demand webcast and learn how you can accelerate application delivery to provide new capabilities and new features on demand via continuous delivery for hybrid cloud applications.
October 12, 2015
This webinar with Dr. Srini Chari, Managing Partner, Cabot Partners and IBM Distinguished Engineer Linton examines how organizations can derive high value insights by framing strategic business questions and combining systems of records with systems of engagement and how these can be achieved by implementing a high-performance, scalable and agile information foundation to support both real-time and large-scale analytics capabilities.
October 12, 2015
Join this webcast to review this and other BCBS 239 mandates and the challenges they pose. We will offer some ideas on making compliance easier and less expensive ideas based on a combination of technical expertise and deep industry experience. If you are dealing with the headaches caused by BCBS 239, you won’t want to miss this!
October 6, 2015
The gains in efficiency resulting from use of mobile computing and cloud-based services have come at a price of increased risk which is sometimes hard to see. More and more business logic resides and executes on insecure devices. Given this landscape, anyone developing code that will run in distributed locations needs to help ensure the integrity of their software as it runs in environments over which they have minimal control.
August 31, 2015
with Rahul Asthana, KenandyIn this interview, Rahul Asthana, Senior Director of Product Marketing at Kenandy, speaks with IT Briefcase about why some enterprises pursue a two-tier application strategy and how they transition fully to new systems. Read More >>>
August 25, 2015
For many years, IT has been a gatekeeper. When anyone wanted new server capacity, additional storage, a password reset, or a new application deployed, they had to come to IT to get the job done. The processes and friction IT put in place to manage the demand led to IT being seen as a barrier, rather than as a business enabler. IT was not focusing on the experience, the perception but only on the technology. In recent years, things have started to change. For instance, the public cloud has made it relatively easy for end users to provision their own computing capacity on demand, and outsourcing has created profound competition for internal IT departments.
August 24, 2015
Content marketing has been the buzz phrase many marketers have been using for the past few years. Many brands and businesses are now fully on board with producing content – to mixed results. However, those that have succeeded with content marketing all have one thing in common. Each of them has leveraged their content with social media. The question for today is – how, exactly, do they do this?
August 18, 2015
In recent years, Microsoft’s hustle to compete with newer, more flexible technology innovators like Google, Apple, and Samsung has resulted in a handful of enthusiastic projects. However, despite Microsoft’s unchallenged supremacy in computing, Microsoft phones are few and far between. Windows 8, the operating system for the mobile era, was beautiful and seamless on touch devices, but wasn’t perfect. Though a few of their tablets, including the most recent Surface Pro 3, have earned top reviews, most Microsoft users prefer true laptops — and continue to reminisce about the powers of XP.
August 6, 2015
IT continues to commoditize. How is this trend forging transformation in the world of IT service management? Consumer behavior is driving IT to the cloud, and outsourcing is moving from the enterprise to the mid-market. We believe that this will result in IT organizations integrating their service management applications with those of their customers, but this is easier said than done.
August 4, 2015
It is no secret that the nook is now the preferred eReader, even surpassing the Kindle Fire in sales. The problem, however, is that the iPad is still the most popular tablet out there. Once users purchase an iPad they find very little use for their Android-powered Nook, regardless of how great it might be. After all, who wants to carry TWO tablets around? Not many people would answer yes, and for a time, it looked as if Apple might begin to dominate the e-book market.
August 4, 2015
Perhaps the most valuable thing about your computer is the data and files that you have saved on it. After all, the main reason for having your PC or laptop is in order to store the data that is on it, and it’s the main priority for putting a protective strategy in place, such as anti-virus software. Whilst operating systems and downloadable software can always be re-downloaded or re-installed, unique, user created data has the potential to be lost forever. Let’s look at some simple steps that can be taken in order to protect your computer or laptop from data loss.
July 30, 2015
with Israel Lifshitz, NuboIf you’ve been tracking the evolution of our BYOD work culture, you’ll know that most enterprises are at some stage of getting a grip on a myriad of issues, including employee adoption, compliance, Shadow IT and user privacy just to name a few. Read More >>>