Inside the Briefcase


IT Briefcase Exclusive Interview: Transforming the “Internet of Things” with Chris McNabb, Dell Boomi

IT Briefcase Exclusive Interview: Transforming the “Internet of Things” with Chris McNabb, Dell Boomi

with Chris McNabb, DELL Boomi
In this interview, Chris McNabb from Dell Boomi offers expert advice for organizations looking to overcome security and compliance issues arising around the proliferation of cloud computing and mobile applications. Read More >>>

IT Briefcase Exclusive Interview: The Changing Complexion of Secure File Transfer in 2014

IT Briefcase Exclusive Interview: The Changing Complexion of Secure File Transfer in 2014

with Bill Ho, President at Biscom
In this interview, Bill Ho offers expert advice for organizations looking to tackle cloud and mobile challenges, as well as increase productivity while retaining data security. Read More >>>

10 Things Your Next Firewall Must Do

10 Things Your Next Firewall Must Do

Download this white paper and learn the challenges your firewall is now experiencing with all the new layers of complexity and how to address the situation.





Briefcase Highlights


APPLICATION INTEGRATION

The Growing Paranoia: Data Breaches and How To Protect Yourself

February 14, 2014 No Comments

by Eric Knight, Dirtsearch.orgYou just paid your rent online. The site seems safe and you don’t think twice about a data breach, but is it? As cases of online identity fraud grow, one can never be too careful about freely giving away personal information. Read More >>>

A Day in the Life of Big Data

February 13, 2014 No Comments

by Gil Allouche, QuobleBig data is being used all around us. Most of us are unaware of its influence, but it impacts our lives on a day to day basis. Certain use cases, such as home automation, haven’t been adopted by everyone but are available now. Read More >>>

Your Productivity Lifeline — a More Reliable VPN Connection

February 12, 2014 No Comments

with Mike Brown, BlackberryAnyone who has ever worked from home while waiting for the elusive cable guy, experienced airport weather delays, or been stationed off site at an event knows all too well that a reliable VPN connection is their lifeline for getting work done. Read More >>>

IBM Builds On Growing Client and Partner Momentum for Social Business in the Cloud

February 7, 2014 No Comments

IBM today announced strong momentum for its Software-as-a-Service based social business offerings from partners, clients and developers. As part of today’s news, IBM is also highlighting its continued investment with new innovations in its social business and cloud technologies.

IT Briefcase Interview Highlighting Free Cloud Service to Monitor Your On-Premise Monitoring Products

February 7, 2014 No Comments

with Gibu Mathew, ManageEngineIn this interview, Gibu Mathew from ManageEngine outlines the benefits of a cloud-based service that monitors traditional on-premise network, system and application monitoring products. Read More >>>

Careless Users in the Cloud

February 4, 2014 No Comments

A Softchoice survey of 1,000 full-time people in the United States and Canada found employees who use SaaS apps for work are developing bad tech habits that expose their organizations to security breaches and data loss.

Overview of Enterprise Storage Markets

January 27, 2014 No Comments

by Rick DelGado, Independent AuthorData storage may not sound like a critical component of running a business, but it is actually a major component of the IT infrastructure and can have severe detrimental effects on a company if it is set up poorly. Read More >>>

The Value of Multivendor Services : Knowledge, Reduced Cost and Service Quality

January 22, 2014 No Comments

By Dave Eichorn, Zensar Technologies By investing in a multivendor services strategy, organizations can conveniently and cost-effectively source their complex IT infrastructure, allowing them to focus on their core business initiatives through allocating resources toward their bottom line. Read More >>>

Four barriers to virtualization adoption among small businesses

January 22, 2014 No Comments

By Mark Oliver, Group Oliver Today, computers are so prolific that their use is almost ubiquitous to the average user. The increase functions computers are able to perform for both individuals and businesses continues to grow. Read More >>>

2014 Predictions for Cloud and Application Development

January 15, 2014 No Comments

By Johan Den Haan, Mendix Forward-thinking CIOs and IT leaders are embracing app-fueled innovation as a driver of business growth and differentiation. What they’re realizing, though, is that not all apps are created equal. Read More >>>

Mobile Applications Being Used for DDoS Attacks

January 15, 2014 No Comments

Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) protection services, today reported that mobile applications are being used in DDoS attacks against enterprise customers. This is one of many key findings found in the company’s Q4 2013 Global DDoS Attack Report, which was published today and can be downloaded from www.prolexic.com/attackreports.

Fixing Website Blind Spots to Increase e-Retail Conversions

January 14, 2014 No Comments

By John Newsom, Dell SoftwareToday, as opposed to physically browsing in stores, consumers are demanding access to more services, from more devices, from any location. As a result, the online experience – and the need to make websites faster and more functional – has become paramount. Read More >>>

New Year’s Resolutions to Boost IT Help Desk Effectiveness

January 13, 2014 No Comments

It is that time of the year again when you sit down, take stock of your IT help desk’s performance these past 12 months and chart a course for success in the new year. Call them New Year’s resolutions, departmental priorities or simply a plan of action; whatever the name, here’s a list of the top five things you could focus on in 2014.

IT Briefcase Exclusive Interview: Transforming the “Internet of Things” with Chris McNabb, Dell Boomi

January 13, 2014 No Comments

with Chris McNabb, DELL BoomiIn this interview, Chris McNabb from Dell Boomi offers expert advice for organizations looking to overcome security and compliance issues arising around the proliferation of cloud computing and mobile applications. Read More >>>

The Massively Distributed Cloud Requires Massively Distributed Solutions

January 9, 2014 No Comments

By Carson Sweet, CloudPassageDespite rapid adoption, security remains a top obstacle to successful adoption. Enterprises are sinking a lot of money into addressing these problems – Gartner estimates that cloud security spending will nearly double between 2013 and 2017 with a 28% annual growth rate. Read More >>>

Discover Discover, track and manage your SQL Server environment effectively

January 9, 2014 No Comments

SQL Elements provides a broad enterprise-wide view of SQL Server inventory through automated discovery, and gives actionable information about the state of the environment.

Why BYOD, Mobility and the Cloud Will Bring the End of Traditional VPNs

January 8, 2014 No Comments

Before the onslaught of cloud-based services and mobile devices, and the anywhere work-style that followed, IT had complete control over users and IT resources. Everything was Windows-based and provided on site, including PCs and email, file and application servers. And, employees received standard-issue PCs and with controlled access to specific, IT-sanctioned office applications and files.

BYOD Strategies: Which One Is Right For Your Company?

January 8, 2014 No Comments

by Rick DelGado, Independent AuthorThere are measures that can be taken to help protect company data in a BYOD atmosphere. This article outlines three strategies that can help. Read More >>>

U.S. Open Showcases the Value of Big Data Analytics for Fans

December 27, 2013 No Comments

By Jim McCann, Paragon SolutionsTennis fans enjoyed unparalleled degrees of information regarding the matches played, the weather conditions and the players who participated in the U.S. Open thanks in large part to big data implementations.Read More >>>

Explaining Hadoop to the Non Data Geeks at the Office

December 19, 2013 No Comments

by Gil Allouche, QuobleThink about how much backstory is in just that one statement: what Hadoop is, why Hadoop matters, what the Hadoop ecosystem is, why it matters, what cloud computing is… you get my point. Read More >>>

IT Briefcase Exclusive Interview: The Changing Complexion of Secure File Transfer in 2014

December 19, 2013 No Comments

with Bill Ho, President at Biscom In this interview, Bill Ho offers expert advice for organizations looking to tackle cloud and mobile challenges, as well as increase productivity while retaining data security. Read More >>>

Looking in to 2014: The Need for Speed in the e-commerce world

December 18, 2013 No Comments

As we are leaving 2013, heading for 2014, e-commerce is under heavy expansion. A growing number of online consumers will put pressure on e-commerce sites’ functionality. Web performance expert Sven Hammar, CEO of Apica, gives you his best advice on how to avoid being the e-retailer who throws the customers out on the street in 2014.

The Rise of SaaS in the Enterprise and the Shifting Role of IT

December 17, 2013 No Comments

by Mike Kane, SoftchoiceEnterprise technology is evolving. Adoption of cloud applications such as Evernote and LogMeIn – consumer-grade tools employees depend on for day-to-day productivity – is booming, but as more users embrace these tools, organizations face a perilous double-edged sword. Read More >>>

Video Interview: The Future of BPM

December 16, 2013 No Comments

with Mac McConnell, BonitasoftWith the evolution of mobile, big data, packaged apps that utilize BPM, and cloud computing, McConnell stresses the importance of customer facing applications and creative “design” thinking when creating BPM tools. Read More >>>

Tangoe Powers the Connected Enterprise

December 10, 2013 No Comments

Tangoe, Inc. (NASDAQ: TNGO), a leading global provider of Connection Lifecycle Management (CLM) software and related services, today announced the launch of Matrix, an integrated solution suite comprised of software and services to address the entire lifecycle of an enterprise’s mobile, fixed, machine, cloud, IT and social communications.

Infographic: Cross-Platform Malware is A Growing Threat For Computers

December 10, 2013 No Comments

There is a new threat in town when it comes to malware; it attacks without prejudice and it’s got cross-platform power. The same strain of a particular malware and virus, if it has cross-platform ability, can hit multiple OS such as Windows, Mac and Linux etc., simultaneously. It is exceedingly harmful because it has the ability to not just infiltrate multiple OS, but also transfer infection from one platform to another with no trouble at all.

Greener Cloud Computing Options

December 10, 2013 No Comments

By Patrick Burke, RackspaceIBM has patented a solution which it claims is a “green button” that distributes a cloud service to lower power systems to help save environmental costs. Read More >>>

Cybersecurity Imperatives: Reinvent Your Network Security

December 9, 2013 No Comments

Download this white paper and learn how your organization can pursue the deployment of the innovative technologies and applications you need to thrive and protect your assets against all types of cyberthreats.

10 Things Your Next Firewall Must Do

December 9, 2013 No Comments

Download this white paper and learn the challenges your firewall is now experiencing with all the new layers of complexity and how to address the situation.

Survey: Constant Connectivity Leads to Conflicting Views

December 4, 2013 No Comments

By John Pironti, IP ArchitectsAmericans love their electronic devices and the connectivity they provide, as evidenced by the number of Internet-connected devices they own. But a new survey shows that most are struggling with data privacy and security concerns that come with the conveniences of an increasingly always-online lifestyle. Read More >>>

ADVERTISEMENT

DTX ExCeL London

WomeninTech