Inside the Briefcase


How Real-Time Analytics can Boost Employee Performance

How Real-Time Analytics can Boost Employee Performance

by Gil Allouche, Quoble
If your company is struggling with employee performance and output, then big data analytics should be part of your future plans. Not only does big data allow companies to gather, and analyze large amounts...

IT Briefcase Exclusive Interview: Transforming the “Internet of Things” with Chris McNabb, Dell Boomi

IT Briefcase Exclusive Interview: Transforming the “Internet of Things” with Chris McNabb, Dell Boomi

with Chris McNabb, DELL Boomi
In this interview, Chris McNabb from Dell Boomi offers expert advice for organizations looking to overcome security and compliance issues arising around the proliferation of cloud computing and mobile applications. Read More >>>

IT Briefcase Exclusive Interview: The Changing Complexion of Secure File Transfer in 2014

IT Briefcase Exclusive Interview: The Changing Complexion of Secure File Transfer in 2014

with Bill Ho, President at Biscom
In this interview, Bill Ho offers expert advice for organizations looking to tackle cloud and mobile challenges, as well as increase productivity while retaining data security. Read More >>>





Briefcase Highlights


MOBILE DATA

How Real-Time Analytics can Boost Employee Performance

May 5, 2014 No Comments

by Gil Allouche, QuobleIf your company is struggling with employee performance and output, then big data analytics should be part of your future plans. Not only does big data allow companies to gather, and analyze large amounts of data, but with data analytics tools, companies of any size can now analyze data in real-time. Read More >>>

ITBriefcase Exclusive Interview with R. Paul Singh, Espresso Logic

April 29, 2014 No Comments

with R. Paul Singh, Espresso Logic, Inc.In the following interview, R. Paul Singh, CEO of Espresso Logic, discusses the challenges IT teams face today in producing the increasingly high volume of internal and external applications for their companies – and highlights how its newly released Live Browser product can help. Read More >>>

How to Generate Revenues for Businesses Using Mobile Apps?

April 24, 2014 No Comments

The world is connected to the internet at all times! If you see, people are dependent on the way smart phones work, and are mostly addicted to using smart phones. Some of the main reasons for using smart phones apart from communication are knowledge. People seek knowledge on roads, on good restaurants, on top news trending for the hour and other such things.

MobileFirst Mondays: Discover “What” To Do with Mobile and “How” To Do It!

April 8, 2014 No Comments

Attend this 15 minute webcast and discover how innovative financial institutions are changing the way they interact with their banking customers to both create customer “stickiness” and enhance the banking experience.

VPN on Android Phones

April 7, 2014 No Comments

Despite their many advantages, Android phones might carry security risks when they go online, threatening your privacy and predisposing you to data fraud. Virtual Private Networks, or VPNs, can be extremely helpful at providing enhanced security and preventing your Android device from having restricted access to certain geographical regions. There are several benefits of using VPN on Android devices, particularly if you access the Internet on a daily basis from public WiFi networks.

5 Best Practices for Mobile Business Intelligence

March 26, 2014 No Comments

Download this white paper and learn the five best practices for distributing information with a mobile audience in mind.

IT Briefcase March Newsletter: Mobile Technology

March 26, 2014 No Comments

Check out our most recent e-Newsletter for the most up-to-date info on Mobile Technology and our feature Webcast this month – 8 Great Mysteries of Cloud Computing. View Newsletter

Have a cool idea that could change the world? You can build an app for that – Ask Watson

March 25, 2014 No Comments

with Jerry Cuomo, IBM WebsphereIncredible things are happening with mobile computing today. What used to be considered a futuristic scene from a movie is now a reality, and what’s more: you don’t have to be an action hero to spark amazing feats with the push of a button. Read More >>>

Forrester Research – 3 Steps to Content Sharing and Collaboration

March 24, 2014 No Comments

In this webcast you will learn the criteria that Forrester Research uses to evaluate vendors, such as mobile support, security, and deployment architecture.

Mobile and Cloud, Naturally!

March 21, 2014 No Comments

with Siamak Farah, InfoStreetCloud solutions have advanced rapidly in the past decade and have changed how we work, study, interact socially, shop, and more. The cloud has been wildly successful, since by its own nature it reduces the need to purchase and maintain servers in our office or home. Read More >>>

Mobile Quality Begins with Agile

March 20, 2014 No Comments

The mobility trend is forcing companies to look, think and feel agile. With a heavier focus on delivery than ever before, a need for continuous integration support, a focused level of testing has suddenly become increasingly important to agile organizations.

Preventing Unauthorized Access to Mobile Computers and Reducing the Risk of Data Loss

March 11, 2014 No Comments

The mobile computing market shows no signs of slowing down, which means more laptops and tablets are brought along on business trips, to sales meetings and on vacations than ever before. This leaves a lot of devices and the data they contain at risk of theft or of simply being lost. You can use a few simple tools and techniques, such as Windows BitLocker and a good backup solution, to help guard against unauthorized access and to minimize the risk of data loss should the device fall into the wrong hands.

Who Pays for BYOD?

March 3, 2014 No Comments

by Rick DelGado, Independent AuthorThere are many factors businesses must consider when creating a BYOD policy. Most businesses tend to focus on security and for good reason, but it’s important to not overlook the cost factor for BYOD, in particular the cost sharing between the employee and the company. Read More >>>

A Look at Cloud Business Technologies, Past and Future

February 28, 2014 No Comments

by Andre Smith, Internet, Marketing and E-Commerce specialistThe cloud has been one of the most prolific buzzwords in business for several years, ever since the concept first debuted. Some detractors believed the cloud would be a passing fad, but the reality has cemented the remote technology-as-a-service idea as a staple of business implementation. Read More >>>

The Business Case for On-premise AND Cloud Storage Solutions

February 24, 2014 No Comments

by Rick DelGado, Independent AuthorThe debate over cloud storage vs. on-premise storage has created some pretty strong opinions on both sides of the issue, but taking the all-or-nothing approach ignores a viable option that allows companies to create a tailored storage solution for their needs: a hybrid solution. Read More >>>

The Evolution of In-House Help Desks

February 20, 2014 No Comments

by Satish Sinha, Zensar TechnologiesToday, it’s rare to find a company that leverages a fully internal IT help desk. There are a number of reasons that this is the case, but it can be summed up by the fact that technology has exploded in the past several years. Read More >>>

Infographic: What does the BYOD trend actually mean for businesses?

February 20, 2014 No Comments

Of late, there has been a growing trend in offices all over the world. Enabled by a combination of Wi-Fi and cloud computing, more and more office workers are bringing their own devices into work. Starting with laptops, this trend soon saw tablets and, to a lesser extent, smartphones become part of what is known as BYOD (Bring Your Own Device).

The Growing Paranoia: Data Breaches and How To Protect Yourself

February 14, 2014 No Comments

by Eric Knight, Dirtsearch.orgYou just paid your rent online. The site seems safe and you don’t think twice about a data breach, but is it? As cases of online identity fraud grow, one can never be too careful about freely giving away personal information. Read More >>>

Your Productivity Lifeline — a More Reliable VPN Connection

February 12, 2014 No Comments

with Mike Brown, BlackberryAnyone who has ever worked from home while waiting for the elusive cable guy, experienced airport weather delays, or been stationed off site at an event knows all too well that a reliable VPN connection is their lifeline for getting work done. Read More >>>

IT Briefcase Interview Highlighting Free Cloud Service to Monitor Your On-Premise Monitoring Products

February 7, 2014 No Comments

with Gibu Mathew, ManageEngineIn this interview, Gibu Mathew from ManageEngine outlines the benefits of a cloud-based service that monitors traditional on-premise network, system and application monitoring products. Read More >>>

A Look At Emerging Phone Technologies

January 23, 2014 No Comments

In the past decades, phone technology has advanced rapidly. The bulky car phones of the ’80s and first cellular phones are a long forgotten memory with today’s smartphones that include a vast array of applications, cameras and more. They are designed to keep us entertained, fit, on schedule and connected at all times. For many, mobile phones have replaced their organizers, watches, timers and calendars.

Four barriers to virtualization adoption among small businesses

January 22, 2014 No Comments

By Mark Oliver, Group Oliver Today, computers are so prolific that their use is almost ubiquitous to the average user. The increase functions computers are able to perform for both individuals and businesses continues to grow. Read More >>>

2014 Predictions for Cloud and Application Development

January 15, 2014 No Comments

By Johan Den Haan, Mendix Forward-thinking CIOs and IT leaders are embracing app-fueled innovation as a driver of business growth and differentiation. What they’re realizing, though, is that not all apps are created equal. Read More >>>

Mobile Applications Being Used for DDoS Attacks

January 15, 2014 No Comments

Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) protection services, today reported that mobile applications are being used in DDoS attacks against enterprise customers. This is one of many key findings found in the company’s Q4 2013 Global DDoS Attack Report, which was published today and can be downloaded from www.prolexic.com/attackreports.

Fixing Website Blind Spots to Increase e-Retail Conversions

January 14, 2014 No Comments

By John Newsom, Dell SoftwareToday, as opposed to physically browsing in stores, consumers are demanding access to more services, from more devices, from any location. As a result, the online experience – and the need to make websites faster and more functional – has become paramount. Read More >>>

IT Briefcase Exclusive Interview: Transforming the “Internet of Things” with Chris McNabb, Dell Boomi

January 13, 2014 No Comments

with Chris McNabb, DELL BoomiIn this interview, Chris McNabb from Dell Boomi offers expert advice for organizations looking to overcome security and compliance issues arising around the proliferation of cloud computing and mobile applications. Read More >>>

The Massively Distributed Cloud Requires Massively Distributed Solutions

January 9, 2014 No Comments

By Carson Sweet, CloudPassageDespite rapid adoption, security remains a top obstacle to successful adoption. Enterprises are sinking a lot of money into addressing these problems – Gartner estimates that cloud security spending will nearly double between 2013 and 2017 with a 28% annual growth rate. Read More >>>

Why BYOD, Mobility and the Cloud Will Bring the End of Traditional VPNs

January 8, 2014 No Comments

Before the onslaught of cloud-based services and mobile devices, and the anywhere work-style that followed, IT had complete control over users and IT resources. Everything was Windows-based and provided on site, including PCs and email, file and application servers. And, employees received standard-issue PCs and with controlled access to specific, IT-sanctioned office applications and files.

BYOD Strategies: Which One Is Right For Your Company?

January 8, 2014 No Comments

by Rick DelGado, Independent AuthorThere are measures that can be taken to help protect company data in a BYOD atmosphere. This article outlines three strategies that can help. Read More >>>

IT Briefcase Exclusive Interview: The Changing Complexion of Secure File Transfer in 2014

December 19, 2013 No Comments

with Bill Ho, President at Biscom In this interview, Bill Ho offers expert advice for organizations looking to tackle cloud and mobile challenges, as well as increase productivity while retaining data security. Read More >>>

ADVERTISEMENT

DTX ExCeL London

WomeninTech