Inside the Briefcase






Briefcase Highlights


Featured Blogs

All Systems Fail

December 2, 2015 No Comments

Today, we are seeing more news about sites from major online retailers and service providers like HP, Target, PayPal and Neiman Marcus going down. High site traffic, poor configurations, scalable architectures, and well planned recovery practices all come into play.

Blogs, Featured Blogs, News

Go beyond Windows 10

November 17, 2015 No Comments

Welcome to a world that many have only envisioned in their dreams. A world where someone can check their email, shop, play games, meet with clients, and store important documents in one location, no matter what device they might be using or where they are. This is the world Windows 10 is trying to build; one platform, one store, and the ability to run across multiple devices from IoT (Internet of Things) to data centers. But does Windows 10 actually measure up to this dream of a connected business environment or are they lagging behind?

Blogs, Featured Blogs

Steps to Using Your Raspberry Pi for Network Monitoring

November 11, 2015 No Comments

The Raspberry Pi has quickly made itself a staple in the tech world – the highly versatile miniature single-board computer is an extremely resourceful and remarkably cheap device. One such use of the Raspberry Pi is for network monitoring services. Formerly requiring wasteful systems setup and dedicated machines, network monitoring best practices for sysadmins is now completely possible with the little Raspberry Pi.

Blogs, Featured Blogs

Avoiding the Circle of Death: Simplified Network Performance Management

October 20, 2015 No Comments

We recently overheard this icon referred as the “circle of death”! Waiting for an app to load is not usually deadly but it can be very frustrating. Frustration is bad enough, but even worse is the productivity that is lost while users wait for applications to load. With all the new people and devices joining networks across the globe, with apps moving to the cloud and content becoming more data-rich, it is not surprising that we are experiencing the “circle of death” more frequently.

Blogs, Featured Blogs

Avoiding Security Threats on Finance Websites

October 6, 2015 No Comments

The internet has made it possible for people to carry out a variety of financial transactions online. From investing to paying your monthly bills, you can take care of your financial obligations from wherever you are. The convenience of using various finance websites has made them a popular option for most people.

Blogs, Featured Blogs

Simple Tips To Choose Web-to-Print Design Software Company

October 1, 2015 No Comments

For the last couple of years, printing industry has been consistently growing its scope and getting more revenues. Behind this, printing technology plays a substantial role as it makes software powerful and flexible to use for various complex designing needs. The perfect implementation of technology is essential to develop a feature-rich tool which is capable of meeting ever-changing product designing requisites. Web to print is a modern technique to build printing tools/software for e-commerce shops. The Internet is a great medium to find the state-of-the-art product design tools powered by web to print technology.

Blogs, Featured Blogs

Essential Tips to Make Remote DBA Services Easier

September 30, 2015 No Comments

Remote DBA services can be defined as the process or practice of managing a huge database from a remote location. The DBA firm may include a service desk function through which all services are being performed. Technical experts from diverse professions may perform from operational centers and meet the queries of the customers when they need them. Now let us go through some effective tips that can be helpful in making the service process easier…

Blogs, Featured Blogs

SanDisks new Wireless Flash Drive: Expanding Mobile Office Possibilities

September 28, 2015 No Comments

Whether it be the need to share video, audio, or basic data files from afar, SanDisk’s new wireless flash drive is making business more capable. Sure, the cloud recently enabled corporations to accomplish much the same thing; however, this new wireless flash drive allows users the same conveniences without as many downfalls. With this device, the most advantageous and alluring feature that is making mobile business a whole lot easier is the ability that SanDisk’s Connect Wireless Stick has to assist people in sharing data from a mobile device without the need for an active internet connection.

Blogs, Featured Blogs

Top 15 Responsive Website Design Companies

September 8, 2015 No Comments

Believe it or not, but still people do judge a book by its cover and simultaneously a website by its visibility on the internet. Hence, the presentation of your website readily influences the credibility of your brand within the reach of digital audience. It is crucial as to how you present your website to the millions of web users engaged in accessing the internet through their mobile phones.

What IBM’s Recent $3M Investment in IoT Means For You and Me

August 24, 2015 No Comments

Recently, IBM—the technology powerhouse—announced to the public that it will be making a brand new “Internet of Things” product. They plan to pour over $3 billion into the project over a four year period. The core idea of this “Internet of Things” is to create a network of data in virtually everything to improve operational efficiency.

Blogs, Featured Blogs

Go Modular for Maximised Data Centre Agility

August 6, 2015 No Comments

The vast majority of today’s data centres have significantly underutilised power systems. Why? Because nobody wants to run short of power. So when power systems are specified it is often done on the assumption that the facility will ultimately have a full compliment of racks all running the power-hungriest equipment possible. And then of course some “contingency” power is added on top, just to be on the safe side.

Blogs, Featured Blogs

IT Pros Need Vacations, Too: Four Ways to Get Ready

July 8, 2015 No Comments

Okay, I get it: As an IT professional, you’re just too darn important to go on vacation. Your whole company might cease to exist if you head to the beach, Disney World, or Las Vegas, turn off the smartphone, and get some rest and relaxation. Right? Wrong.

Blogs, Featured Blogs

Security Implications of the Internet of Things

June 15, 2015 No Comments

From the hacking of the Apple iCloud where celebrities’ accounts were accessed in 2014 to the hacking of Sony that jeopardized the release of the political satire comedy film, “The Interview”, no one knows where the next cyber security threat will be directed or will come from. Internet of things, from car to car communication, social media, Smart Grid to Smart Home among others, we are connected to all kinds of networks and devices, which helps in simplifying how we communicate, work or live.

Blogs, Featured Blogs

Aftermath of Net Neutrality—What’s Next

May 22, 2015 No Comments

February 26, 2015 marked an historic day for the Internet. And not because of the #LlamaDrama or #thedress that blew up on social media, but the 3-2 Federal Communication Commission (FCC) decision earlier in the day that classified Internet as a utility—keeping the medium fair and free. With net neutrality, it keeps business innovative, minority voices shared and lets the Internet continue to function the way it always has. But what about future actions on the opposing side? What’s next concerning net neutrality in America?

Blogs, Featured Blogs

Build versus Buy: File Storage Connectors

May 4, 2015 No Comments

Files are the life-blood of a business. They are also the persistent memory of every digital family. The need to store files is ubiquitous. The competition to own the digital shoebox for individuals and businesses is fierce. New entrants appear every week and old players are at risk of slow death. End-users are adopting every conceivable solution, in every conceivable combination.

Blogs, Featured Blogs

How to Stay Sane When Your Email Management Software Crashes

March 13, 2015 No Comments

Everyone in the IT world knows that nothing gets done when we get mad at a computer. Your computer cannot process your emotion, and it will not speak to you even if you yell at it like Boris in “Goldeneye,” which is just one of the film’s many IT mistakes. Your best chance of getting out of this crash in one piece is collecting yourself, sitting down at your computer and beginning the work of solving the problem.

Blogs, Featured Blogs

Congressional Proposals: Data Breach Notification Law

February 10, 2015 No Comments

At his State of the Union address on January 20, President Obama called on Congress to pass a national law that would require organizations to notify customers of data breaches, in an effort to protect consumers’ personal information. And, Congress has named helping organizations improve their cyberdefenses as one of its “top priorities” for 2015. Today, 47 states have varying levels of cybersecurity-related laws, which has led to a lot of confusion. By creating one uniform federal regulation, the government will be able to provide clarity and accountability for the security of confidential information.

Blogs, Featured Blogs

Infographic: How Big is Big Data?

February 5, 2015 No Comments

Big data has developed and grown significantly over the last several years. It has evolved as more than just a trend or a buzz word. In fact, more and more organizations have begun to leverage big data in all aspects of business. However, just how big is big data? This infographic we have created attempts to show important facts and latest findings that you need to know.

6 Myths Surrounding Mobile App Development

January 5, 2015 No Comments

If you are a first time mobile app developer, you will be surrounded by myths. Mobile app development, over a period of time has caused a lot of myths that have overridden reality. If statistics are anything to go by, you will see that the percentage of time spent by users on mobile app has gone from 80% to 86% in 2014. Users are demanding mobile apps, as it is convenient to browse an app then opening the website on the mobile.

Blogs, Featured Blogs

Gartner Business Intelligence & Analytics Summit

December 22, 2014 No Comments

Gartner Business Intelligence & Analytics Summit 2015, March 30 – April 1, in Las Vegas, NV

IT Pros Speak: Top 3 Priorities for Your IT Security Budget in 2015

December 18, 2014 No Comments

The year is wrapping up quickly (can you believe its mid December?!), meaning we’re all scrambling to finalize budgets and plans for next year. And cyber theft is certainly on our minds with the recent Sony Pictures Entertainment hack and the sheer fallout of confidential data exposure the company is currently experiencing.

Blogs, Featured Blogs

What are Communications Providers focusing on in 2015?

December 17, 2014 No Comments

What do communications providers believe are their biggest challenges to success in 2015? Which technologies do the Telecommunications decision makers cite as making the biggest impact to their business in 2015? CloudSense, the global cloud technology company, have carried out a survey of communication service provider decision-makers across the United States and Europe to find out.

Blogs, Featured Blogs

Total Cost of Ownership: The difference between a consumer tablet versus a rugged tablet

December 11, 2014 No Comments

Xplore Technologies is often asked: what is the difference between a consumer tablet and a fully or ultra-rugged tablet PC? For most, a consumer tablet works best for entertainment and personal use, such as checking emails, browsing the Internet, using web-based applications or viewing streaming media. Rugged tablets, on the other hand, are used primarily in harsh environments that require more durable design and features from a tablet PC, and are used for enterprise mobility initiatives by businesses to outfit field workers and service technicians.

Blogs, Featured Blogs

Why You Need A Third Party Tool for Self-Service Password Reset?

November 20, 2014 No Comments

The default and recommended security policies and compliances have made it mandatory that the password of a user expires after a specific number of days. If the user doesn’t change the password before the expiry, then his/her account will be locked. S/He will not be able to logon at the workstation until the IT helpdesk reset the password.

Blogs, Featured Blogs

Security Intelligence Blog: Cybercriminals Use Citadel to Compromise Password Management and Authentication Solutions

November 20, 2014 No Comments

In these days of endless breaches, securing user access by enforcing unique, complex passwords and strong authentication is imperative. The onslaught of data breaches in the past year alone, with the majority of the breaches involving compromised credentials, forced users to constantly change their passwords. With many users still trying to use the same passwords over and over, and others struggling to remember their newly created complex ones, a password manager becomes a smart and responsible solution for users – and attackers have taken notice.

Blogs, Featured Articles, Featured Blogs

Behold, pathetic mortals, a vampire’s data visualization dashboard

October 28, 2014 No Comments

Greetings, insignificant souls. You may call me … Gregor Castamere. It is not my true name. I stalked this strip of land when it was called New Amsterdam. My family’s name is well known. I have lived for more than 600 years, concealing my terrible secret. I am a vampire.

How Much Did Bellogate Cost?

October 27, 2014 No Comments

By now you’ve probably heard of Bellogate, in which a hacker or imposter sent a University College London (UCL) campus-wide email from what appeared to be the university president’s account. Nearly 29,000 students received an email containing the word “bello.” Then, whether because of the hack or poor email configuration, students were able to reply to the entire list—and they did. Soon each student had thousands of reply-all messages, as well as hundreds of unwanted subscriptions to everything from the Sarah Palin website to One Direction’s fan club.

Blogs, Featured Blogs

8 Android Apps for Wearable Devices

October 20, 2014 No Comments

Android wear entered the market trying the change the whole smart attitude that devices held till then. This renewed affair with smartness that Android wear brought in revolutionized the whole world of technology. While Android brought in revolution, developers are still working on how to bring out the best in Android wear devices.

Blogs, Featured Blogs

A Vision for Converged Backup Infrastructure

October 2, 2014 No Comments

IT is evolving at an accelerated pace today, thanks in large part to virtualization, cloud computing and big data. While these trends can lower costs and increase efficiency, they are too often delivered via point products that offer only marginal improvements to the traditional approach.

Private equity fund managers, do your homework and back a winner

September 24, 2014 No Comments

Private equity funds come in all shapes and sizes. You have funds that invest in entrepreneurial start-ups, you know, the ones whose main asset is just a great idea. And then you have the funds that buy established businesses in more traditional industries (retail, transport, resource, and so on) with the aim of reviving them to their former glory.

Blogs, Featured Blogs
ADVERTISEMENT

DTX ExCeL London

WomeninTech