Inside the Briefcase


Killing Misconception: Five Steps to BPM Success

Killing Misconception: Five Steps to BPM Success

by Miguel Valdes Faura, Bonitasoft
The common thinking has been that developing and implementing a process-based application will be as complicated and disruptive as a custom development. It doesn’t have to be. Here are five steps to ensure...

7 Steps to Securely Deploy Cloud Apps

7 Steps to Securely Deploy Cloud Apps

by Chip Epps, OneLogin
Gartner predicts the number of cloud-provisioned office system users will grow 28.5% a year to 695 million users by 2022 --constituting 60% of the user universe that will exist by then.
Read More...

IT Briefcase Exclusive Interview with IBM: How Major Snow Storms Effect Shopping Trends

with Jay Henderson, IBM Commerce
In this interview, Jay Henderson, Director, Product Strategy, IBM Commerce, speaks with IT Briefcase on how trends such as extreme weather and holiday shopping impact online commerce and what it means for retailers.

IT Briefcase Exclusive Interview: The Value of BPM in 2015

IT Briefcase Exclusive Interview: The Value of BPM in 2015

with Anatoly Belaychuk, Comindware
In this interview, BPM Evangelist at Comindware outlines some of the key challenges and benefits BPM will offer to organizations in 2015.
Read More >>>





Briefcase Highlights


Fresh Ink

IT Briefcase Exclusive Interview: New Era of Performance Optimization in SAN Storage

May 22, 2015 No Comments

with Brian Morin, Condusiv TechnologiesOne of the biggest silent killers of SAN performance has nothing to do with the SAN itself, but the number of small, fractured random I/O that overwhelms bandwidth from the SAN as a result a fragmented logical disk. Read More >>>

IT Briefcase Exclusive Interview with HYPR Corp: Fighting Online Fraud

May 21, 2015 No Comments

with George Avetisov, HYPR Corp.Here’s the problem, according to HYPR Corp., provider of a device-to-cloud biometric security platform: cyber criminals are focusing on mobile payments too, and organizations are repeatedly failing to secure data as it transitions to the cloud. Read More >>>

Killing Misconception: Five Steps to BPM Success

May 15, 2015 No Comments

by Miguel Valdes Faura, BonitasoftThe common thinking has been that developing and implementing a process-based application will be as complicated and disruptive as a custom development. It doesn’t have to be. Here are five steps to ensure success. Read More >>>

Don’t Get Lost in the Cloud: 10 Tips for Controlling Cloud Data

May 13, 2015 No Comments

by Gerry Grealish, PerspecsysWith information flowing more freely than ever in today’s digital economy, tracking sensitive data becomes an increasingly difficult task. In fact, findings from a recent study show more than half of IT professionals admit not having a complete picture of where their sensitive data lives. Read More >>>

4 Steps to Making a Smart Transition to the Cloud

May 11, 2015 No Comments

by Chris Unruh, Grant Thornton LLPDuring the past several years, cloud-based business applications and solutions have emerged as the next frontier for the IT function. The cloud has the potential to transform the way companies operate and enable businesses to access world-class software with little upfront cost. Read More >>>

Choosing the IT Dream Team: Diverse Personalities Are Key

May 4, 2015 No Comments

by Weston Morris, UnisysIT organizations today often face a quandary. They need to introduce new technology and develop new services to take on the emerging business challenges confronting their clients. At the same time, they need to maintain, without disruption, the technologies and services that have enabled them to capitalize on existing opportunities. Read More >>>

Consumers Need an Education in Online Shopping Security 101

April 30, 2015 No Comments

by Robin Alden, Comodo CA Ltd.You place so much time and effort into the design and content of your website to increase its “stickiness” and turn online browsers into buyers, and with good reason. Consumers are increasingly doing more of their shopping online while doing so on a wide variety of devices with different screen sizes. Read More >>>

Eight Realities That Demand Multi-Factor Authentication

April 30, 2015 No Comments

by David Hald, SMS PASSCODESecurity is part and parcel of an IT admin’s job duties, but it is just one of a long litany of must-do’s that crowd each day. They put the basics in place, including antivirus software, passwords and firewalls, and then turn their attention to the latest priority or malfunction. Read More >>>

7 Steps to Securely Deploy Cloud Apps

April 22, 2015 No Comments

by Chip Epps, OneLogin Gartner predicts the number of cloud-provisioned office system users will grow 28.5% a year to 695 million users by 2022 –constituting 60% of the user universe that will exist by then. Read More >>>

Why Marketers Need to Put A/B Testing by the Wayside Content

April 20, 2015 No Comments

by Cory Munchbach, BlueConicWhile A/B and multivariate testing has been known to improve the effectiveness of marketing campaigns, newer tools and methodologies that can be implemented today have evolved to become more effective and informative than their predecessors. Read More >>>

7 Service Desk Habits of The Avengers

April 16, 2015 No Comments

with Vinit Tibrewal, ManageEngine“If you are an IT help desk technician, you’re a superhero!” You may have heard this many times from your help desk solution provider, if not from your customers and colleagues. Read More >>>

Using Dropbox? Get Ready for Spring Cleaning!

April 8, 2015 No Comments

by Paul Castiglione, IpswitchApril is finally here and that means IT teams, like everyone else, will be busy with their spring cleaning projects. While spring cleaning your house is a pretty straightforward endeavor, spring cleaning your files can be a lot more complicated. Read More >>>

COPE vs. BYOD vs. CYOD – How Should an Enterprise Choose?

March 31, 2015 No Comments

by Mitch Black, MOBIRecently, there has been a great deal of debate in the world of mobile devices and how they function in the enterprise. There’s BYOD (Bring Your Own Device) vs. COPE (Corporate Owned, Personally Enabled), and now even CYOD (Choose Your Own Device). Read More >>>

March Madness Should Not Rest Solely on IT’s Shoulders

March 26, 2015 No Comments

by Steve Riley, Riverbed TechnologyThere are several steps companies can take to keep network performance from faltering without ruining employee morale. Some fall under IT’s area of responsibility, but others require other typically non-tech savvy departments and personnel. Read More >>>

How the Experience Web Will Finally Eradicate the Language Barrier

March 25, 2015 No Comments

by Rob Vandenberg, Lingotek Now that our global culture is becoming increasingly digitized, not least with the addition of the Apple Watch and drone delivery, language is going to take on new meaning. The barriers to comprehension will be lower than ever, but the obstacles to effectively marketing your global business will rise. Read More >>>

IT Briefcase Exclusive Interview with IBM: How Major Snow Storms Effect Shopping Trends

March 18, 2015 No Comments

with Jay Henderson, IBM CommerceIn this interview, Jay Henderson, Director, Product Strategy, IBM Commerce, speaks with IT Briefcase on how trends such as extreme weather and holiday shopping impact online commerce and what it means for retailers. Read More >>>

PCI DSS 3.0 Still Isn’t Enough

March 3, 2015 No Comments

By Ed Fox, Met’TelFollowing the data breaches of 2014 (think Home Depot, Target and Sony Entertainment Pictures), it’s clear that security should be top of mind for both businesses and consumers in 2015. Read More >>>

Making the most of your Hybrid Cloud Migration

February 20, 2015 No Comments

By Dave Eichorn, Zensar TechnologiesEnterprises understand the value of hybrid cloud models to achieve a variety of benefits, including lower startup costs, simplified management, and flexibility to scale storage on an as-needed basis. In fact, according to Gartner, nearly half of large enterprises will have hybrid cloud deployments by the end of 2017. Read More >>>

A New Data Warehouse Architecture for the Brave New BI World

February 18, 2015 No Comments

by Paul Moxon, Denodo TechnologiesAlthough Big Data, Internet of Things, Data Lakes, Streaming Analytics, and Machine Learning provide us with new sources of data and new forms of analytics, the reality today is that traditional data warehouse architectures are no longer able to handle many new technologies and a new data architecture is required. Read More >>>

Why Your File Transfer Solution Should Be As Secure As Your Valentine’s Day Delivery

February 12, 2015 No Comments

by Aaron Kelly, IpswitchLet’s face it, we don’t really pay a great deal of attention to delivery methods. As long as things arrive when they are supposed to and in good condition, we give the process very little thought. Read More >>>

“The Offline Problem”: How to Solve the Biggest Hurdle Facing the Mobile Workforce

February 10, 2015 No Comments

by Richard Rabins, Alpha SoftwareDespite the opportunities that mobilizing the workforce offers, enterprises have deployed a surprisingly small number of apps due to the challenges inherent with mobile app development. Read More >>>

A Year in Review of the IT Security Industry and 2015 Predictions

February 10, 2015 No Comments

by Yo Delmar, MetricStreamNow that we are well on our way into 2015, we can look back on the year past to reflect on some of the challenges faced, and also on some of the lessons learned. Hindsight is always 20/20. Read More >>>

2015: The Cloud Broker Comes of Age

February 5, 2015 No Comments

by Jarid Cottrell, Booz Allen HamiltonIn 2013, the cloud started to officially climb the maturity curve. Business leaders understood its value, CIOs understood how to implement it, and new companies arose focused solely on cloud environments. Read More >>>

From Big Data Swamps to Big Data Value with the Right Infrastructure

January 30, 2015 No Comments

by Tom Phelan, Blue DataBig Data promises a lot—new insights about customers, shorter product development cycles, new and increased streams of revenue, and more. But capitalizing on all that promise requires radical shifts in the way data is collected, managed, stored, accessed and used. Read More >>>

Five Tips for Strengthening the IT Department in 2015

January 28, 2015 No Comments

by David Kidd, Peak 10Data security continues to be a growing concern for all businesses – small and large – as part of a macro trend taking grip in 2015. While improving technologies are essential for protecting data, studies have shown that internal incidents continued to top the list of 2014 breaches. Read More >>>

Recent Insight into Analytics in the Cloud

January 26, 2015 No Comments

by John L. Myers, EMAAs we enter the middle of the second decade of the 21st century, many organizations are recognizing and utilizing cloud infrastructure as a way to implement their analytical and business intelligence requirements. Read More >>>

IT Briefcase Exclusive Interview: The Value of BPM in 2015

January 23, 2015 No Comments

with Anatoly Belaychuk, ComindwareIn this interview, BPM Evangelist at Comindware outlines some of the key challenges and benefits BPM will offer to organizations in 2015. Read More >>>

5 Ways DocOps Will Help You Globalize Your Business

January 23, 2015 No Comments

by Rob Vandenberg, LingotekIn yet another case of “what you don’t know actually can hurt you,” DocOps is the latest process poised to up-end your content-management world. If you haven’t heard of this DevOps adaptation, you need to, especially if you hope compete in the race to globalize. Read More >>>

IT Security Tips for Keeping Kids Safe Online in 2015

January 14, 2015 No Comments

with Rawdon Messenger, TeenSafeSocial media — and the way teens use it — is changing quickly. Parents can’t be expected to keep up, even as they’re expected to keep their kids safe online. From Yik Yak to Medium to Tumblr, social media and smartphone apps have evolved far beyond facebook. Read More >>>

Calling all CIOs: IoT Will Change Everything in 2015 and Beyond

January 7, 2015 No Comments

by Ali A. Alkhafaji, VirtusaThe Internet of Things (IoT) introduces difficult questions: How can someone manage all of his or her devices? A unified user interface? Are different companies and industries ready to standardize? What is the potential commercial value for IoT? How will we manage security and safety? Software compatibility? Read More >>>

ADVERTISEMENT

DTX ExCeL London

WomeninTech