Inside the Briefcase
IT Briefcase Analyst ReportThis product guide allows you to quickly assess -- current products in the market, deployment options, basic differences by monitoring features, the stability of suppliers and more.
Read More >>>
with Mike Martin,
nfrastructureIn this interview, Mike Martin, CTO, nfrastructure, speaks with IT Briefcase about what he believes will be the top IoT trends and predictions for organizations of all sizes and their IT teams for the coming...
globeYour business depends on pushing accurate and dynamic content to its global audience--at the snap of a finger. In today’s world, it is possible to break through barriers, rapidly enter new markets, and transform your global aspirations. Traditional translation...
Before using any standard Internet service provider for e-mail (i.e., Gmail, AOL, Yahoo), you must agree to the site’s terms of use by clicking a seemingly innocuous “I Agree” button. Most users fail to actually read the terms and...
Thinking about a move away from traditional phone lines to a voice over Internet Protocol (VoIP) solution? You're not alone: According to Business Wire, the market is on track to reach almost 350 million subscribers by 2020 and generate...
National Cyber Security Awareness Month and Halloween are both in October. Coincidence? Maybe. But, executives do have a lot to fear when it comes to cyber security. While many executives and IT teams are working hard to keep the...
More than half of U.S. businesses use cloud computing, and that number is expected to keep growing. Companies are shifting from traditional data centers to the cloud for reasons including convenience, speed and efficiency. Traditional data centers are on-site...
In the last five years, Cloud hosts such as Amazon Web Services, Google, Microsoft, Box and Dropbox have become increasingly popular and cost effective for storing and sharing data. That said, data theft has never been greater with network...
Today's IT Needs Heroes to Keep Sensitive Data Safe & Protected. Over 78% of data breaches occur from employee negligence or maliciousness according to a recent study.
When it comes to both online and offline systems, many business owners know that it’s important to think seriously about the security of their company. However, a large number of business owners also often lack the funds or time...
The Internet contains everything today. If you doubt this, just do a simple task, Google yourself and see what the results are. A lot of information about you will pop up some of which you didn’t even know prevailed....
Fewer than half of all payment cards and PoS terminals in the US are currently EMV-ready. Moreover, US merchants and card issuers have been slow to migrate to the new technology. In the wake of EMV’s worldwide implementation, a...
Consulting firm Chadwick Martin Bailey found in a recent survey that 15 percent of U.S. consumers have used a mobile wallet in the past six months, up from nine percent in the same period in 2013. The numbers may...
Organizations need to explore another approach that encompasses cloud, but goes beyond it - called Hybrid IT.
by Rob Quiros,
SohaAs the move to hybrid cloud infrastructure causes the Internet and corporate network to meld, enterprises need a new approach to ensure all of their applications and network resources remain secure. But that is easier...
If you’ve been holding off on changing your marketing strategy to cater to mobile device users, the time to act is now. If you’re hoping to stay relevant to target consumers and to keep up with rapidly evolving technology,...
With the maturing cloud now a de facto technology choice for most businesses, especially start-ups, the choice of which cloud solution providers (CSP) to trust is the next big decision. With so many options to choose from, and so...
The preponderant quantity of advances in IT and software engineering in the last ten years has been driven by scale. Ephemeral infrastructure and PaaS enable us to scale hardware, CI/CD enable us to scale the rate of production change,...
Technology is becoming more prominent in just about every industry. It's starting to evolve the way we interact with the world at large. Certainly the concept of information technology, or IT, has expanded to include many more markets than...
Making a purchase or other payment is not like it used to be. These days, cash and credit cards aren’t the necessities they once were because alternative-payment options are just a tap or two away on a mobile device...
Wearable tech like the FitBit, the Apple Watch, heart-rate monitors, and pedometers are currently the domain of the tech-savvy and the fitness-obsessed. But all that could soon change. Physicians say wearable devices have a lot of potential to improve...
It wasn’t so long ago that doctors unanimously relied on paper charts to record and store patient health information. But thanks to provisions in the 2009 economic stimulus program, many doctors and hospitals have received cash incentives in return...
Technology's reach has extended across industries and the healthcare space is no exception. Everything from mobile innovations to wearables and advanced technologies are changing the way doctors care for patients and the way patients care for themselves. These innovations...
with Bernard Golden,
ActiveStateIT professionals are evaluating how open source products can help them meet their organizations’ responsibilities. Enterprise IT has a large and growing commitment to open source products in preference to proprietary alternatives.
Read More...
Many solution platforms and data technologies come to mind in the context of harnessing the power and promise of the Internet of Things (IoT). A relational database does not typically top the list. The potential of an interconnected world...
Daniel Joseph Barry,
NapatechIn this interview, Dan Joe Barry, VP Positioning and Chief Evangelist for Napatech, speaks with IT Briefcase about the emerging technology of software acceleration platforms and tools.
Read More >>>
by Miguel Valdes Faura,
BonitasoftThe common thinking has been that developing and implementing a process-based application will be as complicated and disruptive as a custom development. It doesn’t have to be. Here are five steps to ensure...
by Chip Epps,
OneLogin Gartner predicts the number of cloud-provisioned office system users will grow 28.5% a year to 695 million users by 2022 --constituting 60% of the user universe that will exist by then.
Read More...
Adobe EchoSign for Salesforce® runs seamlessly inside your Salesforce application, and enables anyone on your team to send and track contracts in a few clicks—without leaving the Salesforce application.
with Jay Henderson,
IBM CommerceIn this interview, Jay Henderson, Director, Product Strategy, IBM Commerce, speaks with IT Briefcase on how trends such as extreme weather and holiday shopping impact online commerce and what it means for retailers.