Inside the Briefcase


2016 APM Reference Guide: Application Performance Monitoring

2016 APM Reference Guide: Application Performance Monitoring

IT Briefcase Analyst Report
This product guide allows you to quickly assess -- current products in the market, deployment options, basic differences by monitoring features, the stability of suppliers and more.
Read More >>>

IT Briefcase Exclusive Interview: Top IoT Trends and Predictions for Organizations in 2016

IT Briefcase Exclusive Interview: Top IoT Trends and Predictions for Organizations in 2016

with Mike Martin, nfrastructure
In this interview, Mike Martin, CTO, nfrastructure, speaks with IT Briefcase about what he believes will be the top IoT trends and predictions for organizations of all sizes and their IT teams for the coming...

Unleash the Power of Global Content

Unleash the Power of Global Content

globeYour business depends on pushing accurate and dynamic content to its global audience--at the snap of a finger. In today’s world, it is possible to break through barriers, rapidly enter new markets, and transform your global aspirations. Traditional translation...

Clicking Away Your Right to Privacy

Clicking Away Your Right to Privacy

Before using any standard Internet service provider for e-mail (i.e., Gmail, AOL, Yahoo), you must agree to the site’s terms of use by clicking a seemingly innocuous “I Agree” button. Most users fail to actually read the terms and...

Top Questions to Ask Before Implementing VoIP

Top Questions to Ask Before Implementing VoIP

Thinking about a move away from traditional phone lines to a voice over Internet Protocol (VoIP) solution? You're not alone: According to Business Wire, the market is on track to reach almost 350 million subscribers by 2020 and generate...

Happy Halloween: Bad Cyber Security is Scary

Happy Halloween: Bad Cyber Security is Scary

National Cyber Security Awareness Month and Halloween are both in October. Coincidence? Maybe. But, executives do have a lot to fear when it comes to cyber security. While many executives and IT teams are working hard to keep the...

Three reasons why the cloud is safer than traditional data centers

Three reasons why the cloud is safer than traditional data centers

More than half of U.S. businesses use cloud computing, and that number is expected to keep growing. Companies are shifting from traditional data centers to the cloud for reasons including convenience, speed and efficiency. Traditional data centers are on-site...

WHEN IT COMES TO PROTECTING DATA – TAKE YOUR HEAD OUT OF THE CLOUDS

WHEN IT COMES TO PROTECTING DATA – TAKE YOUR HEAD OUT OF THE CLOUDS

In the last five years, Cloud hosts such as Amazon Web Services, Google, Microsoft, Box and Dropbox have become increasingly popular and cost effective for storing and sharing data. That said, data theft has never been greater with network...

Wanted: Guardians of the Data

Wanted: Guardians of the Data

Today's IT Needs Heroes to Keep Sensitive Data Safe & Protected. Over 78% of data breaches occur from employee negligence or maliciousness according to a recent study.

Four Ways to Make Your Business More Secure

Four Ways to Make Your Business More Secure

When it comes to both online and offline systems, many business owners know that it’s important to think seriously about the security of their company. However, a large number of business owners also often lack the funds or time...

Online Reputation Management for Healthcare Professionals

Online Reputation Management for Healthcare Professionals

The Internet contains everything today. If you doubt this, just do a simple task, Google yourself and see what the results are. A lot of information about you will pop up some of which you didn’t even know prevailed....

EMV Hits The US – Now What?

EMV Hits The US – Now What?

Fewer than half of all payment cards and PoS terminals in the US are currently EMV-ready. Moreover, US merchants and card issuers have been slow to migrate to the new technology. In the wake of EMV’s worldwide implementation, a...

Making Mobile Wallets Safer

Making Mobile Wallets Safer

Consulting firm Chadwick Martin Bailey found in a recent survey that 15 percent of U.S. consumers have used a mobile wallet in the past six months, up from nine percent in the same period in 2013. The numbers may...

Hybrid IT through Cloud Brokerage – Your Path to Better Business Outcomes

Hybrid IT through Cloud Brokerage – Your Path to Better Business Outcomes

Organizations need to explore another approach that encompasses cloud, but goes beyond it - called Hybrid IT.

Turning Trust Upside Down: How to Reduce Security Risks in a Cloud-based Economy

Turning Trust Upside Down: How to Reduce Security Risks in a Cloud-based Economy

by Rob Quiros, Soha
As the move to hybrid cloud infrastructure causes the Internet and corporate network to meld, enterprises need a new approach to ensure all of their applications and network resources remain secure. But that is easier...

Preparing Your Mobile Marketing Strategy for the Future

Preparing Your Mobile Marketing Strategy for the Future

If you’ve been holding off on changing your marketing strategy to cater to mobile device users, the time to act is now. If you’re hoping to stay relevant to target consumers and to keep up with rapidly evolving technology,...

Cloud Providers Are Not All The Same

Cloud Providers Are Not All The Same

With the maturing cloud now a de facto technology choice for most businesses, especially start-ups, the choice of which cloud solution providers (CSP) to trust is the next big decision. With so many options to choose from, and so...

Why Cloud Monitoring Matters in the App Age

Why Cloud Monitoring Matters in the App Age

The preponderant quantity of advances in IT and software engineering in the last ten years has been driven by scale. Ephemeral infrastructure and PaaS enable us to scale hardware, CI/CD enable us to scale the rate of production change,...

Health IT Trends On the Rise in 2015

Health IT Trends On the Rise in 2015

Technology is becoming more prominent in just about every industry. It's starting to evolve the way we interact with the world at large. Certainly the concept of information technology, or IT, has expanded to include many more markets than...

How Vulnerable To Hackers Are Mobile-Payment Apps?

How Vulnerable To Hackers Are Mobile-Payment Apps?

Making a purchase or other payment is not like it used to be. These days, cash and credit cards aren’t the necessities they once were because alternative-payment options are just a tap or two away on a mobile device...

How Wearable Tech Could Transform Health Care

How Wearable Tech Could Transform Health Care

Wearable tech like the FitBit, the Apple Watch, heart-rate monitors, and pedometers are currently the domain of the tech-savvy and the fitness-obsessed. But all that could soon change. Physicians say wearable devices have a lot of potential to improve...

EHRs — How Safe Are Your Medical Records?

EHRs — How Safe Are Your Medical Records?

It wasn’t so long ago that doctors unanimously relied on paper charts to record and store patient health information. But thanks to provisions in the 2009 economic stimulus program, many doctors and hospitals have received cash incentives in return...

The Digitization of Healthcare

The Digitization of Healthcare

Technology's reach has extended across industries and the healthcare space is no exception. Everything from mobile innovations to wearables and advanced technologies are changing the way doctors care for patients and the way patients care for themselves. These innovations...

IT Briefcase Exclusive Interview: What You Need to Know to Meet the Open Source Juggernaut

IT Briefcase Exclusive Interview: What You Need to Know to Meet the Open Source Juggernaut

with Bernard Golden, ActiveState
IT professionals are evaluating how open source products can help them meet their organizations’ responsibilities. Enterprise IT has a large and growing commitment to open source products in preference to proprietary alternatives. Read More...

How Postgres Will Power the Internet of Things

Many solution platforms and data technologies come to mind in the context of harnessing the power and promise of the Internet of Things (IoT). A relational database does not typically top the list. The potential of an interconnected world...

IT Briefcase Exclusive Interview with Napatech: What the Third Platform Requires of the Network

IT Briefcase Exclusive Interview with Napatech: What the Third Platform Requires of the Network

Daniel Joseph Barry, Napatech
In this interview, Dan Joe Barry, VP Positioning and Chief Evangelist for Napatech, speaks with IT Briefcase about the emerging technology of software acceleration platforms and tools.
Read More >>>

Killing Misconception: Five Steps to BPM Success

Killing Misconception: Five Steps to BPM Success

by Miguel Valdes Faura, Bonitasoft
The common thinking has been that developing and implementing a process-based application will be as complicated and disruptive as a custom development. It doesn’t have to be. Here are five steps to ensure...

7 Steps to Securely Deploy Cloud Apps

7 Steps to Securely Deploy Cloud Apps

by Chip Epps, OneLogin
Gartner predicts the number of cloud-provisioned office system users will grow 28.5% a year to 695 million users by 2022 --constituting 60% of the user universe that will exist by then.
Read More...

Adobe EchoSign for Salesforce

Adobe EchoSign for Salesforce® runs seamlessly inside your Salesforce application, and enables anyone on your team to send and track contracts in a few clicks—without leaving the Salesforce application.

IT Briefcase Exclusive Interview with IBM: How Major Snow Storms Effect Shopping Trends

IT Briefcase Exclusive Interview with IBM: How Major Snow Storms Effect Shopping Trends

with Jay Henderson, IBM Commerce
In this interview, Jay Henderson, Director, Product Strategy, IBM Commerce, speaks with IT Briefcase on how trends such as extreme weather and holiday shopping impact online commerce and what it means for retailers.




Briefcase Highlights


Inside the Briefcase

2016 APM Reference Guide: Application Performance Monitoring

February 11, 2016 No Comments

IT Briefcase Analyst ReportThis product guide allows you to quickly assess — current products in the market, deployment options, basic differences by monitoring features, the stability of suppliers and more. Read More >>>

IT Briefcase Exclusive Interview: Top IoT Trends and Predictions for Organizations in 2016

December 2, 2015 No Comments

with Mike Martin, nfrastructureIn this interview, Mike Martin, CTO, nfrastructure, speaks with IT Briefcase about what he believes will be the top IoT trends and predictions for organizations of all sizes and their IT teams for the coming year. Read More >>>

Unleash the Power of Global Content

November 13, 2015 No Comments

globeYour business depends on pushing accurate and dynamic content to its global audience–at the snap of a finger. In today’s world, it is possible to break through barriers, rapidly enter new markets, and transform your global aspirations. Traditional translation processes are hurting your business. If you’re reading this, you’ve most likely felt the pain of a manual translation process, which can slow and even derail brilliant marketing campaigns, global web content, and in-office productivity and creativity. Chances are you’ve felt that pain within the last week.

Clicking Away Your Right to Privacy

November 4, 2015 No Comments

Before using any standard Internet service provider for e-mail (i.e., Gmail, AOL, Yahoo), you must agree to the site’s terms of use by clicking a seemingly innocuous “I Agree” button. Most users fail to actually read the terms and simply click the button without a second thought. Without knowing it, that simple act may be waiving an important Constitutional right toprivacy.

Top Questions to Ask Before Implementing VoIP

November 4, 2015 No Comments

Thinking about a move away from traditional phone lines to a voice over Internet Protocol (VoIP) solution? You’re not alone: According to Business Wire, the market is on track to reach almost 350 million subscribers by 2020 and generate $136 billion in revenue. However, before ditching your plain old telephone service (POTS) for a VoIP, it’s important to ask a few critical questions.

Happy Halloween: Bad Cyber Security is Scary

October 28, 2015 No Comments

National Cyber Security Awareness Month and Halloween are both in October. Coincidence? Maybe. But, executives do have a lot to fear when it comes to cyber security. While many executives and IT teams are working hard to keep the bad actors out, there are still A LOT of vulnerabilities out there dressed up as the good guys. Today many agencies are being fooled by cyber threats hiding in plain sight – disguised in Secure Sockets Layer (SSL) traffic.

Three reasons why the cloud is safer than traditional data centers

October 27, 2015 No Comments

More than half of U.S. businesses use cloud computing, and that number is expected to keep growing. Companies are shifting from traditional data centers to the cloud for reasons including convenience, speed and efficiency. Traditional data centers are on-site hardware that store data within a company’s local network, whereas the cloud is an off-site storage on the Internet. While the fact that the storage is off-site might sound like it’s not as safe, that isn’t the case. Here are three reasons why the cloud is safer than traditional data centers.

WHEN IT COMES TO PROTECTING DATA – TAKE YOUR HEAD OUT OF THE CLOUDS

October 26, 2015 No Comments

In the last five years, Cloud hosts such as Amazon Web Services, Google, Microsoft, Box and Dropbox have become increasingly popular and cost effective for storing and sharing data. That said, data theft has never been greater with network and cloud security becoming more porous. As the need for information sharing increases, the network domain and cloud-based model become more inadequate.

Wanted: Guardians of the Data

October 23, 2015 No Comments

Today’s IT Needs Heroes to Keep Sensitive Data Safe & Protected. Over 78% of data breaches occur from employee negligence or maliciousness according to a recent study.

Four Ways to Make Your Business More Secure

October 23, 2015 No Comments

When it comes to both online and offline systems, many business owners know that it’s important to think seriously about the security of their company. However, a large number of business owners also often lack the funds or time needed in order to take the necessary steps to ensure that their systems are as secure as possible. The fact is, however, that security can be as costly or as inexpensive as you make it, and there are certainly a number of security related steps that you can implement into the running of your business without having to spend a lot of money. Here we have listed a number of cost-effective ways in which you can improve the security of your business both online and offline.

Online Reputation Management for Healthcare Professionals

October 19, 2015 No Comments

The Internet contains everything today. If you doubt this, just do a simple task, Google yourself and see what the results are. A lot of information about you will pop up some of which you didn’t even know prevailed. As a medical professional, the internet is a potentially good platform that can enable you attract huge client base. Every day, patients resort to using the internet to connect with medical professions and seek medical assistance. A study done in the US reveals that 88% of consumers trust online reviews more than personal recommendations. The research further highlights that 30 percent of the consumers look for doctors online. It is the time a healthcare professional can take to lure in more patients and market services.

EMV Hits The US – Now What?

October 19, 2015 No Comments

Fewer than half of all payment cards and PoS terminals in the US are currently EMV-ready. Moreover, US merchants and card issuers have been slow to migrate to the new technology. In the wake of EMV’s worldwide implementation, a wave of technologies – including near-field communication (NFC), tokenization and cloud-based wallets – is having an accelerating impact on the industry.

Making Mobile Wallets Safer

October 13, 2015 No Comments

Consulting firm Chadwick Martin Bailey found in a recent survey that 15 percent of U.S. consumers have used a mobile wallet in the past six months, up from nine percent in the same period in 2013. The numbers may seem small at first glance, but do the math: that’s a 66 percent increase in usage in just two years. In terms of awareness of mobile wallets, the percentage jump is even higher. Their Mobile Wallet in 2015 and Beyond report found that 18 percent of consumers are “very familiar” with mobile wallets, compared to eight percent in 2013.

Hybrid IT through Cloud Brokerage – Your Path to Better Business Outcomes

October 11, 2015 No Comments

Organizations need to explore another approach that encompasses cloud, but goes beyond it – called Hybrid IT.

Turning Trust Upside Down: How to Reduce Security Risks in a Cloud-based Economy

October 9, 2015 No Comments

by Rob Quiros, SohaAs the move to hybrid cloud infrastructure causes the Internet and corporate network to meld, enterprises need a new approach to ensure all of their applications and network resources remain secure. But that is easier said than done, since traditional network perimeters and VPNs simply don’t work in this new cloud-based environment. Read More >>>

Preparing Your Mobile Marketing Strategy for the Future

October 5, 2015 No Comments

If you’ve been holding off on changing your marketing strategy to cater to mobile device users, the time to act is now. If you’re hoping to stay relevant to target consumers and to keep up with rapidly evolving technology, preparing your mobile marketing strategy for the future is officially mission critical.

Cloud Providers Are Not All The Same

October 1, 2015 No Comments

With the maturing cloud now a de facto technology choice for most businesses, especially start-ups, the choice of which cloud solution providers (CSP) to trust is the next big decision. With so many options to choose from, and so many providers, big and small, vying for your attention, it’s important to understand what critical aspects of a CSP to look for. What makes one cloud company better than the next?

Why Cloud Monitoring Matters in the App Age

October 1, 2015 No Comments

The preponderant quantity of advances in IT and software engineering in the last ten years has been driven by scale. Ephemeral infrastructure and PaaS enable us to scale hardware, CI/CD enable us to scale the rate of production change, and microservices, eventually consistent data stores, and distributed systems engineering enable us to scale the applications themselves. Scale is a strange and unforgiving property. It cannot be fooled, and is never fully satiated. It has a way of unceremoniously obliterating conventional thinking. It demands 350 new servers right now and laughs mockingly at your change management meeting and your tape backups.

Health IT Trends On the Rise in 2015

September 21, 2015 No Comments

Technology is becoming more prominent in just about every industry. It’s starting to evolve the way we interact with the world at large. Certainly the concept of information technology, or IT, has expanded to include many more markets than just those involved with computers. There are IT teams trained to work on medical equipment, manufacturing and construction machinery, retail database and point of sale systems, and so much more. The list could go on for a long while.

How Vulnerable To Hackers Are Mobile-Payment Apps?

September 17, 2015 No Comments

Making a purchase or other payment is not like it used to be. These days, cash and credit cards aren’t the necessities they once were because alternative-payment options are just a tap or two away on a mobile device through apps such as Google Wallet, Apple Pay, Square, Levelup, Kash and PayPal. But just how secure are those mobile-payment apps and who makes sure that the companies behind them are doing all they can to keep your personal data safe?

How Wearable Tech Could Transform Health Care

August 4, 2015 No Comments

Wearable tech like the FitBit, the Apple Watch, heart-rate monitors, and pedometers are currently the domain of the tech-savvy and the fitness-obsessed. But all that could soon change. Physicians say wearable devices have a lot of potential to improve health care for people with chronic physical and mental illness.

EHRs — How Safe Are Your Medical Records?

July 21, 2015 No Comments

It wasn’t so long ago that doctors unanimously relied on paper charts to record and store patient health information. But thanks to provisions in the 2009 economic stimulus program, many doctors and hospitals have received cash incentives in return for switching over to electronic health records (EHRs). For that reason, most doctors and hospitals now store patient health information electronically.

The Digitization of Healthcare

July 7, 2015 No Comments

Technology’s reach has extended across industries and the healthcare space is no exception. Everything from mobile innovations to wearables and advanced technologies are changing the way doctors care for patients and the way patients care for themselves. These innovations are transforming every aspect of health and wellness, from patient intake to record keeping to testing and treatment. It’s undeniable that there have been huge transformations and advancements in healthcare thanks to technology, and that these are being readily embraced by doctors, hospitals, specialists and other providers.

IT Briefcase Exclusive Interview: What You Need to Know to Meet the Open Source Juggernaut

July 6, 2015 No Comments

with Bernard Golden, ActiveStateIT professionals are evaluating how open source products can help them meet their organizations’ responsibilities. Enterprise IT has a large and growing commitment to open source products in preference to proprietary alternatives. Read More >>>

How Postgres Will Power the Internet of Things

June 11, 2015 No Comments

Many solution platforms and data technologies come to mind in the context of harnessing the power and promise of the Internet of Things (IoT). A relational database does not typically top the list. The potential of an interconnected world of smart devices communicating with one another to meet human demands instead emphasizes new solutions and new ways to connect and analyze data.

IT Briefcase Exclusive Interview with Napatech: What the Third Platform Requires of the Network

June 3, 2015 No Comments

Daniel Joseph Barry, NapatechIn this interview, Dan Joe Barry, VP Positioning and Chief Evangelist for Napatech, speaks with IT Briefcase about the emerging technology of software acceleration platforms and tools.Read More >>>

Killing Misconception: Five Steps to BPM Success

May 15, 2015 No Comments

by Miguel Valdes Faura, BonitasoftThe common thinking has been that developing and implementing a process-based application will be as complicated and disruptive as a custom development. It doesn’t have to be. Here are five steps to ensure success. Read More >>>

7 Steps to Securely Deploy Cloud Apps

April 22, 2015 No Comments

by Chip Epps, OneLogin Gartner predicts the number of cloud-provisioned office system users will grow 28.5% a year to 695 million users by 2022 –constituting 60% of the user universe that will exist by then. Read More >>>

Adobe EchoSign for Salesforce

March 23, 2015 No Comments

Adobe EchoSign for Salesforce® runs seamlessly inside your Salesforce application, and enables anyone on your team to send and track contracts in a few clicks—without leaving the Salesforce application.

IT Briefcase Exclusive Interview with IBM: How Major Snow Storms Effect Shopping Trends

March 18, 2015 No Comments

with Jay Henderson, IBM CommerceIn this interview, Jay Henderson, Director, Product Strategy, IBM Commerce, speaks with IT Briefcase on how trends such as extreme weather and holiday shopping impact online commerce and what it means for retailers. Read More >>>

ADVERTISEMENT

DTX ExCeL London

WomeninTech