Inside the Briefcase






Briefcase Highlights


Featured Articles

5 Things Every IT Manager Should Automate

January 5, 2015 No Comments

When looking for ways to automate your IT system, you must make sure to address three main areas. The security monitoring, alerting and compliance must be addressed to make sure that your business is performing well. One of the best ways an IT manager can prove his worth to a large company is by asking questions like what needs automation.

Featured Articles

5 Ways to Know You Need an IAM Solution

December 18, 2014 No Comments

Implementing an identity and access management solution scares many organizations’ IT leaders and their CEOs for a variety of reasons. Though doing so does cost money, the expense of doing so is probably not as much as if saved because of resulting employee efficiencies among other savings factors. Cost and investment are only a small factor to be considered.

Featured Articles

Why You’ll Make More Money with a Degree in CIT Than You Will With a Business Degree

December 15, 2014 No Comments

It’s imperative that a student exercises prudence when choosing a degree program to explore a promising career. A degree in business or CIT (Computer and Information Technology) offers flexible options and job opportunities. A future professional looking toward a career in either business or CIT is often curious about the salary potential. Here’s something concrete to steer them in the right direction. This makes it a breeze to decide on a career change if necessary.

Featured Articles

Corporate IT is Facing a Darwinian Challenge, Not a Meteor-Induced Extinction

December 15, 2014 No Comments

One hears a lot of talk about the “death of IT,” or even more commonly the “death of the IT Service Desk,” but how informed are these opinions and do they ultimately drive the right type of response? In my opinion, they often give the view that it will be a “death of the dinosaurs”-type extinction for internal IT organizations. With a sudden fatal event – like the assumed, dinosaur-killing meteor – rather than a gradual, Darwinian-like “survival of the fittest” decline into extinction.

Server and Application Monitoring 101

December 9, 2014 1 Comment

In order to succeed in today’s competitive business world, many organizations have placed system administrators and IT departments under pressure to do more with less. Unfortunately, the challenge of keeping complex networks running smoothly with reduced resources creates heavy workloads that can compromise productivity.

Five Best Practices for a Successful VDI Deployment

December 4, 2014 No Comments

VDI (Virtual Desktop Infrastructure) has been a boon to both users and IT departments. For users, it means having access to their desktop from virtually anywhere. For IT, it means that new virtual desktops can be rolled out to users en masse, anywhere they are located, and without travel. It also means that user data can be corralled on centralized servers, rather than distributed across thousands of disparate – and frequently unsecured – physical desktop computers.

Featured Articles

2015 Predictions for Cloud Security

December 3, 2014 No Comments

2014 will go down in history as the year of the data breach. 2015 will be the year of the “digital enterprise” – as the adoption of cloud, mobility and IoT will continue to flourish. Bitglass, a cloud access security broker (CASB), offers its top tech predictions for 2015.

Three ICT trends to watch in 2015

November 25, 2014 No Comments

2015 is only a few weeks away and it promises to be yet another exciting and eventful year for the telecoms industry. This article outlines the three most important trends making an impact in 2015 as predicted by David King, CEO of leading data centre and power management systems supplier Flexenclosure.

Featured Articles

Security Intelligence Blog: Cybercriminals Use Citadel to Compromise Password Management and Authentication Solutions

November 20, 2014 No Comments

In these days of endless breaches, securing user access by enforcing unique, complex passwords and strong authentication is imperative. The onslaught of data breaches in the past year alone, with the majority of the breaches involving compromised credentials, forced users to constantly change their passwords. With many users still trying to use the same passwords over and over, and others struggling to remember their newly created complex ones, a password manager becomes a smart and responsible solution for users – and attackers have taken notice.

Blogs, Featured Articles, Featured Blogs

Trends in e-commerce in 2015

November 7, 2014 No Comments

E-commerce is growing rapidly and also changing shape year by year. M-commerce, omni-channel and personalization promises to be the trends with the strongest impact on the online retail industry in 2015, according to some experts.

Featured Articles

Tips to speed up ITSM projects

November 5, 2014 No Comments

Speeding up an IT service management (ITSM) project is not just about velocity. As with the saying “more haste, less speed,” organizations need to be careful that they aren’t going so fast that they’ll fail to deliver on the desired outcomes. Or will actually deliver late due to reworking mistakes.

Featured Articles

7 things you wanted to know about CPQ… but were too afraid to ask!

October 31, 2014 No Comments

Configure Price Quote (CPQ) is a solution that refers to a set of software applications supporting the configuration, pricing and quote generation. However many modern CPQ systems have moved way beyond the classic definition of Configure, Price, Quote and now offer a range of enhancements such as contract approval and invoicing.

Featured Articles

Using Configure Price Quote Software to Save Time and Money

October 23, 2014 No Comments

The role of IT professionals has expanded significantly over the past several years. It’s not enough anymore to provide support; today’s IT teams must add value to their organizations, identifying new ways to help employees operate more efficiently and reduce costs. Among their many other responsibilities, IT professionals are expected to provide the tools their colleagues need to drive sales.

Featured Articles

Why Should the IT Helpdesk be Responsible for Authorizations?

October 9, 2014 No Comments

People can arrange their personal finance through Internet banking while e-HRM even allows them to manage their days of leave. However, they have no way of managing their network access rights by themselves. This remains the responsibility of the IT helpdesk. How logical is it to have the IT helpdesk decide whether users receive access rights to applications?

Featured Articles

IT to Play Critical Role in Business in 2015

September 29, 2014 No Comments

The majority of CEOs and business owners (93 percent) believe their companies’ IT departments will play critical roles in their business in 2015, according to a new survey released by Modis. The survey conducted by the employment firm earlier this month, revealed that chief information officers (CIO) are trusted to hire the right IT talent, with the majority of CEOs and business owners (98 percent) trusting their heads of IT to appropriately invest in technology that will grow their business.

Innovation in the enterprise: How can CIOs ensure its success?

September 29, 2014 No Comments

How CIOs can handle the disruption caused by increased innovation in the enterprise. Ten years ago, mobile consisted of email, voice and SMS. Any innovation was very much behind the firewall, in a closed environment. If new developments were needed, resources would have to be allocated and as a result, any CIO would have to be very sure of a return on the investment before innovation projects could go ahead.

Why VMI is the future for our BYOD Generation

September 24, 2014 No Comments

While many approaches are being used to control the impact of the mobile age on IT, VMI technology shows your organization can both embrace and thrive in this new world.

M2M: Why 2016 will be the tipping point

September 22, 2014 No Comments

With the “Internet of Things” set to grow from 4.4 billion connected devices this year to 10.3 billion by 2018[1], every business and industry will inevitably feel its impact. And while the adoption of machine-to-machine (M2M) strategies is on the rise, many businesses have yet to act – leaving them at a crossroads, in which they must choose to embrace this opportunity, or risk being left behind.

Featured Articles

Will Your Company Be Ready If Disaster Strikes?

September 17, 2014 No Comments

It’s always been important to have a Business Continuity and Disaster Recovery (BCDR) plan in place to make sure your company can continue operating in the event of a hurricane, flood, earthquake, fire or – most commonly – human error. But with data and computing power becoming an increasingly essential part of modern companies’ value propositions and product portfolios, it’s arguably more important today than ever before.

Cracking the Code to Innovation: 7 Steps That Guarantee Success

September 15, 2014 No Comments

Tweet Everyone says they want innovation in their organization, but when an ambitious employee offers it to a CEO, for example, the idea is often shot down, says Dr. Neal Thornberry, faculty director for innovation initiatives at the Naval Postgraduate School in California. “Senior leaders often miss the value-creating potential of a new concept because […]

Featured Articles

Infographic: What’s Your IT Personaility?

September 15, 2014 No Comments

Take this quick 4-question IT Personality quiz to determine if you’re an IT Builder that prefers to engineer an innovative solution yourself, or an IT Disruptor, who prefers to enable the business more quickly by implementing new, insightful technology developed in the marketplace.

Featured Articles

Seven Priorities for Developing Smart Energy Devices

September 10, 2014 No Comments

There are major growth opportunities for utility companies through smart meters and smart home platforms, provided they address quality and consumer driven issues. According to mobile phone giant, Vodafone, in its latest M2M barometer report, 20% of utilities and energy firms have now adopted smart grid and smart metering systems, and 17% have also introduced smart home and office offerings — a category that includes home automation, intelligent heating and connected security systems.

Featured Articles

CIO Infographic: Big Data Through the Eyes of Your IT Staff

September 10, 2014 No Comments

CSC has created an interesting infographic on how big data could be so much more – a vision of what could be.

Raising the game – The IBM Business Tech Trends Study

August 26, 2014 No Comments

IBM has evaluated the current adoption landscape of 4 key technologies in the enterprise: Big Data & Analytics, Cloud, Mobile and Social

The New Threat from an Old Friend

August 20, 2014 No Comments

When it comes to security, IT pros can’t control everything. Not all threats can be mitigated by following the simple best practices of keeping security software up-to-date and regularly patching vulnerable applications. In addition, not all potentially risky features can simply be turned off, even if IT pros would like to.

What Happens When You Click “Add to Cart?”

August 20, 2014 No Comments

You may have noticed that in the brief history of online shopping the time between placing an order and delivery has decreased dramatically. When I young, as I remember, the only way to get that ultra-rare hooded Cobra Commander action figure was to cut out a cardboard order form from the back of a cereal box, get eight dollars plus shipping and handling from Mom, mail it away and wait six to twelve weeks for the coveted item to arrive. Today, all it takes is a pressing “add to cart” and checking out.

Featured Articles

How Search & Relevance Technology Improves a Fast-Growing Financial Services Firm’s Return on Knowledge

August 12, 2014 No Comments

As a growing emerging asset management firm, our knowledge ecosystem across 130 institutional clients has grown considerably after just 10 years in business. We built Majedie in a cloud-based environment, and we realized that much of our relevant information fell across disparate systems, each with its own specific search functionality.

Featured Articles

IT Briefcase Interview: Mobile Website and Custom APIs Monitoring

August 11, 2014 No Comments

In this interview, Zaheeruddin Ahmed B, marketing analyst at Site24x7, a ManageEngine cloud service, discusses the need for a way to monitor mobile apps and mobile-optimized websites — from the perspective of the mobile user — and his company’s efforts to do just that with its industry-first mobile monitoring solution.

The Top Five Benefits of Integrating Microsoft’s SharePoint with a Faxing Solution

August 5, 2014 No Comments

Companies use SharePoint in many different ways. For example, someone may set up an online portal to quickly find corporate information. You can also set up an extranet with SharePoint to securely share documents with partners and others. Today SharePoint is one of Microsoft’s fastest growing applications with over $1 Billion in revenue and over 100 million users.

Featured Articles

Transforming Your IT Organization to Drive Innovation in a Digital Economy

July 31, 2014 No Comments

The tempo of change in today’s business world is faster than ever. Business leaders are struggling to understand the meaning of these changes, how to manage them, and how best to increase skills and operational pace to remain competitive. Digital transformations are introducing new kinds of customer behaviors, business processes, expectations and entirely new business models. These transformations require a new kind of organization.

Featured Articles
ADVERTISEMENT

DTX ExCeL London

WomeninTech