Inside the Briefcase






Briefcase Highlights


Featured Articles

Crossing the BPM Chasm

April 5, 2012 No Comments

In the scheme of things, business process management (BPM) is still a newcomer. Sure, document processing, electronic forms, and other proto-BPM solutions have been around for a while. More recently, however, the synergistic coupling of these solutions, combining them with flexible workflow management and other useful features has produced today’s sophisticated BPM products. Even as BPM moves beyond early adopters into the mainstream market, however, many customers have just begun to scratch the surface of what is possible with today’s BPM solutions.

Gartner highlights five trends that will shape cloud computing

April 4, 2012 No Comments

Research firm Gartner has published five points from its report Five Cloud Computing Trends That Will Affect Your Cloud Strategy Through 2015 that it says users must factor into their planning processes.

Australian Court Hangs Blame for Deceptive Ads on Google

April 3, 2012 No Comments

In today’s Tech Trek: Google faces legal battles on opposite sides of the globe, a Chinese iPhone and iPad manufacturer deals with labor issues, California-based Accel Partners invests $14 million in an Israeli social gaming developer and more.

Featured Articles

BI, Performance Management Software Market Surpassed $12B

April 3, 2012 No Comments

Worldwide business intelligence (BI) platform, analytic applications and performance management (PM) software revenue reached $12.2 billion in 2011, a 16.4 percent increase from 2010 revenue of $10.5 billion, according to a report from IT analytics fimr Gartner.

12 Steps for Staying 1 Step Ahead of Online Security Threats

March 27, 2012 No Comments

Pop-up windows are a common form of online advertising and often appear so quickly that users are caught offguard. However, some pop-ups, when clicked, trigger spyware that can cause serious damage to computers. That’s why it’s important to never click “agree” or “OK” to close a pop-up window, and only click on the red “X” in the corner or Alt + F4 to close it safely.

Featured Articles

Cloud Computing Calls for Rebuilding Enterprise IT

March 22, 2012 No Comments

For all of the buzz about cloud computing, there remains confusion about its real implications for an IT organization. CIO.com’s Bernard Golden argues that to take full advantage of the cost savings and efficiency improvements of the cloud, CIOs have to rethink their approach to IT.

How to Get a Hot Job in Big Data

March 19, 2012 No Comments

Big data is reshaping business IT. Thanks to cheap storage, massive processing power, and tools like Hadoop, organizations are now able to mine terabytes of information and derive useful business intelligence from it.

Cloud and Mobile Business Intelligence for SMBs: A Growing Market

March 12, 2012 No Comments

Business intelligence (BI) solutions have always been considered an enterprise service. Aggregating data, analyzing reports, and forecasting results have been luxury only midmarket or larger companies can afford. But a recent study from market research firm Techaisle shows that SMBs are beginning to use BI to better understand their businesses, and early adopters of this increasingly affordable technology are all potential clients

Why Mobile CRM Apps Are Slow to Take Off

March 12, 2012 No Comments

Everybody knows mobile computing is on the rise. Why, then, have the smartphone versions of CRM apps been such slow sellers? Here are some important lessons to learn about all enterprise apps, cloud or otherwise.

Diversity the Key to Managing Big Data

March 12, 2012 No Comments

Big data – the accumulation and subsequent mining of large data stores – carries great potential for businesses looking to gain insight into their markets or customers. But while the concept of big data is simple, the management of big data is not.

Cloud Computing Tools for Small Businesses

March 9, 2012 No Comments

Small businesses looking to save on resources and increase productivity stand to benefit most from platforms that offer these scalable services.

It’s Business as Usual for Anonymous as Panda Takes a Hit

March 8, 2012 No Comments

The hactivist community suffered a betrayal by one of its own when LulzSec leader Sabu helped the FBI arrest several of his cohorts, but the larger Anonymous collective wants the world to know it’s undeterred. To that end, it struck Panda Security, but the firm insisted nothing of importance was breached. Still, “the state of Anonymous is not much different than it was three days ago,” said Steve Fox, CEO of Security Pursuit.

Featured Articles

IT Security & Network Security News & Reviews: Insider Security Threats: 10 Tactics to Stop These Data Breaches

March 5, 2012 No Comments

The full version of 2012 Verizon Data Breach Investigation Report is being released soon. However, the report’s preliminary findings show that a vast majority of data breaches in 2011 were the result of outsiders trying to break in for malicious purposes.

Docs Value EHRs, But Older Physicians Lag In Adoption

March 2, 2012 No Comments

Two-thirds of doctors say they use some form of electronic records to manage clinical information, and a similar number believe IT can improve care in the long term, according to a study from the Deloitte Center for Health Solutions.

Hadoop: How Open Source Can Whittle Big Data Down to Size

March 2, 2012 No Comments

Techworld Australia caught up with Doug Cutting to talk about Apache Hadoop, a software framework he created for processing massive amounts of data.

Harnessing Big Data with BI-as-a-Service

March 2, 2012 No Comments

Big Data doesn’t do your company much good if those who know your business best can’t harness it to unlock its value.

Open Source Opens Doors for Aussie Start-Up

February 27, 2012 No Comments

It’s pretty rare for a start-up company to benefit from more than a decade of software development valued at about $2 million each year. Read more: http://www.smh.com.au/it-pro/business-it/open-source-opens-doors-for-aussie-startup-20120223-1tpub.html#ixzz1nbwWYlRh

Is Cloud Computing A Global Market Yet? Nyet

February 23, 2012 No Comments

Brazil, China, and some European countries have erected barriers to free flow of data, due to fears of U.S. domination of cloud market, says BSA.

Eight Business-changing Ways to Use Big Data

February 22, 2012 No Comments

Enterprises are finding business-changing ways to put the power of Hadoop, an open source Apache project for storing and processing large amounts of data, to good use. They are using Hadoop and Big Data to reduce risks, better serve customers and even change the Internet.

How Western European Telcos Meet the Cloud Computing Needs of Enterprise?s

February 21, 2012 No Comments

As enterprises demand a single point of contact for all technology needs and expect integration to be seamless, a coherent cloud computing strategy is becoming a prerequisite for operators’ further growth in the business segment, according to a new report.

Don’t Cloud the Business Issues

February 16, 2012 No Comments

The saying “Good fences make good neighbours” is very applicable to relationships with Cloud service providers. Clear demarcation of services, roles and responsibilities is vital to these relationships. The more that’s left to subjective opinion, conjecture and guesswork, the more likely it is that misunderstandings, mistakes and missed opportunities will result.

Big Data and Rise of Predictive Enterprise Solutions

February 11, 2012 No Comments

Given the three Vs of Big Data, namely Volume, Variety and Velocity (read this for more), challenge before large and medium sized companies is how to unlock the potential of Big Data and productively leverage its value in running the business.

Enterprise BI Architecture Groups: The Key to Effective Agile Data Warehousing

February 2, 2012 No Comments

Research and Markets (http://www.researchandmarkets.com/research/8ff458/enterprise_bi_arch) has announced the addition of the “Enterprise BI Architecture Groups: The Key to Effective Agile Data Warehousing” report to their offering.

New Email Spec Aims to Tangle Phishing Lines

January 31, 2012 No Comments

Fifteen leading email service providers and tech companies have announced a joint effort to fight phishers. Google, Facebook, PayPal, Yahoo and Agari are among the companies behind the Domain-based Message Authentication, Reporting and Conformance spec. DMARC is a technical specification that standardizes how email receivers perform email authentication using well-known mechanisms.

Featured Articles

Twitter Builds a Better Gagger

January 30, 2012 No Comments

Twitter now has the ability to silence tweets on a country-by-country basis. If it’s given a valid and legal request to block a message in a particular country, the service says, it will make that message invisible to users located there. Freedom of speech advocates came down hard on the company. Twitter maintains it’s “extremely passionate about people’s right to free expression,” said spokesperson Rachel Bremer.

FBI’s Most Wanted: A Social Media Monitoring Tool

January 30, 2012 No Comments

An FBI listing on FedBizOpps.gov is putting out the call for developers to submit software capable of automatically monitoring social media channels for he purpose of detecting criminal activity. “Given the overwhelming volume of data generated on the Internet … it is no surprise that the FBI is completely overwhelmed and unable to do any type of canvassing through basic human intervention,” said Cornell’s Tracy Mitrano.

Featured Articles

Cloud Middleware On Google Apps Marketplace

January 30, 2012 No Comments

Enterprise middleware player WSO2 has readied its StratosLive Java Platform-as-a-Service (PaaS) for market on the Google Apps Marketplace this month

Ventana Research Releases New Benchmark Research on Big Data

January 26, 2012 No Comments

Ventana Research has released its latest Benchmark Research, The Challenge of Big Data, concerning the management of large-scale data management and processing.

In Search of the App That Could Save the World

January 23, 2012 1 Comment

It is my belief that the majority of the world’s problems — and some of the stupidest products (Zune for instance) — resulted from our hardwired tendency to treat truth and accuracy as unimportant. After watching a political debate, viewers are often split on which candidate did the best job. Chances are everyone is simply arguing to support a view they held before the debate, and what actually was argued was secondary.

Featured Articles

Middle-East Cyberbattle Escalates as Arab Banks Take a Pounding

January 20, 2012 No Comments

Arab financial institutions were walloped recently by pro-Israel hackers, according to a recent report. Cyberattack incidents between Israel and its neighbors have been climbing recently, with institutions and individuals on both sides of the conflict falling victim. The exact methods used by the hackers in the latest incident have not been disclosed.

Featured Articles
ADVERTISEMENT

DTX ExCeL London

WomeninTech