Featured Blogs

How Much Did Bellogate Cost?

Blog post recommended on October 27, 2014

8 Android Apps for Wearable Devices

Blog post recommended on October 20, 2014

A Vision for Converged Backup Infrastructure

Blog post recommended on October 2, 2014

IT Briefcase Analyst Blog

Exclusive Webcast: 8 Great Mysteries of Cloud Computing

8 Great Mysteries Cloud
Listen to this exclusive webcast as we reveal eight unsolved mysteries that are accompanying the great cloud computing migration.
View Webcast

Podcast: Humanizing BPM with Clay Richardson, Forrester Research

Clay Richardson
In this brief podcast, Clay Richardson, Principle Analyst at Forrester Research, discusses the future of BPM and emphasizes the value of the user experience, referring to business processes today as existing within the “Age of the Customer”.

VIEW ALL IT Briefcase Analyst Blog Articles


How to Navigate Data into the Cloud

Cloud mobile_2
By Dave Wagner, TeamQuest
The increase in businesses moving their data into the cloud has created several new challenges for data center managers. Many departments and employees are increasingly using the public cloud to host unpredictable applications with unknown resource requirements. Read More >>>

It’s Time to Go All-in on the Cloud

By Joe Manuele, Avaya
Today, enterprises and their IT departments are migrating to cloud services faster than ever before. In fact, no other technology in our industry is associated with such dramatic triple-digit growth as cloud. By 2020, the cloud computing industry will be a $40 billion market.
Read More >>>


Featured Video

Opening Keynote at 14th Cloud Expo | Steven Martin, General Manager of Window Azure, Microsoft

Microsoft Azure is open and flexible, enables rapid development and is enterprise proven. Come find out why more than 57% of Fortune 500 companies are using Microsoft Azure to accelerate their time-to-market, open up new business opportunities and save them money.

In his Opening Keynote at 14th Cloud Expo, Steven Martin, General Manager of Window Azure, Microsoft, discusses how to extend your on-premises storage, move virtual machines to the cloud, build mobile/web applications, or and harness the power of Big Data.


Featured Webinars & Videos

Smarter Data Protection for your Evolving Business

If your business is like many organizations that need to deliver 100% data availability, manage rapid data growth; yet control costs, now is the time to discover how modernized data protection can help your organization deliver better outcomes.

Taking Control of Data Debris Benefits IT and Beyond

In this webinar based on his article in ComputerWorld, CGOC faculty member David White describes how data retention is getting out of hand at many organizations.

Talking Results: Nuance Communications and IBM Harness Big Data with Elastic Storage

Please Join IBM and Nuance Communications Inc. to learn how Nuance uses IBM Elastic Storage to improve the power of their voice recognition applications by managing storage growth, cost and complexity while increasing performance and data availability.

How Storage Infrastructure Can Help You Differentiate and Add Value to Your Cloud Storage Services

This roundtable discussion with a successful Service Provider and an IBM expert offers great insights on how the right choice of infrastructure impacts your ability to deliver on those expectations.

Transform your IT department into a self-service cloud application provider with IBM Cloud Orchestrator

According to a Forrester survey of Fortune 1000 IT leaders, 83% do not think they deliver cloud services fast enough. The problem lies within finding the right balance between system optimization and innovation.


Featured White Papers

Symantec Internet Security Threat Report 2014

The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.

SANS Report Breaches Happen: Be Prepared

Computer viruses are yesterday’s news; automated attacks that morph rapidly, concealing themselves through encryption and deceptive packaging, are the new hotness. This paper describes how to start with improved malware reporting and gateway monitoring and how to combine this output with security intelligence from both internal and external resources.

Symantec Intelligence Report: September 2014

The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.

Your Money or Your Files! A Short History of Ransomware

Ransomware attacks cause downtime, data loss, possible intellectual property theft, and in certain industries a ransomware attack is considered a data breach. Multiple ransomware strains are now attacking your end-users. Since September 2013, CryptoLocker has become vicious, and the first strain of second-gen ransomware CryptoWall V2.0 has reared its...

Gartner MQ: Endpoint Protection

Symantec Endpoint Protection 12.1 was, once again, positioned as a Leader in Gartner’s Magic Quadrant and rated highest in the ability to execute. Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.