IT Briefcase Analyst Blog

Exclusive Webcast: 8 Great Mysteries of Cloud Computing

8 Great Mysteries Cloud
Listen to this exclusive webcast as we reveal eight unsolved mysteries that are accompanying the great cloud computing migration.
View Webcast

Podcast: Humanizing BPM with Clay Richardson, Forrester Research

Clay Richardson
In this brief podcast, Clay Richardson, Principle Analyst at Forrester Research, discusses the future of BPM and emphasizes the value of the user experience, referring to business processes today as existing within the “Age of the Customer”.

VIEW ALL IT Briefcase Analyst Blog Articles

FRESH INK

To Cloud or Not to Cloud, That is the Question

cloud-question
By Joe Caserta, Caserta Concepts
One of the biggest decisions any business will need to make this year is where to store the company’s data. Is renting space in the Cloud the answer, or is it best to keep data in-house by investing in the appropriate infrastructure? Read More >>>

Context-Aware Security: A Key to Successful BYOD

security awareness
by Neal Foster, DELL Software
How can IT give users what they want and protect data assets at the same time? By implementing context-aware security. Context awareness is something most of us practice every day.
Read More >>>


VIEW ALL FRESH INK

Featured Video

An Introduction Into The Legal Implications Of Big Data

Alexander Duisberg, a highly respected lawyer within the IT industry from international law firm Bird & Bird talks about the most important legal aspects of big data and lists his top tips for businesses wishing to exploit the huge potential of data assets.


VIEW ALL Videos

Featured Webinars & Videos

Charting Your Analytical Future- BI Reporting and Dashboard Webinar

Everyone needs BI reports and dashboards, but not everyone wants the same information. Learn how incorporating other analytical capabilities can increase the value of your reports and dashboards.

State of the Art Availability: IBM X6

Join us to hear Dan Olds, Founder of Gabriel Consulting discuss how new technology from IBM System x, featuring Intel Xeon processors push availability to new heights providing business with the system reliability they need for their mission critical workloads.

Top Five Considerations: Ensure Business Continuity for Your Website

How do you ensure your website stays secure? What are the best methods for preventing DDoS, DNS, and application layer attacks? And more importantly, what security method will work best for your organization?

Charting Your Analytical Future – Creating effective visualizations to harness insight from increasingly complex data Webinar

See how to take advantage of new visualization capabilities in the Business Analytics portfolio to address business requirements and learn about the next-generation data discovery solution that can help your business users independently uncover insights and answers from their data.

Information Governance in a World of Big Data

Join us on Wednesday, May 14, at 12 p.m. ET/9 a.m. PT for our insightful Webinar, “Information Governance in a World of Big Data"

VIEW ALL WEBINARS & VIDEOS

Featured White Papers

How to use Virtualization to Create a Simple and Highly Reliable Disaster Recovery Plan

Disaster Recovery isn’t just a buzzword, it’s the difference between surviving a data breach, data loss, or catastrophic event like a hurricane; or ending up as one added statistic to the list of organizations that closed their doors after something goes wrong. Yet, according to a recent study, most...

Thunder ADC: 10 Reasons to Select A10

The A10 Thunder™ ADC product line of high-performance, next-generation application delivery controllers enables customers’ applications to be highly available, accelerated and secure.

The 2014 Application and Service Delivery Handbook

This is the eight edition of what had previously been called the Application Delivery Handbook.

Data Centers in the Crosshairs: Today’s Most Dangerous Threats

This paper analyzes the top five most dangerous threats to your data center.

Taking the Leap to Virtualization

Tweet Many mid-market companies have invested significant time and resources to secure and back up their servers, client computers, data, and overall network infrastructure in what was the traditional client-server setup. Now, what were considered emerging technologies just a few years ago, cloud computing and virtualization have arrived on...

VIEW ALL WHITE PAPERS
ADVERTISEMENT