Featured Blogs


8 Android Apps for Wearable Devices

Blog post recommended on October 20, 2014

A Vision for Converged Backup Infrastructure

Blog post recommended on October 2, 2014

Private equity fund managers, do your homework and back a winner

Blog post recommended on September 24, 2014

IT Briefcase Analyst Blog

Exclusive Webcast: 8 Great Mysteries of Cloud Computing

8 Great Mysteries Cloud
Listen to this exclusive webcast as we reveal eight unsolved mysteries that are accompanying the great cloud computing migration.
View Webcast

Podcast: Humanizing BPM with Clay Richardson, Forrester Research

Clay Richardson
In this brief podcast, Clay Richardson, Principle Analyst at Forrester Research, discusses the future of BPM and emphasizes the value of the user experience, referring to business processes today as existing within the “Age of the Customer”.

VIEW ALL IT Briefcase Analyst Blog Articles

FRESH INK

It’s Time to Go All-in on the Cloud

cloud-management-FINAL
By Joe Manuele, Avaya
Today, enterprises and their IT departments are migrating to cloud services faster than ever before. In fact, no other technology in our industry is associated with such dramatic triple-digit growth as cloud. By 2020, the cloud computing industry will be a $40 billion market.
Read More >>>

Fishing for Data in a Digitalized Tourism Industry

data management
By Yves de Montcheuil, Talend
Among the most digitalized industries, travel and hospitality is changing fast. Travel agents, airlines, airports, hotel chains - the entire industry is fishing for value in a seemingly-unlimited ocean of data.
Read More >>>


VIEW ALL FRESH INK

Featured Video

Opening Keynote at 14th Cloud Expo | Steven Martin, General Manager of Window Azure, Microsoft

Microsoft Azure is open and flexible, enables rapid development and is enterprise proven. Come find out why more than 57% of Fortune 500 companies are using Microsoft Azure to accelerate their time-to-market, open up new business opportunities and save them money.

In his Opening Keynote at 14th Cloud Expo, Steven Martin, General Manager of Window Azure, Microsoft, discusses how to extend your on-premises storage, move virtual machines to the cloud, build mobile/web applications, or and harness the power of Big Data.


VIEW ALL Videos

Featured Webinars & Videos

Taking Control of Data Debris Benefits IT and Beyond

In this webinar based on his article in ComputerWorld, CGOC faculty member David White describes how data retention is getting out of hand at many organizations.

Talking Results: Nuance Communications and IBM Harness Big Data with Elastic Storage

Please Join IBM and Nuance Communications Inc. to learn how Nuance uses IBM Elastic Storage to improve the power of their voice recognition applications by managing storage growth, cost and complexity while increasing performance and data availability.

How Storage Infrastructure Can Help You Differentiate and Add Value to Your Cloud Storage Services

This roundtable discussion with a successful Service Provider and an IBM expert offers great insights on how the right choice of infrastructure impacts your ability to deliver on those expectations.

Transform your IT department into a self-service cloud application provider with IBM Cloud Orchestrator

According to a Forrester survey of Fortune 1000 IT leaders, 83% do not think they deliver cloud services fast enough. The problem lies within finding the right balance between system optimization and innovation.

Simplifying Cloud Enabled Enterprise Environments



Join us for this webcast and learn how Ubuntu's orchestration and deployment tools work on all clouds to drive simplicity and quick return on investment.

VIEW ALL WEBINARS & VIDEOS

Featured White Papers

Your Money or Your Files! A Short History of Ransomware

Ransomware attacks cause downtime, data loss, possible intellectual property theft, and in certain industries a ransomware attack is considered a data breach. Multiple ransomware strains are now attacking your end-users. Since September 2013, CryptoLocker has become vicious, and the first strain of second-gen ransomware CryptoWall V2.0 has reared its...

Gartner MQ: Endpoint Protection

Symantec Endpoint Protection 12.1 was, once again, positioned as a Leader in Gartner’s Magic Quadrant and rated highest in the ability to execute. Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.

The Cyber Resilience Blueprint: A New Perspective on Security

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for...

Symantec Intelligence Report: August 2014

This August intelligence report from Symantec provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.

YES, CRIMINALS ARE TARGETING YOUR DATA: HERE ARE 7 MUST DO DEFENSIVE MEASURES

The 7 Must Do Defensive Measures to protect your personal data.

VIEW ALL WHITE PAPERS
ADVERTISEMENT