Join the IT Briefcase Community!

Please login with your email address and password below.

Register Button
Forgot Password?

IT Briecase respects your privacy.

Follow us...

Follow us on Twitter Join our LinkedIn community Find us on Facebook Subscribe to ITBriefcase RSS Feed Info at Virtual Star Media

Recent News

Gartner Business Intelligence & Analytics Summit

News Posted on December 22, 2014

MapR Forms Alliance with SAS

News Posted on December 18, 2014

UC EXPO 2015 launches with leading exhibitor and speaker line up

News Posted on December 15, 2014


News Posted on December 11, 2014

MediaHub Selects MapR Technologies for Digital Archive and Future Data Analytics

News Posted on December 11, 2014

Avaya and Google Collaborate on Contact Center Solutions for Businesses

News Posted on December 10, 2014

IT Briefcase Analyst Blog

Exclusive Webcast: 8 Great Mysteries of Cloud Computing

8 Great Mysteries Cloud
Listen to this exclusive webcast as we reveal eight unsolved mysteries that are accompanying the great cloud computing migration.
View Webcast

Podcast: Humanizing BPM with Clay Richardson, Forrester Research

Clay Richardson
In this brief podcast, Clay Richardson, Principle Analyst at Forrester Research, discusses the future of BPM and emphasizes the value of the user experience, referring to business processes today as existing within the “Age of the Customer”.

VIEW ALL IT Briefcase Analyst Blog Articles


IT Briefcase Exclusive Interview with IBM: Managing Big Data through Storage

with Bernie Spang, IBM’s Systems & Technology Group
In this interview, Bernie Spang from IBM’s Systems & Technology Group speaks with IT Briefcase on how users are adopting a more agile software defined storage approach, and how this philosophy prepares them for 2015 and the future. Read More >>>

The Siloed Database Administrator: Breaking down the wall between DBAs and the rest of IT

with Gerardo Dada, SolarWinds
It’s a rare IT department that doesn’t experience a little bit of the “blame game” when something goes awry—particularly in the first moments after an application goes down or Help Desk tickets start flooding in.
Read More >>>


Featured Video

Where Do Turkeys Come From? Let's Find Out Using Power BI

Power Map tour of turkey consumption in the US.

The Power BI team decided to look at turkey production and consumption with some Power Map magic to see what states will be most "thank-full" of bird this year...


Featured Webinars & Videos

Eliminate the Barriers to Your Cloud Adoption

Learn how IBM, our Technology Partners and clients are reinventing data availability for the hybrid cloud era, so you can embrace cloud with confidence.

Modernizing Data Protection for SMBs

In this webcast analyst Dave Vellante of Wikibon and RJ Nichols of Tech Data discuss the data protection challenges facing SMBs.

Smarter Data Protection for your Evolving Business

If your business is like many organizations that need to deliver 100% data availability, manage rapid data growth; yet control costs, now is the time to discover how modernized data protection can help your organization deliver better outcomes.

Taking Control of Data Debris Benefits IT and Beyond

In this webinar based on his article in ComputerWorld, CGOC faculty member David White describes how data retention is getting out of hand at many organizations.

Talking Results: Nuance Communications and IBM Harness Big Data with Elastic Storage

Please Join IBM and Nuance Communications Inc. to learn how Nuance uses IBM Elastic Storage to improve the power of their voice recognition applications by managing storage growth, cost and complexity while increasing performance and data availability.


Featured White Papers

Part 2 – The 2014 Application & Service Delivery Handbook: Network and Application Optimization

In this second of four installments, this handbook focuses on describing the technologies, products and services that are available to improve the performance of applications and services.

Mobile First: Securing Information Sprawl

In a recent survey, “The Mobile Trust Gap,” MobileIron reported that of the 3000 respondents, 80% claimed they are using personal smartphones and tablets for work.

Symantec Internet Security Threat Report 2014

The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.

SANS Report Breaches Happen: Be Prepared

Computer viruses are yesterday’s news; automated attacks that morph rapidly, concealing themselves through encryption and deceptive packaging, are the new hotness. This paper describes how to start with improved malware reporting and gateway monitoring and how to combine this output with security intelligence from both internal and external resources.

Symantec Intelligence Report: September 2014

The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.