Featured Blogs

6 Myths Surrounding Mobile App Development

Blog post recommended on January 5, 2015

Gartner Business Intelligence & Analytics Summit

Blog post recommended on December 22, 2014

What are Communications Providers focusing on in 2015?

Blog post recommended on December 17, 2014

IT Briefcase Analyst Blog

Exclusive Webcast: 8 Great Mysteries of Cloud Computing

8 Great Mysteries Cloud
Listen to this exclusive webcast as we reveal eight unsolved mysteries that are accompanying the great cloud computing migration.
View Webcast

Podcast: Humanizing BPM with Clay Richardson, Forrester Research

Clay Richardson
In this brief podcast, Clay Richardson, Principle Analyst at Forrester Research, discusses the future of BPM and emphasizes the value of the user experience, referring to business processes today as existing within the “Age of the Customer”.

VIEW ALL IT Briefcase Analyst Blog Articles


From Big Data Swamps to Big Data Value with the Right Infrastructure

big data
by Tom Phelan, Blue Data
Big Data promises a lot—new insights about customers, shorter product development cycles, new and increased streams of revenue, and more. But capitalizing on all that promise requires radical shifts in the way data is collected, managed, stored, accessed and used. Read More >>>

Five Tips for Strengthening the IT Department in 2015

by David Kidd, Peak 10
Data security continues to be a growing concern for all businesses – small and large – as part of a macro trend taking grip in 2015. While improving technologies are essential for protecting data, studies have shown that internal incidents continued to top the list of 2014 breaches.
Read More >>>


Featured Video

Gartner Research Circle: A collective voice of IT and Business decision makers.

The Gartner Research Circle is a program that is run throughout the year where participants share their input in a variety of ways on an array of topics throughout the year. Contact: ResearchCircle@gartner.com for additional information.


Featured Webinars & Videos

Architecting a New Approach for Continuous Advanced Threat Protection

Watch this webcast and listne to Neail MacDonald and Jim Brennan discuss specific techniques that can help you prevent sophisticated attacks, detect stealthy and persistent threats already inside your organization, and how to best respond in the event of a security breach.

From Information to Insights: IBM Sterling B2B Services Reporting & Analytics

Discover how IBM's B2B Services Reporting and Analytics can deliver unprecedented levels of insight into all of your trading partner relationships in order to drive better, more profitable business decisions.

Inside the mind of the successful Business Intelligence (BI) customer: From best practices to lessons learned

Virtual Roundtable: Four long-time BI customers – Mueller, Inc., Elie Tahari, Michigan State University and Host Hotels & Resorts – will speak candidly about their BI success from the front lines.

IDC MarketScape: Worldwide Business-to-Business Integration Gateway Software 2014 Vendor Assessment

This IDC study serves as a guide for short-listing the selection of B2Bi gateway software used for midlevel to highly sophisticated projects.

Watch “The Cost of a Bad App- and how to deliver a good one, fast”

The first part of the webcast briefing will focus on the global survey findings and their business implications – quantifying the cost of a bad app. The second part will cover strategies and solution options for consistently delivering good apps fast. After the webcast, you may view the report...


Featured White Papers

Part 2 – The 2014 Application & Service Delivery Handbook: Network and Application Optimization

In this second of four installments, this handbook focuses on describing the technologies, products and services that are available to improve the performance of applications and services.

Mobile First: Securing Information Sprawl

In a recent survey, “The Mobile Trust Gap,” MobileIron reported that of the 3000 respondents, 80% claimed they are using personal smartphones and tablets for work.

Symantec Internet Security Threat Report 2014

The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.

SANS Report Breaches Happen: Be Prepared

Computer viruses are yesterday’s news; automated attacks that morph rapidly, concealing themselves through encryption and deceptive packaging, are the new hotness. This paper describes how to start with improved malware reporting and gateway monitoring and how to combine this output with security intelligence from both internal and external resources.

Symantec Intelligence Report: September 2014

The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.