Inside the Briefcase

Top Questions to Ask Before Implementing VoIP

Top Questions to Ask Before Implementing VoIP

Thinking about a move away from traditional phone lines to a voice over Internet Protocol (VoIP) solution? You're not alone: According to Business Wire, the market is on track to reach almost 350 million subscribers by 2020 and generate...

EMV Hits The US – Now What?

EMV Hits The US – Now What?

Fewer than half of all payment cards and PoS terminals in the US are currently EMV-ready. Moreover, US merchants and card issuers have been slow to migrate to the new technology. In the wake of EMV’s worldwide implementation, a...

Making Mobile Wallets Safer

Making Mobile Wallets Safer

Consulting firm Chadwick Martin Bailey found in a recent survey that 15 percent of U.S. consumers have used a mobile wallet in the past six months, up from nine percent in the same period in 2013. The numbers may...

Briefcase Highlights


Introducing the New Retail BRAIN

November 24, 2015 No Comments

This year that annual shopping frenzy in the U.S. known as Black Friday will take place on November 27, the day after Thanksgiving. Sales, according to the Black Friday website, will actually start early on Thanksgiving Day and extend throughout the weekend. Total sales are expected to top $80 billion. Also, the number of bargain hunters will increase this year to well over 300 million. Sales channels will include both brick and mortar stores as well as online retailers.

Chip Cards Offer Additional Security for Holiday Shopping Season

November 23, 2015 No Comments

As the holiday shopping season approaches, the American Bankers Association is educating consumers about the new chip technology embedded in many credit and debit cards. The new chip cards offers bank customers an added layer of security just in time for the holidays. The chip – a small metallic square on the front of the payment card – assigns a one-time code for each transaction, and makes it nearly impossible for fraudsters to create counterfeit cards.

Shifting to a Design-Driven Culture

November 19, 2015 No Comments

by Antoine Mottier, BonitasoftUnderstanding customer need is more important today than ever as millennials enter the workforce. According to Goldman Sachs, millennials are one of the largest generations in history and are about to move into their prime spending years – poised to reshape the economy. Read More >>>

Learn About Some of the Top Money Management Apps

November 19, 2015 No Comments

You must be spending a lot of time on your Android phone by just browsing through pictures or playing some tap-tap games. Instead, if you can spend some time for your money management through apps it can definitely be much more worthy. Let us go through some financial apps that can help in effective money management process.

New Cybrary Mobile App Provides Hacking Training to Developing Nations with Limited Web Access

November 19, 2015 No Comments

Cybrary, the world’s first and only no-cost cyber security massive open online course (MOOC) provider, announced the availability of its Android-based mobile app that allows users with limited Web access – particularly in developing countries – to learn hacking, forensics and other cyber security skills on the go.

Six Workspace as a Service Myths Debunked

November 16, 2015 No Comments

If you’re not using Workspace as a Service (WaaS) yet, it may be because you don’t fully grasp what it really is, how much it does, and how hot the global market is projected to become. As with many emerging technologies in a growth phase, WaaS is often underestimated and misunderstood. But if industry forecasts hold true, WaaS just may be the next big thing in the IT services space. To help shed light on why this is so, here are six busted myths about WaaS.

Barbarians at the Gate: Enhancing Web Security with Behavioural Analytics

November 11, 2015 No Comments

Cybercrime is thriving … as demonstrated by several high-profile, online data breaches in the press recently. As static, on-premise security measures are increasingly becoming ineffective against attempts to steal data and take web services offline, many security professionals are left unsure how to best mitigate these evolving threats.

The Power of Passive Authentication in the Contact Center

November 11, 2015 No Comments

In this webcast, authentication and fraud experts from Gartner and Verint Systems discuss passive authentication for the contact center.

Top Questions to Ask Before Implementing VoIP

November 4, 2015 No Comments

Thinking about a move away from traditional phone lines to a voice over Internet Protocol (VoIP) solution? You’re not alone: According to Business Wire, the market is on track to reach almost 350 million subscribers by 2020 and generate $136 billion in revenue. However, before ditching your plain old telephone service (POTS) for a VoIP, it’s important to ask a few critical questions.

Looking to grow lean? Here’s how to make sure you have a business management solution that is up to the task

November 3, 2015 No Comments

Many small and midsized enterprises are struggling to get by without a proper business management solution (BMS). Instead, they stitch together a combination of systems that end up leading to inefficient processes and a series of information silos. However, an increasing number of CIOs are embracing cloud-computing options. Indeed, nearly 30 percent of companies plan to move their systems to the cloud by 2018. With that in mind, the following are some questions SMBs need to ask during their shift from a messy, disparate system, to a fluid business management solution that is up to the task of growing their company lean.

Infographic: 7 Monsters that Spook Your Enterprise Applications

October 29, 2015 No Comments

Why is it that 75% of the business and IT executives anticipate their software projects will fail? Why is failure rate often a planned expense that is written off long before development ever begins? Below is a fun infographic to not only understand the major friction points in delivering successful enterprise applications, but also learn how to tackle these monsters and speed custom app creation. Do tell us about the monsters that scare you the most and any other ghouls we may have missed.

The Internet of Things Is Killing Your Storage: Best Practices for the Brave New World

October 23, 2015 No Comments

IDC points to several factors that are enabling the rise of the Internet of Things (IoT), including a global culture that has embraced and now expects greater connectivity; ongoing interest in and development of smart cars, homes and cities; and advances in connectivity infrastructure. Consequently, the analyst firm anticipates that IoT technology and services spending will generate global revenues of $8.9 trillion by 2020.

How SaaS-Safe Time Clock Software Can Benefit Your Business

October 20, 2015 No Comments

If you’re not familiar with the term, SaaS is a distribution method that hosts powerful software on a network or via the cloud, and manages it by a remote vendor or service provider. Once subscribed to the service, you can tap in and manage exactly what you need to, and so can your employees should the system call for it. Troubleshooting, service time and installation are all handled by the vendor or service provider.

IT Briefcase Exclusive Interview with Napatech: The Future of Network Appliances

October 19, 2015 No Comments

Daniel Joseph Barry, NapatechIn this interview, Dan Joe Barry speaks with IT Briefcase about the results of a recent Heavy Reading survey of communications service provider (CSP) and network equipment provider (NEP) registrants regarding the current use of both traditional hardware and virtualized network appliances. Read More >>>

EMV Hits The US – Now What?

October 19, 2015 No Comments

Fewer than half of all payment cards and PoS terminals in the US are currently EMV-ready. Moreover, US merchants and card issuers have been slow to migrate to the new technology. In the wake of EMV’s worldwide implementation, a wave of technologies – including near-field communication (NFC), tokenization and cloud-based wallets – is having an accelerating impact on the industry.

Making Mobile Wallets Safer

October 13, 2015 No Comments

Consulting firm Chadwick Martin Bailey found in a recent survey that 15 percent of U.S. consumers have used a mobile wallet in the past six months, up from nine percent in the same period in 2013. The numbers may seem small at first glance, but do the math: that’s a 66 percent increase in usage in just two years. In terms of awareness of mobile wallets, the percentage jump is even higher. Their Mobile Wallet in 2015 and Beyond report found that 18 percent of consumers are “very familiar” with mobile wallets, compared to eight percent in 2013.

How to deliver hybrid apps in two weeks

October 12, 2015 No Comments

Attend this on-demand webcast and learn how you can accelerate application delivery to provide new capabilities and new features on demand via continuous delivery for hybrid cloud applications.

Rethinking Big Data Platforms like Hadoop with Open Technology

October 12, 2015 No Comments

This webinar with Dr. Srini Chari, Managing Partner, Cabot Partners and IBM Distinguished Engineer Linton examines how organizations can derive high value insights by framing strategic business questions and combining systems of records with systems of engagement and how these can be achieved by implementing a high-performance, scalable and agile information foundation to support both real-time and large-scale analytics capabilities.

How to Ease the Pain of Data Lineage Collection Mandated by BCBS 239

October 12, 2015 No Comments

Join this webcast to review this and other BCBS 239 mandates and the challenges they pose. We will offer some ideas on making compliance easier and less expensive ideas based on a combination of technical expertise and deep industry experience. If you are dealing with the headaches caused by BCBS 239, you won’t want to miss this!

Creating Trust in the Shifting Digital Landscape: Best Practices in Application Development

October 6, 2015 No Comments

The gains in efficiency resulting from use of mobile computing and cloud-based services have come at a price of increased risk which is sometimes hard to see. More and more business logic resides and executes on insecure devices. Given this landscape, anyone developing code that will run in distributed locations needs to help ensure the integrity of their software as it runs in environments over which they have minimal control.

IT Briefcase Exclusive Interview: The Value of a Two-tier Application Strategy

August 31, 2015 No Comments

with Rahul Asthana, KenandyIn this interview, Rahul Asthana, Senior Director of Product Marketing at Kenandy, speaks with IT Briefcase about why some enterprises pursue a two-tier application strategy and how they transition fully to new systems. Read More >>>

5 Steps to Enterprise-Wide Automation

August 25, 2015 No Comments

For many years, IT has been a gatekeeper. When anyone wanted new server capacity, additional storage, a password reset, or a new application deployed, they had to come to IT to get the job done. The processes and friction IT put in place to manage the demand led to IT being seen as a barrier, rather than as a business enabler. IT was not focusing on the experience, the perception but only on the technology. In recent years, things have started to change. For instance, the public cloud has made it relatively easy for end users to provision their own computing capacity on demand, and outsourcing has created profound competition for internal IT departments.

How To Use Social Media To Leverage Your Content Marketing Output

August 24, 2015 No Comments

Content marketing has been the buzz phrase many marketers have been using for the past few years. Many brands and businesses are now fully on board with producing content – to mixed results. However, those that have succeeded with content marketing all have one thing in common. Each of them has leveraged their content with social media. The question for today is – how, exactly, do they do this?

The Future of Mobile Microsoft

August 18, 2015 No Comments

In recent years, Microsoft’s hustle to compete with newer, more flexible technology innovators like Google, Apple, and Samsung has resulted in a handful of enthusiastic projects. However, despite Microsoft’s unchallenged supremacy in computing, Microsoft phones are few and far between. Windows 8, the operating system for the mobile era, was beautiful and seamless on touch devices, but wasn’t perfect. Though a few of their tablets, including the most recent Surface Pro 3, have earned top reviews, most Microsoft users prefer true laptops — and continue to reminisce about the powers of XP.

Service Integration and Management (SIAM): The Next Frontier in ITSM

August 6, 2015 No Comments

IT continues to commoditize. How is this trend forging transformation in the world of IT service management? Consumer behavior is driving IT to the cloud, and outsourcing is moving from the enterprise to the mid-market. We believe that this will result in IT organizations integrating their service management applications with those of their customers, but this is easier said than done.

Bring the Nook Home with Reading Apps for iPad

August 4, 2015 No Comments

It is no secret that the nook is now the preferred eReader, even surpassing the Kindle Fire in sales. The problem, however, is that the iPad is still the most popular tablet out there. Once users purchase an iPad they find very little use for their Android-powered Nook, regardless of how great it might be. After all, who wants to carry TWO tablets around? Not many people would answer yes, and for a time, it looked as if Apple might begin to dominate the e-book market.

4 Steps to Protect Your Computer from Data Loss

August 4, 2015 No Comments

Perhaps the most valuable thing about your computer is the data and files that you have saved on it. After all, the main reason for having your PC or laptop is in order to store the data that is on it, and it’s the main priority for putting a protective strategy in place, such as anti-virus software. Whilst operating systems and downloadable software can always be re-downloaded or re-installed, unique, user created data has the potential to be lost forever. Let’s look at some simple steps that can be taken in order to protect your computer or laptop from data loss.

IT Briefcase Exclusive Interview: BYOD Planning with an Eye for the Future

July 30, 2015 No Comments

with Israel Lifshitz, NuboIf you’ve been tracking the evolution of our BYOD work culture, you’ll know that most enterprises are at some stage of getting a grip on a myriad of issues, including employee adoption, compliance, Shadow IT and user privacy just to name a few. Read More >>>

Will Windows 10 bring revival to its mobile platform?

July 29, 2015 No Comments

With the release of Windows 10 comes another opportunity for Microsoft to align its direction for mobile to better serve developers and IT departments. Together with a subtle name change to Windows 10 Mobile, Microsoft is looking to draw a line in the sand on its failed attempt to chase Apple in the consumer market with Windows Phone.

A Few Simple Steps Can Make Post-M&A IT Integration Smoother

July 29, 2015 No Comments

We’ve been hearing a lot lately about the current mergers and acquisitions boom, but very little about the role of information technology in making such deals successful. Yet the IT leadership of a company is central to the success of an M&A. If the post-deal integration is done right, the transaction will unfold much more smoothly, and that’s good for investors, employees and the overall health of the company.


Cyber Healthcare

TDWI Orlando 2015

Gartner Identity & Access Management Summit

Gartner Data Center Las Vegas

Big Data Tech Con

ITBriefcase Comparison Report

Cyber Security Exchange