July 2, 2015
with Tejas Vashi, Learning@CiscoThe Internet of Everything (IoE) is bringing together people, process, data and things to make networked connections more relevant and valuable than ever before. Understandably, this is accelerating the pace of digital transformation. Read More >>>
June 29, 2015
Cloud computing solutions can add tremendous value to your small business. Many times disaster strikes when devices are lost during travel or servers go down. It is difficult to gauge whether or not you will be able to access or recover your company data under such circumstances. Whether you’ve just spilled a morning coffee or lost your work tablet all together, cloud computing solutions will always have your data stored and accessible 24/7. Cloud services can be seen as external hard drives that do not require hardware.
June 29, 2015
The cloud isn’t just a buzzword for the boardroom – it’s the metaphor used to describe the vast array of connected services that are changing the way businesses work. It’s a metaphor that’s driving a revolution, and if you haven’t included cloud-based services in your business model yet, you’ve already got some catching up to do.
June 29, 2015
with Dror Nadler, CellroxAs mobile payments barrel forward like a freight train, the potential consequences of cyber breaches grow in severity. 30 percent of U.S. shoppers already use mobile wallets, and 62 percent of shoppers who don’t use a mobile wallet expect to adopt one in the next year, according to a 2015 report from Interactions marketing group. Read More >>>
June 23, 2015
Whether an enterprise or government entity, the proliferation of BYOD has propelled data security to the forefront of just about any organization with a digital footprint. This is of particular concern to public sector IT where security and reliability are critical for managing and safeguarding sensitive data. The problem is compounded when you factor in the tendency of employees to cross-contaminate their devices with both personal and work-specific communications. As such, sensitive data should never be stored on a personal server, which can be more easily breached.
June 22, 2015
This week, the U.S. Open heads to the Pacific Northwest for the very first time. Chambers Bay Golf Course in Washington State will play host. Anyone familiar with this course knows “there aren’t traditional golf hazards, like water and trees, but there is trouble everywhere at Chambers Bay” says one sports blogger.
June 18, 2015
Cultivating employee buy-in is a prime concern of managers any time a new tool or process is implemented. The more resistance an initiative faces, the more likely it is to ultimately fail.The path to increased efficiency isn’t always smooth, often requiring nudges to help people get out of their comfort zones and move forward.
June 11, 2015
A March survey of 1,593 members of the 451 Global Digital Infrastructure Alliance looked at cloud computing and other key IT market trends, including enterprise adoption of cloud, IT budgets and spending, and customer satisfaction with leading Infrastructure-as-a-Service (IaaS), Hosted Private and On-Premises Private Cloud vendors.
June 3, 2015
Daniel Joseph Barry, NapatechIn this interview, Dan Joe Barry, VP Positioning and Chief Evangelist for Napatech, speaks with IT Briefcase about the emerging technology of software acceleration platforms and tools.Read More >>>
June 2, 2015
Are enterprises boldly going where no enterprise has gone before? For the second year running, we’re excited to share the results of our annual Enterprise Cloud Storage Survey. Expanded this year to include 300 respondents, the survey results show that enterprises are aware and wary of file sharing in the cloud when done without policy and IT control. At the same time, we see growing adoption of private and hosted private (or virtual private) architectures to address security and privacy concerns.
May 28, 2015
Check out this informative Infographic on Cloud Security!
May 26, 2015
with Sam Ganga, DMIIn this interview, Sam Ganga at DMI speaks with IT Briefcase on the three fastest-growing trends for addressing ecommerce through the mobile web and provide the pros and cons of each. Read More >>>
May 18, 2015
Adobe Document Cloud enables the workforce to increase productivity while staying secure.
May 18, 2015
In 2013, Scandinavian research group SINTEF announced that 90 percent of all data ever created was generated during the two previous years. That time frame continues shrink as the rate of data creation increases exponentially. Mobile devices, computers, gaming systems and even your car all produce terabytes and terabytes of data. Under these conditions, every business needs to think seriously about their cloud options.
May 13, 2015
by Gerry Grealish, PerspecsysWith information flowing more freely than ever in today’s digital economy, tracking sensitive data becomes an increasingly difficult task. In fact, findings from a recent study show more than half of IT professionals admit not having a complete picture of where their sensitive data lives. Read More >>>
May 11, 2015
by Chris Unruh, Grant Thornton LLPDuring the past several years, cloud-based business applications and solutions have emerged as the next frontier for the IT function. The cloud has the potential to transform the way companies operate and enable businesses to access world-class software with little upfront cost. Read More >>>
April 30, 2015
by Robin Alden, Comodo CA Ltd.You place so much time and effort into the design and content of your website to increase its “stickiness” and turn online browsers into buyers, and with good reason. Consumers are increasingly doing more of their shopping online while doing so on a wide variety of devices with different screen sizes. Read More >>>
April 30, 2015
by David Hald, SMS PASSCODESecurity is part and parcel of an IT admin’s job duties, but it is just one of a long litany of must-do’s that crowd each day. They put the basics in place, including antivirus software, passwords and firewalls, and then turn their attention to the latest priority or malfunction. Read More >>>
April 23, 2015
As business units and IT organizations move to the use of public cloud services, crucial application details often go missing. Some groups might not be particularly concerned by this. After all, as long as your application still performs well, why track the specific hardware used to support it? In the age of service level agreements and shared, multitenant architectures, does it really matter anymore if you know the physical server, storage system or network supporting your application as long as application performance meets users’ service level needs?
April 22, 2015
Are you just getting on the e-reading bandwagon after all this time? Perhaps you want to test it out instead of investing in an e-reader right away. Whether you have an iPad or Nook tablet there is something out there for everyone. Whatever the case may be, you can test how you like this new found hobby by using your iPhone on the go. And with the widely available reading apps for iOS, you just might fall in love with one of them.
April 22, 2015
by Chip Epps, OneLogin Gartner predicts the number of cloud-provisioned office system users will grow 28.5% a year to 695 million users by 2022 –constituting 60% of the user universe that will exist by then. Read More >>>
April 21, 2015
Comindware® (www.comindware.com) – a leading provider of cloud-based Enterprise Work Management solutions has been selected as one of the Top 20 Most Promising BPM Technology Solution Providers by CIO Reviewin 2015. The CIO Review editorial board comprised CEOs, CIOs, CMOs and industry analysts who reviewed the finalists by various parameters such as impact on the market, product differentiation, ability to execute and other criteria.
April 8, 2015
by Paul Castiglione, IpswitchApril is finally here and that means IT teams, like everyone else, will be busy with their spring cleaning projects. While spring cleaning your house is a pretty straightforward endeavor, spring cleaning your files can be a lot more complicated. Read More >>>
April 7, 2015
Download the paper to learn more about how Adobe Document Cloud can help sales teams close deals faster!
April 1, 2015
A 2015 survey of over 1,000 cyber security professionals confirms that security remains the biggest barrier to faster cloud adoption, with nine out of ten organizations expressing this concern. The survey explores a wide range of issues, including the specific driving forces and risk factors of cloud adoption, how organizations are currently using or planning to use the cloud, whether the promise of the cloud is living up to the hype, and how organizations are responding to the security concerns in public, private and hybrid cloud environments.
March 31, 2015
by Mitch Black, MOBIRecently, there has been a great deal of debate in the world of mobile devices and how they function in the enterprise. There’s BYOD (Bring Your Own Device) vs. COPE (Corporate Owned, Personally Enabled), and now even CYOD (Choose Your Own Device). Read More >>>
March 23, 2015
Adobe EchoSign for Salesforce® runs seamlessly inside your Salesforce application, and enables anyone on your team to send and track contracts in a few clicks—without leaving the Salesforce application.
March 23, 2015
CloudVelox offers Pilot Light DR for AWS–automated cloud-based disaster recovery for multi-tier, physical and virtual production apps.
March 23, 2015
Crowd Research Partners today announced the results of a comprehensive cloud security study conducted in cooperation with the 250,000+ member Information Security Community on LinkedIn and leading cloud security vendors AlertLogic, AlienVault, Bitglass, CloudPassage, Palerra and Redspin.
March 18, 2015
It’s no secret that the Internet and e-commerce have revolutionized the retail industry in recent years. E-commerce has drastically changed the way in which information about a customer’s journey to purchase is captured. Companies can now determine with relative ease what a specific customer is looking for, how they found the site, products they have purchased previously, and even past purchases they abandoned.