Inside the Briefcase

Briefcase Highlights


Cloud Providers Are Not All The Same

October 1, 2015 No Comments

With the maturing cloud now a de facto technology choice for most businesses, especially start-ups, the choice of which cloud solution providers (CSP) to trust is the next big decision. With so many options to choose from, and so many providers, big and small, vying for your attention, it’s important to understand what critical aspects of a CSP to look for. What makes one cloud company better than the next?

Why Cloud Monitoring Matters in the App Age

October 1, 2015 No Comments

The preponderant quantity of advances in IT and software engineering in the last ten years has been driven by scale. Ephemeral infrastructure and PaaS enable us to scale hardware, CI/CD enable us to scale the rate of production change, and microservices, eventually consistent data stores, and distributed systems engineering enable us to scale the applications themselves. Scale is a strange and unforgiving property. It cannot be fooled, and is never fully satiated. It has a way of unceremoniously obliterating conventional thinking. It demands 350 new servers right now and laughs mockingly at your change management meeting and your tape backups.

5 Things a Cloud Provider Should Offer to Earn Trust and Business

September 28, 2015 No Comments

Advancement in the cloud and its delivery models of IaaS and SaaS have caused a monumental shift in the way IT services are deployed and delivered. Beginning in the early 2000s IaaS, Infrastructure as a Service, emerged on the scene. IaaS offered a standardized infrastructure that was pre-provisioned and ready-to-go at a moment’s notice. This delivery mechanism eliminated the manual process of ordering and provisioning dedicated hardware in favor of standardization and automation, combined with pre-staged equipment.

Key Benefits of Working in the Cloud

September 24, 2015 No Comments

To many business owners and directors, working in the Cloud is still some abstract concept that they haven’t quite come to terms with. This is really unfortunate as there are just so many benefits once it is understood exactly what Cloud computing is and how to make the most of it for your particular business model. If you are looking at setting up a Cloud platform for your enterprise, here are a few of the key benefits you might want to know about.

Growth of Hybrid Cloud

September 3, 2015 No Comments

According to industry research, the hybrid cloud market is estimated to grow from $25.28 billion in 2014 to $84.67 billion in 2019, at a compound annual growth rate (CAGR) of 27.3%. The research also states that around 50% of enterprises will “embrace hybrid cloud”.

How the Cloud Will Evolve in 2016

September 1, 2015 No Comments

Cloud is a disruptive, US$100bn “fast fish,” eating up the slow fish in the enormous technology fishbowl that’s a massive US$3.8tn in size. The cloud will be ten years old next year and will continue to pick up momentum and speed even when many would imagine that, after ten years, growth would slow down. However, evolving enterprise IT attitudes towards cloud show a move away from focusing on IT infrastructure to an almost consumer-like consumption of cloud through service models such as software-as-a-service.

7 Tips for Cloud Preparedness

August 31, 2015 No Comments

September is National Preparedness Month, which in part, is designed to help businesses plan for and protect against natural or human-caused disasters. Certainly, CISOs and information security pros working in the healthcare industry know that the importance of preparedness extends to the management and security of networks, systems and assets. Aggressive cloud adoption in the U.S., in particular, requires awareness of a specific set of challenges and opportunities in order to build a secure and resilient cloud program.

IT Briefcase Exclusive Interview: The Value of a Two-tier Application Strategy

August 31, 2015 No Comments

with Rahul Asthana, KenandyIn this interview, Rahul Asthana, Senior Director of Product Marketing at Kenandy, speaks with IT Briefcase about why some enterprises pursue a two-tier application strategy and how they transition fully to new systems. Read More >>>

Important Ideas to Consider While Applying the Cloud Strategy

August 27, 2015 No Comments

When you are shifting into the cloud technology, you are required to manage the strategy in the right manner. Your business opportunities can benefit with the help of data security and cost savings. Now, let us discuss a few ideas regarding application of the cloud solutions in your business.

5 Steps to Enterprise-Wide Automation

August 25, 2015 No Comments

For many years, IT has been a gatekeeper. When anyone wanted new server capacity, additional storage, a password reset, or a new application deployed, they had to come to IT to get the job done. The processes and friction IT put in place to manage the demand led to IT being seen as a barrier, rather than as a business enabler. IT was not focusing on the experience, the perception but only on the technology. In recent years, things have started to change. For instance, the public cloud has made it relatively easy for end users to provision their own computing capacity on demand, and outsourcing has created profound competition for internal IT departments.

Is Public Cloud Really Cheaper? It Depends.

August 24, 2015 No Comments

Many companies are actively evaluating or trying public cloud services. This is especially true in the area of IaaS (Infrastructure as a Service). Their main rationale? While many look for advantages like easy access, they also feel they’ll gain dramatic cost savings often touted with going to ‘the Cloud.’

How the Cloud Can Help to Revolutionize Your Business

August 24, 2015 No Comments

Cloud computing is a relatively new concept that is rapidly growing in popularity. The concept of cloud computing involves remotely hosting applications and data within a ‘cloud’ environment of web servers, which are then made accessible to an end user as a cloud service. As this allows the user to control access to critical data and install software as if on their own machine, the use of cloud computing offers a tremendous amount of flexibility.

How To Use Social Media To Leverage Your Content Marketing Output

August 24, 2015 No Comments

Content marketing has been the buzz phrase many marketers have been using for the past few years. Many brands and businesses are now fully on board with producing content – to mixed results. However, those that have succeeded with content marketing all have one thing in common. Each of them has leveraged their content with social media. The question for today is – how, exactly, do they do this?


August 18, 2015 No Comments

Nemertes’ annual study on IP Telephony/Unified Communications (UC) real-world Total Cost of Ownership finds organizations spending less on their on-premises IP telephony and UC deployments, driven by extreme competition between vendors, which are offering previously unseen prices for capital and licensing, and by improved knowledge among IT staffs.

Forrester Report: Build A Better Business Case For UC

August 18, 2015 No Comments

This report outlines Forrester’s solution for IT infrastructure and operations (I&O) professionals who are building out communications and collaboration infrastructure.

White Paper: How BYOE Drives Value for Unified Communications

August 17, 2015 No Comments

This White Paper has been produced to explain the nature of BYOE (Bring Your Own Experience) and demonstrate how it can make Unified Communications more valuable to the business as well as more relevant to your employees.

3 Hot Buttons for Hosted Unified Communications

August 17, 2015 No Comments

J Arnold & Associates monitors the communications technology landscape extensively, and has identified three “hot button” trends organizations need to know when selecting the right communications technology.

Minimizing Costs, Maximizing Value of IP Telephony

August 14, 2015 No Comments

IT  leaders  face the challenge  of  delivering  improved  collaboration  capabilities  while   also minimizing  cost  of  operations.  Consequently,  understanding the  ability  of  IP Telephony (IPT) and Unified  Communications  (UC)  solutions  to  provide robust  technology affordably is  critical  for  overall  IT success.

9 Things to Consider Before Choosing A Cloud Phone Provider

August 14, 2015 No Comments

Businesses today are turning to cloud phone systems more than ever, but how do you know which one is right for you? To choose the one that’s best for your business, we’ve dialed it down to nine simple questions you should ask before pressing one for yes.

Staying Secure in the Cloud

August 11, 2015 No Comments

This white paper examines security considerations for migrating communication solutions into the cloud.

Hiding in the Cloud

August 4, 2015 No Comments

Researchers have detected Russian hackers operating in plain sight using the cover of legitimate services including Twitter, Github and cloud storage services to steal data from organizations during the work day. Recently, a cyber gang known as APT29 created malware called Hammertoss which is very hard to detect. Using a variety of Twitter handles daily, they are able to send commands to infected machines using images embedded with encrypted command information, these commands allow them to upload the stolen information to cloud storage services. They also infect legitimate web servers and usethem as part of their command and control infrastructure.

Bring the Nook Home with Reading Apps for iPad

August 4, 2015 No Comments

It is no secret that the nook is now the preferred eReader, even surpassing the Kindle Fire in sales. The problem, however, is that the iPad is still the most popular tablet out there. Once users purchase an iPad they find very little use for their Android-powered Nook, regardless of how great it might be. After all, who wants to carry TWO tablets around? Not many people would answer yes, and for a time, it looked as if Apple might begin to dominate the e-book market.

4 Steps to Protect Your Computer from Data Loss

August 4, 2015 No Comments

Perhaps the most valuable thing about your computer is the data and files that you have saved on it. After all, the main reason for having your PC or laptop is in order to store the data that is on it, and it’s the main priority for putting a protective strategy in place, such as anti-virus software. Whilst operating systems and downloadable software can always be re-downloaded or re-installed, unique, user created data has the potential to be lost forever. Let’s look at some simple steps that can be taken in order to protect your computer or laptop from data loss.

Prevent Hurricane Fear From Churning Up Stormy Clouds

August 3, 2015 No Comments

On July 8, the New York Stock Exchange abruptly came to a screeching halt, United Airlines grounded its flights, and the Wall Street Journal’s website went dark. You might think cloud providers let out sighs of relief when it was determined the cloud had nothing to do with these disruptions. In fact, it was quickly determined that no security breaches or attacks were involved. They were all just coincidental glitches.

IT Briefcase Exclusive Interview: BYOD Planning with an Eye for the Future

July 30, 2015 No Comments

with Israel Lifshitz, NuboIf you’ve been tracking the evolution of our BYOD work culture, you’ll know that most enterprises are at some stage of getting a grip on a myriad of issues, including employee adoption, compliance, Shadow IT and user privacy just to name a few. Read More >>>

Will Windows 10 bring revival to its mobile platform?

July 29, 2015 No Comments

With the release of Windows 10 comes another opportunity for Microsoft to align its direction for mobile to better serve developers and IT departments. Together with a subtle name change to Windows 10 Mobile, Microsoft is looking to draw a line in the sand on its failed attempt to chase Apple in the consumer market with Windows Phone.

The Internet of Things: Challenges and Opportunities Across Industries

July 28, 2015 No Comments

with Sam Ganga, DMIZK Research reports that the Internet of Things (IoT) will have 50 billion endpoints by 2010 and will create 2.5 trillion new revenue streams in the next 10 years. That represents a huge opportunity for organizations large and small across all industries. Read More >>>

Capturing Packets Faster in the 100Gbps World

July 27, 2015 No Comments

by Daniel Joseph Barry, NapatechThe number of network end points is growing into the billions as the Internet of Things (IoT) expands its presence, spurred on inexpensive sensors, the rapid adoption of mobile devices and innovative minds. This presents engineers and administrators with the challenge of managing and protecting the network in real time. Read More >>>

Requirements Customers Have For Mobile Payments

July 22, 2015 No Comments

by Kristen Gramigna, BluePayMobile payments can equip small businesses to accept payment by credit or debit card, using the mobile device that small-business owners likely have within reach most of the time. While mobile payment technology can benefit both customer and business owner, some customers remain hesitant about them. Read More >>>

Establishing a Foundation for Enterprise Security Policy in the Public Cloud

July 9, 2015 No Comments

In many respects, Cloud Access Security Brokers are the future of what we currently know as the data center firewall. How so? A data center firewall sits in front of enterprise applications/databases (systems of record) in the data center, providing control and visibility. Increasingly, those applications and databases are moving from the corporate data center to the public cloud – with apps like Office 365, Box, and Salesforce, quickly becoming the norm in the enterprise. In this context, cloud apps become the new system of record. Since the traditional data center firewall can’t see cloud traffic, it can no longer provide the protection that we need.


TDWI Orlando 2015

Gartner Identity & Access Management Summit

Gartner Data Center Las Vegas

Big Data Tech Con

American Customer Festival

ITBriefcase Comparison Report

Cyber Security Exchange