Inside the Briefcase

Adobe EchoSign for Salesforce

Adobe EchoSign for Salesforce

Adobe EchoSign for Salesforce® runs seamlessly inside your Salesforce application, and enables anyone on your team to send and track contracts in a few clicks—without leaving the Salesforce application.

IT Briefcase Exclusive Interview with IBM: How Major Snow Storms Effect Shopping Trends

IT Briefcase Exclusive Interview with IBM: How Major Snow Storms Effect Shopping Trends

with Jay Henderson, IBM Commerce
In this interview, Jay Henderson, Director, Product Strategy, IBM Commerce, speaks with IT Briefcase on how trends such as extreme weather and holiday shopping impact online commerce and what it means for retailers.

Briefcase Highlights


IT Briefcase Exclusive Interview: New Era of Performance Optimization in SAN Storage

May 22, 2015 No Comments

with Brian Morin, Condusiv TechnologiesOne of the biggest silent killers of SAN performance has nothing to do with the SAN itself, but the number of small, fractured random I/O that overwhelms bandwidth from the SAN as a result a fragmented logical disk. Read More >>>

How serious is Data Loss?

May 20, 2015 No Comments

Data loss is one of the most serious concerns for both individuals and businesses. People who create, modify or enter any type of data into computer systems are aware of the effects of data loss on their work. Depending on the type of data loss that occurred, data recovery may be possible using various types of applications. There are many causes of data loss.

Investing in Current Infrastructure or Migrating to Cloud-Based Managed Services?

May 18, 2015 No Comments

In 2013, Scandinavian research group SINTEF announced that 90 percent of all data ever created was generated during the two previous years. That time frame continues shrink as the rate of data creation increases exponentially. Mobile devices, computers, gaming systems and even your car all produce terabytes and terabytes of data. Under these conditions, every business needs to think seriously about their cloud options.

Killing Misconception: Five Steps to BPM Success

May 15, 2015 No Comments

by Miguel Valdes Faura, BonitasoftThe common thinking has been that developing and implementing a process-based application will be as complicated and disruptive as a custom development. It doesn’t have to be. Here are five steps to ensure success. Read More >>>

3 Ways Automation Technology Drives Business Value

May 13, 2015 No Comments

Gone are the days where CIOs are only responsible for managing IT and service request fulfillment. As demands have evolved throughout the enterprise, CIOs are being asked to fill two additional roles: Chief Solutions Officer and Chief Alignment Officer. IT leaders are now increasingly relied on to develop and execute quick fixes for company-wide issues, while connecting the enterprise technologically and culturally. With so much to juggle, many are turning to automation technology to ensure no objective gets dropped.

4 Steps to Making a Smart Transition to the Cloud

May 11, 2015 No Comments

by Chris Unruh, Grant Thornton LLPDuring the past several years, cloud-based business applications and solutions have emerged as the next frontier for the IT function. The cloud has the potential to transform the way companies operate and enable businesses to access world-class software with little upfront cost. Read More >>>

Choosing the IT Dream Team: Diverse Personalities Are Key

May 4, 2015 No Comments

by Weston Morris, UnisysIT organizations today often face a quandary. They need to introduce new technology and develop new services to take on the emerging business challenges confronting their clients. At the same time, they need to maintain, without disruption, the technologies and services that have enabled them to capitalize on existing opportunities. Read More >>>

Eight Realities That Demand Multi-Factor Authentication

April 30, 2015 No Comments

by David Hald, SMS PASSCODESecurity is part and parcel of an IT admin’s job duties, but it is just one of a long litany of must-do’s that crowd each day. They put the basics in place, including antivirus software, passwords and firewalls, and then turn their attention to the latest priority or malfunction. Read More >>>

Tackling the Mountain of Application Development Projects: Does IT Need to Shift Gears?

April 29, 2015 No Comments

You’re out on a bike ride and start to notice you’re losing momentum. You’re pedaling the same, but with each rotation, you aren’t getting as far as you need to keep pace. You see a hill up ahead: what do you do? Any biker knows that you have to shift gears to power through hills. Today’s IT teams are facing a hill – no, a mountain – of work as business demands for custom applications rise. As the backlog of development projects builds, some are learning that it’s time to shift gears.

Another Dark Side of the Cloud: Data Center Migrations

April 23, 2015 No Comments

As business units and IT organizations move to the use of public cloud services, crucial application details often go missing. Some groups might not be particularly concerned by this. After all, as long as your application still performs well, why track the specific hardware used to support it? In the age of service level agreements and shared, multitenant architectures, does it really matter anymore if you know the physical server, storage system or network supporting your application as long as application performance meets users’ service level needs?

How to Start an IT Career You’ll Love

April 23, 2015 No Comments

Information technology professionals are finding doors wide open to exciting careers that pay very well and may take them anywhere in the world. If you are a certified IT pro with skills using computers and software to manage information, your expertise will be in high demand in careers including…

Data Management Insights – Meet Mr. Clutter

April 23, 2015 No Comments

Have you met Mr. Clutter? He works at your firm. Well, works is probably not the right word. But he’s there—pervasively—and has the greatest impact on your company, more than any other employee by far. Mr. Clutter floods you with innumerable emails, text messages, alerts and notifications. He knows every one of your email addresses and mobile numbers and will inundate each of those inboxes. You can run, but you can’t hide from Clutter.

7 Steps to Securely Deploy Cloud Apps

April 22, 2015 No Comments

by Chip Epps, OneLogin Gartner predicts the number of cloud-provisioned office system users will grow 28.5% a year to 695 million users by 2022 –constituting 60% of the user universe that will exist by then. Read More >>>

Comindware selected as one of Top 20 Most Promising BPM Technology Solution Providers

April 21, 2015 No Comments

Comindware® ( – a leading provider of cloud-based Enterprise Work Management solutions has been selected as one of the Top 20 Most Promising BPM Technology Solution Providers by CIO Reviewin 2015. The CIO Review editorial board comprised CEOs, CIOs, CMOs and industry analysts who reviewed the finalists by various parameters such as impact on the market, product differentiation, ability to execute and other criteria.

Why Marketers Need to Put A/B Testing by the Wayside Content

April 20, 2015 No Comments

by Cory Munchbach, BlueConicWhile A/B and multivariate testing has been known to improve the effectiveness of marketing campaigns, newer tools and methodologies that can be implemented today have evolved to become more effective and informative than their predecessors. Read More >>>

Why It’s Time to Modernize Your Network for Today’s Digital Enterprise Webinar

April 17, 2015 No Comments

Watch this on-demand webinar to learn how enterprises can accelerate innovation in this hyperconnected world.

7 Service Desk Habits of The Avengers

April 16, 2015 No Comments

with Vinit Tibrewal, ManageEngine“If you are an IT help desk technician, you’re a superhero!” You may have heard this many times from your help desk solution provider, if not from your customers and colleagues. Read More >>>

CA Security Council Report: Consumers Don’t Know Much About Security

April 13, 2015 No Comments

The CA Security Council (CASC), an advocacy group committed to the advancement of the security of websites and online transactions, today released its 2015 Consumer Trust Survey which found that validation matters. While consumers are confused about some aspects of security, they recognize and trust the security that SSL brings to e-commerce sites. Fifty-three percent of respondents identify the padlock as adding confidence in an e-commerce site, with 42 percent associating the green bar and organization name in the URL with greater safety.

Using Dropbox? Get Ready for Spring Cleaning!

April 8, 2015 No Comments

by Paul Castiglione, IpswitchApril is finally here and that means IT teams, like everyone else, will be busy with their spring cleaning projects. While spring cleaning your house is a pretty straightforward endeavor, spring cleaning your files can be a lot more complicated. Read More >>>

Riverbed Application Performance Platform Solutions Power California Environmental Firm Dudek’s Expansion as Highly Efficient Hybrid Enterprise

April 3, 2015 No Comments

Headquartered in Encinitas, Dudek is a California-focused environmental firm with more than 300 planners, scientists, civil engineers, contractors, and support staff located in 13 sites across the state. The firm has provided its clients with environmental, permitting, planning, engineering, construction and operational services since 1980. When Abe Esguerra, IT Director at Dudek, came to the firm in 2002 there were just five offices, 120 employees, and no wide area network (WAN). In those days, inter-office collaboration consisted of sharing large files via FTP, MAPI and mailing CDs.

COPE vs. BYOD vs. CYOD – How Should an Enterprise Choose?

March 31, 2015 No Comments

by Mitch Black, MOBIRecently, there has been a great deal of debate in the world of mobile devices and how they function in the enterprise. There’s BYOD (Bring Your Own Device) vs. COPE (Corporate Owned, Personally Enabled), and now even CYOD (Choose Your Own Device). Read More >>>

Borrowing Technology from Media & Entertainment for Big Data Analytics in the Cloud

March 31, 2015 No Comments

For most of computing’s history, data meant “structured” data or data that fits neatly into pre-defined categories and rows stored in databases or spreadsheets. But the big data movement has changed all of that with the proliferation of unstructured data analysis. Unstructured data is any data that doesn’t fit into a predefined data model. It includes things like video, images, text, and all the data being logged by sensors and the myriad of digital devices. Where structured data is relatively easy to store and analyze using traditional technology, unstructured data isn’t.

Outsourcing Your Enterprise Mobility Management: Considerations and Questions

March 26, 2015 No Comments

Nieslen reports that mobile Web adoption has grown at a rate eight times faster than Web adoption in the 1990s and early 2000s. More than 1.2 billion people are accessing the Web from their mobile devices. This explosion of mobility creates exciting opportunities to serve customers better and more quickly, as well as allow employees greater work flexibility. It also creates a strain in IT resources.

March Madness Should Not Rest Solely on IT’s Shoulders

March 26, 2015 No Comments

by Steve Riley, Riverbed TechnologyThere are several steps companies can take to keep network performance from faltering without ruining employee morale. Some fall under IT’s area of responsibility, but others require other typically non-tech savvy departments and personnel. Read More >>>

How the Experience Web Will Finally Eradicate the Language Barrier

March 25, 2015 No Comments

by Rob Vandenberg, Lingotek Now that our global culture is becoming increasingly digitized, not least with the addition of the Apple Watch and drone delivery, language is going to take on new meaning. The barriers to comprehension will be lower than ever, but the obstacles to effectively marketing your global business will rise. Read More >>>

Adobe EchoSign for Salesforce

March 23, 2015 No Comments

Adobe EchoSign for Salesforce® runs seamlessly inside your Salesforce application, and enables anyone on your team to send and track contracts in a few clicks—without leaving the Salesforce application.

Gartner Digital Workplace Summit 2015

March 20, 2015 No Comments

Gartner Digital Workplace Summit 2015, May 18-20, Orlando, FL., delivers the strategic insights and actionable advice needed to redesign your organization’s work environment.

Retail: It’s all about gaining consumer confidence

March 18, 2015 No Comments

It’s no secret that the Internet and e-commerce have revolutionized the retail industry in recent years. E-commerce has drastically changed the way in which information about a customer’s journey to purchase is captured. Companies can now determine with relative ease what a specific customer is looking for, how they found the site, products they have purchased previously, and even past purchases they abandoned.

IT Briefcase Exclusive Interview with IBM: How Major Snow Storms Effect Shopping Trends

March 18, 2015 No Comments

with Jay Henderson, IBM CommerceIn this interview, Jay Henderson, Director, Product Strategy, IBM Commerce, speaks with IT Briefcase on how trends such as extreme weather and holiday shopping impact online commerce and what it means for retailers. Read More >>>

Why Documenting your Business Operating Systems Matters

March 11, 2015 No Comments

Let’s face it, documenting your business operating systems can’t be classified as an exciting or creative process. While a little dull and most definitely time-consuming, it’s nevertheless absolutely essential that your business has comprehensive documentation of your business operating systems. And there are more than just a couple of reasons for it.


TDWI Boston



Gartner IT Operations Summit

Gartner Enterprise Architecture

Red Hat JBoss Busines Automate

ITBriefcase Comparison Report