Inside the Briefcase






Briefcase Highlights


Fresh Ink

IT Briefcase Exclusive Interview: The Value of a Two-tier Application Strategy

August 31, 2015 No Comments

with Rahul Asthana, KenandyIn this interview, Rahul Asthana, Senior Director of Product Marketing at Kenandy, speaks with IT Briefcase about why some enterprises pursue a two-tier application strategy and how they transition fully to new systems. Read More >>>

IT Briefcase Exclusive Interview: The Customer Experience Gap – A Q&A with IBM’s Hannah Egan

August 21, 2015 No Comments

with Hannah Egan, IBM CommerceIn this interview, we posed several questions to Hannah Egan, Product Strategy Specialist, IBM Commerce and she helped us understand the changing customer experience landscape and offered some useful tips. Read More >>>

IT Briefcase Exclusive Interview: BYOD Planning with an Eye for the Future

July 30, 2015 No Comments

with Israel Lifshitz, NuboIf you’ve been tracking the evolution of our BYOD work culture, you’ll know that most enterprises are at some stage of getting a grip on a myriad of issues, including employee adoption, compliance, Shadow IT and user privacy just to name a few. Read More >>>

The Internet of Things: Challenges and Opportunities Across Industries

July 28, 2015 No Comments

with Sam Ganga, DMIZK Research reports that the Internet of Things (IoT) will have 50 billion endpoints by 2010 and will create 2.5 trillion new revenue streams in the next 10 years. That represents a huge opportunity for organizations large and small across all industries. Read More >>>

Capturing Packets Faster in the 100Gbps World

July 27, 2015 No Comments

by Daniel Joseph Barry, NapatechThe number of network end points is growing into the billions as the Internet of Things (IoT) expands its presence, spurred on inexpensive sensors, the rapid adoption of mobile devices and innovative minds. This presents engineers and administrators with the challenge of managing and protecting the network in real time. Read More >>>

Requirements Customers Have For Mobile Payments

July 22, 2015 No Comments

by Kristen Gramigna, BluePayMobile payments can equip small businesses to accept payment by credit or debit card, using the mobile device that small-business owners likely have within reach most of the time. While mobile payment technology can benefit both customer and business owner, some customers remain hesitant about them. Read More >>>

Digital Transformation and the Changing Enterprise

July 9, 2015 No Comments

with Anatoly Belaychuk, ComindwareVolatility of today’s business landscape is unprecedented: it is harder than ever to stay on top and win a lasting competitive advantage. Due to the Digital Disruption, it is now virtually impossible to develop a business model, cast it into the concrete of an ERP system and leverage highly optimized processes for years. Read More >>>

IT Briefcase Exclusive Interview: What You Need to Know to Meet the Open Source Juggernaut

July 6, 2015 No Comments

with Bernard Golden, ActiveStateIT professionals are evaluating how open source products can help them meet their organizations’ responsibilities. Enterprise IT has a large and growing commitment to open source products in preference to proprietary alternatives. Read More >>>

IT Briefcase Exclusive Interview with Learning@Cisco: New Training Needed to Manage the Internet of Everything

July 2, 2015 No Comments

with Tejas Vashi, Learning@CiscoThe Internet of Everything (IoE) is bringing together people, process, data and things to make networked connections more relevant and valuable than ever before. Understandably, this is accelerating the pace of digital transformation. Read More >>>

Your Mobile Wallet Isn’t Safe

June 29, 2015 No Comments

with Dror Nadler, CellroxAs mobile payments barrel forward like a freight train, the potential consequences of cyber breaches grow in severity. 30 percent of U.S. shoppers already use mobile wallets, and 62 percent of shoppers who don’t use a mobile wallet expect to adopt one in the next year, according to a 2015 report from Interactions marketing group. Read More >>>

IT Briefcase Exclusive Interview with NuData Security: Detecting Identity Theft to Prevent Online Fraud

June 25, 2015 No Comments

with Ryan Wilk, NuData SecurityIn this interview, Ryan Wilk, director of Customer Success for NuData Security, talks speaks with IT Briefcase about just how serious data breaches can be to both the consumer and the organization, the latest trend in fraud and the best way to stop fraud before it starts. Read More >>>

4 Tips for Creating Brand Advocates Out of Father’s Day Shoppers This Year

June 18, 2015 No Comments

Johann Wrede, SAPA recent Customer Experience Index report from Forrester shows companies that outperform competitors in customer experience are more likely to turn customers into repeat customers, and repeat customers into loyal and engaged brand ambassadors. Simply stated? “Customer service is king” is no longer just a marketing tagline, but a mantra that governs how organizations will continue to survive. Read More >>>

Welcome to Tomorrowland: Where Developers Can Finally Roam Free

June 10, 2015 No Comments

Miguel Valdes Faura, BonitasoftThe truth is that most old-line BPM technologies prevented developers from having the freedom and flexibility they needed to build highly personalized applications. They took a “no code” approach and touted it as a feature while expecting developers to “make do” with stale, generic user interfaces and rigid forms. Read More >>>

Doing Versus Planning: The New Way to Build Enterprise Apps

June 4, 2015 No Comments

Aygun Suleymanova, Progress SoftwareWhether a developer is building mobile apps for a small- to medium-sized organization or a multinational enterprise, the apps themselves have to be enterprise-ready. Read More >>>

IT Briefcase Exclusive Interview with Napatech: What the Third Platform Requires of the Network

June 3, 2015 No Comments

Daniel Joseph Barry, NapatechIn this interview, Dan Joe Barry, VP Positioning and Chief Evangelist for Napatech, speaks with IT Briefcase about the emerging technology of software acceleration platforms and tools.Read More >>>

IT Briefcase Exclusive Interview: Weighing the Options for Mobile Design in a Google-centric World

May 26, 2015 No Comments

with Sam Ganga, DMIIn this interview, Sam Ganga at DMI speaks with IT Briefcase on the three fastest-growing trends for addressing ecommerce through the mobile web and provide the pros and cons of each. Read More >>>

IT Briefcase Exclusive Interview: New Era of Performance Optimization in SAN Storage

May 22, 2015 No Comments

with Brian Morin, Condusiv TechnologiesOne of the biggest silent killers of SAN performance has nothing to do with the SAN itself, but the number of small, fractured random I/O that overwhelms bandwidth from the SAN as a result a fragmented logical disk. Read More >>>

IT Briefcase Exclusive Interview with HYPR Corp: Fighting Online Fraud

May 21, 2015 No Comments

with George Avetisov, HYPR Corp.Here’s the problem, according to HYPR Corp., provider of a device-to-cloud biometric security platform: cyber criminals are focusing on mobile payments too, and organizations are repeatedly failing to secure data as it transitions to the cloud. Read More >>>

Killing Misconception: Five Steps to BPM Success

May 15, 2015 No Comments

by Miguel Valdes Faura, BonitasoftThe common thinking has been that developing and implementing a process-based application will be as complicated and disruptive as a custom development. It doesn’t have to be. Here are five steps to ensure success. Read More >>>

Don’t Get Lost in the Cloud: 10 Tips for Controlling Cloud Data

May 13, 2015 No Comments

by Gerry Grealish, PerspecsysWith information flowing more freely than ever in today’s digital economy, tracking sensitive data becomes an increasingly difficult task. In fact, findings from a recent study show more than half of IT professionals admit not having a complete picture of where their sensitive data lives. Read More >>>

4 Steps to Making a Smart Transition to the Cloud

May 11, 2015 No Comments

by Chris Unruh, Grant Thornton LLPDuring the past several years, cloud-based business applications and solutions have emerged as the next frontier for the IT function. The cloud has the potential to transform the way companies operate and enable businesses to access world-class software with little upfront cost. Read More >>>

Choosing the IT Dream Team: Diverse Personalities Are Key

May 4, 2015 No Comments

by Weston Morris, UnisysIT organizations today often face a quandary. They need to introduce new technology and develop new services to take on the emerging business challenges confronting their clients. At the same time, they need to maintain, without disruption, the technologies and services that have enabled them to capitalize on existing opportunities. Read More >>>

Consumers Need an Education in Online Shopping Security 101

April 30, 2015 No Comments

by Robin Alden, Comodo CA Ltd.You place so much time and effort into the design and content of your website to increase its “stickiness” and turn online browsers into buyers, and with good reason. Consumers are increasingly doing more of their shopping online while doing so on a wide variety of devices with different screen sizes. Read More >>>

Eight Realities That Demand Multi-Factor Authentication

April 30, 2015 No Comments

by David Hald, SMS PASSCODESecurity is part and parcel of an IT admin’s job duties, but it is just one of a long litany of must-do’s that crowd each day. They put the basics in place, including antivirus software, passwords and firewalls, and then turn their attention to the latest priority or malfunction. Read More >>>

7 Steps to Securely Deploy Cloud Apps

April 22, 2015 No Comments

by Chip Epps, OneLogin Gartner predicts the number of cloud-provisioned office system users will grow 28.5% a year to 695 million users by 2022 –constituting 60% of the user universe that will exist by then. Read More >>>

Why Marketers Need to Put A/B Testing by the Wayside Content

April 20, 2015 No Comments

by Cory Munchbach, BlueConicWhile A/B and multivariate testing has been known to improve the effectiveness of marketing campaigns, newer tools and methodologies that can be implemented today have evolved to become more effective and informative than their predecessors. Read More >>>

7 Service Desk Habits of The Avengers

April 16, 2015 No Comments

with Vinit Tibrewal, ManageEngine“If you are an IT help desk technician, you’re a superhero!” You may have heard this many times from your help desk solution provider, if not from your customers and colleagues. Read More >>>

Using Dropbox? Get Ready for Spring Cleaning!

April 8, 2015 No Comments

by Paul Castiglione, IpswitchApril is finally here and that means IT teams, like everyone else, will be busy with their spring cleaning projects. While spring cleaning your house is a pretty straightforward endeavor, spring cleaning your files can be a lot more complicated. Read More >>>

COPE vs. BYOD vs. CYOD – How Should an Enterprise Choose?

March 31, 2015 No Comments

by Mitch Black, MOBIRecently, there has been a great deal of debate in the world of mobile devices and how they function in the enterprise. There’s BYOD (Bring Your Own Device) vs. COPE (Corporate Owned, Personally Enabled), and now even CYOD (Choose Your Own Device). Read More >>>

March Madness Should Not Rest Solely on IT’s Shoulders

March 26, 2015 No Comments

by Steve Riley, Riverbed TechnologyThere are several steps companies can take to keep network performance from faltering without ruining employee morale. Some fall under IT’s area of responsibility, but others require other typically non-tech savvy departments and personnel. Read More >>>

ADVERTISEMENT

Gartner Security and Risk

Gartner Data Center Las Vegas

Big Data Tech Con

Gartner BPM Summit

American Customer Festival

SPTECHCON

Red Hat JBoss Busines Automate

Cyber Security Exchange

ITBriefcase Comparison Report