Inside the Briefcase


Human-Plus-Machine Computing: Beyond Moore’s Law

Human-Plus-Machine Computing: Beyond Moore’s Law

How do we move forward in a world where Moore’s Law no longer holds true? For five decades, Gordon Moore’s famous prediction about processing power doubling about every two years held firm. It was a reliable sort of constant...

IT Briefcase Interview: Machine Learning – the Key for Securing Big Data?

IT Briefcase Interview: Machine Learning – the Key for Securing Big Data?

with Dale Kim, MapR Technologies
In this interview, Dale Kim, senior director of industry solutions at MapR, speaks with IT Briefcase on the critical role machine learning plays in cyber-security today.
Read More >>>

IT Briefcase Exclusive Interview: IBM Cloud Video Powers NASA Live Streaming

IT Briefcase Exclusive Interview: IBM Cloud Video Powers NASA Live Streaming

with Alden Fertig, IBM Cloud Video’s Ustream
In this interview, Alden Fertig, Vice President of Product for IBM Cloud Video’s Ustream, and brings us along the evolution of NASA’s live streaming.
Read More >>>

IT Briefcase Exclusive Interview: Cloud Sandboxes and Their Many Benefits

IT Briefcase Exclusive Interview: Cloud Sandboxes and Their Many Benefits

with Shashi Kiran, Quali
IT Briefcase conducted the following Q&A with Quali Chief Marketing Officer Shashi Kiran to get a better understanding about the beneficial uses of cloud sandboxes as the DevOps trend continues to take hold and gain...

The Automotive Industry Goes Driving in the Cloud

The Automotive Industry Goes Driving in the Cloud

Just when you think that you have seen it all, as far as cars and technology are concerned, the automotive industry takes it to another level. While the ability to create cars that have the capacity to fly may...

Preparing for the Adoption of Office 365

Preparing for the Adoption of Office 365

As you may know, Microsoft Office 365 is the number one cloud-based solution, due to its appeal on multiple levels to individuals and business users alike. In recent years, Microsoft has invested heavily in cloud computing, with its revenue...

How to Best Utilise Analytics in all its Forms

How to Best Utilise Analytics in all its Forms

Analytics is one of the most indispensable tools any website owner can have. It had gotten to the stage where if you don’t use analytics in some form, your site or company (if it’s web dependant) will fail. I’ve...

2016 APM Reference Guide: Application Performance Monitoring

2016 APM Reference Guide: Application Performance Monitoring

IT Briefcase Analyst Report
This product guide allows you to quickly assess -- current products in the market, deployment options, basic differences by monitoring features, the stability of suppliers and more.
Read More >>>

IT Briefcase Exclusive Interview: Top IoT Trends and Predictions for Organizations in 2016

IT Briefcase Exclusive Interview: Top IoT Trends and Predictions for Organizations in 2016

with Mike Martin, nfrastructure
In this interview, Mike Martin, CTO, nfrastructure, speaks with IT Briefcase about what he believes will be the top IoT trends and predictions for organizations of all sizes and their IT teams for the coming...

Unleash the Power of Global Content

Unleash the Power of Global Content

globeYour business depends on pushing accurate and dynamic content to its global audience--at the snap of a finger. In today’s world, it is possible to break through barriers, rapidly enter new markets, and transform your global aspirations. Traditional translation...

Clicking Away Your Right to Privacy

Clicking Away Your Right to Privacy

Before using any standard Internet service provider for e-mail (i.e., Gmail, AOL, Yahoo), you must agree to the site’s terms of use by clicking a seemingly innocuous “I Agree” button. Most users fail to actually read the terms and...

Top Questions to Ask Before Implementing VoIP

Top Questions to Ask Before Implementing VoIP

Thinking about a move away from traditional phone lines to a voice over Internet Protocol (VoIP) solution? You're not alone: According to Business Wire, the market is on track to reach almost 350 million subscribers by 2020 and generate...

Happy Halloween: Bad Cyber Security is Scary

Happy Halloween: Bad Cyber Security is Scary

National Cyber Security Awareness Month and Halloween are both in October. Coincidence? Maybe. But, executives do have a lot to fear when it comes to cyber security. While many executives and IT teams are working hard to keep the...

Three reasons why the cloud is safer than traditional data centers

Three reasons why the cloud is safer than traditional data centers

More than half of U.S. businesses use cloud computing, and that number is expected to keep growing. Companies are shifting from traditional data centers to the cloud for reasons including convenience, speed and efficiency. Traditional data centers are on-site...

WHEN IT COMES TO PROTECTING DATA – TAKE YOUR HEAD OUT OF THE CLOUDS

WHEN IT COMES TO PROTECTING DATA – TAKE YOUR HEAD OUT OF THE CLOUDS

In the last five years, Cloud hosts such as Amazon Web Services, Google, Microsoft, Box and Dropbox have become increasingly popular and cost effective for storing and sharing data. That said, data theft has never been greater with network...

Wanted: Guardians of the Data

Wanted: Guardians of the Data

Today's IT Needs Heroes to Keep Sensitive Data Safe & Protected. Over 78% of data breaches occur from employee negligence or maliciousness according to a recent study.

Four Ways to Make Your Business More Secure

Four Ways to Make Your Business More Secure

When it comes to both online and offline systems, many business owners know that it’s important to think seriously about the security of their company. However, a large number of business owners also often lack the funds or time...

Online Reputation Management for Healthcare Professionals

Online Reputation Management for Healthcare Professionals

The Internet contains everything today. If you doubt this, just do a simple task, Google yourself and see what the results are. A lot of information about you will pop up some of which you didn’t even know prevailed....

EMV Hits The US – Now What?

EMV Hits The US – Now What?

Fewer than half of all payment cards and PoS terminals in the US are currently EMV-ready. Moreover, US merchants and card issuers have been slow to migrate to the new technology. In the wake of EMV’s worldwide implementation, a...

Making Mobile Wallets Safer

Making Mobile Wallets Safer

Consulting firm Chadwick Martin Bailey found in a recent survey that 15 percent of U.S. consumers have used a mobile wallet in the past six months, up from nine percent in the same period in 2013. The numbers may...

Hybrid IT through Cloud Brokerage – Your Path to Better Business Outcomes

Hybrid IT through Cloud Brokerage – Your Path to Better Business Outcomes

Organizations need to explore another approach that encompasses cloud, but goes beyond it - called Hybrid IT.

Turning Trust Upside Down: How to Reduce Security Risks in a Cloud-based Economy

Turning Trust Upside Down: How to Reduce Security Risks in a Cloud-based Economy

by Rob Quiros, Soha
As the move to hybrid cloud infrastructure causes the Internet and corporate network to meld, enterprises need a new approach to ensure all of their applications and network resources remain secure. But that is easier...

Preparing Your Mobile Marketing Strategy for the Future

Preparing Your Mobile Marketing Strategy for the Future

If you’ve been holding off on changing your marketing strategy to cater to mobile device users, the time to act is now. If you’re hoping to stay relevant to target consumers and to keep up with rapidly evolving technology,...

Cloud Providers Are Not All The Same

Cloud Providers Are Not All The Same

With the maturing cloud now a de facto technology choice for most businesses, especially start-ups, the choice of which cloud solution providers (CSP) to trust is the next big decision. With so many options to choose from, and so...

Why Cloud Monitoring Matters in the App Age

Why Cloud Monitoring Matters in the App Age

The preponderant quantity of advances in IT and software engineering in the last ten years has been driven by scale. Ephemeral infrastructure and PaaS enable us to scale hardware, CI/CD enable us to scale the rate of production change,...

Health IT Trends On the Rise in 2015

Health IT Trends On the Rise in 2015

Technology is becoming more prominent in just about every industry. It's starting to evolve the way we interact with the world at large. Certainly the concept of information technology, or IT, has expanded to include many more markets than...

How Vulnerable To Hackers Are Mobile-Payment Apps?

How Vulnerable To Hackers Are Mobile-Payment Apps?

Making a purchase or other payment is not like it used to be. These days, cash and credit cards aren’t the necessities they once were because alternative-payment options are just a tap or two away on a mobile device...

How Wearable Tech Could Transform Health Care

How Wearable Tech Could Transform Health Care

Wearable tech like the FitBit, the Apple Watch, heart-rate monitors, and pedometers are currently the domain of the tech-savvy and the fitness-obsessed. But all that could soon change. Physicians say wearable devices have a lot of potential to improve...

EHRs — How Safe Are Your Medical Records?

EHRs — How Safe Are Your Medical Records?

It wasn’t so long ago that doctors unanimously relied on paper charts to record and store patient health information. But thanks to provisions in the 2009 economic stimulus program, many doctors and hospitals have received cash incentives in return...

The Digitization of Healthcare

The Digitization of Healthcare

Technology's reach has extended across industries and the healthcare space is no exception. Everything from mobile innovations to wearables and advanced technologies are changing the way doctors care for patients and the way patients care for themselves. These innovations...





Briefcase Highlights


Inside the Briefcase

Human-Plus-Machine Computing: Beyond Moore’s Law

December 5, 2016 No Comments

How do we move forward in a world where Moore’s Law no longer holds true? For five decades, Gordon Moore’s famous prediction about processing power doubling about every two years held firm. It was a reliable sort of constant as innovators continued to increase the number of transistors per square inch on integrated circuits. But all good things must come to an end, and Moore’s Law has been confounded by another, more immutable law: physics.

IT Briefcase Interview: Machine Learning – the Key for Securing Big Data?

November 29, 2016 No Comments

with Dale Kim, MapR TechnologiesIn this interview, Dale Kim, senior director of industry solutions at MapR, speaks with IT Briefcase on the critical role machine learning plays in cyber-security today. Read More >>>

IT Briefcase Exclusive Interview: IBM Cloud Video Powers NASA Live Streaming

November 22, 2016 No Comments

with Alden Fertig, IBM Cloud Video’s UstreamIn this interview, Alden Fertig, Vice President of Product for IBM Cloud Video’s Ustream, and brings us along the evolution of NASA’s live streaming. Read More >>>

IT Briefcase Exclusive Interview: Cloud Sandboxes and Their Many Benefits

October 17, 2016 No Comments

with Shashi Kiran, QualiIT Briefcase conducted the following Q&A with Quali Chief Marketing Officer Shashi Kiran to get a better understanding about the beneficial uses of cloud sandboxes as the DevOps trend continues to take hold and gain industry momentum. Read More >>>

The Automotive Industry Goes Driving in the Cloud

October 13, 2016 No Comments

Just when you think that you have seen it all, as far as cars and technology are concerned, the automotive industry takes it to another level. While the ability to create cars that have the capacity to fly may be quite a way off, that has not stopped the automobile industry from doing some incredible things with the latest cars off of the assembly line. According to a recent article by CSC, the automotive industry has turned to cloud computing, big data technology and location awareness as a means of integrating the latest in computing technology into the driving experience.

Preparing for the Adoption of Office 365

October 3, 2016 No Comments

As you may know, Microsoft Office 365 is the number one cloud-based solution, due to its appeal on multiple levels to individuals and business users alike. In recent years, Microsoft has invested heavily in cloud computing, with its revenue from Office 365 jumping 54 percent over the last quarter.

How to Best Utilise Analytics in all its Forms

September 27, 2016 No Comments

Analytics is one of the most indispensable tools any website owner can have. It had gotten to the stage where if you don’t use analytics in some form, your site or company (if it’s web dependant) will fail. I’ve collected the things that I feel are the most important aspects to focus on when looking at your analytics.

2016 APM Reference Guide: Application Performance Monitoring

February 11, 2016 No Comments

IT Briefcase Analyst ReportThis product guide allows you to quickly assess — current products in the market, deployment options, basic differences by monitoring features, the stability of suppliers and more. Read More >>>

IT Briefcase Exclusive Interview: Top IoT Trends and Predictions for Organizations in 2016

December 2, 2015 No Comments

with Mike Martin, nfrastructureIn this interview, Mike Martin, CTO, nfrastructure, speaks with IT Briefcase about what he believes will be the top IoT trends and predictions for organizations of all sizes and their IT teams for the coming year. Read More >>>

Unleash the Power of Global Content

November 13, 2015 No Comments

globeYour business depends on pushing accurate and dynamic content to its global audience–at the snap of a finger. In today’s world, it is possible to break through barriers, rapidly enter new markets, and transform your global aspirations. Traditional translation processes are hurting your business. If you’re reading this, you’ve most likely felt the pain of a manual translation process, which can slow and even derail brilliant marketing campaigns, global web content, and in-office productivity and creativity. Chances are you’ve felt that pain within the last week.

Clicking Away Your Right to Privacy

November 4, 2015 No Comments

Before using any standard Internet service provider for e-mail (i.e., Gmail, AOL, Yahoo), you must agree to the site’s terms of use by clicking a seemingly innocuous “I Agree” button. Most users fail to actually read the terms and simply click the button without a second thought. Without knowing it, that simple act may be waiving an important Constitutional right toprivacy.

Top Questions to Ask Before Implementing VoIP

November 4, 2015 No Comments

Thinking about a move away from traditional phone lines to a voice over Internet Protocol (VoIP) solution? You’re not alone: According to Business Wire, the market is on track to reach almost 350 million subscribers by 2020 and generate $136 billion in revenue. However, before ditching your plain old telephone service (POTS) for a VoIP, it’s important to ask a few critical questions.

Happy Halloween: Bad Cyber Security is Scary

October 28, 2015 No Comments

National Cyber Security Awareness Month and Halloween are both in October. Coincidence? Maybe. But, executives do have a lot to fear when it comes to cyber security. While many executives and IT teams are working hard to keep the bad actors out, there are still A LOT of vulnerabilities out there dressed up as the good guys. Today many agencies are being fooled by cyber threats hiding in plain sight – disguised in Secure Sockets Layer (SSL) traffic.

Three reasons why the cloud is safer than traditional data centers

October 27, 2015 No Comments

More than half of U.S. businesses use cloud computing, and that number is expected to keep growing. Companies are shifting from traditional data centers to the cloud for reasons including convenience, speed and efficiency. Traditional data centers are on-site hardware that store data within a company’s local network, whereas the cloud is an off-site storage on the Internet. While the fact that the storage is off-site might sound like it’s not as safe, that isn’t the case. Here are three reasons why the cloud is safer than traditional data centers.

WHEN IT COMES TO PROTECTING DATA – TAKE YOUR HEAD OUT OF THE CLOUDS

October 26, 2015 No Comments

In the last five years, Cloud hosts such as Amazon Web Services, Google, Microsoft, Box and Dropbox have become increasingly popular and cost effective for storing and sharing data. That said, data theft has never been greater with network and cloud security becoming more porous. As the need for information sharing increases, the network domain and cloud-based model become more inadequate.

Wanted: Guardians of the Data

October 23, 2015 No Comments

Today’s IT Needs Heroes to Keep Sensitive Data Safe & Protected. Over 78% of data breaches occur from employee negligence or maliciousness according to a recent study.

Four Ways to Make Your Business More Secure

October 23, 2015 No Comments

When it comes to both online and offline systems, many business owners know that it’s important to think seriously about the security of their company. However, a large number of business owners also often lack the funds or time needed in order to take the necessary steps to ensure that their systems are as secure as possible. The fact is, however, that security can be as costly or as inexpensive as you make it, and there are certainly a number of security related steps that you can implement into the running of your business without having to spend a lot of money. Here we have listed a number of cost-effective ways in which you can improve the security of your business both online and offline.

Online Reputation Management for Healthcare Professionals

October 19, 2015 No Comments

The Internet contains everything today. If you doubt this, just do a simple task, Google yourself and see what the results are. A lot of information about you will pop up some of which you didn’t even know prevailed. As a medical professional, the internet is a potentially good platform that can enable you attract huge client base. Every day, patients resort to using the internet to connect with medical professions and seek medical assistance. A study done in the US reveals that 88% of consumers trust online reviews more than personal recommendations. The research further highlights that 30 percent of the consumers look for doctors online. It is the time a healthcare professional can take to lure in more patients and market services.

EMV Hits The US – Now What?

October 19, 2015 No Comments

Fewer than half of all payment cards and PoS terminals in the US are currently EMV-ready. Moreover, US merchants and card issuers have been slow to migrate to the new technology. In the wake of EMV’s worldwide implementation, a wave of technologies – including near-field communication (NFC), tokenization and cloud-based wallets – is having an accelerating impact on the industry.

Making Mobile Wallets Safer

October 13, 2015 No Comments

Consulting firm Chadwick Martin Bailey found in a recent survey that 15 percent of U.S. consumers have used a mobile wallet in the past six months, up from nine percent in the same period in 2013. The numbers may seem small at first glance, but do the math: that’s a 66 percent increase in usage in just two years. In terms of awareness of mobile wallets, the percentage jump is even higher. Their Mobile Wallet in 2015 and Beyond report found that 18 percent of consumers are “very familiar” with mobile wallets, compared to eight percent in 2013.

Hybrid IT through Cloud Brokerage – Your Path to Better Business Outcomes

October 11, 2015 No Comments

Organizations need to explore another approach that encompasses cloud, but goes beyond it – called Hybrid IT.

Turning Trust Upside Down: How to Reduce Security Risks in a Cloud-based Economy

October 9, 2015 No Comments

by Rob Quiros, SohaAs the move to hybrid cloud infrastructure causes the Internet and corporate network to meld, enterprises need a new approach to ensure all of their applications and network resources remain secure. But that is easier said than done, since traditional network perimeters and VPNs simply don’t work in this new cloud-based environment. Read More >>>

Preparing Your Mobile Marketing Strategy for the Future

October 5, 2015 No Comments

If you’ve been holding off on changing your marketing strategy to cater to mobile device users, the time to act is now. If you’re hoping to stay relevant to target consumers and to keep up with rapidly evolving technology, preparing your mobile marketing strategy for the future is officially mission critical.

Cloud Providers Are Not All The Same

October 1, 2015 No Comments

With the maturing cloud now a de facto technology choice for most businesses, especially start-ups, the choice of which cloud solution providers (CSP) to trust is the next big decision. With so many options to choose from, and so many providers, big and small, vying for your attention, it’s important to understand what critical aspects of a CSP to look for. What makes one cloud company better than the next?

Why Cloud Monitoring Matters in the App Age

October 1, 2015 No Comments

The preponderant quantity of advances in IT and software engineering in the last ten years has been driven by scale. Ephemeral infrastructure and PaaS enable us to scale hardware, CI/CD enable us to scale the rate of production change, and microservices, eventually consistent data stores, and distributed systems engineering enable us to scale the applications themselves. Scale is a strange and unforgiving property. It cannot be fooled, and is never fully satiated. It has a way of unceremoniously obliterating conventional thinking. It demands 350 new servers right now and laughs mockingly at your change management meeting and your tape backups.

Health IT Trends On the Rise in 2015

September 21, 2015 No Comments

Technology is becoming more prominent in just about every industry. It’s starting to evolve the way we interact with the world at large. Certainly the concept of information technology, or IT, has expanded to include many more markets than just those involved with computers. There are IT teams trained to work on medical equipment, manufacturing and construction machinery, retail database and point of sale systems, and so much more. The list could go on for a long while.

How Vulnerable To Hackers Are Mobile-Payment Apps?

September 17, 2015 No Comments

Making a purchase or other payment is not like it used to be. These days, cash and credit cards aren’t the necessities they once were because alternative-payment options are just a tap or two away on a mobile device through apps such as Google Wallet, Apple Pay, Square, Levelup, Kash and PayPal. But just how secure are those mobile-payment apps and who makes sure that the companies behind them are doing all they can to keep your personal data safe?

How Wearable Tech Could Transform Health Care

August 4, 2015 No Comments

Wearable tech like the FitBit, the Apple Watch, heart-rate monitors, and pedometers are currently the domain of the tech-savvy and the fitness-obsessed. But all that could soon change. Physicians say wearable devices have a lot of potential to improve health care for people with chronic physical and mental illness.

EHRs — How Safe Are Your Medical Records?

July 21, 2015 No Comments

It wasn’t so long ago that doctors unanimously relied on paper charts to record and store patient health information. But thanks to provisions in the 2009 economic stimulus program, many doctors and hospitals have received cash incentives in return for switching over to electronic health records (EHRs). For that reason, most doctors and hospitals now store patient health information electronically.

The Digitization of Healthcare

July 7, 2015 No Comments

Technology’s reach has extended across industries and the healthcare space is no exception. Everything from mobile innovations to wearables and advanced technologies are changing the way doctors care for patients and the way patients care for themselves. These innovations are transforming every aspect of health and wellness, from patient intake to record keeping to testing and treatment. It’s undeniable that there have been huge transformations and advancements in healthcare thanks to technology, and that these are being readily embraced by doctors, hospitals, specialists and other providers.

ADVERTISEMENT

AnDevCon


American Customer Festival 2016 New York

ITBriefcase Comparison Report

Cyber Security Exchange