Inside the Briefcase

BYOD Security: 5 Tips for IT Professionals

BYOD Security: 5 Tips for IT Professionals

by Rick DelGado, Independent Author
Personal devices have become a common part of the working environment now. More and more, companies are adopting Bring Your Own Device (BYOD) policies, allowing employees to use their own devices both inside and outside...

How Real-Time Analytics can Boost Employee Performance

How Real-Time Analytics can Boost Employee Performance

by Gil Allouche, Quoble
If your company is struggling with employee performance and output, then big data analytics should be part of your future plans. Not only does big data allow companies to gather, and analyze large amounts...

Briefcase Highlights


The Four Phases of Cloud Optimization

September 12, 2014 No Comments

with Joe Kinsella, CloudHealthSeveral years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to over $350K. Read More >>>

How far is too far when it comes to outsourcing IT?

September 8, 2014 No Comments

with Mike Decker, Annese & Associates, Inc.With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in Telecommunications, I started my career inside a NOC located in the basement of a major bank in Buffalo, NY. Read More >>>

8 Things You Need to Do Before, During, and After Migrating to Office 365

September 4, 2014 No Comments

with Robert Berlin, OneLoginWith Windows Server 2003 hitting its end of life next year, the push is on for even faster migration. But the path is a complex one, and careful planning will be your best friend. Having spent a number of years helping customers along this road, here are my top tips for a safe journey. Read More >>>

You Can’t Win the Data Loss Blame Game – So End It

September 3, 2014 No Comments

By Omer Eiferman, CellroxIn a world of desktops, tracking data leaks was much easier. If an employee digitally leaked corporate data or insider information, IT could usually pin down when and where it happened. However, with personal smartphones now being used for business, the blame game is not so simple. Read More >>>

Raising the game – The IBM Business Tech Trends Study

August 26, 2014 No Comments

IBM has evaluated the current adoption landscape of 4 key technologies in the enterprise: Big Data & Analytics, Cloud, Mobile and Social

IT Briefcase Interview: Mobile Website and Custom APIs Monitoring

August 11, 2014 No Comments

In this interview, Zaheeruddin Ahmed B, marketing analyst at Site24x7, a ManageEngine cloud service, discusses the need for a way to monitor mobile apps and mobile-optimized websites — from the perspective of the mobile user — and his company’s efforts to do just that with its industry-first mobile monitoring solution.

Context-Aware Security: A Key to Successful BYOD

August 4, 2014 No Comments

by Neal Foster, DELL SoftwareHow can IT give users what they want and protect data assets at the same time? By implementing context-aware security. Context awareness is something most of us practice every day. Read More >>>

Got WiFi? Free App Helps You Meet Basic User Needs

July 28, 2014 No Comments

Did you hear the one about the teacher who asks a group of students to name something they need but can’t see or feel? The hip-hop loving, smart-gadgets sporting, what’s-apping generation answer in unison, “WiFi.” Increasingly, WiFi is becoming indispensable and, apparently, a candidate for inclusion in Maslow’s hierarchy of basic human needs.

Assessing the Cloud to Find its Silver Lining

July 24, 2014 No Comments

by Russ Loignon, TangoeBusiness moves at the speed of light, and the ability to stay competitive in today’s global workplace dictates that enterprises rely on the technology available today, yet be prepared to adapt quickly for future technologies. Read More >>>

Globalizing the Continuous Delivery Pipeline

July 23, 2014 No Comments

by Rob Vandenberg, LingotekThanks to trends like BYOD and cloud computing, devops now works together as a unified organization, rather than throwing code over an invisible wall. It’s a necessary and timely evolution—especially for today’s sophisticated global IT environments. Read More >>>

Mobility Today and Tomorrow: It’s Time to Dial In

July 10, 2014 No Comments

Mobile today is changing how people interact as well as how work gets done. The questions that remain are, what will drive the factors that fuel mobile’s next evolution and for those who still haven’t taken the leap, what should they consider as they decide to go mobile?

BYOD Security Risks: Companies May Be Playing with Fire

June 26, 2014 No Comments

The BOYD policy has already become a substantial factor in the corporate world, with there being enough documented evidence to establish the fact that it gives a significant boost to employee’s productivity. As more and more companies are warming up to the idea of allowing personal mobile devices in the workplace, the security implications of adopting such a policy are becoming increasingly hard to ignore. Indeed, companies are putting a lot at risk for getting a bit more out of their employees.

Simplifying the Development and Publishing of Apps for Businesses Today

June 24, 2014 No Comments

As digitization and mobility in companies become all pervasive, and IT departments continue to strive to do more with less, the shortage of IT skills to support Mobile Apps development and publishing is an increasingly acute issue.

Mobile Content, Collaboration & IDC’s 3rd IT Platform: The Next Frontier for the Mobile Enterprise

June 9, 2014 No Comments

This IDC White Paper outlines the next frontier for the mobile enterprise: mobile content and collaboration in the context of IDC’s 3rd IT Platform.

Empowering Your Mobile Workers – A Modern Mobile IT Strategy

June 9, 2014 No Comments

Here’s how some of the nation’s most progressive corporations are meeting the many needs of their mobile workers – without overwhelming their IT departments.

Driving Enterprise Transformation with Box and Office 365

June 9, 2014 No Comments

Download this white paper and read how IT needs a transformation to a more user-centric, mobile-aware and agile model, and the best-of-breed architecture the cloud affords is key to unlocking this next evolution of enterprise technology.

With BYOD, You Don’t Have to Choose Between Productivity and Security

June 6, 2014 No Comments

Mobile devices could become an immense source of productivity, but employers are still reluctant to let employees use apps of their choice on personal devices that access corporate data. With work hours and locations ever more flexible, employees want to access corporate data on-the-go, at home and long after “EOD.” BYOD is allowing people to get more done with more freedom, but we now have a gap between employee and employer expectations.

THE INTRANET OF EVERYWHERE: Deploying a search-driven architecture to address intranet challenges

June 4, 2014 No Comments

The purpose of this document is not to compare or evaluate the many intranet solutions on the market today. Instead, we want to shine a light on a challenge organizations face regardless of the intranet solution they ultimately choose.

Innovative Trends Make Mobile App Development More Responsive

May 19, 2014 No Comments

As the array of mobile devices flourish in the market and as mobile applications coded in HTML5 start appearing in abundance, it becomes more essential for mobile app developers to concentrate progressively on the aspect of responsive app schemes. Why? Because amidst an overwhelming number of mobile options/solutions existing in the current hour, the singular code of a responsive design looks like the most tempting universal answer for mobile optimization.

BlackBerry Opens BlackBerry 10 Operating System to Multiple MDM Platforms

May 13, 2014 No Comments

BlackBerry Limited, a world leader in mobile communications, today announced that it will enable mobile device management (MDM) companies to directly manage devices with the BlackBerry 10 operating system.

IT Briefcase Exclusive Interview with Ed Brill, Director, Mobile Enterprise Marketing, IBM

May 9, 2014 No Comments

with Ed Brill, IBM Social BusinessIn this interview, Ed Brill from IBM Social Business discusses mobile as a business transformation tool and considerations for the ‘upwardly mobile’ enterprise. Read More >>>

BYOD Security: 5 Tips for IT Professionals

May 5, 2014 No Comments

by Rick DelGado, Independent AuthorPersonal devices have become a common part of the working environment now. More and more, companies are adopting Bring Your Own Device (BYOD) policies, allowing employees to use their own devices both inside and outside the office.Read More >>>

How Real-Time Analytics can Boost Employee Performance

May 5, 2014 No Comments

by Gil Allouche, QuobleIf your company is struggling with employee performance and output, then big data analytics should be part of your future plans. Not only does big data allow companies to gather, and analyze large amounts of data, but with data analytics tools, companies of any size can now analyze data in real-time. Read More >>>

ITBriefcase Exclusive Interview with R. Paul Singh, Espresso Logic

April 29, 2014 No Comments

with R. Paul Singh, Espresso Logic, Inc.In the following interview, R. Paul Singh, CEO of Espresso Logic, discusses the challenges IT teams face today in producing the increasingly high volume of internal and external applications for their companies – and highlights how its newly released Live Browser product can help. Read More >>>

How to Generate Revenues for Businesses Using Mobile Apps?

April 24, 2014 No Comments

The world is connected to the internet at all times! If you see, people are dependent on the way smart phones work, and are mostly addicted to using smart phones. Some of the main reasons for using smart phones apart from communication are knowledge. People seek knowledge on roads, on good restaurants, on top news trending for the hour and other such things.

MobileFirst Mondays: Discover “What” To Do with Mobile and “How” To Do It!

April 8, 2014 No Comments

Attend this 15 minute webcast and discover how innovative financial institutions are changing the way they interact with their banking customers to both create customer “stickiness” and enhance the banking experience.

VPN on Android Phones

April 7, 2014 No Comments

Despite their many advantages, Android phones might carry security risks when they go online, threatening your privacy and predisposing you to data fraud. Virtual Private Networks, or VPNs, can be extremely helpful at providing enhanced security and preventing your Android device from having restricted access to certain geographical regions. There are several benefits of using VPN on Android devices, particularly if you access the Internet on a daily basis from public WiFi networks.

5 Best Practices for Mobile Business Intelligence

March 26, 2014 No Comments

Download this white paper and learn the five best practices for distributing information with a mobile audience in mind.

IT Briefcase March Newsletter: Mobile Technology

March 26, 2014 No Comments

Check out our most recent e-Newsletter for the most up-to-date info on Mobile Technology and our feature Webcast this month – 8 Great Mysteries of Cloud Computing. View Newsletter

Have a cool idea that could change the world? You can build an app for that – Ask Watson

March 25, 2014 No Comments

with Jerry Cuomo, IBM WebsphereIncredible things are happening with mobile computing today. What used to be considered a futuristic scene from a movie is now a reality, and what’s more: you don’t have to be an action hero to spark amazing feats with the push of a button. Read More >>>


Gartner Identity & Access

TDWI World Conf San Diego

Red Hat JBoss Busines Automate

ACI Customer Experience Management Summit


ITBriefcase Comparison Report

IBM Data