Inside the Briefcase

IT Briefcase Interview: Why Increasing Demand for Always-on Connectivity is Driving Advances in Network Resiliency

IT Briefcase Interview: Why Increasing Demand for Always-on Connectivity is Driving Advances in Network Resiliency

with Gary Marks, Opengear
In this interview, Opengear CEO Gary Marks offers analysis into why network resilience has become such a challenge for today’s enterprises, as well as how businesses are improving the management of their remotely-located network sites....

2016 APM Reference Guide: Application Performance Monitoring

2016 APM Reference Guide: Application Performance Monitoring

IT Briefcase Analyst Report
This product guide allows you to quickly assess -- current products in the market, deployment options, basic differences by monitoring features, the stability of suppliers and more.
Read More >>>

Briefcase Highlights


The Future of IT Troubleshooting

March 21, 2017 No Comments

A common approach to addressing any number of performance issues in IT environments is to throw a bunch of potential solutions at the wall and see what sticks. However, IT environments are becoming increasingly complex and varied, making the dart-on-the-wall strategy even less effective than it already was. As such, here I will cover what IT troubleshooting should look like in the hybrid IT world we now find ourselves in, and will continue to be encompassed by into the future.

IT Briefcase Interview: Why Increasing Demand for Always-on Connectivity is Driving Advances in Network Resiliency

March 9, 2017 No Comments

with Gary Marks, OpengearIn this interview, Opengear CEO Gary Marks offers analysis into why network resilience has become such a challenge for today’s enterprises, as well as how businesses are improving the management of their remotely-located network sites. Read More >>>

How Open Source AI Effects the World Around Us

March 8, 2017 No Comments

The marriage of artificial intelligence and the open-source concept is still very new, and we’re beginning to see its production come to fruition. After a few years, outsiders have been able to help play with other’s open-sourced AI technology and in turn, send these improvements back to the original creators.

Top Five Ways Marketing Teams Benefit from Box

February 21, 2017 No Comments

To create a success, marketing teams have to move fast! Moving the business forward means completing the next project, campaign or launch flawlessly. But keeping every stakeholder aligned and informed has never been easy. Read this article to discover top five ways marketing teams benefit from using Box.

Featured Tech Article: Preemptive Transformation at Western Union

February 16, 2017 No Comments

Western Union has always been on the forefront of technological innovation. The company launched in 1851 with the invention of the telegraph. Now, 165 years later, we are digitally transforming ourselves and devising new and easier ways for our customers to move money around the world.

The Necessity Of Security Audits For Open Source Projects

January 5, 2017 No Comments

Curl, an open source application installed on hundreds of thousands of servers, was found to have several serious security vulnerabilities in a voluntary audit. The vulnerabilities were quickly fixed, but the incident exemplifies the importance of external auditing of the open source projects on which we all depend.

IT Briefcase Exclusive Interview: Evolving the Enterprise with the Service Desk and Improved Workflows through IT Service Management

December 26, 2016 No Comments

with Nancy Van Elsacker, Top DeskIn this Interview, Nancy Van Elsacker Louisnord, president of TOPdesk US, discusses the value of IT Service Management within the ever evolving IT Enterprise. Read More >>>

Are You Ready to Join the Ranks of Open Source Rookies?

December 16, 2016 No Comments

A lot of great software is being built using open source, and each year Black Duck reviews open source projects started during the past 12 months to recognize those whose mission, community growth, and market impact make them particularly notable. We call our selections the “Open Source Rookies,” and the process begins with an average 100-200 projects that meet those requirements of intriguing vision, ability to build a community, and value to the marketplace.

10 Tips for Taming IT Tickets

December 8, 2016 No Comments

In many organizations, IT support seems to follow a corollary of Moore’s Law in which the number of support tickets — rather than the number of transistors — doubles every two years. Even companies that experience slower growth find that tickets ultimately proliferate and threaten to overwhelm their IT support teams if they haven’t kept their ticket management systems and processes up to date. You can avoid that fate by following the 10 steps below to keep tickets manageable, resolve them quickly and provide an amazing help desk and ticket management experience.

Edison Group: IBM FlashSystem:
Powering the Future of IT

November 28, 2016 No Comments

The direction of technology both follows and influences the direction of business. The tools enterprises need to compete, improve, adapt, solve problems, and succeed are supplied by technology. Sometimes, technology even supplies new opportunities, such as when a technological advance leads to the creation of a new marketplace. The Internet is by far the most powerful example of this in the past 50 years.

3 Common Myths About Open Source Software

November 16, 2016 No Comments

One of the buzzwords that has been floating around tech circles for the past several years is “open source.” Open source software has been around for quite a while, now, but there are still several misconceptions about it. Many people aren’t even quite sure what it means. Is it just freeware? Is it copyrighted material? How secure is it? Is it just cheap, low-quality junk that you use because you don’t want to shell out the money for a real program?

Exploring New Niches: How to Overcome the Challenges

November 14, 2016 No Comments

There are more online stores than ever as we get nearer to 2017; far more than when we experienced a dot-com boom back in 2000. People are appreciating the advantages offered by maintaining online businesses, which is why the market is saturated and very competitive.

Business Continuity: Top Tips For Dodging Disruptions

October 26, 2016 No Comments

Are you prepared for a network outage? Many companies have invested heavily in disaster-recovery solutions designed to mitigate the effects of catastrophic storms, earthquakes or power outages. However, Information Age notes that the cause of disruptions isn’t always so obvious — software updates gone awry or day-to-day human errors can also precipitate continuity problems. Here are five tips to help your company dodge network disruptions.

Most Useful Mobile Technology in Today’s Market

October 11, 2016 No Comments

It seems as though the world has gone mobile. Everywhere you look someone has their smartphone out doing everything from playing Pokémon Go to shopping on the QVC online store. From texting to checking Facebook to keeping abreast of the news and weather forecasts, there is always something to do and see on that handy little gadget we wouldn’t leave home without. Not only are our cell phones a source of entertainment, but also a source of information and even function.

Zero Maintenance IT: Achieving Operational Efficiency while Powering Business Agility

October 5, 2016 No Comments

IT executives today expect they will need to provide more rigorous cost and ROI calculations to justify spending on services. At the same time, digital technology is increasingly the means for delivering profit-generating business services, so keeping technology in optimal working order is critical. This paradoxical imperative with the dual mandate of reducing cost and increasing value needs an effective strategy to drive toward “zero maintenance IT.”

Your First Custom App: Getting Started

September 27, 2016 No Comments

Every day, organizations and individuals are experiencing the power of custom apps to improve productivity, increase efficiency and achieve desired outcomes. For those uninitiated, getting your first custom app off the ground can be intimidating. However, there are a few concrete steps that you can take to move your idea from imagination to implementation. These steps and core concepts have been distilled from the best practices of many people – and teams – who have planned their own custom apps and are using them to their advantage. By following these steps, you’ll be harnessing the power of custom apps in no time.

On Storage: A Conversation with IBM Experts

August 30, 2016 No Comments

Big data, analytics, and especially mobile are disrupting the marketplace, and your customers need to understand the implications and opportunities inherent in the new marketplace. This webcast outlines ways to become a trusted source of knowledge and information on storage options for your customers.

IDC Report: Achieving Flash Storage Nirvana

August 10, 2016 No Comments

This IDC Flash discusses Nimble Storage’s introduction of an all-flash array (AFA), the AF-Series, as an addition to the company’s already very successful CS-Series line of hybrid-flash arrays (HFAs), on February 23, 2016. This Flash discusses Nimble’s entry into the AFA space and updates IDC’s view of the company’s competitive position in the overall enterprise storage market, based on this announcement.

Whitepaper: Can Machine Learning Prevent Application Downtime?

August 10, 2016 No Comments

Business users expect immediate access to data, all the time and without interruption. But reality does not always meet expectations. IT leaders must constantly perform intricate forensic work to unravel the maze of issues that impact data delivery to applications. This performance gap between the data and the application creates a bottleneck that impacts productivity and ultimately damages a business’ ability to operate effectively. We term this the “app-data gap.”

OWASP Top 10 & Open Source Code: Why Watching Your Back Means Watching Everyone Else’s

June 6, 2016 No Comments

At times, being a developer can feel a little bit like being back in school and getting partnered up on projects. You would work your butt off, fastidiously checking and rechecking your part of the assignment until you’re sure it’s perfect only to show up at school on Monday and find that your partner hasn’t fulfilled his end of the deal. And there goes the project.

IT Briefcase Exclusive Interview: Steps for Successful VDI Implementation

May 6, 2016 No Comments

with Jeremy Moskowitz, Founder and CEO, PolicyPak SoftwareIn this interview, Jeremy Moskowitz, founder and CEO of PolicyPak, speaks with IT Briefcase on the challenges and opportunities of using a virtual desktop infrastructure (VDI.)Read More >>>

Scale-Out NAS: Best Practices to Implement Tomorrow’s Storage Today

April 29, 2016 No Comments

by Stefan Bernbo, CompuverdeAs the data deluge continues on unabated, vertically scaling legacy approaches to storage are falling short. Organizations need to find a way to store high volumes of data without busting the budget, all while maintaining high levels of performance… Read More >>>

The Total Economic Impact of Migrating from Open Source Application Servers to IBM WAS Liberty

April 6, 2016 No Comments

IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by migrating from open source Java EE application servers to WebSphere Application Server (WAS) Liberty.

IT Briefcase Exclusive Interview: Top Skills Needed to Manage Hybrid IT Environments

March 14, 2016 No Comments

with Kong Yang, SolarWindsIn this interview, Kong Yang, Head Geek and technical product manager at SolarWinds, speaks with IT Briefcase on how hybrid environments are changing the role of the IT professional. Read More >>>

The IoT Is Reinventing Manufacturing

February 18, 2016 No Comments

No longer a catchphrase or a vague notion, the Internet of Things is in full swing. McKinsey & Company estimates that the IoT has a total potential economic impact of $3.9 trillion to $11.1 trillion a year by 2025. Manufacturers are already spending considerable amounts of money on mobilizing the enterprise, including connecting employees, products, services and machines/vehicles. Digging deeper, we can see what functions in the business they’ve tackled first.

2016 APM Reference Guide: Application Performance Monitoring

February 11, 2016 No Comments

IT Briefcase Analyst ReportThis product guide allows you to quickly assess — current products in the market, deployment options, basic differences by monitoring features, the stability of suppliers and more. Read More >>>

Rugged DevOps: Solving Big Problems

February 4, 2016 No Comments

In part one of this series, “Rugged DevOps: Survival is Not Mandatory”, I shared news that 1 in 16 open source and third-party components downloaded last year included a known vulnerability. That may not seem like too many until you realize the average company downloads well over 200,000 components annually. These components are electively downloaded by development teams, often unaware of the vulnerabilities that come with them.

Rugged DevOps: Survival is Not Mandatory

February 3, 2016 No Comments

Deming, the patron saint of DevOps once advised, “It is not necessary to change. Survival is not mandatory.” To survive, application development teams are constantly pressured to deliver software even faster. But fast is not enough. The best organizations realize that security, quality and integrity at velocity are mandatory for survival. Hence, DevOpsSec.

Tech Training: Tips For Successful Software Implementation

January 14, 2016 No Comments

“Software is eating the world.” The now-classic quote from Marc Andreessen needs some updating, since it’s now more accurate to say software as a service (SaaS) is consuming the world, but the core statement is spot on: Companies can’t survive (and thrive) without the regular influx of new software. The problem? Many employees struggle to keep pace with changing environments and workflows — here are four tips for executives looking to streamline the software training process.

Identity and Access Management for Hadoop: The Cornerstone for Big Data Security

January 6, 2016 No Comments

Learn how an integrated security strategy can secure and simplify access to Hadoop environments, while leveraging your existing identity management infrastructure.


UC Expo



ITBriefcase Comparison Report