Inside the Briefcase

Briefcase Highlights


Scale-Out NAS: Best Practices to Implement Tomorrow’s Storage Today

April 29, 2016 No Comments

by Stefan Bernbo, CompuverdeAs the data deluge continues on unabated, vertically scaling legacy approaches to storage are falling short. Organizations need to find a way to store high volumes of data without busting the budget, all while maintaining high levels of performance… Read More >>>

Gartner MQ on Disaster Recovery as a Service

April 29, 2016 No Comments

Among providers of disaster recovery as a service there is wide variance in experience and service quality, together with other key differentiating factors. Data center managers should use this Magic Quadrant to help them evaluate providers of DRaaS services.

6 barriers blocking your success

April 28, 2016 No Comments

This guide will show you how you can positively in uence innovation in your team, department or organization through something you do everyday: learning.

IT Briefcase Exclusive Interview: The rise of cloud application control technology

April 26, 2016 No Comments

with Ed Macnair, CEO, CensorNetIn this interview, Ed Macnair, CEO of CensorNet, speaks with IT Briefcase on how security technologies needs to evolve to meet the challenge and opportunities of cloud computing.Read More >>>

Top Apps for Entrepreneurs & Small Businesses

April 11, 2016 No Comments

Advances in technology have made it easier than ever to manage both your personal and professional life. Having a smartphone on hand at all times is no longer a novelty—almost two-thirds of the population own one, according to a 2015 Pew Research Study. And smartphone owners are using them for more than just making phone calls and sending texts. Smartphones are used heavily to get online, or download applications specifically created to manage every facet of life.

IT Service Providers: Practice What You Preach

April 4, 2016 No Comments

Enterprise technology continues to advance at a rapid pace, and clients demand that their IT service provider evaluate all options to ensure the most effective solutions are in place to run infrastructure operations efficiently. That outside expertise is what clients (current and prospective) require from IT service partners – employing agile practices for speed-to-market, utilizing the most current tools, and knowing how to leverage them to meet their evolving needs. To do this, it is critical for service providers to take a good look at their own infrastructure and processes, and practice what they preach.

Hayat Communications Goes Mobile: Company Saves Time, Money, and Relationships with RMAD Platform

March 31, 2016 No Comments

At Hayat Communications, we design, supply, build and manage diverse spectrum services in fixed line and wireless networks, with offices and major activities in Kuwait, UAE, KSA, Qatar, Bahrain, Oman, India and Iraq. Supporting our field workers across such a large geographic area can be difficult. For years, we had been doing it with an ad-hoc set of tools, and didn’t have an easy way to coordinate the work of our people in the field – or tie them back to centralized databases. We needed to improve our efficiency and field productivity.

Payment Security Best Practices

March 31, 2016 No Comments

Accepting a variety of payment forms — including credit and debit cards, and mobile and Web-based payments — is beneficial to all business owners. Not only does payment flexibility give customers the right to choose how to pay, based on the size and nature of their purchase, it can level the playing field between small business owners and well-established competitors.

6 Phone Apps That Will Make you a Better Driver

March 30, 2016 No Comments

Technology is improving each day. One of the technologies that have had a significant impact on people’s lives is the mobile phone technology. Using a mobile app while driving is forbidden by the law. However, some apps have been developed that can be used to make one a better driver. Below is a list of some of these apps.

Factors to Consider When You Are Developing a Mobile Business Strategy

March 29, 2016 No Comments

Mobile communication is playing a bigger role in modern businesses. However, many business owners are still coming to terms with this relatively new technology. Before you rush in and implement a new mobile business strategy, there are important factors you should consider first.

5 Vital Considerations You Need to Make Before Choosing a WordPress Directory Theme

March 29, 2016 No Comments

Craigslist is probably one of the most widely used listing websites today. It is available to user all over the world. As a result of its success, business directory listing websites have become almost an integral part of everyday life. Creating a directory website has become a popular trend today and you can also do this thanks to the many directory themes you can use on WordPress.

B2B Integration: Survival of the Fittest

March 23, 2016 No Comments

In 2016, what really separates B2B integration from legacy internal integration architectures such as enterprise service bus (ESB) or extract, transform, load (ETL)? Have the natural forces of technology and the resulting evolution of business applications simply rendered the distinctions meaningless? If so, which architecture has adapted to become the winner? Which is on the endangered species list? And have any evolved into the ungainly evolutionary equivalent of the giant three-horned chameleon?

5 Startling IT Stats for Small Businesses

March 22, 2016 No Comments

In an ever changing economy, businesses need to keep up with the evolution of technology. Luckily, solutions have emerged that allow business owners to outsource their IT efforts. Activities such as IT security, Hosting, IT Support and Data centre infrastructure maintenance can be handed over to an external company who are proficient at what they do. Below is an infographic constructed by Couno that details what small business are missing in this day and age of IT.

10 Things That Make a Good Web Host

March 22, 2016 No Comments

Whether you wish your website to act as an information-oriented platform, or carry out those sensitive business transactions, a superior hosting service is always vital. Not because you have paid for the services, an up-time of 100% is your prerogative, especially with a stiff competition in the space and all of them echoing that ‘no outage – up always’ slogan.

What Does a 5G World Mean for the IoT Industry?

March 18, 2016 No Comments

It seems like it wasn’t that long ago when people and businesses alike were excitedly talking about the possibilities and potential that accompanied the introduction of 4G networks. There’s little doubt that 4G has transformed how people use mobile devices and take advantage of internet connections, but already many experts are dreaming of what lies ahead with the fifth generation of mobile networks: 5G. Verizon may introduce the first 5G network as early as next year, while Samsung may show off its own 5G capabilities at the 2018 Winter Olympic Games.

IT Briefcase Exclusive Interview: Top Skills Needed to Manage Hybrid IT Environments

March 14, 2016 No Comments

with Kong Yang, SolarWindsIn this interview, Kong Yang, Head Geek and technical product manager at SolarWinds, speaks with IT Briefcase on how hybrid environments are changing the role of the IT professional. Read More >>>

Home Security and the Internet of Things

March 10, 2016 No Comments

The future, it seems, is one of connectivity — not only between people from across the globe thanks to things like social media and wireless technology, but between devices too. It’s no longer just our phones or computers that access the internet, but our light bulbs, coffee-machines, refrigerators, and microwaves. As a community, we’re welcoming the “Internet of Things” into our lives — encouraging a world of constant connection to each other, and the internet. As a result, estimates suggest that by 2020, the sum of IoT (Internet of Things) devices will reach 25 to 30 billion.

The Tech Effect: Is it Your Job? Or How You’re Doing It?

March 9, 2016 No Comments

As the founder of a B2B tech startup, I wanted my company to operate with a stronger understanding of the effect technology has on how professionals feel about their jobs. To this end, we commissioned YouGov PLC to conduct a study, the 2016 Industry and Productivity Report, to surface the most up-to-date data. The study confirmed sentiments that we’re hearing from business people all over the country: Many workers are unsatisfied with their current employment, and it is largely everyday challenges that are dragging them down.

Overcoming the IoT’s Security Challenges

March 9, 2016 No Comments

Governments, utilities and businesses from every sector are embracing the possibilities of the Internet of Things (IoT). This interconnected environment promises safer public parks, more efficient factories, better healthcare – imagination seems to be the only limit when it comes to applying the IoT to today’s needs. However, for the positive action of all these improvements to work and life, there is at least an equal negative reaction. Gartner analysts recently revealed that by 2020, firms will have increased annual security budgets by 20 percent (up from less than one percent in 2015) in order to address security compromises in the IoT.

IT Briefcase Featured Interview: How To Be A Digital Master in 2016

March 4, 2016 No Comments

What sets digital masters apart, and how can you cultivate these capabilities within your own organization? In this Q&A, Derek Roos, CEO at Mendix, prompts George Westerman, Principal Research Scientist with MIT Sloan’s Initiative on the Digital Economy, to discuss the secrets of digital mastery. Find out how George responded to Derek’s questions. And learn what it means to be digital and the importance of collaboration between business and IT.

Key Technical Support Considerations for Smart IT Infrastructures

March 2, 2016 No Comments

We are entering a new era of computing. Following the programmable and tabulating systems eras, cognitive computing represents a huge leap forward. This new era brings with it fundamental differences in how systems are built and interact with humans.

Redefining Networks for Cloud, Analytics, Mobile and Social

March 2, 2016 No Comments

This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks.

Midsized Organizations Are Particularly in Need of Better IT Resiliency

February 29, 2016 No Comments

Everyone depends on data access. Midsized organizations are just as dependent as big companies are because so many knowledge workers these days need access to digital information to do their jobs. So, it’s not surprising to see most IT teams at midmarket organizations (100 to 999 employees) now reporting that they operate under standard SLA fulfilment ranges of less than two hours—for high-priority and normal workloads alike.

Understanding Cloud Desktop and its Many Benefits

February 29, 2016 No Comments

A majority of businesses are moving critical applications from physical personal computers to the virtual environment. A 2015 IT priorities survey confirms this where 76% of the IT decision makers surveyed indicated their preference for cloud bases productivity applications. About 57% stated they would roll out enterprise file sharing and synching services on the cloud.

Is IT Prepared for the Changes in Enterprise Mobility?

February 29, 2016 No Comments

Mobile devices are quickly becoming the primary devices among enterprises. Their great user experience, increased computing capabilities, explosion of apps, and always-on connectivity combined with agility, make them ideal replacements for PCs. Mobility these days, is not just a tool enabling employees access to email and a handful of corporate applications, but rather a tool to improve employee productivity and ease of working by enabling them with real-time connectivity to customers, partners, suppliers and workers.

Are You Prepared for the Top Three Compliance Issues?

February 26, 2016 No Comments

by Fouad Khalil, SSH Communications SecurityNo matter what an enterprise’s major market is, it is probably subject to regulatory compliance requirements, such as PCI, SOX, FISMA and HIPAA. PCI requirements in particular demand a high level of auditability and controls. Read More >>>

Beyond SD-WAN: Network-Aware Orchestration

February 26, 2016 No Comments

It is becoming increasingly harder to maintain network reliability and consistent service levels across the organization. The adoption of cloud services, business application-focused requirements and evolving security policies require IT organizations to continuously deploy configuration changes.

How to use Data to Improve Employee Satisfaction

February 25, 2016 No Comments

As a business owner, you know how important it is to collect and use data to drive your company forward. But did you know that you can also utilize data to increase the level of satisfaction that your employees feel with their jobs? Keeping your employees happy means they’ll be willing to go the extra mile to help you and your company succeed, and it also means that they’ll be willing to stay with you for the long haul. Check out the tips below for using data to improve employee satisfaction.

How to Increase IT Self-Service Adoption

February 24, 2016 No Comments

Self-service is everywhere. More and more consumers are using do-it-yourself stations to book movie or flight tickets, withdraw cash from ATMs or simply make other banking transactions. Embracing this trend, many IT organizations have a self-service portal to the help desk to catch up with the increasing ticket volumes, to reduce efforts and costs, and most importantly, to automate routine incidents that don’t require a technician’s assistance. This is so organizations can handle more business-critical responsibilities.

The Network: Still the Foundation of IT

February 24, 2016 No Comments

Managing a modern enterprise network is not for the faint of heart: with more devices on the network; the always-present threat of data breach; and the challenges brought about by trends such as software-defined networking (SDN), the Internet of Things (IoT), and the cloud (including hybrid IT), there’s more pressure than ever on today’s network administrators. Yet, even under these high-stakes circumstances (and, in some cases, because of them), network performance must still be maintained to the highest standards.


Women in Technology Summit San Jose

TDWI Orlando 2015

Gartner Identity & Access Management Summit

Gartner Data Center Las Vegas

ITBriefcase Comparison Report

Cyber Security Exchange