Inside the Briefcase

BYOD Security: 5 Tips for IT Professionals

BYOD Security: 5 Tips for IT Professionals

by Rick DelGado, Independent Author
Personal devices have become a common part of the working environment now. More and more, companies are adopting Bring Your Own Device (BYOD) policies, allowing employees to use their own devices both inside and outside...

Workflows, People and Processes

Workflows, People and Processes

By Trev Harmon, Adaptive Computing
In the world of business there seems to constantly be a battle for supremacy between People and Process. Both ideological camps put forth their ideas and justifications, much of which is based on...

Briefcase Highlights


Protecting Your Data at Each Step of the Networking Path

September 18, 2014 No Comments

by Bill Manning, APC by Schneider ElectricAs the amount of business critical data grows, the importance of data availability surges – businesses simply cannot afford to lose precious data due to instances of downtime. Read More >>>

Panaya Enables Greater Agility in ERP Changes with Big Data Analytics

September 18, 2014 No Comments

Panaya is proud to announce the launch of Panaya CloudQuality™ Suite, a cloud-based SaaS that provides a suite of services needed to deploy changes in ERP systems. From day-to-day changes to the most complicated upgrades, Panaya CloudQuality™ suite applies big data analytics to predict what will break, how to fix it and what to test for every change made.

The Four Phases of Cloud Optimization

September 12, 2014 No Comments

with Joe Kinsella, CloudHealthSeveral years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to over $350K. Read More >>>

How far is too far when it comes to outsourcing IT?

September 8, 2014 No Comments

with Mike Decker, Annese & Associates, Inc.With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in Telecommunications, I started my career inside a NOC located in the basement of a major bank in Buffalo, NY. Read More >>>

8 Things You Need to Do Before, During, and After Migrating to Office 365

September 4, 2014 No Comments

with Robert Berlin, OneLoginWith Windows Server 2003 hitting its end of life next year, the push is on for even faster migration. But the path is a complex one, and careful planning will be your best friend. Having spent a number of years helping customers along this road, here are my top tips for a safe journey. Read More >>>

Does your Company Really Need BPM?

September 3, 2014 No Comments

with Mac McConnell, BonitaSoftDoes everybody need BPM? Are there companies out there that would have no use for the kinds of solutions we provide? Hate to say it, but there might be a few. In the spirit of a Letterman “Late Show Top 10” list, here are 8 types of companies that simply don’t need BPM.Read More >>>

You Can’t Win the Data Loss Blame Game – So End It

September 3, 2014 No Comments

By Omer Eiferman, CellroxIn a world of desktops, tracking data leaks was much easier. If an employee digitally leaked corporate data or insider information, IT could usually pin down when and where it happened. However, with personal smartphones now being used for business, the blame game is not so simple. Read More >>>

Raising the game – The IBM Business Tech Trends Study

August 26, 2014 No Comments

IBM has evaluated the current adoption landscape of 4 key technologies in the enterprise: Big Data & Analytics, Cloud, Mobile and Social

Efficient Data Automation for Financial Firms

August 26, 2014 No Comments

By Jim Manias, Advanced Systems Concepts For modern companies, apps and systems (not pigeons) are carrying the data, and it falls on IT to be sure this movement happens quickly and accurately.Timeliness and efficiency in the delivery of relevant data translates into increased revenues and reduced risks for all financial firms. Read More >>>

Beyond ad clicks: using ‘Big Data’ for social good

August 25, 2014 No Comments

There is a growing interest in “big data,” the science of collecting large amounts of information and making sense of it. In 2008 and 2012, data science became a major part of political campaigns. Now, governments and nonprofits are beginning to see it as a way to tackle social problems.

To Cloud or Not to Cloud, That is the Question

August 11, 2014 No Comments

By Joe Caserta, Caserta ConceptsOne of the biggest decisions any business will need to make this year is where to store the company’s data. Is renting space in the Cloud the answer, or is it best to keep data in-house by investing in the appropriate infrastructure? Read More >>>

Context-Aware Security: A Key to Successful BYOD

August 4, 2014 No Comments

by Neal Foster, DELL SoftwareHow can IT give users what they want and protect data assets at the same time? By implementing context-aware security. Context awareness is something most of us practice every day. Read More >>>

Effectively Leveraging Social Media to Improve Your Business

July 31, 2014 No Comments

In the midst of all the social media insights and capabilities now available, listening to Social Media is becoming a forgotten skill set. In the early stages of social media marketing, listening was at the very top of the list in a social media strategy. Companies placed emphasis on listening to social media conversations to see who was talking about them and hear what they had to say.

Simplifying the Development and Publishing of Apps for Businesses Today

June 24, 2014 No Comments

As digitization and mobility in companies become all pervasive, and IT departments continue to strive to do more with less, the shortage of IT skills to support Mobile Apps development and publishing is an increasingly acute issue.

Business Continuity Meets the Cloud: Protecting Your Reputation in the Always-on World

June 11, 2014 No Comments

By Laurence Guihard-Joly, IBMNot so long ago, a system outage equaled a forced recess for employees while a member of the IT team rebooted a server. There were consequences of course including the loss of data, inconvenienced customers, angry managers and more. Read More >>>

How Greed, Generosity and the Defense of Civil Liberties Can Put Your Data at Risk

June 10, 2014 No Comments

By Cam Roberson, Beachhead SolutionsSome human traits are security hazards – but not always because they are faults. As a matter of fact, some traits directly and deliberately engineer situations in which data leaks are more likely. Read More >>>

Five Ways Box Makes SharePoint Better

June 8, 2014 No Comments

Businesses around the world have made significant investments in Microsoft SharePoint for content management. However, these same companies are struggling with making the transition to a more mobile, more collaborative workplace. Download this white paper to learn five ways Box can make SharePoint better.

3 Tips for Deploying “Systems of Engagement” Practices for the Benefit of your Customers

June 6, 2014 No Comments

by Mac McConnell, BonitaSoftOne unintended consequence of employing customer-focused software systems is they view the world through a singular lens, which can quickly become a problem. These systems are generally geared toward providing general information to the users, without necessarily including recommendations for action. Read More >>>

IT Briefcase Exclusive Interview with Sai Sundhar Padmanabhan, ManageEngine

June 3, 2014 No Comments

with Sai Sundhar Padmanabhan, ManageEngineBelow, Sai Sundhar Padmanabhan, marketing analyst at ManageEngine, discusses the state of network traffic flows, why the ability to monitor high flow rates is critical to IT and business, and how to make sure you can handle high flows. Read More >>>

Managing IT Points of Failures: Separating a Fire Drill from a Fire

May 21, 2014 No Comments

by Deepak Kanwar, ZenossA red flag on the IT operations dashboard at many organizations still means “All Hands on Deck,” a failure has been detected, it’s time to grab the safety gear and ready the hoses for what could be hours of intense fighting. Read More >>>

Five Worst Practices to Avoid in the Cloud

May 20, 2014 No Comments

Businesses of all sizes are moving to the cloud in droves, looking for flexible, cost-effective solutions that enable their operations to run more efficiently. This move by businesses to migrate their IT services, applications and infrastructure to a cloud-based architecture will cause market revenue to reach an estimated $174.2 billion this year, up 20 percent from $145.2 billion in 2013, according to new research from IHS Research. By 2017, enterprise spending on the cloud will amount to a projected $235.1 billion, IHS predicts.

The End of Email? Think Again.

May 19, 2014 No Comments

While email certainly has its drawbacks, including the ratio of spam vs. important emails and the daily task of sifting through the noise (which according to a recent McKinsey report takes up on average almost a third of our working day) businesses understand that email will continue to be utilized as a primary form of communication for some time. In fact, according to a recent IT pro survey, 87 percent agree the very forms of “smart” communication that many believe will lead to email’s downfall have actually increased the amount of email sent and received. So it’s time to focus attention on improving email rather than seeking alternatives.

How to Leverage the Knowledge in Your Networks to Drive Innovation

May 19, 2014 No Comments

by Alex Saric, Ariba, Inc.The knowledge that’s now intrinsic to our networks can drive innovation—in products, processes, business models, and more. But to leverage network knowledge for innovation, you have to know where to find the knowledge and how to put it to use. Read More >>>

IT Briefcase Exclusive Interview with Ed Brill, Director, Mobile Enterprise Marketing, IBM

May 9, 2014 No Comments

with Ed Brill, IBM Social BusinessIn this interview, Ed Brill from IBM Social Business discusses mobile as a business transformation tool and considerations for the ‘upwardly mobile’ enterprise. Read More >>>

BYOD Security: 5 Tips for IT Professionals

May 5, 2014 No Comments

by Rick DelGado, Independent AuthorPersonal devices have become a common part of the working environment now. More and more, companies are adopting Bring Your Own Device (BYOD) policies, allowing employees to use their own devices both inside and outside the office.Read More >>>

2014: Top 5 Consumer Point of Sale Apps Review

April 25, 2014 No Comments

Payments transactions will reach 1.3 trillion U.S. dollars per year before 2017. A lot of people are already using mobile applications to easily purchase stuff from online stores. There are a lot of retail POS applications for businesses, which are now replacing bulky, and dumb billing machines. If you do a search for point of sale applications, chances are you will find more retail PoS applications compared to applications that are meant to be used by consumers. These consumer PoS applications are mainly used in places like restaurants, pubs, cafes, bars and parlors.


April 23, 2014 No Comments

This whitepaper helps marketers understand the attributes and benefits of great digital experiences, and offers guidance on how to take advantage of the latest trends and technologies.

Workflows, People and Processes

April 22, 2014 No Comments

By Trev Harmon, Adaptive Computing In the world of business there seems to constantly be a battle for supremacy between People and Process. Both ideological camps put forth their ideas and justifications, much of which is based on research and founded through their own internal point of view. Read More >>>

The Technology Behind Predictive Project Management

April 21, 2014 No Comments

By Steward Copper, Project Management InsightsWe cannot deny all the advantages of the predictive approach and the importance of performing all the project stages it presupposes – planning, estimating, measuring and controlling the work. At the same time, more and more Project Managers do accept the science and art project management way. Read More >>>

5 IT Jobs Emerging in Small Business

April 14, 2014 No Comments

by Rick DelGado, Independent AuthorBusinesses are finding ways to change as the world around them evolves. Advances in technology are driving much of the change, altering the landscape where people and companies conduct their business.Read More >>>


Gartner Identity & Access

TDWI World Conf San Diego

Red Hat JBoss Busines Automate

ACI Customer Experience Management Summit


ITBriefcase Comparison Report

IBM Data