Monday, June 04, 2012

10 SaaS delivery companies to watch

  Flame malware's structure among most complex ever seen, says Kaspersky Lab | 10 web sites that time forgot
 
  Network World Daily News PM

Forward this to a Friend >>>


10 SaaS delivery companies to watch
Analysts and industry watchers agree that the next frontier for SaaS is setting distribution channels designed specifically for the cloud and providing mechanisms for managing multiple SaaS offerings from a single control point. These advancements will likely come from a variety of sources: established SaaS vendors, startups providing SaaS channel enabling software, and cloud service brokerage houses. Here are 10 to watch, listed in alphabetical order. Read More


WHITE PAPER: Silver Peak Systems, Inc.

2012 WAN Optimization Magic Quadrant
Limited bandwidth, long distances and poor network quality prohibit cost reductions for today's critical IT initiatives. Your IT organization needs WAN optimization that can be deployed anywhere, on any platform, and for the lowest cost. See how the new Gartner Magic Quadrant for WAN Optimization Controllers can help. Read now.

WHITE PAPER: Centage Corporation

Centage/IOMA Budgeting Survey: Benchmarks & Issues
How are other financial professionals dealing with the issues you face? This report offers you an inside peak into what the minds at over 200 financial executives are thinking and doing to impact their own bottom line. Learn more.

Flame malware's structure among most complex ever seen, says Kaspersky Lab
Kaspersky Lab Monday shared more details about the sophisticated cyber-espionage Flame malware widely believed to be the work of a nation-state, though the security firm isn't venturing yet to say what country that might be. Read More

10 web sites that time forgot
Read More

Windows 8 test drive: Hardware is a challenge
Hardware will remain a key to satisfaction in Windows 8 based on a quick drive-through of the Release Preview version of the new Microsoft operating system. Read More


WHITE PAPER: Intel

Cloud Vendors Reveal Security Strengths
Regardless of the type of cloud model you're implementing, you'll need to evaluate security options. This guide compares the answers from 9 cloud vendors to some of the toughest cloud security questions. Learn more.

Artist builds, flies helicopter made from his dead cat
Artist builds, flies helicopter made from his dead cat The "Orvillecopter" is a tribute to Dutch artist Bart Jansen's cat Orville Read More

Microsoft recalls certificates exploited by Flame malware
Businesses should install a Microsoft security update to avoid being duped by exploited certificates that were used as part of the Flame malware attack against targeted Iranian computer networks. Read More

Windows 8, price drops to accelerate ultrabook growth, Lenovo says
While the viability of ultrabooks is being questioned, Lenovo product chief Peter Hortensius believes a drop in prices and the arrival of Microsoft's Windows 8 OS will signal a major shift in laptop computing and trigger more interest in the product category. Read More


WHITE PAPER: CommVault

The Benefits of Modernizing Your Data Protection
Conventional backup and recovery approaches are not robust enough to meet today's data and information management challenges, let alone those of tomorrow. A new strategy is essential. Learn More

Acer unveils Windows 8 tablets, ultrabooks featuring hybrid designs
Acer on Monday unveiled new Windows 8 products, including tablets that come with attachable peripherals and ultrabooks fitted with touchscreens, as the company tries to set itself apart from the competition with new hardware designs that meld features from both tablets and notebooks. Read More

Tech Debate: Dictate the mobile device or let the user decide?
The list of benefits for the Bring Your Own Device movement is long, but so is the list of associated risks. Is the time right to connect employee gadgets to the company network, or should we be more circumspect? The experts Robert Rhodes, CIO of Houston Healthcare says the risks of BYOD are enormous, allowing employees to use their own devices to access core resources raises serious questions for employer and employee alike. Evan Kaplan, CEO of iPass says we are better off letting users select the devices that will make them most productive, and trying to control the process just ends up making us less secure anyway. Read More

The best office apps for Android tablets
With the right set of apps, your Android tablet can become an indispensable part of your mobile work arsenal. Here are the tools you need Read More

Lenovo cracks $800 price barrier with new IdeaPad ultrabooks
Lenovo has cracked the US$800 price barrier on ultrabooks, launching thin-and-light IdeaPad U-series laptops with Intel's latest Core processors starting at $749. Read More

Mobile Tech, Social Media Force FTC to Revisit Advertising Guidelines
The Federal Trade Commission is looking to update 12-year-old framework for disclosure and privacy as marketers increasingly seed messages on mobile devices and social networking sites. Read More

 
 
 

SLIDESHOWS

10 terrific LTE smartphones for $150 or less
LTE on the cheap: Offerings from Apple, Samsung, Nokia and more make cut.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. BYOD's phone number problem
  2. Hacktivists UGNazi attack 4chan, CloudFare and Wounded Warrior Project
  3. Facebook posts its internal C++ software library
  4. Rehearsal is over, IPv6 goes prime time June 6
  5. Like Cisco, ALU finds reluctance to embrace cloud
  6. U.S. warns users of new Citadel ransomware hit
  7. iPhone 5 rumor rollup for the week ending June 1
  8. U.S. and Israel unleashed Stuxnet, says New York Times
  9. Is RIM ruined?
  10. Could data scientist be your next job?
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment