Reading this on a mobile device? Try our optimized mobile version here:

March 11, 2013
Sign upForwardArchiveAdvertise
News for software and services professionals

  Today's Software Buzz 
  • A look at businesses' use of Big Data
    Big Data analytics is taking hold in areas such as human resources, marketing, operations and product development, Steven Rosenbush and Michael Totty write. They cite Catalyst IT Services as an example of using Big Data in the hiring process, including requiring job candidates to complete an online assessment that delivers data about how applicants answer questions as well as their actual answers. The Wall Street Journal (3/8) LinkedInFacebookTwitterEmail this Story
  Cloud Computing 
  • Other News
  Mobile & Wireless 
  • Johns Hopkins clinicians embrace desktop virtualization
    Desktop virtualization is becoming an important tool for IT organizations, especially as the need to be mobile increases, Stacy Collett writes, citing the example of Baltimore's Johns Hopkins Hospital, where up to 9,000 clinicians use the technology. Computerworld (3/11) LinkedInFacebookTwitterEmail this Story
  • Keep a lost mobile device from becoming a security nightmare
    Before launching a bring-your-own-device initiative, companies need to be aware of the potential pitfalls that await them and adapt their policies to ease such difficulties, experts say. Lost or stolen devices can offer an open door for access into corporate networks, but that door can be closed by establishing rules that require employees to use a PIN and report losses as soon as they are discovered, says Endre Walls, chief technology officer of the nonprofit Resources for Human Development. Network World (3/11) LinkedInFacebookTwitterEmail this Story
  • Other News
  Security & Privacy 
  • Iran reportedly blocks some VPNs to tighten Internet controls
    Iran reportedly has taken steps to block unapproved virtual private networks that dodge the country's Internet filter. "Within the last few days illegal VPN ports in the country have been blocked. Only legal and registered VPNs can from now on be used," lawmaker Ramezanali Sobhani-Fard said, according to the Mehr News Agency. Reuters (3/10) LinkedInFacebookTwitterEmail this Story
  Government IT 
  • U.S. expands cybersecurity information sharing under executive order
    Defense contractors Lockheed Martin and Raytheon have joined a Department of Homeland Security information sharing program formed by President Barack Obama's executive order on cybersecurity, which will give the companies access to classified data needed to prevent cyberattacks. AT&T and CenturyLink are also taking part in the initiative. Participants in the DHS Enhanced Cybersecurity Services program will receive information such as coding and timestamps utilized in attacks, which they can use to bolster their cybersecurity offerings. Bloomberg (3/11) LinkedInFacebookTwitterEmail this Story
  • FTC calls for more protection against bogus mobile billing
    The mobile-phone industry should provide recourse for consumers who fall victim to unauthorized mobile billing, the Federal Trade Commission says. More transparency is also urged by the FTC to help expand the usage of mobile payments, which the commission says hold huge potential for growth. Meanwhile, FTC chief Edith Ramirez said she will keep working to formulate and enforce privacy-protection rules for consumers. Reuters (3/8) , News Service (3/8) , Adweek (3/8) LinkedInFacebookTwitterEmail this Story
  SIIA News 
  • Webinar: Trust, Assurance, and Compliance Readiness
    With new technology innovations in health IT, especially leveraging cloud-computing platforms and mobile devices, it is even more critical for health care providers and their IT solution providers to provide adequate assurances that health care services are built to protect the patient on a safe platform for innovation. Join us for an overview of Cloud Security Alliance's Governance Risk & Compliance Stack and the CSA Security, Trust & Assurance Registry as well as other research initiatives, all serving as the basis of emerging security and assurance standards and supply chain risk-management best practices for cloud computing. Register today for this webinar on Wednesday, March 20. LinkedInFacebookTwitterEmail this Story
  • Don't miss your chance -- Sponsor AATC 2013
    Now in its eighth year, AATC 2013 is the industry's most comprehensive ISV conference. Our primary focus for AATC 2013 is to help you Make Contacts, Form Partnerships and Close Deals. What better way to make contacts, form partnerships and close deals than to sponsor? Check out the sponsorship packages on our website. Or, register now, and take advantage of early-bird pricing. LinkedInFacebookTwitterEmail this Story
Learn more about SIIA ->Join SIIA  |  Resource Center  |  Member Services
Events & Conferences  |  Blog  |  Contact Us

The greatest way to live with honor in this world is to be what we pretend to be."
Greek philosopher

LinkedInFacebookTwitterEmail this Story

Subscriber Tools
Print friendly format  | Web version  | Search past news  | Archive  | Privacy policy

 Recent SIIA Software SmartBrief Issues:   Lead Editor:   Amanda Gutshall
Contributing Editor:   Jeff Dorsch
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
© 1999-2013 SmartBrief, Inc.®  Legal Information