Reading this on a mobile device? Try our optimized mobile version here: http://r.smartbrief.com/resp/enoSCfbwocfEsRuBNsKi

March 15, 2013
Sign upForwardArchiveAdvertise
News for software and services professionals

  Today's Software Buzz 
 
  • Startups generate investor interest in software-defined storage
    Emerging data storage technologies based on the principles of virtualization and software-defined networking got a boost this week with the announcement of $6.1 million in financing for SwiftStack. The software-defined storage company, which was founded in 2011, is creating a suite of solutions for enterprises in the mobile, Web and SaaS spaces and announced the funding just weeks after a second firm, Jeda Networks, launched its own foray into SDS. CRN.com (U.S.) (3/14) LinkedInFacebookTwitterEmail this Story
Northwestern University MS in Information Systems
The MS in Information Systems teaches the latest in information systems, emphasizing design, implementation and evaluation of software applications and theoretical models. Students choose one of seven specializations to complement professional experience and interests. Advance your IT career — learn online or part-time at our Chicago campus.

  Cloud Computing 
  • VMware announces NSX product
    VMware says it's focused on helping businesses with software-defined data centers and storage, which it views as a key component of cloud development. Its NSX technology merges vCloud networking and security product with the Nicira Network Virtualization Platform the company purchased in 2012. VMware NSX will be available in the second half of the year, VMware said. CRN.com (U.S.) (3/14) , ZDNet (3/13) LinkedInFacebookTwitterEmail this Story
  • Dell calls for group to help create SDN standards
    Dell has suggested the creation of a working committee on software-defined-networking standards within the Object Management Group, which builds integration standards for technologies. "OMG provides blueprints for people who want to build SDN in an open, meritocratic manner, so we are pleased to engage with this community," an unidentified Dell spokesperson wrote in an e-mail. Network World (3/14) LinkedInFacebookTwitterEmail this Story
Is Pricing Low Your Strategy to Success? Think again.
Pricing is the heart of a business. It affects everything you do and is affected by everything you do. Economists talk of supply and demand as key factors behind pricing—successful entrepreneurs manipulate demand by making their products more desirable. These six steps will help you determine the right price for your product or service, read the article and learn how to get pricing right.

  Mobile & Wireless 
 
  • Other News
Building Workplace Trust 2015
Interaction Associates' 6th annual research study tracking trust on the job, Building Workplace Trust, is out, and more than half of employees surveyed give their organizations low marks for trust and leadership. Yet this year's findings again point to how high trust leads to better outcomes and financial results — and even boosts innovation.

  Security & Privacy 
 
  • Hackers hit U.S. malware database
    The U.S. government was forced to take a critical cybersecurity database offline recently after a National Institute of Standards and Technology firewall detected an attack on the agency's servers. The infiltration of the National Vulnerability Database, which houses data on viruses and other bugs, happened because of Adobe ColdFusion vulnerabilities and reportedly persisted for two months before being detected and patched. The Register (U.K.) (3/14) , RT.com (Russia) (3/15) LinkedInFacebookTwitterEmail this Story
  • Other News
Combating Identity Theft in a Mobile, Social World
Mobile connectivity threats extend from consumers to the business environment. But who is really responsible for securing sensitive information? Smart business leaders are becoming proactive on the matter. Learn how to get protected in this white paper. Download the white paper now.

  Government IT 
 
  • Senate hearing reveals cyberthreat preparations
    President Barack Obama last year signed a classified policy directive setting out how the U.S. government will deal with cyberattacks, Bill Gertz writes. U.S. intelligence agencies also have assembled a National Intelligence Estimate on cyberthreats, a Senate hearing revealed Tuesday. The Washington Times (3/13) LinkedInFacebookTwitterEmail this Story
  • Tech titans lobby Congress to stem "patent troll" activities
    Technology firms including Cisco Systems and Adobe Systems are lobbying Congress to do something about "patent trolling" and what they call frivolous lawsuits over copyright infringement. "Patent trolls are business terrorists," SAS' John Boswell said. "Their weapons of mass destruction are software and business-method patents with fuzzy boundaries that can be asserted against many different products, many different companies, in many different ways." However, Congress seems unsure about how to take on the issue, Brendan Sasso and Jennifer Martinez write. The Hill/Hillicon Valley blog (3/14) , ITWorld.com/IDG News Service (3/14) LinkedInFacebookTwitterEmail this Story
How to Achieve IT Agility: A Survival Guide for IT Decision Makers
When business teams add new apps and services to already-strained networks, IT departments are accountable for making everything work. Is your team ready for this challenge? Read this eGuide to learn how IT teams are automating their networks, why they're utilizing Ethernet fabrics and SDN, and what success looks like as they regain network control and business relevance.

  SIIA News 
  • Webinar: Trust, Assurance and Compliance Readiness
    With new technology innovations in health IT, especially leveraging cloud-computing platforms and mobile devices, it is even more critical for health care providers and their IT solution providers to provide adequate assurances that health care services are built to protect the patient on a safe platform for innovation. Join us for an overview of Cloud Security Alliance's Governance Risk & Compliance Stack and the CSA Security, Trust & Assurance Registry as well as other research initiatives, all serving as the basis of emerging security and assurance standards and supply chain risk-management best practices for cloud computing. Register today for this webinar on Wednesday, March 20. LinkedInFacebookTwitterEmail this Story
Learn more about SIIA ->Join SIIA  |  Resource Center  |  Member Services
Events & Conferences  |  Blog  |  Contact Us

  SmartQuote 
Adventure is not outside man; it is within."
--George Eliot,
British writer


LinkedInFacebookTwitterEmail this Story

 
 
Subscriber Tools
   
Print friendly format  | Web version  | Search past news  | Archive  | Privacy policy

 
Read more at SmartBrief.com
 
 
 Recent SIIA Software SmartBrief Issues:   Lead Editor:   Amanda Gutshall
Contributing Editor:   Jeff Dorsch
   
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
 
 
© 1999-2013 SmartBrief, Inc.®  Legal Information