Reading this on a mobile device? Try our optimized mobile version here:

March 28, 2013
Sign upForwardArchiveAdvertise
News for software and services professionals

  Today's Software Buzz 
  • Gartner: Mobile to drive IT spending gains this year
    A Gartner report says IT spending will increase 4.1% this year to hit $3.8 trillion, driven primarily by demand for mobile technology and enterprise services. The report predicts the same growth pace in 2014 and says that about 45% of this year's spending will be on telecom services. The top growth category is hardware sales, Gartner says. TechCrunch (3/28) LinkedInFacebookTwitterEmail this Story
Addressing Security Challenges with LTE
With more IP connectivity, more traffic, more bandwidth, more apps and new protocols like SIP and diameter, LTE provides new security challenges for mobile operators. Among the tools to deal with it are better leveraging of security policy and service chaining. Download F5's infographic for a snapshot of new LTE security challenges and how to address them.

  Cloud Computing 
  • Collaboration aims for expanded hybrid-cloud options
    Amazon, Equinix and NetApp say they're collaborating for hybrid clouds that use a hosted NetApp infrastructure for Equinix data centers connected to Amazon Web Services. "We're enabling private storage for the public-compute cloud," Equinix's Greg Adgate says. Network World (3/27) LinkedInFacebookTwitterEmail this Story
  • Citrix software package touts "anything as a service"
    Citrix is offering CloudPortal Business Manager 2.0, which it describes as "a single cloud interface for delivering anything as a service." The debut marks the company's entry into application management, Jack Clark writes. "We're not trying to create a service package of 1,000 applications, nor are we just trying to sit on one [infrastructure]," Citrix's Tom McCafferty said. "... I think things like cloud platform and cloud business manager are the evolution of Citrix as a business." The Register (U.K.) (3/27) LinkedInFacebookTwitterEmail this Story
10 ways to inspire creativity in your staff.
Fostering creative business practices isn't as hard as it seems and can lead to smart solutions. Use these ten techniques to help inspire and encourage creativity in your staff. Read the article and learn 10 ways to get the creative juices flowing.

  Mobile & Wireless 
  • HP offers free app analysis with "Fortify My App"
    Hewlett-Packard has introduced a cloud-based service that lets application developers test their code for vulnerabilities such as improper credentials storage or "information leaking" before they introduce the apps. The free component of HP's "Fortify On Demand" product, dubbed "Fortify My App," covers an array of platforms and tests for a limited number of vulnerabilities, presenting them in a report within 24 hours. Network World (3/27) LinkedInFacebookTwitterEmail this Story
  • IDC: Tablet demand pushed smart-device shipments up 30% in 2012
    Demand for tablet PCs and smartphones continued to take a chunk out of the PC market in 2012, and is expected to propel device shipments ahead of computers for the first time this year, IDC says. Shipments of tablets were up 80% in 2012 and are forecast to reach 190 million units in 2013, IDC says. (U.S.) (3/26) LinkedInFacebookTwitterEmail this Story
Combating Identity Theft in a Mobile, Social World
Mobile connectivity threats extend from consumers to the business environment. But who is really responsible for securing sensitive information? Smart business leaders are becoming proactive on the matter. Learn how to get protected in this white paper. Download the white paper now.

  Security & Privacy 
  • Security researchers: Many Amazon S3 buckets are wide open
    Researchers at Rapid7 say they were easily able to look into Amazon Simple Storage Service buckets, estimating that about 17% of them can have their contents exploited or stolen. "The security risk from a public bucket is simple. A list of files and the files themselves -- if available for download -- can reveal sensitive information," Rapid7's Will Vandevanter wrote in a blog post. "The worst-case scenario is that a bucket has been marked as 'public' exposes a list of sensitive files, and no access controls have been placed on those files." InfoWorld/Tech Watch blog (3/27) LinkedInFacebookTwitterEmail this Story
  • U.K. launches secret "Fusion Cell" for cybersecurity
    The U.K. has started a cybersecurity center designed to increase collaboration and information sharing between the public and private sectors. The "Fusion Cell" involves 160 companies representing five industrial sectors, and will be staffed by about a dozen security experts, including members of the intelligence services. Bloomberg (3/26) LinkedInFacebookTwitterEmail this Story
  • Other News
Whitepaper: SDN: How do you get there from here?
Are the growing data needs of mobile, cloud, big data and social threatening today's enterprise networks? Scalable processes, a phased integration approach and the appetite to optimize over time are key components of a modern network. It's how agile organizations prepare for the data needs of tomorrow.
Explore the whitepaper to start down the path toward SDN.

  Government IT 
  • Analyst: Mobile tech will represent 25% of U.S. patents in 2013
    Twenty-five percent of patents issued by the U.S. in 2013 will pertain to mobile technology, analyst Chetan Sharma estimates in a report. That compares with 5% of all patents 12 years ago, he notes. "Mobile will continue to be the growth engine of the knowledge economy and the companies who understand the value of the intellectual property will continue to protect and benefit from their investments for years to come," Sharma writes. All Things D (3/27) LinkedInFacebookTwitterEmail this Story
  • Other News
  SIIA News 
  • Register for the industry's leading ISV conference, AATC13
    Join us May 7 to 9 in San Francisco for SIIA's All About the Cloud conference. Your success in today's ever-changing world of technological innovation around the cloud, mobile and social media can depend on the strength of your relationships with the right strategic partners and vendors. So our primary focus for AATC 2013 is to help you make contacts, form partnerships and close deals. Take advantage of early-bird pricing by registering today or considering a sponsorship. LinkedInFacebookTwitterEmail this Story
  • The State of Software Monetization
    As the Internet changes the way organizations conduct business and how they secure their critical intellectual property, companies are continuously struggling to find a balance between business enablement and security. Safenet and the Software & Information Industry Association announced their finding from a survey, which shows software developers continue to view security and business enablement as mutually exclusive. Look at the findings here. LinkedInFacebookTwitterEmail this Story
Learn more about SIIA ->Join SIIA  |  Resource Center  |  Member Services
Events & Conferences  |  Blog  |  Contact Us

We owe something to extravagance, for thrift and adventure seldom go hand in hand."
--Jennie Jerome Churchill,
American-born British society figure

LinkedInFacebookTwitterEmail this Story

Subscriber Tools
Print friendly format  | Web version  | Search past news  | Archive  | Privacy policy

 Recent SIIA Software SmartBrief Issues:   Lead Editor:   Amanda Gutshall
Contributing Editor:   Jeff Dorsch
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
© 1999-2013 SmartBrief, Inc.®  Legal Information