News for software and services professionals | |
Today's Software Buzz
| | |
|
- Highs and lows of Big Data are cited
Speakers at a conference in the U.K. touted the analytics capabilities of Big Data while also expressing concerns about its widening use, Ben Rooney writes. "The richest examples of Big Data are to understand consumer behavior and optimize your product for it. That is where the danger can lie," Splunk's Stephen Sorkin said. "... The software only finds correlations, not causations. In order to find causal relationships you have to do work." The Wall Street Journal
(11/29)
-
Neuroscientist makes a bet on Big Data's value:
Mobile-device guru and neuroscience expert Jeff Hawkins is focused on streaming real-time data collected for predictive analysis, and likens it to how the brain functions. The co-founder of Numenta says his Grok technology will prove his theory. "It only makes sense to look at old data if you think the world doesn't change," Hawkins says. The New York Times (tiered subscription model)/Bits blog
(11/28)
Cloud Computing
| | |
|
- Amazon Web Services aims for bigger customers
Amazon Web Services is aiming higher with its cloud-computing products, competing with old-guard tech companies including Oracle, IBM and Hewlett-Packard for big corporate customers, AWS chief Andy Jassy says. "The old world of technology has a pricing model which is to charge as much as customers can pay," he said. "Customers are tired of it." Reuters
(11/28)
- Analyst: Hackers are targeting mobile networks
Hackers are finding the volume of data on mobile networks appealing to their purposes, making the networks a more attractive target than Windows PCs, says Patrick Donegan of Heavy Reading. He said at an industry conference that Long-Term Evolution wireless networks are especially vulnerable to concentrated cyberattacks. "What we have seen to date is still just early skirmishes," Donegan said. Light Reading
(11/28)
, Light Reading Mobile
(11/28)
|
MoDevEast is the premier mobile conference in the mid-Atlantic region where developers, managers, designers and marketers gather to accelerate every mobile initiative. Pre-conference workshops on Thursday, Nov 29th, a full conference agenda on Friday, Nov 30th and a hackathon on Dec 1st provide something for every professional involved in mobile. www.modeveast.com |
Security & Privacy
| | |
|
- Privileged access to critical infrastructure to be protected
Security-software vendors such as Cyber-Ark are coming up with products to protect the control systems of critical infrastructure, particularly the privileged-access accounts for those systems, Taylor Armerding writes. "So many of those systems were designed to work for decades, we can't simply rotate the equipment out as we might for a desktop computer," says Jason Healey of the Atlantic Council. CSO
(11/28)
Government IT
| | |
|
- White House seeks businesses' input on cybersecurity executive order
President Barack Obama's administration has been holding meetings with business executives, technology experts and privacy advocates, seeking to gain ideas and support for a planned executive order on cybersecurity. The "listening tour" -- which officials say is an unusual precursor to an executive order -- has included sessions with representatives of critical industries, including the energy sector, that would be directly impacted by Obama's action. Politico (Washington, D.C.)
(11/27)
SIIA News
| | |
|
-
Save the date for the industry-leading ISV Conference, AATC13
Save the dates and plan to join us at next year's All About the Cloud conference, May 7 to 9 in San Francisco. Your success in today's ever-changing world of technological innovation around cloud, mobile and social media can depend on the strength of your relationships with the right strategic partners and vendors. So our primary focus for AATC 2013 is to help you make contacts, form partnerships and close deals. Take advantage of leftover budget by registering today or considering a sponsorship.
|
-
Do you know everything about commerce or monetization solutions?
The SIIA CODiE Awards is looking for executives, bloggers, VCs, analysts and software experts to judge nominations for the SIIA CODiE Awards. If you feel your background reflects an understanding of the software industry, then sign up today to judge the only peer recognized awards program in the content, education and software industries. Check out the program and nominate yourself today.
SmartQuote
| | |
|
| We acquire the strength we have overcome."
--Ralph Waldo Emerson, American writer
|
| |
| |
Read more at
SmartBrief.com |
|
|
|
|
| Recent
SIIA Software SmartBrief Issues:
- Wednesday, November 28, 2012
- Tuesday, November 27, 2012
- Monday, November 26, 2012
- Wednesday, November 21, 2012
- Tuesday, November 20, 2012
| | | Lead Editor:
Susan Rush
Contributing Editor:
Jeff Dorsch
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004 | |
|
|
© 1999-2012 SmartBrief, Inc.®
Legal Information |
|