Wednesday, August 21, 2013

AWS Outage Examined | Cloud's Human Cost

If you have trouble viewing this email, read the online version.

Cloud Computing From InformationWeek
Join the community
Facebook Twitter LinkedIn
  August 21, 2013
MUST READ
Charles Babcock Amazon.com Suffers Hour-Long Retail Site Outage
Cloud services remained in operation as Amazon.com online retail site disappeared Monday afternoon.



Cloud Adoption: 4 Human Costs
Moving to the cloud imposes changes on your IT workforce. Think in terms of changed expectations, education, migration and maintenance.

New York State Chooses Office 365
Microsoft's Windows 8 might be struggling, but Office 365 is a cloud juggernaut. Its latest customer: New York State, which will move 120,000 employees to the popular cloud office suite by the end of the year.

Groklaw Shuts Down, Cites Government Surveillance
Website founder plans "to get off of the Internet to the degree it's possible" due to the absence of online privacy.

Amazon Web Services: What's It Good For?
A lot, even if it still gets damned with faint praise for its enterprise cloud services.


 
FEATURED REPORTS and FEATURED WHITEPAPERS
  • Research: Data Center Decision Time

    Is your glass house a sparkling hub of IT innovation or a financial albatross? For many, it's the latter. Worse, we often lack agility, 67% say application and hardware philosophies frequently or occasionally conflict business demand, and just 27% say a private ...

  • Strategy: Advanced Persistent Threats: The New Reality

    For most organizations, the imminent danger that advanced persistent threats pose has been relatively low. That's changing as attackers' target base widens, their knowledge grows and their cyber weapons trickle down to the hacker masses. In this Dark Reading report, ...

MORE REPORTS
spacer spacer spacer
  • Mobile Security Guide

    As mobile devices become more common, cybercriminals see them as having huge profit potential, and aim to gain access to the users' confidential personal and financial information. In this Mobile Security Guide, we will walk you through the mobile malware ...

  • How to Engage Mobile Customers While Protecting Sensitive Enterprise Data

    With the proliferation of mobile devices, the development of intelligent and composite applications, the number of multi-device users, and the shift to BYOD, businesses are challenged to effectively capitalize on mobile opportunities. Download this white paper to explore how to ...

MORE WHITEPAPERS
 
MOST POPULAR NEWS
10 Cool Back-To-School Tech Tools
College students tote a ton of technology when they head off to school. Here are 10 more gadgets and apps worth throwing in the backpack.

Samsung Galaxy Mega Phablet Debuts
Samsung's newest device earns its name with many features of its Galaxy S4 on an oversized screen.

10 Hidden Android Tips, Tricks
Learn some new tricks for your Android smartphone with our tips on maps, storage, data plans and more.

10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.

Hubble Telescope's New Images: Galaxies Through Time
The newest images from Hubble help scientists see how galaxies evolve -- comparing present day to 11 billion years ago.

MORE NEWS  
 
WEBCASTS
  • Vulnerability Management Challenges and Best Practices Revealed

    During this webinar, IBM Security Systems will discuss the issues and obstacles many encounter as they attempt to identify and prioritize security risks and exploitable vulnerabilities. They will also share details on the newest member of the QRadar Security Intelligence ...

 


This e-mail was sent to sojo.blo@gmail.com

Cloud Computing From InformationWeek
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment