Wednesday, June 19, 2013

MS Dynamics Apps Hit Azure | VMware Fights Amazon With 'Cloud Credits'

If you have trouble viewing this email, read the online version.

Cloud Computing From InformationWeek
  Wednesday, June 19, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
CIO Columnist VMware Fights Rival Amazon With 'Cloud Credits'
By Charles Babcock
VMware says pre-paying for hybrid cloud services gives customers more control over "rogue IT spend," hopes it will keep them in the VMware fold.

Microsoft Dynamics Apps Hit Azure Cloud
Microsoft makes good on promised cloud hosting of Dynamics GP and Dynamics NAV ERP apps. Dynamics AX will be the real, multi-tenant test.

Bluelock Makes Cloud Disaster Recovery Affordable
Bluelock Recovery-as-a-Service allows midsized companies to avoid physical duplicates and store virtual machines at a distant location.

Forrester Rates Public Cloud Choices For Developers
Forrester examines IaaS and PaaS options for developers, as the line blurs between these two types of public clouds.

What Savvis Cloud Services Gain From AppFog
CenturyLink's cloud company, Savvis, broadens cloned app capabilities by acquiring automation platform AppFog.

Red Hat Escalates Private Cloud Fight With VMware
Red Hat combines its Enterprise Linux with OpenStack to push its own private cloud stack alternative to VMware, Microsoft platforms.

 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Strategies for Improving Web Application Security
In this report, we recommend some best practices for balancing the needs of the business with security requirements. It doesn't take special certification or a million dollars, but it does take planning, time, and a smart combination of tools and best practices.
Download Now (Registration Required)

Featured Report
5 SDN Business Benefits
Have your engineers caught software-defined networking fever yet? While SDN is currently most appropriate for test labs or tech-savvy cloud operators like Google and Facebook, that's poised to change. As the technology matures and products proliferate, enterprise IT executives need a grasp of the potential benefits.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Business Agility & the True Economics of Cloud Computing
Download this report to read the results of a McKinsey & Company survey that reveals a direct link between implementing cloud computing and improving business agility.
Download Now (Registration Required)


Cloud-Enabled Business Model Innovation
Companies worldwide are beginning to recognize cloud's capabilities to generate new business models and promote sustainable competitive advantage. Read the white paper to understand all the benefits of IBM SmartCloud.
Download Now (Registration Required)


MORE WHITEPAPERS
 
MOST POPULAR NEWS
Google Challenges Surveillance Gag Order
Google argues it has a First Amendment Right to report the number of demands for information it receives under national security laws.

Windows 8.1: 10 Surprise Benefits
Windows 8.1 does a lot more than bring back the Start button. These 10 features may give it a much-needed popularity boost with enterprise users.

Boston Bombers Can't Elude City's Tech Infrastructure
Video surveillance played a key role in identifying the suspects in Monday's tragic Boston Marathon bombing, setting a precedent for increasing use of sophisticated security IT systems nationwide.

10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.

10 Tools To Beat Email Overload
New tools and services promise to help you put more love into your love-hate relationship with email. We check out the contenders.





MORE NEWS  
 
WEBCASTS
Secure Cloud: Taking Advantage of the Intelligent WAN
Join us to hear top industry experts discuss the private data network technologies that are best suited for enterprise cloud access requirements. You won't want to miss this opportunity to learn how your organization can best mitigate risk while reaping the full potential benefits of the cloud. It happens Wednesday, June 12, 2013. More Information & Registration

Click here
 
RESOURCES AND EVENTS
E2 Conference Boston
E2 is the only event of its kind, bringing together business and technology leaders looking for new ways to evolve their enterprise applications strategy and achieve business value. Join us in Boston, June 17-19, for three days of 40+ conference sessions and workshops across eight tracks and discover the latest insights in enterprise social software, big data and analytics, mobility, cloud, SaaS and APIs, UI/U, and more.
Get More Details and Register Today



This e-mail was sent to sojo.blo@gmail.com

Cloud Computing From InformationWeek
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of Cloud Computing From InformationWeek go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

What Prism Knows: 8 Facts | NSA Tests IT Access Control

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
Join the community
Facebook Twitter LinkedIn
  Wednesday, June 19, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist NSA Tests IT Access Control Restrictions
By Mathew J. Schwartz
Could two-person access requirements and better automation prevent future leaks?

MUST READ
What Prism Knows: 8 Metadata Facts
Data traffic analysis could provide "megadata" intelligence agencies can use to cross-reference information using big data techniques.

Security ROI: 5 Practices Analyzed
Which security practices bring the best return on investment? Not all of the most popular practices are good for your company.

Google Challenges Surveillance Gag Order
Google argues it has a First Amendment Right to report the number of demands for information it receives under national security laws.

Google Defends Efforts Against Rogue Pharmacies
Under fire from law enforcement officials, Google insists it has been making progress in its effort to deny advertising to rogue pharmacies.

FBI Driver's License Photo Searches Raise Privacy Questions
Facial-recognition software advances allow law enforcement and government agencies to match images of unknown suspects with government-issued ID photos.

Privacy Concerns: Big Data's Biggest Barrier?
Businesses must be up front with consumers about what data they're using and why. Opting out should be easier, too.

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
The 8 Most Common Causes of Data Breaches
It seems as though not a day goes by without a headline screaming that some organization has experienced a data breach, putting the business -- and its customers and partners -- at risk. To keep your own organization out of the news, it's important to understand the most common causes of data breaches and what you can do to mitigate the threats they present.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Seven Steps to Security
Download this paper learn seven practical steps to begin an application security program and methods of measuring application security program success.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

Google Challenges Surveillance Gag Order
Google argues it has a First Amendment Right to report the number of demands for information it receives under national security laws.

Windows 8.1: 10 Surprise Benefits
Windows 8.1 does a lot more than bring back the Start button. These 10 features may give it a much-needed popularity boost with enterprise users.

Boston Bombers Can't Elude City's Tech Infrastructure
Video surveillance played a key role in identifying the suspects in Monday's tragic Boston Marathon bombing, setting a precedent for increasing use of sophisticated security IT systems nationwide.

10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.

10 Tools To Beat Email Overload
New tools and services promise to help you put more love into your love-hate relationship with email. We check out the contenders.
 

WEBCASTS:

Secure Cloud: Taking Advantage of the Intelligent WAN
Join us to hear top industry experts discuss the private data network technologies that are best suited for enterprise cloud access requirements. You won't want to miss this opportunity to learn how your organization can best mitigate risk while reaping the full potential benefits of the cloud. It happens Wednesday, June 12, 2013.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
E2 Conference Boston
E2 is the only event of its kind, bringing together business and technology leaders looking for new ways to evolve their enterprise applications strategy and achieve business value. Join us in Boston, June 17-19, for three days of 40+ conference sessions and workshops across eight tracks and discover the latest insights in enterprise social software, big data and analytics, mobility, cloud, SaaS and APIs, UI/U, and more.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.