Advertisement

Kamis, 25 Juni 2015

Will Microsoft Shift Away from Software Licensing? - infoTECH Spotlight

 
 
Follow us on:
 

Featured Articles


In a world where Microsoft is the dominate player in the software space, it's hard to believe the company would think about a different approach to the market. While software licensing is where the profit dollars exist, the cloud is where opportunities lie in the future. As such, the software giant is transitioning to the cloud in a big way.
AgilData CEO Dan Lynn's presentation on the main stage of Cloud Expo NYC starts off with a black and white video clip of Bruce Lee explaining the agility of water. He says with his indelible charm, "Water can flow or it can crash. Be water my friend."
Ask any IT director what one of his or her biggest headaches is, and that individual will probably tell you that it's keeping track of software licenses. Vendors today license in a variety of different ways, so a single organization may be trying to keep track of licenses that are per user, per device, per core, per memory or even unlimited. Vendors say the complexity is necessary if they're to provide users with the flexibility they want.
Just as the French discipline of parkour identifies the most efficient route from point A to point B, Tel Aviv based network security company Tufin automates secure application connectivity over an enterprise network. And like parkour-the subject of viral Internet videos of athletes scaling skyscraper facades and hopping between rooftops-the idea, in theory at least, is to do this as safely as possible.
For most of us, threats to our computer systems come from the outside in. We're concerned about viruses, about malware, about distributed denial of service (DDoS) attacks that can cripple our systems without proper vigilance. But what we don't commonly consider is the attack that comes from the inside, and a new report from Crowd Research Partners suggests that this may actually be an even bigger threat to our systems' way of life.
Face the facts: at some point, sooner or later, your system will be breached. It's no longer a question of "if", but rather "when". Why? It has to do with the very nature of the Internet itself, the increasing complexity of our connections, and a growing web of software and hardware that daily adds openings into the silos we expect to be interconnected and secured all at once.


Top Stories




TMCnet Free Premium Content


Featured Channels


Advertise With Us

General advertising Info: Click here

Become a TMCnet columnist!

Become a TMCnet columnist! Want to contribute your expertise to a growing audience of technology professionals? Become a writer, blogger or columnist for the TMCnet Web site and this newsletter. Contact TMCnet Group Editorial Director, Erik Linask, at elinask@tmcnet.com for details.



 

 

RESOURCES

 

Whitepapers

Publications

Videos

Events

Webinars

Blogs

Free eNewsletters


 

This email was distributed by: Technology Marketing Corporation, 800 Connecticut Avenue, Norwalk, CT 06854 As a valued reader or attendee of TMC's publications and events, you will occasionally receive carefully-screened offers and free product information via email. If you no longer wish to receive this type of email, please go to http://www.tmcnet.com/enews/subs.aspx?eml=ipat39@gmail.com to adjust your preferences.

 
     

Tidak ada komentar:

Posting Komentar