Skip to main content

Notable quotes about Microsoft, Oracle and others in the software industry ecosystem

By June 14, 2014Uncategorized

The US government should stop trying to force tech companies to circumvent treaties by turning over data in other countries. Under the Fourth Amendment of the US Constitution, users have a right to keep their email communications private. We need our government to uphold Constitutional privacy protections and adhere to the privacy rules established by law. That’s why we recently went to court to challenge a search warrant seeking content held in our datacenter in Ireland. — Brad Smith, chief counsel, Microsoft

We have reached a deflection point in managed services. There will be more change in the next two years than the last 15 and more opportunities for MSPs to re-invent themselves, leapfrog their competition and become more competitive with their pricing, he said. — Mike Cullen, vice president of worldwide sales and business strategy, MSP at N-able

While Salesforce Wear will certainly aid businesses looking to implement wearables into their mobile strategy, several barriers and important consideration still exist for entering the Internet of Things market. Companies entering the wearable space will still need to develop new ways to secure and support these new classes of devices and their associated data. — Nicholas Evans, CTO, Unisys

There is a radical uptick in performance when you move an application into memory. … The bottom line is that in-memory database technology has become such an elemental part of the business technology landscape that it was important for Oracle to deliver a solution specifically branded as in-memory. — Charles King, analyst, Pund-IT

So, in that sense, it is a great protocol for sharing sensitive data and data that is intended for reuse by 3rd parties, to ensure proper and accurate reuse. The HTTPA protocol [“HTTP with Accountability, being developed at MIT] seems able to prevent data from being transmitted if any of the policies are violated. Since that action is taken at the HTTP handshake level, that should protect private, confidential and secure data more robustly and at the wire level – versus through fragile database lookups. — Kirk D. Borne, professor, George Mason University

Copy link
Powered by Social Snap