The Burden of SaaS

Schwartz, Ephraim
December 2006
InfoWorld;12/11/2006, Vol. 28 Issue 50, p10
Trade Publication
The article presents information about software as a service (SaaS) in December 2006. The critical challenge of access and how to manage it must be addressed as SaaS enters the mainstream. Information technology companies like Aladdin Knowledge Systems, are working behind closed doors to address the problem and help make SaaS an enterprise-worthy alternative. Access issues include those of authentication and authorization. The Shadow Domain technology of Aladdin is also discussed. The article concludes with the observation that the need for tools to manage SaaS will create industry giants much like the rise of Microsoft and Oracle due to network-connected desktop computers.


Related Articles

  • IT Reluctantly Embraces Web 2.0.  // CIO Insight;2006 Research, p68 

    The article reports on the adoption of Web 2.0 popular personal technologies by the information technology (IT) executives. Accordingly, despite the concerns on security, it is difficult for IT executives to eliminate the use of Web 2.0 technologies in communicating and information sharing. In...

  • Worlds without frontiers. Condon, Ron // SC Magazine: For IT Security Professionals;Mar2004, p20 

    The article highlights the promotion of open standards to enable a secure and boundaryless information flow across organizations by the Jericho Forum as of March 2004. Led by security bosses at organizations such as BP, Royal Mail, BBC, and ICI, they have come together to form the Jericho...

  • TechEDGE.  // Certification Magazine;Apr2005, Vol. 7 Issue 4, p10 

    Presents news briefs on information technology (IT) computer software releases as of April 2005. Senforce Endpoint Security Suite 3.0 software of Senforce Technologies Inc.; AppareNet Voice Internet telephony tool from Apparent Networks Inc.; Map Accelerator for Microsoft's BizTalk Server 2004...

  • CDP moves to storage forefront. Preimesberger, Chris // eWeek;6/11/2007, Vol. 24 Issue 21, p18 

    The article discusses the importance of continuous data protection (CDP) in helping businesses better store and protect the information. CDP can be used by information technology (IT) managers in the restoration of a system to a working order within 5 minutes after a failure. Moreover, this...

  • Free Global Internet From High-Tech iKiosk at RGU.  // Multimedia Information & Technology;Nov2006, Vol. 32 Issue 4, p107 

    The article reports on the free global Internet access through iKiosk, a high technology software from Robert Gordon University's (RGU) sport center in Aberdeen, Scotland. The iKiosk is a network of touch-screen information points about the city. It offers free electronic mails, videomails and...

  • Small CUs Lean On, Learn From Providers. Jepson, Kevin // Credit Union Journal;6/26/2006, Vol. 10 Issue 25, p14 

    The article reports that leaders of small credit unions in the U.S. believe in the importance of listening to an information technology (IT) provider. Nevertheless, they realize that small credit unions do not have to take their vendors on blind faith. It is essential to establish a good...

  • Secure, or paranoid? Irving, John // Database & Network Journal;Jun2004, Vol. 34 Issue 3, p17 

    Nowadays, business is increasingly dependent on information systems. It is noted, however, that most companies are still making little progress in countering rising information security threats, despite the increased awareness of computer related risk. Threats come from hacking, intrusion, and...

  • Right Here, Right Now Personalized Content. Jedd, Marcia // AIIM E-DOC;Jul/Aug2005, Vol. 19 Issue 4, p26 

    This article discusses on the challenge for software companies to provide end users an easy access and delivery of personalized content. Nowadays, delivering the right information to the right person is very important. With information overload taken to new heights, software providers need to...

  • MONITOR APPLICATION PERFORMANCE. Dumoulin, Fred // Communications News;Sep2006, Vol. 43 Issue 9, p20 

    The article provides advice on effective monitoring strategies for the computer networks of corporations. Strategies should look at Web performance problems from three directions: the user application experience, device availability and site availability. The multipronged approach helps...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics