Editor's Corner: What if the Facebook Platform really became a platform? Also Noted: RAMP Spotlight On... Security as an excuse for avoiding DevOps AT&T looking at DirecTV (again); Sprint looking at T-Mobile (again); and much more... Follow @fierceentcomm on Twitter News From the Fierce Network: 1. BYOD security: Not my job, say many employees 2. CIOs told that IT decisions are better left to others 3. Bloomfire now integrates with online storage vendors This week's sponsor is ProofPoint. | | The last few years have seen a dramatic increase in the use of email as a vehicle for cyberattacks on organizations and large corporations. Recently, Proofpoint researchers identified a new class of sophisticated and effective, large-scale phishing attack dubbed "longline" phishing attacks. Download this whitepaper to learn about the unique characteristics of these attacks, how they are carried out, and the alarming effectiveness they have. Download today! | What if the Facebook Platform really became a platform? The word "Zynga" characterizes both the vigor and the speed with which the first generation of Facebook apps entered and exited the public conscience. Usually a company doesn't have to lead the news with headlines about plotting a chart for growth unless its chart, up to now, had been pointing it the other direction. The fortunes of Zynga and other social game makers depend almost entirely on the platform that supports it. Although there are Zynga games outside of Facebook, it was essentially Facebook that vaulted the company and its virtual farms to prominence. Both my longtime readers will recall how hard on Facebook I've been in the past. Some folks have said I haven't been fair to Facebook, since I'm not even a member (indeed, I'm one of the six holdouts). A few years back, a reader suggested that I haven't earned the right to complain about having my private data be exploited by anonymous apps on Facebook's platform without my permission (as if I or anyone would check a box saying, "Yes, please exploit my private data, I'm perfectly fine with that") until I've joined the service and become a victim myself. So here I am in my new digs dealing with communications systems and data platforms, and I finally have an opportunity to wield my mallet at my old, familiar punching bag. And yet I'm not going to take the swing. Yes, settle down, both of you, I'm going to play fair. A year ago already, Facebook acquired mobile apps platform Parse. At the time, I thought to myself, whoops, there goes another platform, ker-plop. It would be like AOL after acquiring Nullsoft, AOL after acquiring MapQuest, AOL after acquiring MusicNow and CNN after acquiring journalists. I remembered how promising it seemed when Facebook invested in HTML5 development at long last, only for Mark Zuckerberg to publicly trash that decision just months later, well before it would have borne fruit. When my friend and colleague Al Hilwa, who directs software development research for IDC, wrote me the other day to say there's positive prospects for Parse, at first, I had to clean coffee off my keyboard. Then I thought this over, applying the same logic I used to declare Heroku the best enterprise cloud service of 2011. Yes, I sometimes use logic, and sometimes it even works. Here's mine: Users don't really care about platforms unless there's something wrong with them. If platforms work, they care about the apps, and that's fine. When Facebook invests in its platform as an identity unto itself, a destination, a portal--that's wasted energy. When apps provide the same features to users as Facebook provides now, and perhaps with better usage models, they'll embrace apps. Perhaps this once, Facebook actually gets this. Zuckerberg was wrong to trash HTML5 just because he doesn't understand it, the same way Donald Sterling is wrong to trash humans because he doesn't understand them. But Parse could work, theoretically, if it provided a platform for apps to provide their own identities and usefulness and brands without being interrupted by a big, freakin' "f." Maybe the apps you use on your phone right now run on Heroku. Would you know it? You might, if they acted strangely. But as long as they don't, Heroku's ultimate benefactor, Mark Benioff, is perfectly happy with supplying the resources, engaging the customers and reaping the rewards. This makes Wednesday's announcement from the Facebook f8 conference quite intriguing indeed: Parse apps will soon be able to run on your phone offline, by way of an offline data store. Keep in mind, Parse is not just a system for growing virtual carrots and pigs in real-time. For example, a service called Chef that enables on-demand scaling of Amazon AWS server capacity for other apps runs on Parse. If Parse develops to full fruition, just as if Zuckerberg had never heard of it, then conceivably it can extend Facebook's presence in mobile services without the baggage of the social network. It is this heavy, unwieldy, frankly ugly social service that is Facebook's boat anchor. If for once, it has the perseverance and good manners to step aside and let Parse apps do what they do, Zuckerberg would have a grin as big as Benioff's. And I will be the first to hit the "Like" button. Read more about: Facebook, Facebook f8 back to top | | Today's Top News 1. FCC chair dances around 'commercially reasonable' The FCC's now-regular public reprimand of the press for misinterpreting its ongoing revisions to "Open Internet" regulations as anything less than open reached a new crescendo on Tuesday. Like a camp counselor reminding scouts that sleeping in the rain is still an option for those who would prefer he not regale them with tales of his first dates, FCC Chairman Tom Wheeler wrote at greater length on the Commission's blog than before, saying "the Internet will remain an open pathway" and that ISPs' efforts to degrade service based on content or application "would be shut down." In his Tuesday post, Wheeler provided further detail about the meaning of the "commercially reasonable" amendment to the FCC's Open Internet regulations, the earlier version of which having been struck down by the D.C. Circuit Court of Appeals in Verizon v. FCC last January. "Something that harms consumers is not commercially reasonable," wrote Wheeler. "For instance, degrading service in order to create a new 'fast lane' would be shut down." Of course, smart consumers can do the math here: Perhaps technologies such as deep packet inspection, or DPI, may not be permitted to enable service degradation for applications such as P2P, which ISPs have historically found questionable even though many legitimate VoIP applications use P2P. But let's assume for the sake of argument that all Internet hosts treat all IP packets equally. In such an alternate-universe utopia, we could arbitrarily assign a Quality of Service tag to every packet, and call each QoS a "3." Maybe degrading some applications to a QoS of "1" would be illegal. But what would stop ISPs from arranging to upgrade every other application to a "5?" Chairman Wheeler's new details indicate the FCC would prohibit such a QoS upgrade, but only in one instance: "Providing exclusive, prioritized service to an affiliate is not commercially reasonable. For instance, a broadband provider that also owns a sports network should not be able to give a commercial advantage to that network over another competitive sports network wishing to reach viewers over the Internet." What Wheeler is clearly stopping short of saying is that any means of applying QoS to Internet services is commercially unreasonable, and thus would be prohibited by the revised regulations. In its January decision, the D.C. Appeals Court declared the FCC lacked the authority to enforce the existing Open Internet order while, at the same time, claiming it wasn't treating Internet service like telephone service--with its common carrier provisions. But the Court was kind enough to present a legal theory for how an order could be enforced--specifically, if it "encourage[d] the deployment on a reasonable and timely basis of advanced telecommunications capability to all Americans." Sounds like a laudable goal. It's also a roadmap for how the FCC could regulate Internet service under Title II of the Telecommunications Act, meaning ISPs would be treated more like common carriers. More than once in Wheeler's Tuesday message he referenced the specter of regulating Internet service providers with the same law that gave us universal service. "I do not believe we should leave the market unprotected for multiple more years while lawyers for the biggest corporate players tie the FCC's protections up in court," wrote the Chairman. "Notwithstanding this, all regulatory options remain on the table. If the proposal before us now turns out to be insufficient or if we observe anyone taking advantage of the rule, I won't hesitate to use Title II. However, unlike with Title II, we can use the [Appeals] court's roadmap to implement Open Internet regulation now rather than endure additional years of litigation and delay." The proposed rulemaking remains scheduled for discussion at the next FCC open meeting on May 15. At this rate, we can expect perhaps four more missives from the Chairman before the meeting convenes. UPDATE 3:45 pm ET 30 April 2014: In a letter responding to Chairman Wheeler's blog post (.PDF) dated April 29, Sen. Al Franken (D - Minn.) cautioned him against any effort to revise the original Open Internet order in such a way as to permit a "fast lane," calling that a "misguided approach." Playing on some of Wheeler's own choice of words, Sen. Franken wrote, "Struggling to craft a 'commercially reasonable' standard misses the point: Pay-to-play arrangements are inherently discriminatory and anticompetitive, and therefore should be prohibited as a matter of public policy. They increase costs for consumers and give ISPs a disincentive to improve their broadband networks -- undermining the FCC's mission to protect the public interest and strengthen the nation's broadband infrastructure... The FCC should be working to sustain competition and consumer benefits, not creating unnecessary tolls for businesses and consumers." For more: - read Chairman Wheeler's blog post on FCC.gov - read Sen. Franken's response letter (.PDF) Related Articles: FCC tries 'commercially reasonable' net neutrality compromise FCC Chairman Wheeler: There's the Internet, then there's interconnection Read more about: Net Neutrality, Tom Wheeler back to top | This week's sponsor is CPL. | | FastCast Webinar: Reduce Datacenter Energy Costs by up to 15%: Software Meets Datacenter ROI Friday, May 15th, 2pm ET/ 11am PT Join us for a look at two Intel Datacenter Software solutions, sample use cases, and implementation overviews. Intel Data Center Manager (Intel DCM): Energy Director provides device-level power and thermal monitoring and management for groups of servers, networking, storage, and other IT equipment. Register Today! | 2. Nokia Networks emerges from sale of devices unit For years, Microsoft executives told me that the keys to the technology kingdom lay in the hands of the people who build the platforms upon which its castles rest. Today, those executives are spectators outside Microsoft's castle walls, as it becomes one of the world's biggest device manufacturers. And the company that gave Microsoft that part of its castle, Nokia, begins making its all-new case that the technology kingdom lay in the hands of the people who build the platforms. The NSN brand, which had come to represent the broadband technology arm of the former mobile phone manufacturer Nokia and its former partner Siemens, is being gently retired in favor of "Nokia Networks." And the man who led NSN to prominence, Rajeev Suri, becomes CEO of Nokia as a whole. "All the changes in technology that we have seen in recent years, from lower cost computing and connectivity, to better network, cloud-based data and processing power, [and] the increasing ubiquity of sensor-laden smartphones and other devices, are starting to come together and create something much greater than sum of those parts," stated Suri Tuesday afternoon, during his first quarterly earnings call in his new role (thanks to Seeking Alpha for the transcript). "That something has been called the programmable world by some. And we like that name. It is a world where physical objects of all kinds; cars, TVs, medical devices, wrist bands and more will have built-in computing power, sensors and connectivity. These objects will become bound together with intelligence built on vast amounts of data that is processed in the cloud and used to automate and simplify, to create new services and to improve people's lives in many areas." It is an astonishing transformation, and if Suri can pull it off, he might just become the greatest corporate savior since Steve Jobs. As Suri made clear Tuesday, and perhaps for the last time, the device business is a losing prospect. According to Nokia's published Q1 2014 numbers, its "discontinued operations" were operating at a margin after net sales of -16.9 percent, resulting in a loss of €326 million on €1.93 billion of net sales. Congratulations Microsoft, that's now your problem to solve. Nokia Networks, meanwhile, had a healthy gross margin of 39.6% percent on €2.33 billion of net sales, €1.25 billion of that accountable to the Mobile Broadband unit. And while Microsoft has use of Nokia's patent portfolio, Nokia still owns it. So now that it's no longer a competitive mobile phone producer, it can stop wasting money on intellectual property spats that never end, and instead reap healthy revenues from collaboration agreements like the one Nokia made in February with former rival HTC. Microsoft needs to build its Windows Phones, including those with Nokia brands, into devices that offer competitive native services, especially given Google's reinvestment in Android and in its own services, including Google Now. All good mobile services are based around location; and if Google Maps has any serious competitor from a technological perspective, it's Nokia's HERE, which embeds contextual intelligence and information from nearby advertisers into its always-improving location finder app. HERE beats the tar out of Microsoft Virtual Earth, and will likely replace it soon. If Windows Phone 8.1 sinks against Android, Microsoft will surely receive the blame. But if it makes inroads, Rajeev Suri may be the one taking the bow. For more: - see the transcript from Seeking Alpha - see the Nokia release on collaboration with HTC - explore Nokia's HERE site Related Articles: Linux Foundation enlists Microsoft, Cisco, Facebook to help save OpenSSL [includes news on NSN donation] Siemens explores sale of NSN with private equity firms Read more about: Microsoft Devices and Services, Nokia Siemens Networks back to top | 3. Execs uncertain of data security in or out of the cloud One definition of "big data" is the assembly of all the related data, and the extrapolation of new facts from it. The timely release on Tuesday from two different commissioning sources of separate reports based on surveys conducted by the same Ponemon Institute reveals a new and perhaps more disturbing fact than either report revealed on its own: Companies that move their critical data to cloud-based storage aren't any more certain that the data is protected than they were before the move. The emergent fact comes from one Ponemon Institute study sponsored by security gateway provider Websense, based on data from a survey conducted in Q4 2013; coupled with a second Ponemon study sponsored by identity management service provider Thales e-Security, compiled from a separate survey conducted in 2013 and first published as part of a broader report on encryption in February. Granted, these are separate samples--the former being 4,881 IT and security practitioners in 15 countries, who are responsible for their on-premise security; the latter being 4,275 executives and IT managers in 8 countries who were responsible for moving their data off-premise and into the cloud. Both surveys covered Australia, Brazil, France, Germany, the U.K. and the U.S. Importantly, the former survey included Canada, China, Hong Kong, India and Italy; the latter survey covered Japan and Russia. It's important to note these surveys took place before the Heartbleed revelations. With those caveats in mind, the suggestion still comes through pretty clearly: The responsible parties for protecting their companies' private data are no more certain of that protection after moving to the cloud than before. The data may actually be safer, but the important fact here is, executives don't know it either before or after the exodus. Apparently, no one tells them and they don't ask. For the Websense-sponsored report, 57 percent of IT security practitioners asked believe their organization is not protected from "advanced cyber attacks," and 63 percent responded they were in no position to stop the pilfering of private data if they were attacked. This despite 44 percent of respondents stating they know for a fact they were substantially attacked (meaning, infiltration did take place) at least once in the past year. Moving to the Thales-sponsored report, we find 59 percent of executives and IT managers asked believe their cloud-based data, once at rest, is probably not protected by any means, including encryption, tokenization, suppression or masking. When the scope of the question is narrowed, 45 percent of the cloud group believes their data actually is readable, once it becomes part of a SaaS application. Think about this for a moment: When executives' responses are treated anonymously, regardless of whether or not they have security and compliance initiatives and frameworks in place both in and outside the cloud (and they very well might), and whether or not they meet their respective governments' standards, nearly half cannot personally attest to the security and integrity of personal and private data they hold about their customers, clients, partners and patients. The implication here is not that the data is insecure (although plenty of sources will attempt to leap to this conclusion). It is that the responsible parties don't know, even when efforts are being made to restructure how that data is stored. Organizations these days are so interested in breaking down the walls of their vertical silos. Perhaps they should take a look at the horizontal walls while they're at it. For more: - see the Ponemon study sponsored by Websense - see the Ponemon study sponsored by Thales e-Security Related Articles: Average SQL injection attack takes 7 months to find, fix [FierceITSecurity] Mobile security IT is not my problem, say workers [FierceMobileIT] Read more about: Websense, Ponemon Institute back to top | 4. Analysts give credence to IMS over VoLTE Internet Protocol has held the promise of carrying all the world's telecommunications traffic--live voice, data and video--simultaneously, ever since the 3GPP specifications group proposed the IP Multimedia Subsystem in 1999. IMS was to have been the harbinger of convergence between all fixed and mobile communications, as well as the end of circuit-switched networks. It was, in a sense, unified communications--assuming by that we mean, all the communications services of the world getting together and agreeing to unify on this completely new and different platform. It was as unified a platform as Esperanto was a common language. Getting operators on board with 3GPP's first attempt at interoperability--Rich Communications Suite, or RCS--fizzled out, especially as a new generation of tablets brought with them over-the-top communications apps that, in carriers' minds, rendered major investments in new IP communications hardware redundant. "Nobody was buying IMS just to do IMS," remarks Joe Hoffman, practice director for mobile networks at ABI Research, in an interview with FierceEnterpriseCommunications. But recently we've been seeing a revival of IMS with some vendors, most notably Alcatel-Lucent. What's different now? "They buy it today because they want to put VoLTE [Voice-over-LTE] on there, and all the other things that come from the digital communication age." After one vendor was bold enough to put its toes back in the IMS waters (probably A-L), Hoffman tells us, he was skeptical of its strategy. "IMS has such a heritage for big, heavy iron. When you're trying to support ten, fifty, a hundred million subscribers, and push that down into enterprise, things do have to change a little bit." That change will be gradual, believes ABI, but it will come. In a report released last April 22, ABI's Sabir Rafiq surprised me by predicting that IMS could earn a handful of vendors a collective sum of $1.2 billion in revenue over the next five years (not annually, but the five-year total). That's not astounding, but it's not flat either--and IMS-related revenue growth was truly flat, all through the last decade and into today. Unified communications evolved largely without IMS. But now with cloud dynamics potentially playing a role, there's an argument to be made that IMS has cast off its heaviest anchor: all that dedicated hardware. Vendors can now present IMS as a service, so long as they have the cloud infrastructure to support it--and A-L certainly has that. Hoffman believes the best immediate opportunity for IMS will be sales to large enterprises, not small, in partnerships with mobile operators. "It's really only right now for the companies that can afford this kind of a thing. And what would drive them to it is the merging of telecom and IT, which is what you're seeing in the operator world now, and also what you're seeing in the enterprise market--starting with the bigger guys, because of the roadmaps of technologies they want to deploy, and things they want to do with rich communications." UC has the flexibility to scale services down to the SMB customer level right now. Today's IMS, in its new guise as a UC alternative, probably cannot scale down that far, Hoffman argues. Studying the 2,000 largest companies, he says, ABI drew a line in the sand of organizations with 10,000+ employees, and easily came to the conclusion that IMS would appeal above that line. "We don't believe this is a technology that is fit to knock out unified communications," he adds, "because quite frankly, the UC market is two orders of magnitude bigger. But we do see an attraction of merging telecom and IT for the larger companies, moving down into medium-sized companies." For more: - see the ABI report from last April Related Articles: Mobile fuels strong growth in policy management market, says Infonetics [FierceMobileIT] Enterprises look to one operator to provide both mobile, fixed-line services [FierceMobileIT] RCS offers enterprises an alternative to BYOD [FierceMobileIT] Read more about: ABI Research back to top | Also Noted This week's sponsor is RAMP. | | eBook | Finding the Payoff in Enterprise Video Video is a powerful medium for communication. Its potential uses range from sales and marketing through employee communications, training and more. But enterprise use has grown in fits and starts. In this eBook, FierceCIO explores the capabilities, culture and infrastructure to find the payoff in enterprise video. Download this eBook today. | SPOTLIGHT ON... Security as an excuse for avoiding DevOps If you made a list of the things that stood as obstacles to your organization adopting better technology or sounder business practices, there's a good chance you'd discover most, or even all, these things boiled down to one lone factor: culture. But culture takes many forms, and as my friend and colleague George V. Hulme reports, more often these days, it's turning up in the form of quality assurance. For example, an organization that may be hesitant to adopt DevOps practices (endowing admins with developers' skills) may plead that giving admins that level of knowledge runs contrary to someone's security framework. Read more: DevOps: Caution Ahead [by George V. Hulme, DevOps.com] > Reduce Datacenter Energy Costs by up to 15%: Software Meets Datacenter ROI - Friday, May 16, 2014 - 2 pm ET / 11 am PT Join us for a look at two Intel Datacenter Software solutions, sample use cases, and implementation overviews. Intel Data Center Manager (Intel DCM): Energy Director provides device-level power and thermal monitoring and management for groups of servers, networking, storage, and other IT equipment. Register Today! | > Enterprise Connect Lync Tour - May 7 ? June 24 - Various Locations Attend a free one-day workshop to get the insight and strategy you need to evaluate and successfully implement Lync in your enterprise. May 7 :: San Francisco May 12 :: Boston May 20 :: Chicago June 24 :: New York Don't miss this free, "must attend" event - register today for the location nearest you at enterpriseconnect.com/tour/. > Keeping virtualized environments safe - June 2-5 - Nice, France - Sponsored by: TM Forum Live! TM Forum Live! addresses the issues and opportunities surrounding virtualization for service providers and various types of enterprises, with presentations from Deutsche Telecom, AT&T, Telefonica and more. Save up to $400 on a gold pass when you register with voucher code PW3DA2! > GSMA Mobile Asia Expo 2014 - June 11-13 - Shanghai, China Mobile connects us to new information, possibilities, people, ideas and experiences. Mobile Asia Expo showcases the mobile solutions that are transforming our lives today and into tomorrow. Register now to join us 11-13 June 2014 in Shanghai, China, where we are Making Global Connections. | > Whitepaper: Avoiding the top three challenges of custom-coded SharePoint applications In this white paper, learn about the challenges of custom coded SharePoint applications. Then, see how you can overcome them to create the SharePoint sites you want. Download Today! > Whitepaper: IT Made Easy with ManageEngine ServiceDesk Plus ManageEngine ServiceDesk Plus is an ITIL-Ready Help Desk Software with integrated asset and project management. True to our tagline, "IT Made Easy", ServiceDesk Plus wins hands down when it comes to ease of use, out of the box settings and integration. Visit http://www.servicedeskplus.com/ to check out the list of features that come at just $995 and to download a 30-Day Free Trial! > Whitepaper: How to Add Attachment Viewing to Salesforce Read this Accusoft whitepaper to learn about the case for an attachment viewer for Salesforce. Download now. > Whitepaper: Finding ROI in Document Collaboration Read this Accusoft whitepaper to learn about the factors that make document collaboration more difficult than it should be, and about how to create a collaboration strategy that makes sense for your organization. Download Now! > Whitepaper: Delight & Engage Customers with Mobile APIs Read this success story and learn how a robust API and secure API Management powered Keep’s iOS app to become one of the most popular apps in the Lifestyle category in the iTunes App Store. > Whitepaper: Best Practices for Migrating to SharePoint Online in Office 365 Having evolved from a document repository into collaborative platform, learn the best practice for migrating to SharePoint Online in Office 365, and harness the power of the cloud for high availability and secure data storage. Download Now. > eBook: eBrief | How Big Data Changes The Way You Think and Operate Big data allows companies to focus on individuals instead of vague trends. Businesses that jump in and start learning now can reap an advantage over slower competitors. Download this eBrief today! > eBook: Critical Infrastructure and Cybersecurity This FierceITSecurity eBook looks at key dependencies among critical infrastructure sectors and how companies in these areas can stay ahead of threats and maximize their defensive efforts. Download this eBook today! > Whitepaper: Best Practices for Migrating to SharePoint 2013 SharePoint 2013 has the industry buzzing. It’s powerful and a vast improvement over previous versions. In this white paper, get best practice to ensure your migration to SharePoint 2013 is quick, easy and cost effective. Download Today! > Whitepaper: 5 Unsung Tools of Dev Ops Jonathon Thurman shares his five favorite DevOps tools which have been around a long time. They may not be flashy but they're time tested and just work. He also tells you how to use them and how to configure them for maximum value. Download 5 Unsung Tools of DevOps to see which tools make the cut and why. > eBook: Getting to DevOps (And Getting the Payoff) DevOps is a more holistic approach to application development, more fully taking into account deployment and ongoing operational needs – and tossing a lot of automation into the mix. This FierceEnterpriseCommunications eBook provides step-by-step guidance on implementing DevOps for CIOs and IT and application development managers. Download this eBook today! > Whitepaper: 802.11ac in the Enterprise: Technologies and Strategies Download the White Paper "802.11ac in the Enterprise: Technologies and Strategies" to learn from industry expert Craig Mathias about the technologies behind 802.11ac, deployment misconceptions and review steps that every organization should take in getting ready for 802.11ac. Download today! > Whitepaper: Defense Against the Dark Arts: Finding and Stopping Advanced Threats Today's most-damaging targeted attacks don't occur by happenstance. They are carefully planned and executed by a new breed of professional adversaries. Read this white paper, Defense Against the Dark Arts: Finding and Stopping Advanced Threats to gain a practical understanding of today's Advanced Threat Landscape and strategies for detecting and stopping Advanced Threats. Download today! > Whitepaper: Longline Phishing: A new Class of Advanced Phishing Attacks The last few years have seen a dramatic increase in the use of email as a vehicle for cyberattacks on organizations and large corporations. Recently, Proofpoint researchers identified a new class of sophisticated and effective, large-scale phishing attack dubbed "longline" phishing attacks. Download this whitepaper to learn about the unique characteristics of these attacks, how they are carried out, and the alarming effectiveness they have. Download today! > Whitepaper: Hardware Test Equipment is the Key to Accurate Network Testing Surprisingly, many organizations are not adequately testing their networks. Network testing is crucial for any IT organization that wants to ensure availability, security and performance of applications and services running on their networks. Download this whitepaper now to learn more! > Whitepaper: Supporting VDIs and Thin Clients Companies have already begun deploying VDIs and thin clients (like Google's Chromebook) on a massive scale. The low-cost, easily deployed workstations present a significant cost savings for companies, but require unique tools to support them. This whitepaper, written by Proxy Networks, outlines the best way to do that. Download now. > Whitepaper: Four Ways to Improve IT Efficiency The role of the help desk within businesses has expanded considerably over the last decade, becoming an integral piece of the overall corporate strategy. In this whitepaper, Proxy Networks outlines the best way to align your IT department with that strategy in order to improve overall departmental efficiency. Download now. | |
No comments:
Post a Comment
Keep a civil tongue.