| This week's sponsor is CA Technologies. |  | Webinar: Rethinking Enterprise Mobility Management – Beyond BYOD Thursday, May 29th, 12pm ET / 9am PT Our panel of experts will help you understand how to develop effective strategies that accelerate mobility transformation and prepare your organization for the mobile future. Register Today! | Also Noted: RAMP Spotlight On... The IT buyer isn't the same person anymore Target's CEO falls; EMC's storage scale flies and much more... Follow @fierceentcomm on Twitter News From the Fierce Network: 1. IT security execs convinced data breach is coming 2. Candy Crush takes mobile gaming crown from Angry Birds 3. Apple beats Samsung in court but loses in marketplace | This week's sponsor is Mashery. |  | Delight & Engage Customer with Mobile APIs Read this success story and learn how a robust API and secure API Management powered Keep's iOS app to become one of the most popular apps in the Lifestyle category in the iTunes App Store. Read now! | Today's Top News 1. Nokia doesn't have to buy Juniper Networks Mergers are only necessary when the emerging whole entity is greater than the sum of its parts. In recent years, this has become a rare occasion. Flying in the face of European business analysts who last February foresaw Nokia's NSN division and Juniper Networks merging, the newly minted Nokia Networks announced jointly with Juniper on Monday that they can both advance their goals with a smarter arrangement: a partnership. The result of this partnership will be a single OpenStack-based telco cloud platform, bundling together Nokia's Liquid Core NFV and core virtualization system for managing telco service applications, Juniper's MetaFabric switching and routing architecture and Juniper's Contrail SDN platform. The move will put both companies in a better position to tackle Alcatel-Lucent, as well as Cisco, Ericsson, Huawei and emerging NFV competitor HP without all that sticky reorganization hassle that Nokia doesn't exactly want to repeat right now. Under the terms of their arrangement, Nokia will be handling the end-to-end service part of the bundle--meaning it should take the lead in selling and representing the bundle to customers. Both SDN and NFV are architectural layers of abstraction. SDN creates an adaptable virtualized network that is best suited for the applications at hand, by dividing the control from the data plane and letting logical tables define the relationships between the virtual map and the real hardware. NFV can virtualize the real hardware, presenting a virtualized router map that can adapt more readily to the traffic it's carrying. When the two technologies were introduced, the tech press mistook them for being competitive. Actually, they're complementary, with the result of their integration being increased and prolonged utility of more generic server hardware. Last February, Rajeev Suri, the director of NSN's telecom business--now Nokia Networks' CEO--found himself in the position of downplaying rumors fueled by Reuters' reporting of his company merging with Juniper. At a Mobile World Congress press conference in Barcelona, Suri told reporters, "There are no synergies" between a wireless network company like his and a router and switch manufacturer like Juniper. Just because the platform incorporates products from different markets does not mean the markets can or should merge, Suri implied. It's a clear indication that this new CEO is capable of making some well-reasoned and sound decisions, in the face of pressure from investors to make headlines. For more: - see the Reuters report from February - read about Nokia's Liquid Core, Juniper Network's MetaFabric and their Contrail SDN - read about the HP Network Functions Virtualization - look over Rajeev Suri's comments on the partnership Related Articles: Nokia, the networks and services company, ventures forth Juniper is laying off 6 percent of its employees Read more about: Juniper Networks back to top | | This week's sponsor is CPL. |  | FastCast Webinar: Reduce Datacenter Energy Costs by up to 15%: Software Meets Datacenter ROI Friday, May 15th, 2pm ET/ 11am PT Join us for a look at two Intel Datacenter Software solutions, sample use cases, and implementation overviews. Intel Data Center Manager (Intel DCM): Energy Director provides device-level power and thermal monitoring and management for groups of servers, networking, storage, and other IT equipment. Register Today! | 2. Cisco ditches WebEx Social, partners with Jive Software What enterprise service vendors call "the social wave" is confusing. It's a trend where workers use their own means to communicate with one another. It drives productivity, it reduces costs, it improves morale and it benefits the business. And that's a problem, because the revenue from all this goodness does not flow back to enterprise service vendors--not when workers are left to their own devices. Case in point: Cisco began its journey into enterprise collaboration services just a few years ago. That journey ended last with the announcement that Cisco was partnering with Jive Software. Jive is a very popular consumer-grade, cloud-based collaboration platform provider, which is becoming more familiar to admins as they notice more and more employees using it without any strategic investment or training initiative or paradigm shifting taking place. Back in 2009, Cisco's collaboration strategy could be described in large part with the single word "Microsoft." Essentially, Cisco provided the pipes and the routing, and Microsoft provided the servers and the front end. The key to collaboration at that time according to a Cisco strategy paper (.pdf) was "integration." The way it would provide a "media-rich collaboration experience" was to facilitate Microsoft's facilities for Windows: for telephony, Microsoft Office Communications Server; for point-of-presence, federation with Microsoft Live Communications, showing up in Microsoft Exchange Calendar; for instant messaging, Microsoft Exchange feeding into Microsoft Outlook; for document sharing, Microsoft SharePoint; for conferencing and collaboration, Microsoft Office Communicator... and the list actually doesn't stop there, but you get the general picture. The word "social" did not appear once in this initial strategy paper. The problem Cisco's customers must have had with this initial strategy appears to have been addressed in 2010 in a subsequent paper (.pdf) which focused on the familiar topic of return on investment. "Strategic ROI is often hard to quantify in dollars," reads the 2010 paper. "But strategy is the area where business transformations occur. Collaboration tools help companies enter new markets; build new business models; accelerate innovation cycles and make faster, better decisions. These tools enable the major moves that lead to competitive advantage and reinvention of how you do business." Why, O why were workers not collaborating with one another when enterprise software vendors were serving it to them under appropriate license terms? To its credit, Cisco attacked this question head-on, and came to the conclusion it needed to redefine the collaboration experience. In mid-2010, it bet big on an idea called Cisco Quad, whose usage model incorporated the iPads that were in nearly every executive's portfolio. "Cisco Quad is an immersive platform for enterprise collaboration that integrates voice, video and social networking into one workspace," stated the company's announcement. Rather than a pipe to this Microsoft technology and a separate pipe to that one, Quad would adopt a centralized portal approach--not unlike a knowledge management system--bridging all types of content, including documents and media, into a single panel. It took a year for many to discover Quad. "Cisco Quad could become just what the enterprise collaboration market needs," wrote Gartner analyst Larry Cannell in 2011, "a competitive product from a large vendor with deep pockets and strong ties throughout most IT organizations." As a Cisco evangelist wrote at the time, maybe Facebook and LinkedIn were taboo in organizations, but with a little training session, certainly workers would see the advantage of using Quad instead, without feeling like they're sacrificing too much. Quad went through one rebranding, becoming mixed into the WebEx umbrella as WebEx Social (.pdf), but ending its original life in the process. The newly branded platform's key selling point was serving as a single portal on a single platform. But then came last week. And with a message that literally quoted Charles Darwin, for reasons Dr. Freud would certainly appreciate, Cisco VP Peder Ulander put the best face on a course change which, it must have seemed, involved a towel and the act of throwing. "We're... announcing the end-of-sale of WebEx Social today," wrote Ulander. "As the market for enterprise social software continues to develop, we're seeing the market consolidate around key vendors. To provide the best flexibility and outcomes for our customers, we're expanding our focus to work with these vendors' products and to provide native integration with products in our collaboration portfolio. Rather than emphasize social within one product, we're making sure it's an integral part of all our products." The enticement of using Internet Protocol as the enterprise's system of collaboration is that it's open and adaptable. The problem with this is that workers can adapt it themselves, rendering huge chunks of an entire industry almost helpless to justify their own existence. That industry happens to also be the lifeblood of the Internet, and if that industry doesn't find a new way to justify itself with substantive services that generate both revenue and praise simultaneously, the Internet will end up being hurt, and workers will end up feeling the pain anyway. For more: - see Jive Software's website - download the Cisco strategy paper (.pdf) - download the 2010 Cisco paper (.pdf) - read a Gartner analyst's comments from 2011 - see the Cisco evangelist's comments Related Articles: Cisco, Google sign a deal to bring WebEx to Chromebooks Cisco fights to keep videoconferencing screens relevant Read more about: Cisco back to top | 3. NTT, Fujitsu, Alcatel-Lucent prepare cross-carrier cloud demonstration On May 14, NTT, Fujitsu and the Japanese division of Alcatel-Lucent plan to demonstrate a proof of concept of telecom-scale network functions virtualization, or NFV. The idea is to demonstrate a network service application designed and implemented on a purely virtual platform--perhaps the type of service that a small telecom provider might offer to its subscribers by leasing capacity from more than one global network. NTT's translation of its proof-of-concept goals into English lost something in translation, so a direct quotation would probably send you running for the medicine cabinet. I've looked at the diagrams, and perhaps I can explain better: NTT envisions disparate telecom systems as hosts of a common virtual platform. A-L's CloudBand can serve as the NFV for that platform and Fujitsu can provide the middleware--the abstraction layer. The biggest problem with developing service applications on a telecom network, says NTT, is scalability. Naturally, as an application grows in adoption, it needs more resources. But accommodating that need typically isn't possible without rewriting the application for a network built out with those added resources. By separating the service layer from the network infrastructure, the service provider need be concerned only with the software, and network engineers don't have to worry about the side-effects of maintenance operations on the applications their systems already run. During the May 14 demonstration, the three partners promise to do the following: First, they'll launch... oh, what's a good word for this sort of thing? Let's call it a cloud. (Just a suggestion for NTT's box.) In this cloud, multiple telecom network systems will be hosting this virtual platform, and in so doing, pool their resources. This pooling will take place dynamically, while at the same time proving that the pool is providing carrier-grade functionality. Then they will scale an application out, adjusting the pooling as necessary and apply load balancing and backup. And to really show how the concept works, they'll perform live maintenance on the hardware while the scaled-out application is running. And rather than show all this off in the basement of someone's headquarters complex, participants will be enjoying the beauty and luxury of Resort MICE Island on Okinawa. As NTT stated in a position paper published last February: "We aim to establish new server architecture that will enable us to develop service applications at an early stage. In addition, we aim to expand and apply the resulting technology to support other fields that require reliability, scalability and maintainability (financial or medical fields, etc.) as well as in the communication network field in the future. Our desire is to see this technology spread and become a global standard." Back in the era before standardized operating systems, programs were designed for processors and the peripherals connected to them. The first program interpreters, like BASIC--now a half-century old--made it feasible to transport the logic of a program from one implementation to another. By "transport" in this context (take it from a veteran) I mean, print out the source code on one system's dot-matrix printer and type it into the other system. Even then, TRS-80 Level II BASIC and Applesoft BASIC were as different as English from Gaelic. The real purpose of platforms is to truly resolve the "portability" issue by establishing an abstraction layer (at least one, perhaps more) between software logic and hardware implementations. The entire history of evolved computing can be viewed as an expansion of the concept of platforms, from the smallest microcomputers toward the largest systems. The largest systems there can possibly be are global telecommunications networks. The problem there in 2014 is essentially a scaled up form of the first portability issues of 1964. Telecom network control systems and service applications are written as software, but they apply solely and specifically to the systems that host them. An interoperability platform hasn't been perceived as necessary, just as a common programming language wasn't really considered all that necessary until years after FORTRAN and BASIC were first implemented, and a common operating system wasn't even given much credence until the mid-1980s. For more: - read the NTT paper - read about Alcatel-Lucent's CloudBand Related Articles: Japanese scalable public cloud gains a foothold on US shores Alcatel-Lucent turns up NFV volume supporting mobile networks Read more about: NTT back to top | 4. CenturyLink to cut cloud block storage prices by 60 percent CenturyLink is taking a direct hit at Amazon's dominant cloud position with a series of new pricing plans and support elements as part of a broader initiative to tout their growing set of capabilities they built internally and through key acquisitions like Tier 3 and AppFog. Set to go live in mid-June, the service provider said it is reducing cloud-based CPU, RAM and block storage pricing by 60 percent and bandwidth pricing by 50 percent. In particular, it will charge $0.05 GB out/per month. "CenturyLink over many years gets this concept of bringing value to customers by reducing price," said Andrew Higginbotham, senior vice president of cloud and technology at CenturyLink Technology Solutions, in an interview with FierceEnterpriseCommunications. Besides the pricing, the service provider is also introducing a series of support bundles. Customers can choose from three support tiers, select from a list of its most popular NOC service items or work with CenturyLink's professional services team. All of these new elements are supported by its growing base of data centers. To date, the service provider has a total of 56 data centers, including 16 nodes offering its public cloud product. Higginbotham said the company is seeing "not only seeing new customers come in, but also CenturyLink customers as well as legacy Savvis customers moving onto this platform." Although much of CenturyLink's key technical talent resides in its Monroe, La., location, much of the cloud services team resides in Seattle, where the telco established Cloud Development Center. Housing the cloud team there makes sense because it is the place where other dominant players like Amazon, Google and Microsoft also reside. Following recent expansions of the public cloud capabilities into Toronto and London, CenturyLink is looking to expand into Singapore, with other possible sites in either Australia or Japan. However compelling CenturyLink executives believe their new pricing regime is, John Dinsdale, a chief analyst and research director at Synergy Research Group, says this is an inevitable move they have to make in order to stay competitive with Amazon, Google and Microsoft. "The public IaaS market is essentially becoming commoditized," he said. "While there may be some additional selling points, a lot of buying decisions are being based on a pure price-per-unit basis--and it is very easy to get comparative pricing from the various cloud operators. Companies like CenturyLink have little option but to respond to pricing initiatives from AWS (and Google and Microsoft) if they want to aggressively grow their IaaS revenues." For more: - see this blog post Related Articles: Synergy Research: Equinix, NTT lead the North America, APAC colocation markets CenturyLink, Windstream enhance their U.S. Ethernet standing, says VSG CenturyLink plans to reduce carbon exhaust by 20% by 2024 [FierceTelecom] CenturyLink, Verizon, others sharpen their data analytics skills [FierceTelecom] Read more about: public cloud back to top | 5. Newly discovered OpenID vulnerability not really new "Could the next Heartbleed," intoned about two dozen pitches lurking in my inbox, "be lurking inside your computer right now?" Well, of course, but let's be perfectly honest with ourselves: Endpoint security products didn't detect the OpenSSL bug for the past eight years it was there. How come? Because OpenSSL isn't malware, and OpenSSL was behaving the way it was programmed to behave. Like the cartoon character Jessica Rabbit, it wasn't bad, it was just drawn that way. Last Thursday, a fellow identifying himself as a PhD math student from Nanyang Technological University (with this type of story, you can't be too certain about any of your facts) named Wang Jing, reported on a personal blog the existence of a "Covert Redirect Vulnerability Related to OAuth 2.0 and OpenID"--the open source authentication mechanisms used by many Web service and content providers, including Facebook. Taking a cue from Heartbleed, Wang designed a logo and a graphical style for the public divulgence of his discovery, evidently prior to having informed anyone representing OpenID. Soon after the "Covert Redirect" promotional tour site went live, FierceEnterpriseCommunications contacted sources with the OpenID Foundation and with the Internet Engineering Task Force, which both seemed to be as aware of the discovery as we were at the time. Though we were told a statement is forthcoming from the OpenID Foundation, it had not been posted by press time. Nonetheless, one major tech news site ran the story, and subsequent aggregators throughout the echo chamber focused on Wang's characterization of the discovery as "a daunting task." Some sites reported that OpenID providers "can't easily patch it" or "won't be fixed anytime soon." But what are we talking about, really? OpenID is a mechanism for enabling one provider to authenticate identities and transfer their tokens to other providers. It's what enables you and other users to "Log in using Facebook" or "Log in using Google," and thus enables these services to provide identity as well as content. There is an architectural problem with OpenID, and there always has been. It's the notion that an authenticating site can send the token validating the identity being violated, to a site other than the one asking for authentication in the first place. It's an "open redirect," it's permissible, it's surprisingly visible and its exploitability is not only well-known but has been complained about for some time. In fact, security providers including Sophos have documented how it can be exploited, at least theoretically. As Lisa Vaas explained back in October 2012, a simple URL shortening service could be utilized to effectively mask the identity of the site receiving an open redirect. That could make it a slightly "covert redirect". And this appears to be the principle that Wang discusses on his site. Over the weekend, Internet engineer Tim Bray, previously with Google and a contributor to OpenID's Connect working group, summed up the response to Wang's warning quite succinctly: "It's got a logo! It's got a Web presence. Oh good, let's look there and figure out what the problem is. Um, nope, it's just arm-waving... I understand OAuth pretty well and it's really hard to figure out what's being claimed. I'm wondering what steps CNET took to validate this story, aside from checking out that yeah, there's a website with a fancy logo." Bray says he tried to interpret how Wang worked around OAuth's requirement that open redirects be registered, and didn't get very far. He referenced a personal blog post by OAuth architect John Bradley, who--after taking a dig at the echo chamber himself--explains that certain OAuth 2 implementers including Facebook relax their own controls, perhaps in an effort to make authentication easier for developers. For instance, Bradley notes, "Facebook only validates the domain of the registered redirect_uri, and allows subdomains containing arbitrary paths." But Bradley goes on to say he believes Wang's specific demonstration would not be possible in real life using a browser that had not been tampered with, and outside of a scenario where the attacker and the attackee are the same party. To be fair to Wang, the redirect problem is an actual problem. To the extent the problem is exploitable, then this is a vulnerability of sorts. Whether it deserves a logo and a publicity stunt is debatable. On the other hand, we're talking about it here, which is more than you could say for the status of this known vulnerability over the past few years. It does point to something of a cultural problem: We don't pay much real attention to technology unless: 1) it has a touchscreen or some other cool control system involving hand gestures; 2) it threatens to steal your identity or hijack your credit or impact the Internet core. All the dull stuff in-between gets buried beneath a heap of tweets. Perhaps Wang's stunt may be regarded as childish, but it did have the effect of elevating the topic to a level of general public discussion, which is closer to where it should be. If we're at the point where we need a "Heartbleed" stunt to wake us up to reality, then maybe we need a megaphone blaring in our ears after all. For more: - read the CNET story - see the Fast Company article and the BGR article - see Egor Homakov's blog post - see John Bradley's blog post Related Articles: Security vulnerability with its own logo and marketing: Did 'Heartbleed' backfire? Sloppy coding blamed for worldwide SSL 'Heartbleed' vulnerability Read more about: OAuth, covert redirect back to top | Also Noted | This week's sponsor is RAMP. |  | eBook | Finding the Payoff in Enterprise Video Video is a powerful medium for communication. Its potential uses range from sales and marketing through employee communications, training and more. But enterprise use has grown in fits and starts. In this eBook, FierceCIO explores the capabilities, culture and infrastructure to find the payoff in enterprise video. Download this eBook today. | SPOTLIGHT ON... The IT buyer isn't the same person anymore The role of IT purchasing in the modern enterprise is shifting from the person responsible for capital expenditures to the person who handles monthly expenses. By moving authority from the CIO to the COO, the entire strategic picture changes for why IT services and software are purchased in the first place. This is becoming a common theme for much of my work, and yet still somehow its message gets lost among certain folk (you know who you are... yes, you, stop looking so innocent) who insist upon repeating the same disastrous strategy and hoping for different results. My wife tells me that such behavior defines a "complete idiot." (She says it explains why she's still married to me, although I'm still pondering whether that's a compliment.) So just to demonstrate I'm not alone, here's yet another new source of research that demonstrates the impact of this role shift. Read more: Bye, bye, traditional IT buyer [by Mark Peters, Network Computing] > Reduce Datacenter Energy Costs by up to 15%: Software Meets Datacenter ROI - Friday, May 16, 2014 - 2 pm ET / 11 am PT Join us for a look at two Intel Datacenter Software solutions, sample use cases, and implementation overviews. Intel Data Center Manager (Intel DCM): Energy Director provides device-level power and thermal monitoring and management for groups of servers, networking, storage, and other IT equipment. Register Today! > WEBINAR: Rethinking Enterprise Mobility Management ? Beyond BYOD - SPONSORED BY: CA Technologies Enterprise mobility management is about more than just getting handle on the flood of BYOD devices coming into the organization. It is about managing the explosion of new devices, applications, content and transactions, which threatens to overwhelm IT managers. Our panel of experts will help you understand how to develop effective strategies that accelerate mobility transformation and prepare your organization for the mobile future. Register Today! | > Enterprise Connect Lync Tour - May 7 ? June 24 - Various Locations Attend a free one-day workshop to get the insight and strategy you need to evaluate and successfully implement Lync in your enterprise. May 7 :: San Francisco May 12 :: Boston May 20 :: Chicago June 24 :: New York Don't miss this free, "must attend" event - register today for the location nearest you at enterpriseconnect.com/tour/. > Keeping virtualized environments safe - June 2-5 - Nice, France - Sponsored by: TM Forum Live! TM Forum Live! addresses the issues and opportunities surrounding virtualization for service providers and various types of enterprises, with presentations from Deutsche Telecom, AT&T, Telefonica and more. Save up to $400 on a gold pass when you register with voucher code PW3DA2! > GSMA Mobile Asia Expo 2014 - June 11-13 - Shanghai, China Mobile connects us to new information, possibilities, people, ideas and experiences. Mobile Asia Expo showcases the mobile solutions that are transforming our lives today and into tomorrow. Register now to join us 11-13 June 2014 in Shanghai, China, where we are Making Global Connections. | > Whitepaper: Avoiding the top three challenges of custom-coded SharePoint applications In this white paper, learn about the challenges of custom coded SharePoint applications. Then, see how you can overcome them to create the SharePoint sites you want. Download Today! > Whitepaper: IT Made Easy with ManageEngine ServiceDesk Plus ManageEngine ServiceDesk Plus is an ITIL-Ready Help Desk Software with integrated asset and project management. True to our tagline, "IT Made Easy", ServiceDesk Plus wins hands down when it comes to ease of use, out of the box settings and integration. Visit http://www.servicedeskplus.com/ to check out the list of features that come at just $995 and to download a 30-Day Free Trial! > Whitepaper: How to Add Attachment Viewing to Salesforce Read this Accusoft whitepaper to learn about the case for an attachment viewer for Salesforce. Download now. > Whitepaper: Finding ROI in Document Collaboration Read this Accusoft whitepaper to learn about the factors that make document collaboration more difficult than it should be, and about how to create a collaboration strategy that makes sense for your organization. Download Now! > Whitepaper: Delight & Engage Customers with Mobile APIs Read this success story and learn how a robust API and secure API Management powered Keep’s iOS app to become one of the most popular apps in the Lifestyle category in the iTunes App Store. > eBook: eBrief | How Big Data Changes The Way You Think and Operate Big data allows companies to focus on individuals instead of vague trends. Businesses that jump in and start learning now can reap an advantage over slower competitors. Download this eBrief today! > eBook: Critical Infrastructure and Cybersecurity This FierceITSecurity eBook looks at key dependencies among critical infrastructure sectors and how companies in these areas can stay ahead of threats and maximize their defensive efforts. Download this eBook today! > Whitepaper: Best Practices for Migrating to SharePoint 2013 SharePoint 2013 has the industry buzzing. It’s powerful and a vast improvement over previous versions. In this white paper, get best practice to ensure your migration to SharePoint 2013 is quick, easy and cost effective. Download Today! > Whitepaper: 5 Unsung Tools of Dev Ops Jonathon Thurman shares his five favorite DevOps tools which have been around a long time. They may not be flashy but they're time tested and just work. He also tells you how to use them and how to configure them for maximum value. Download 5 Unsung Tools of DevOps to see which tools make the cut and why. > eBook: Getting to DevOps (And Getting the Payoff) DevOps is a more holistic approach to application development, more fully taking into account deployment and ongoing operational needs – and tossing a lot of automation into the mix. This FierceEnterpriseCommunications eBook provides step-by-step guidance on implementing DevOps for CIOs and IT and application development managers. Download this eBook today! > Whitepaper: 802.11ac in the Enterprise: Technologies and Strategies Download the White Paper "802.11ac in the Enterprise: Technologies and Strategies" to learn from industry expert Craig Mathias about the technologies behind 802.11ac, deployment misconceptions and review steps that every organization should take in getting ready for 802.11ac. Download today! > Whitepaper: Defense Against the Dark Arts: Finding and Stopping Advanced Threats Today's most-damaging targeted attacks don't occur by happenstance. They are carefully planned and executed by a new breed of professional adversaries. Read this white paper, Defense Against the Dark Arts: Finding and Stopping Advanced Threats to gain a practical understanding of today's Advanced Threat Landscape and strategies for detecting and stopping Advanced Threats. Download today! > Whitepaper: Longline Phishing: A new Class of Advanced Phishing Attacks The last few years have seen a dramatic increase in the use of email as a vehicle for cyberattacks on organizations and large corporations. Recently, Proofpoint researchers identified a new class of sophisticated and effective, large-scale phishing attack dubbed "longline" phishing attacks. Download this whitepaper to learn about the unique characteristics of these attacks, how they are carried out, and the alarming effectiveness they have. Download today! > eBook: eBrief | Best Practices in Mobile Application and Management Delivery Your organization knows that mobile productivity is important, and it may have already started down the road toward Mobile Device Management (MDM) and Mobile Application Management (MAM). But have you developed a holistic view of application management and delivery -- and its impact on the business? Download this free eBrief to learn about best practices for your mobile deployment. > Whitepaper: Developing for the Internet of Things: Challenges and Opportunities Cisco estimates that 50 billion devices and objects will be connected to the Internet by 2020. Will there be a role for developers in this area? And if so, how can developers position themselves in the months ahead on this nascent but potentially explosive opportunity? Register Today! > Whitepaper: Hardware Test Equipment is the Key to Accurate Network Testing Surprisingly, many organizations are not adequately testing their networks. Network testing is crucial for any IT organization that wants to ensure availability, security and performance of applications and services running on their networks. Download this whitepaper now to learn more! > Whitepaper: Supporting VDIs and Thin Clients Companies have already begun deploying VDIs and thin clients (like Google's Chromebook) on a massive scale. The low-cost, easily deployed workstations present a significant cost savings for companies, but require unique tools to support them. This whitepaper, written by Proxy Networks, outlines the best way to do that. Download now. > Whitepaper: Four Ways to Improve IT Efficiency The role of the help desk within businesses has expanded considerably over the last decade, becoming an integral piece of the overall corporate strategy. In this whitepaper, Proxy Networks outlines the best way to align your IT department with that strategy in order to improve overall departmental efficiency. Download now. | |
No comments:
Post a Comment
Keep a civil tongue.