Sponsor

2014/05/05

| 05.05.14 | Nokia doesn't have to buy Juniper Networks

If you are unable to see the message below, click here to view.

May 5, 2014
Sign up for free:
Subscribe | Website | Jobs | Mobile Edition
Refer FierceEnterpriseCommunications to a Colleague

This week's sponsor is CA Technologies.

Webinar: Rethinking Enterprise Mobility Management – Beyond BYOD
Thursday, May 29th, 12pm ET / 9am PT

Our panel of experts will help you understand how to develop effective strategies that accelerate mobility transformation and prepare your organization for the mobile future. Register Today!


Today's Top Stories

  1. Nokia doesn't have to buy Juniper Networks
  2. Cisco ditches WebEx Social, partners with Jive Software
  3. NTT, Fujitsu, Alcatel-Lucent prepare cross-carrier cloud demonstration
  4. CenturyLink to cut cloud block storage prices by 60 percent
  5. Newly discovered OpenID vulnerability not really new


Also Noted: RAMP
Spotlight On... The IT buyer isn't the same person anymore
Target's CEO falls; EMC's storage scale flies and much more...

Follow @fierceentcomm on Twitter

News From the Fierce Network:
1. IT security execs convinced data breach is coming
2. Candy Crush takes mobile gaming crown from Angry Birds
3. Apple beats Samsung in court but loses in marketplace


This week's sponsor is Mashery.

Delight & Engage Customer with Mobile APIs

Read this success story and learn how a robust API and secure API Management powered Keep's iOS app to become one of the most popular apps in the Lifestyle category in the iTunes App Store. Read now!



Sponsor: Intel

FierceLive! Webinars

> Reduce Datacenter Energy Costs by up to 15%: Software Meets Datacenter ROI - Friday, May 16, 2014 - 2 pm ET / 11 am PT
> WEBINAR: Rethinking Enterprise Mobility Management ? Beyond BYOD - SPONSORED BY: CA Technologies

Events

> Enterprise Connect Lync Tour - May 7 ? June 24 - Various Locations
> Keeping virtualized environments safe - June 2-5 - Nice, France - Sponsored by: TM Forum Live!
> GSMA Mobile Asia Expo 2014 - June 11-13 - Shanghai, China

Marketplace

> Whitepaper: Avoiding the top three challenges of custom-coded SharePoint applications
> Whitepaper: IT Made Easy with ManageEngine ServiceDesk Plus
> Whitepaper: How to Add Attachment Viewing to Salesforce
> Whitepaper: Finding ROI in Document Collaboration
> Whitepaper: Delight & Engage Customers with Mobile APIs
> eBook: eBrief | How Big Data Changes The Way You Think and Operate
> eBook: Critical Infrastructure and Cybersecurity
> Whitepaper: Best Practices for Migrating to SharePoint 2013
> Whitepaper: 5 Unsung Tools of Dev Ops
> eBook: Getting to DevOps (And Getting the Payoff)
> Whitepaper: 802.11ac in the Enterprise: Technologies and Strategies
> Whitepaper: Defense Against the Dark Arts: Finding and Stopping Advanced Threats
> Whitepaper: Longline Phishing: A new Class of Advanced Phishing Attacks
> eBook: eBrief | Best Practices in Mobile Application and Management Delivery
> Whitepaper: Developing for the Internet of Things: Challenges and Opportunities
> Whitepaper: Hardware Test Equipment is the Key to Accurate Network Testing
> Whitepaper: Supporting VDIs and Thin Clients
> Whitepaper: Four Ways to Improve IT Efficiency

* Post a classified ad: Click here.
* General ad info: Click here

Today's Top News

1. Nokia doesn't have to buy Juniper Networks


Mergers are only necessary when the emerging whole entity is greater than the sum of its parts. In recent years, this has become a rare occasion. Flying in the face of European business analysts who last February foresaw Nokia's NSN division and Juniper Networks merging, the newly minted Nokia Networks announced jointly with Juniper on Monday that they can both advance their goals with a smarter arrangement: a partnership.

The result of this partnership will be a single OpenStack-based telco cloud platform, bundling together Nokia's Liquid Core NFV and core virtualization system for managing telco service applications, Juniper's MetaFabric switching and routing architecture and Juniper's Contrail SDN platform. The move will put both companies in a better position to tackle Alcatel-Lucent, as well as Cisco, Ericsson, Huawei and emerging NFV competitor HP without all that sticky reorganization hassle that Nokia doesn't exactly want to repeat right now.

Under the terms of their arrangement, Nokia will be handling the end-to-end service part of the bundle--meaning it should take the lead in selling and representing the bundle to customers.

Both SDN and NFV are architectural layers of abstraction. SDN creates an adaptable virtualized network that is best suited for the applications at hand, by dividing the control from the data plane and letting logical tables define the relationships between the virtual map and the real hardware. NFV can virtualize the real hardware, presenting a virtualized router map that can adapt more readily to the traffic it's carrying.

When the two technologies were introduced, the tech press mistook them for being competitive. Actually, they're complementary, with the result of their integration being increased and prolonged utility of more generic server hardware.

Last February, Rajeev Suri, the director of NSN's telecom business--now Nokia Networks' CEO--found himself in the position of downplaying rumors fueled by Reuters' reporting of his company merging with Juniper. At a Mobile World Congress press conference in Barcelona, Suri told reporters, "There are no synergies" between a wireless network company like his and a router and switch manufacturer like Juniper.

Just because the platform incorporates products from different markets does not mean the markets can or should merge, Suri implied. It's a clear indication that this new CEO is capable of making some well-reasoned and sound decisions, in the face of pressure from investors to make headlines.

For more:
- see the Reuters report from February
- read about Nokia's Liquid Core, Juniper Network's MetaFabric and their Contrail SDN
- read about the HP Network Functions Virtualization
- look over Rajeev Suri's comments on the partnership

Related Articles:
Nokia, the networks and services company, ventures forth
Juniper is laying off 6 percent of its employees

Read more about: Juniper Networks
back to top


This week's sponsor is CPL.

FastCast Webinar: Reduce Datacenter Energy Costs by up to 15%: Software Meets Datacenter ROI
Friday, May 15th, 2pm ET/ 11am PT

Join us for a look at two Intel Datacenter Software solutions, sample use cases, and implementation overviews. Intel Data Center Manager (Intel DCM): Energy Director provides device-level power and thermal monitoring and management for groups of servers, networking, storage, and other IT equipment. Register Today!



2. Cisco ditches WebEx Social, partners with Jive Software


What enterprise service vendors call "the social wave" is confusing. It's a trend where workers use their own means to communicate with one another. It drives productivity, it reduces costs, it improves morale and it benefits the business.

And that's a problem, because the revenue from all this goodness does not flow back to enterprise service vendors--not when workers are left to their own devices.

Case in point: Cisco began its journey into enterprise collaboration services just a few years ago. That journey ended last with the announcement that Cisco was partnering with Jive Software. Jive is a very popular consumer-grade, cloud-based collaboration platform provider, which is becoming more familiar to admins as they notice more and more employees using it without any strategic investment or training initiative or paradigm shifting taking place.

Back in 2009, Cisco's collaboration strategy could be described in large part with the single word "Microsoft." Essentially, Cisco provided the pipes and the routing, and Microsoft provided the servers and the front end. The key to collaboration at that time according to a Cisco strategy paper (.pdf) was "integration." The way it would provide a "media-rich collaboration experience" was to facilitate Microsoft's facilities for Windows: for telephony, Microsoft Office Communications Server; for point-of-presence, federation with Microsoft Live Communications, showing up in Microsoft Exchange Calendar; for instant messaging, Microsoft Exchange feeding into Microsoft Outlook; for document sharing, Microsoft SharePoint; for conferencing and collaboration, Microsoft Office Communicator... and the list actually doesn't stop there, but you get the general picture.

The word "social" did not appear once in this initial strategy paper.

The problem Cisco's customers must have had with this initial strategy appears to have been addressed in 2010 in a subsequent paper (.pdf) which focused on the familiar topic of return on investment.

"Strategic ROI is often hard to quantify in dollars," reads the 2010 paper. "But strategy is the area where business transformations occur. Collaboration tools help companies enter new markets; build new business models; accelerate innovation cycles and make faster, better decisions. These tools enable the major moves that lead to competitive advantage and reinvention of how you do business."

Why, O why were workers not collaborating with one another when enterprise software vendors were serving it to them under appropriate license terms? To its credit, Cisco attacked this question head-on, and came to the conclusion it needed to redefine the collaboration experience. In mid-2010, it bet big on an idea called Cisco Quad, whose usage model incorporated the iPads that were in nearly every executive's portfolio.

"Cisco Quad is an immersive platform for enterprise collaboration that integrates voice, video and social networking into one workspace," stated the company's announcement. Rather than a pipe to this Microsoft technology and a separate pipe to that one, Quad would adopt a centralized portal approach--not unlike a knowledge management system--bridging all types of content, including documents and media, into a single panel.

It took a year for many to discover Quad.

"Cisco Quad could become just what the enterprise collaboration market needs," wrote Gartner analyst Larry Cannell in 2011, "a competitive product from a large vendor with deep pockets and strong ties throughout most IT organizations." As a Cisco evangelist wrote at the time, maybe Facebook and LinkedIn were taboo in organizations, but with a little training session, certainly workers would see the advantage of using Quad instead, without feeling like they're sacrificing too much.

Quad went through one rebranding, becoming mixed into the WebEx umbrella as WebEx Social (.pdf), but ending its original life in the process. The newly branded platform's key selling point was serving as a single portal on a single platform.

But then came last week. And with a message that literally quoted Charles Darwin, for reasons Dr. Freud would certainly appreciate, Cisco VP Peder Ulander put the best face on a course change which, it must have seemed, involved a towel and the act of throwing.

"We're... announcing the end-of-sale of WebEx Social today," wrote Ulander. "As the market for enterprise social software continues to develop, we're seeing the market consolidate around key vendors. To provide the best flexibility and outcomes for our customers, we're expanding our focus to work with these vendors' products and to provide native integration with products in our collaboration portfolio. Rather than emphasize social within one product, we're making sure it's an integral part of all our products."

The enticement of using Internet Protocol as the enterprise's system of collaboration is that it's open and adaptable. The problem with this is that workers can adapt it themselves, rendering huge chunks of an entire industry almost helpless to justify their own existence. That industry happens to also be the lifeblood of the Internet, and if that industry doesn't find a new way to justify itself with substantive services that generate both revenue and praise simultaneously, the Internet will end up being hurt, and workers will end up feeling the pain anyway.

For more:
- see Jive Software's website
- download the Cisco strategy paper (.pdf)
- download the 2010 Cisco paper (.pdf)
- read a Gartner analyst's comments from 2011
- see the Cisco evangelist's comments

Related Articles:
Cisco, Google sign a deal to bring WebEx to Chromebooks
Cisco fights to keep videoconferencing screens relevant

Read more about: Cisco
back to top



3. NTT, Fujitsu, Alcatel-Lucent prepare cross-carrier cloud demonstration


On May 14, NTT, Fujitsu and the Japanese division of Alcatel-Lucent plan to demonstrate a proof of concept of telecom-scale network functions virtualization, or NFV. The idea is to demonstrate a network service application designed and implemented on a purely virtual platform--perhaps the type of service that a small telecom provider might offer to its subscribers by leasing capacity from more than one global network.

NTT's translation of its proof-of-concept goals into English lost something in translation, so a direct quotation would probably send you running for the medicine cabinet. I've looked at the diagrams, and perhaps I can explain better: NTT envisions disparate telecom systems as hosts of a common virtual platform. A-L's CloudBand can serve as the NFV for that platform and Fujitsu can provide the middleware--the abstraction layer.

The biggest problem with developing service applications on a telecom network, says NTT, is scalability. Naturally, as an application grows in adoption, it needs more resources. But accommodating that need typically isn't possible without rewriting the application for a network built out with those added resources. By separating the service layer from the network infrastructure, the service provider need be concerned only with the software, and network engineers don't have to worry about the side-effects of maintenance operations on the applications their systems already run.

During the May 14 demonstration, the three partners promise to do the following: First, they'll launch... oh, what's a good word for this sort of thing? Let's call it a cloud. (Just a suggestion for NTT's box.) In this cloud, multiple telecom network systems will be hosting this virtual platform, and in so doing, pool their resources. This pooling will take place dynamically, while at the same time proving that the pool is providing carrier-grade functionality.

Then they will scale an application out, adjusting the pooling as necessary and apply load balancing and backup.  And to really show how the concept works, they'll perform live maintenance on the hardware while the scaled-out application is running.

And rather than show all this off in the basement of someone's headquarters complex, participants will be enjoying the beauty and luxury of Resort MICE Island on Okinawa.

As NTT stated in a position paper published last February: "We aim to establish new server architecture that will enable us to develop service applications at an early stage. In addition, we aim to expand and apply the resulting technology to support other fields that require reliability, scalability and maintainability (financial or medical fields, etc.) as well as in the communication network field in the future. Our desire is to see this technology spread and become a global standard."

Back in the era before standardized operating systems, programs were designed for processors and the peripherals connected to them. The first program interpreters, like BASIC--now a half-century old--made it feasible to transport the logic of a program from one implementation to another. By "transport" in this context (take it from a veteran) I mean, print out the source code on one system's dot-matrix printer and type it into the other system. Even then, TRS-80 Level II BASIC and Applesoft BASIC were as different as English from Gaelic.

The real purpose of platforms is to truly resolve the "portability" issue by establishing an abstraction layer (at least one, perhaps more) between software logic and hardware implementations. The entire history of evolved computing can be viewed as an expansion of the concept of platforms, from the smallest microcomputers toward the largest systems.

The largest systems there can possibly be are global telecommunications networks. The problem there in 2014 is essentially a scaled up form of the first portability issues of 1964. Telecom network control systems and service applications are written as software, but they apply solely and specifically to the systems that host them. An interoperability platform hasn't been perceived as necessary, just as a common programming language wasn't really considered all that necessary until years after FORTRAN and BASIC were first implemented, and a common operating system wasn't even given much credence until the mid-1980s.

For more:
- read the NTT paper
- read about Alcatel-Lucent's CloudBand

Related Articles:
Japanese scalable public cloud gains a foothold on US shores
Alcatel-Lucent turns up NFV volume supporting mobile networks

Read more about: NTT
back to top



4. CenturyLink to cut cloud block storage prices by 60 percent


CenturyLink is taking a direct hit at Amazon's dominant cloud position with a series of new pricing plans and support elements as part of a broader initiative to tout their growing set of capabilities they built internally and through key acquisitions like Tier 3 and AppFog.

Set to go live in mid-June, the service provider said it is reducing cloud-based CPU, RAM and block storage pricing by 60 percent and bandwidth pricing by 50 percent. In particular, it will charge $0.05 GB out/per month.

"CenturyLink over many years gets this concept of bringing value to customers by reducing price," said Andrew Higginbotham, senior vice president of cloud and technology at CenturyLink Technology Solutions, in an interview with FierceEnterpriseCommunications.  

Besides the pricing, the service provider is also introducing a series of support bundles. Customers can choose from three support tiers, select from a list of its most popular NOC service items or work with CenturyLink's professional services team. 

All of these new elements are supported by its growing base of data centers. To date, the service provider has a total of 56 data centers, including 16 nodes offering its public cloud product. 

Higginbotham said the company is seeing "not only seeing new customers come in, but also CenturyLink customers as well as legacy Savvis customers moving onto this platform."

Although much of CenturyLink's key technical talent resides in its Monroe, La., location, much of the cloud services team resides in Seattle, where the telco established Cloud Development Center. Housing the cloud team there makes sense because it is the place where other dominant players like Amazon, Google and Microsoft also reside.

Following recent expansions of the public cloud capabilities into Toronto and London, CenturyLink is looking to expand into Singapore, with other possible sites in either Australia or Japan.

However compelling CenturyLink executives believe their new pricing regime is, John Dinsdale, a chief analyst and research director at Synergy Research Group, says this is an inevitable move they have to make in order to stay competitive with Amazon, Google and Microsoft.

"The public IaaS market is essentially becoming commoditized," he said. "While there may be some additional selling points, a lot of buying decisions are being based on a pure price-per-unit basis--and it is very easy to get comparative pricing from the various cloud operators. Companies like CenturyLink have little option but to respond to pricing initiatives from AWS (and Google and Microsoft) if they want to aggressively grow their IaaS revenues."

For more:
- see this blog post

Related Articles:
Synergy Research: Equinix, NTT lead the North America, APAC colocation markets
CenturyLink, Windstream enhance their U.S. Ethernet standing, says VSG
CenturyLink plans to reduce carbon exhaust by 20% by 2024 [FierceTelecom]
CenturyLink, Verizon, others sharpen their data analytics skills [FierceTelecom]

Read more about: public cloud
back to top



5. Newly discovered OpenID vulnerability not really new


"Could the next Heartbleed," intoned about two dozen pitches lurking in my inbox, "be lurking inside your computer right now?" Well, of course, but let's be perfectly honest with ourselves: Endpoint security products didn't detect the OpenSSL bug for the past eight years it was there. How come? Because OpenSSL isn't malware, and OpenSSL was behaving the way it was programmed to behave. Like the cartoon character Jessica Rabbit, it wasn't bad, it was just drawn that way.

Last Thursday, a fellow identifying himself as a PhD math student from Nanyang Technological University (with this type of story, you can't be too certain about any of your facts) named Wang Jing, reported on a personal blog the existence of a "Covert Redirect Vulnerability Related to OAuth 2.0 and OpenID"--the open source authentication mechanisms used by many Web service and content providers, including Facebook.

Taking a cue from Heartbleed, Wang designed a logo and a graphical style for the public divulgence of his discovery, evidently prior to having informed anyone representing OpenID.  Soon after the "Covert Redirect" promotional tour site went live, FierceEnterpriseCommunications contacted sources with the OpenID Foundation and with the Internet Engineering Task Force, which both seemed to be as aware of the discovery as we were at the time.

Though we were told a statement is forthcoming from the OpenID Foundation, it had not been posted by press time. Nonetheless, one major tech news site ran the story, and subsequent aggregators throughout the echo chamber focused on Wang's characterization of the discovery as "a daunting task." Some sites reported that OpenID providers "can't easily patch it" or "won't be fixed anytime soon."

But what are we talking about, really? OpenID is a mechanism for enabling one provider to authenticate identities and transfer their tokens to other providers. It's what enables you and other users to "Log in using Facebook" or "Log in using Google," and thus enables these services to provide identity as well as content.

There is an architectural problem with OpenID, and there always has been. It's the notion that an authenticating site can send the token validating the identity being violated, to a site other than the one asking for authentication in the first place. It's an "open redirect," it's permissible, it's surprisingly visible and its exploitability is not only well-known but has been complained about for some time.

In fact, security providers including Sophos have documented how it can be exploited, at least theoretically. As Lisa Vaas explained back in October 2012, a simple URL shortening service could be utilized to effectively mask the identity of the site receiving an open redirect. That could make it a slightly "covert redirect". And this appears to be the principle that Wang discusses on his site.

Over the weekend, Internet engineer Tim Bray, previously with Google and a contributor to OpenID's Connect working group, summed up the response to Wang's warning quite succinctly: "It's got a lo­go! It's got a Web pres­ence. Oh good, let's look there and fig­ure out what the prob­lem is. Um, nope, it's just arm-waving... I un­der­stand OAuth pret­ty well and it's re­al­ly hard to fig­ure out what's be­ing claimed. I'm won­der­ing what steps CNET took to val­i­date this sto­ry, aside from check­ing out that yeah, there's a website with a fan­cy lo­go."

Bray says he tried to interpret how Wang worked around OAuth's requirement that open redirects be registered, and didn't get very far. He referenced a personal blog post by OAuth architect John Bradley, who--after taking a dig at the echo chamber himself--explains that certain OAuth 2 implementers including Facebook relax their own controls, perhaps in an effort to make authentication easier for developers. For instance, Bradley notes, "Facebook only validates the domain of the registered redirect_uri, and allows subdomains containing arbitrary paths."

But Bradley goes on to say he believes Wang's specific demonstration would not be possible in real life using a browser that had not been tampered with, and outside of a scenario where the attacker and the attackee are the same party.

To be fair to Wang, the redirect problem is an actual problem. To the extent the problem is exploitable, then this is a vulnerability of sorts. Whether it deserves a logo and a publicity stunt is debatable. On the other hand, we're talking about it here, which is more than you could say for the status of this known vulnerability over the past few years.

It does point to something of a cultural problem: We don't pay much real attention to technology unless: 1) it has a touchscreen or some other cool control system involving hand gestures; 2) it threatens to steal your identity or hijack your credit or impact the Internet core. All the dull stuff in-between gets buried beneath a heap of tweets. Perhaps Wang's stunt may be regarded as childish, but it did have the effect of elevating the topic to a level of general public discussion, which is closer to where it should be.

If we're at the point where we need a "Heartbleed" stunt to wake us up to reality, then maybe we need a megaphone blaring in our ears after all.

For more:
- read the CNET story
- see the Fast Company article and the BGR article
- see Egor Homakov's blog post
- see John Bradley's blog post

Related Articles:
Security vulnerability with its own logo and marketing: Did 'Heartbleed' backfire?
Sloppy coding blamed for worldwide SSL 'Heartbleed' vulnerability

Read more about: OAuth, covert redirect
back to top



Also Noted

This week's sponsor is RAMP.

eBook | Finding the Payoff in Enterprise Video

Video is a powerful medium for communication. Its potential uses range from sales and marketing through employee communications, training and more. But enterprise use has grown in fits and starts. In this eBook, FierceCIO explores the capabilities, culture and infrastructure to find the payoff in enterprise video. Download this eBook today.


SPOTLIGHT ON... The IT buyer isn't the same person anymore

The role of IT purchasing in the modern enterprise is shifting from the person responsible for capital expenditures to the person who handles monthly expenses. By moving authority from the CIO to the COO, the entire strategic picture changes for why IT services and software are purchased in the first place. This is becoming a common theme for much of my work, and yet still somehow its message gets lost among certain folk (you know who you are... yes, you, stop looking so innocent) who insist upon repeating the same disastrous strategy and hoping for different results. My wife tells me that such behavior defines a "complete idiot." (She says it explains why she's still married to me, although I'm still pondering whether that's a compliment.) So just to demonstrate I'm not alone, here's yet another new source of research that demonstrates the impact of this role shift.

Read more:  Bye, bye, traditional IT buyer [by Mark Peters, Network Computing]

Still ailing in the wake of last year's data breach, Target begins the painful process of rebuilding:
>> Target's CEO gets the chop, after retailer suffers massive data breach [WeLiveSecurity]

EMC to demonstrate a hybrid cloud storage appliance that promises "hyperscale" volumes with an average of 18 percent TCO savings:
>> EMC Elastic Cloud Storage Appliance... [press release from EMC.com]

Some fear, an uncertainty regarding the metadata generated by Microsoft's OneDrive for Business is debunked:
>> What's really going on in OneDrive for Business [ZDNet]

A White House report confirms the danger of analyzing the data from the future Internet of Things and concluding where people are sitting, standing, going:
>> The Internet of Things could encroach on personal privacy [Computerworld]

A DevOps-style approach to tackling the sources of chronic network behavior problems might result in patches, but not cures:
>> What is root cause analysis? [AlertSite]

And Finally... Wi-Fi on airlines: Users will find it's worth the trouble [eWeek]


Webinars


* Post listing: Click here.
* General ad info: Click here.

> Reduce Datacenter Energy Costs by up to 15%: Software Meets Datacenter ROI - Friday, May 16, 2014 - 2 pm ET / 11 am PT

Join us for a look at two Intel Datacenter Software solutions, sample use cases, and implementation overviews. Intel Data Center Manager (Intel DCM): Energy Director provides device-level power and thermal monitoring and management for groups of servers, networking, storage, and other IT equipment. Register Today!

> WEBINAR: Rethinking Enterprise Mobility Management ? Beyond BYOD - SPONSORED BY: CA Technologies

Enterprise mobility management is about more than just getting handle on the flood of BYOD devices coming into the organization. It is about managing the explosion of new devices, applications, content and transactions, which threatens to overwhelm IT managers. Our panel of experts will help you understand how to develop effective strategies that accelerate mobility transformation and prepare your organization for the mobile future. Register Today!



Events


* Post listing: Click here.
* General ad info: Click here.

> Enterprise Connect Lync Tour - May 7 ? June 24 - Various Locations

Attend a free one-day workshop to get the insight and strategy you need to evaluate and successfully implement Lync in your enterprise.

May 7 :: San Francisco
May 12 :: Boston
May 20 :: Chicago
June 24 :: New York

Don't miss this free, "must attend" event - register today for the location nearest you at enterpriseconnect.com/tour/.

> Keeping virtualized environments safe - June 2-5 - Nice, France - Sponsored by: TM Forum Live!

TM Forum Live! addresses the issues and opportunities surrounding virtualization for service providers and various types of enterprises, with presentations from Deutsche Telecom, AT&T, Telefonica and more. Save up to $400 on a gold pass when you register with voucher code PW3DA2!

> GSMA Mobile Asia Expo 2014 - June 11-13 - Shanghai, China

Mobile connects us to new information, possibilities, people, ideas and experiences. Mobile Asia Expo showcases the mobile solutions that are transforming our lives today and into tomorrow. Register now to join us 11-13 June 2014 in Shanghai, China, where we are Making Global Connections.



Marketplace


* Post listing: Click here.
* General ad info: Click here.

> Whitepaper: Avoiding the top three challenges of custom-coded SharePoint applications

In this white paper, learn about the challenges of custom coded SharePoint applications. Then, see how you can overcome them to create the SharePoint sites you want. Download Today!

> Whitepaper: IT Made Easy with ManageEngine ServiceDesk Plus

ManageEngine ServiceDesk Plus is an ITIL-Ready Help Desk Software with integrated asset and project management. True to our tagline, "IT Made Easy", ServiceDesk Plus wins hands down when it comes to ease of use, out of the box settings and integration. Visit http://www.servicedeskplus.com/ to check out the list of features that come at just $995 and to download a 30-Day Free Trial!

> Whitepaper: How to Add Attachment Viewing to Salesforce

Read this Accusoft whitepaper to learn about the case for an attachment viewer for Salesforce. Download now.

> Whitepaper: Finding ROI in Document Collaboration

Read this Accusoft whitepaper to learn about the factors that make document collaboration more difficult than it should be, and about how to create a collaboration strategy that makes sense for your organization. Download Now!

> Whitepaper: Delight & Engage Customers with Mobile APIs

Read this success story and learn how a robust API and secure API Management powered Keep’s iOS app to become one of the most popular apps in the Lifestyle category in the iTunes App Store.

> eBook: eBrief | How Big Data Changes The Way You Think and Operate

Big data allows companies to focus on individuals instead of vague trends. Businesses that jump in and start learning now can reap an advantage over slower competitors. Download this eBrief today!

> eBook: Critical Infrastructure and Cybersecurity

This FierceITSecurity eBook looks at key dependencies among critical infrastructure sectors and how companies in these areas can stay ahead of threats and maximize their defensive efforts. Download this eBook today!

> Whitepaper: Best Practices for Migrating to SharePoint 2013

SharePoint 2013 has the industry buzzing. It’s powerful and a vast improvement over previous versions. In this white paper, get best practice to ensure your migration to SharePoint 2013 is quick, easy and cost effective. Download Today!

> Whitepaper: 5 Unsung Tools of Dev Ops

Jonathon Thurman shares his five favorite DevOps tools which have been around a long time. They may not be flashy but they're time tested and just work. He also tells you how to use them and how to configure them for maximum value. Download 5 Unsung Tools of DevOps to see which tools make the cut and why.

> eBook: Getting to DevOps (And Getting the Payoff)

DevOps is a more holistic approach to application development, more fully taking into account deployment and ongoing operational needs – and tossing a lot of automation into the mix. This FierceEnterpriseCommunications eBook provides step-by-step guidance on implementing DevOps for CIOs and IT and application development managers. Download this eBook today!

> Whitepaper: 802.11ac in the Enterprise: Technologies and Strategies

Download the White Paper "802.11ac in the Enterprise: Technologies and Strategies" to learn from industry expert Craig Mathias about the technologies behind 802.11ac, deployment misconceptions and review steps that every organization should take in getting ready for 802.11ac.
Download today!

> Whitepaper: Defense Against the Dark Arts: Finding and Stopping Advanced Threats

Today's most-damaging targeted attacks don't occur by happenstance. They are carefully planned and executed by a new breed of professional adversaries. Read this white paper, Defense Against the Dark Arts: Finding and Stopping Advanced Threats to gain a practical understanding of today's Advanced Threat Landscape and strategies for detecting and stopping Advanced Threats. Download today!

> Whitepaper: Longline Phishing: A new Class of Advanced Phishing Attacks

The last few years have seen a dramatic increase in the use of email as a vehicle for cyberattacks on organizations and large corporations. Recently, Proofpoint researchers identified a new class of sophisticated and effective, large-scale phishing attack dubbed "longline" phishing attacks. Download this whitepaper to learn about the unique characteristics of these attacks, how they are carried out, and the alarming effectiveness they have. Download today!

> eBook: eBrief | Best Practices in Mobile Application and Management Delivery

Your organization knows that mobile productivity is important, and it may have already started down the road toward Mobile Device Management (MDM) and Mobile Application Management (MAM). But have you developed a holistic view of application management and delivery -- and its impact on the business? Download this free eBrief to learn about best practices for your mobile deployment.

> Whitepaper: Developing for the Internet of Things: Challenges and Opportunities

Cisco estimates that 50 billion devices and objects will be connected to the Internet by 2020. Will there be a role for developers in this area? And if so, how can developers position themselves in the months ahead on this nascent but potentially explosive opportunity? Register Today!

> Whitepaper: Hardware Test Equipment is the Key to Accurate Network Testing

Surprisingly, many organizations are not adequately testing their networks. Network testing is crucial for any IT organization that wants to ensure availability, security and performance of applications and services running on their networks. Download this whitepaper now to learn more!

> Whitepaper: Supporting VDIs and Thin Clients

Companies have already begun deploying VDIs and thin clients (like Google's Chromebook) on a massive scale. The low-cost, easily deployed workstations present a significant cost savings for companies, but require unique tools to support them. This whitepaper, written by Proxy Networks, outlines the best way to do that. Download now.

> Whitepaper: Four Ways to Improve IT Efficiency

The role of the help desk within businesses has expanded considerably over the last decade, becoming an integral piece of the overall corporate strategy. In this whitepaper, Proxy Networks outlines the best way to align your IT department with that strategy in order to improve overall departmental efficiency. Download now.

No comments:

Post a Comment

Keep a civil tongue.

Label Cloud

Technology (1464) News (793) Military (646) Microsoft (542) Business (487) Software (394) Developer (382) Music (360) Books (357) Audio (316) Government (308) Security (300) Love (262) Apple (242) Storage (236) Dungeons and Dragons (228) Funny (209) Google (194) Cooking (187) Yahoo (186) Mobile (179) Adobe (177) Wishlist (159) AMD (155) Education (151) Drugs (145) Astrology (139) Local (137) Art (134) Investing (127) Shopping (124) Hardware (120) Movies (119) Sports (109) Neatorama (94) Blogger (93) Christian (67) Mozilla (61) Dictionary (59) Science (59) Entertainment (50) Jewelry (50) Pharmacy (50) Weather (48) Video Games (44) Television (36) VoIP (25) meta (23) Holidays (14)

Popular Posts (Last 7 Days)