Spring World 2017

Conference & Exhibit

Attend The #1 BC/DR Event!

Fall Journal

Volume 29, Issue 4

Full Contents Now Available!

Jon Seals

NetApp All Flash FAS Accelerates Complex Forecast Application by up to 15 Times, Improves Accuracy to Protect the Life and Property of Germany's Citizens

SUNNYVALE, Calif. – "The airlines, railways and emergency responders depend on us to provide immediate, detailed weather information around the clock," said Hans-Joachim Koppert, head of Weather Forecasting Services at Deutscher Wetterdienst (DWD). "We knew NetApp All Flash FAS could not only handle our exponential data growth, but also speed our weather visualization application so that we could provide life-saving information to first responders in real time."

As Germany's national meteorological service, DWD takes in feeds from more than 2,000 measuring stations, a network of 17 weather radar systems, numerous meteorological satellites, and a massive number of international data sources. The data is fed into complex forecast models and accessed through NinJo, DWD's weather visualization application, and TriVis, a powerful graphics solution for the visualization of meteorological data for all digital media.

With advances in radar and satellite technologies, the data collected by DWD has grown exponentially, making it increasingly difficult for the service to deliver the fast response times customers need. The problem was particularly acute for the search-and-rescue pilots who depend on weather forecasts from NinJo to complete their operations safely. Retrieving weather data needed for a search-and-rescue operation could take up to 15 seconds -- far too long when a rescuer is dealing with a life or death situation.

Having relied on NetApp® storage for more than 14 years with no unplanned application downtime, DWD was confident that NetApp (NASDAQ: NTAP) All Flash FAS would deliver the performance required to speed its NinJo application. Since implementing NetApp All Flash FAS, DWD can provide emergency responders with real-time access to the information needed to complete their missions and save lives. DWD has also been able to build out innovative features. These features include the ability to trace the path of a plane on a map instantaneously and display three- or four-dimensional weather data for that location in real time. Aviation, shipping and railway customers also can minimize costly weather delays and plan more efficient routes. Faster warnings enable the general public to better prepare for severe weather situations, such as tornadoes and thunderstorms -- protecting property and saving lives.

With NetApp All Flash FAS, DWD has been able to:

  • Calculate weather conditions in real time.
  • Improve rescue operations by mapping three- or four-dimensional weather data.
  • Accelerate performance of its NinJo application.
  • Streamline management for more than 8PB of data and 164 storage systems across 21 sites throughout Germany.
  • Improve the accuracy of weather forecasts and warnings.

More information:

About NetApp
Leading organizations worldwide count on NetApp for software, systems and services to manage and store their data. Customers value our teamwork, expertise and passion for helping them succeed now and into the future. To learn more, visit www.netapp.com.

NetApp and the NetApp logo are trademarks or registered trademarks of NetApp, Inc. in the United States and/or other countries. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such. A current list of NetApp trademarks is available on the web at www.netapp.com/us/legal/netapptmlist.aspx.


New Flocker Driver Provides More Storage Options for Dockerized Applications

SAN FRANCISCO, Calif. – ClusterHQ, The Container Data People, today announced that the newest member of its community, Pure Storage, has developed a storage driver for Flocker, the leading open source data volume manager for containerized applications. By providing a pluggable solution for Flocker, developers using Pure Storage FlashArray//m as their storage backend will have persistent data management capabilities for any and all Dockerized apps running in their environments.

"In a survey released today by ClusterHQ and DevOps.com, respondents reported that persistent storage challenges are the number one barrier to container adoption," said Serge Pashenkov, VP of Distributed Storage, ClusterHQ. "Through this new partnership and the many others we've established, containerizing applications and the data needed to make them work has become simple and practical. Our joint customers can now take advantage of the portability and agility inherent in containers for their entire application."

Flocker is the only container volume manager available on the market that works with the complete Docker toolkit (Engine, Swarm, Compose, UCP, Datacenter), Kubernetes, and Apache Mesos. As a result, storage companies can write a single Flocker storage driver and immediately gain access to the entire ecosystem of container tools. This eliminates the need for one-off integrations with emerging container tools because ClusterHQ is already built to integrate with them all.

"We're seeing an uptick in customers increasing their deployment of containers in production, which naturally means that achieving persistent storage is becoming the priority," said Matt Kixmoeller, VP of Product, Pure Storage. "The Pure Storage FlashArray//m driver for Flocker enables Docker deployments to take advantage of the all-flash performance, resiliency, and best-in-class efficiency of the Pure Storage FlashArray."

The pluggable nature of Flocker is designed to work with any storage system, providing the ability to integrate Dockerized applications with existing storage backends. Any company or community that wants its storage to work with Docker can easily write a driver for Flocker.

Learn more about the ClusterHQ Storage Partner program and join at: https://clusterhq.com/partners/

To learn more about building a storage plugin for Flocker, visit: https://docs.clusterhq.com/en/1.1.0/gettinginvolved/plugins.html

During DockerCon 2016, June 19-21 in Seattle, stop by booth G9 to take a #DockerSelfie and learn more about ClusterHQ's products and services.

Interact with ClusterHQ

About ClusterHQ
ClusterHQ builds container data management software that enables broader adoption of container technology across the entire application lifecycle. The company provides a full suite of products, Flocker, Volume Hub and dvol, that give developers and operations teams expanded resources for testing and managing containerized applications, so that users at any level can easily manage their containerized data from the convenience of a laptop. DevOps teams worldwide rely on ClusterHQ's open source Flocker software to meet the data portability requirements of distributed, microservices-based applications. Available for download at www.clusterhq.com/flocker, Flocker enables containers and their associated data volumes to be easily moved between servers as a single unit, a prerequisite for production operation of stateful application components in containers. Flocker facilitates widespread production deployment of containers for databases, queues and key value stores by making it simple and practical for entire distributed applications to be consolidated into an all-container development and operations environment. No matter where, or what, a container is running, Flocker gives DevOps teams operational freedom to quickly react to market conditions by relocating application containers in response to changing conditions, so that their business can innovate faster and be more responsive. Flocker increases the value of an organization's container investment and opens the door for a greater variety of mainstream enterprise use cases. Organizations can now embrace the portability and massive per-server density benefits of containers for stateful application services, enabling the creation of a new generation of microservices-based applications, and in some cases the replacement of virtual machines with containers. ClusterHQ provides the tools and services necessary for deploying and managing fully containerized stateful applications, simplifying IT processes and delivering on the advantages inherent in containers. We are the Container Data People™.

Leader in Telematics and Connected Car Technology to Spotlight How Businesses Make Fleet Safety a Priority

PALO ALTO, Calif. – Automile, leading provider of a cloud-based, mobile and design-first Telematics solution, today announced the launch of a new initiative, 'Celebrating Businesses with Workforce-on-Wheels.' Through this ongoing program, Automile recognizes companies demonstrating exemplary fleet management processes. With June being National Safety Month, Automile currently seeks to highlight the businesses leading the way in safety for their drivers and vehicles and publicly share their successful practices.

"Keeping drivers safe is a business-critical issue for companies managing a mobile workforce behind wheels. When the community comes together to share their company's own safety practices, from training drivers to implementing best practices, everyone benefits from the power of many," said Jens Nylander, CEO and founder of Automile. "We are pleased to recognize the companies that are taking steps to keep their workforce safe and invite them to share their stories with us."

Through its 'Celebrating Businesses with Workforce-on-Wheels' initiative, Automile encourages businesses to share one tip or strategy they currently have in place or are planning to implement to create a safer mobile workforce by emailing team@automile.com. Automile will then reach out to schedule a 30-minute interview with each company that submits and spotlight their organization with a complimentary article on Automile's blog and recognition on its social media channels. 

The need for business owners and fleet leaders to improve their safety practices is clear; it is estimated the unsafe driving practices and motor vehicle crashes cost employers $60 billion annually in medical care, legal expenses, property damage and lost productivity. Yet, businesses are often left in the dark about what happens as a driver travels from point A to point B, having no visibility into whether the driver is speeding, braking harshly or otherwise partaking in unsafe behaviors. They may also be at risk if they lack a simple way to continually monitor and benchmark their behavior to ensure they follow company policies and practices for safe driving.

By highlighting the companies with proven strategies to mitigate safety risks, Automile's goal is to bring greater awareness to the practices that lead to safer operations.

Additional information about how to make fleet safety a top business priority can be found at: https://automile.com/blog/should-fleet-safety-be-one-of-your-top-businesspriorities.

Participation in the 'Celebrating Businesses with Workforce-on-Wheels' program is complimentary. Email team@automile.com to share your tips or to ask any questions about the initiative.

About Automile
Automile revolutionizes fleet management through innovative, cloud-based, mobile-optimized and design-first experiences. Automile is used by business of all sizes across Europe and the United States to optimize fleet performance, gain greater visibility into their drivers and vehicles and ultimately improve the bottom line. With an innovative API and extensive partner program, Automile is committed to collaborating to ensure the best product possible for its customers. Headquartered in Stockholm, Sweden and Palo Alto, Calif., Automile continues to leverage IoT technology to disrupt the traditional approach to fleet management. Learn more at: Website | Twitter | LinkedIn | Facebook

200+ FIDO Certified Products Are Now Available for Simpler, Stronger Authentication

MOUNTAIN VIEW, Calif. – Now is the time for the world to stop relying on passwords. This is clear as 63 percent of all data breaches involve the use of stolen, weak, or default passwords, while the recent LinkedIn, Myspace, Tumblr and Fling password leaks left 642 million accounts compromised and millions scrambling to change the old, simple passwords that they reuse across applications. Technology and service providers agree, and are backing a new standard to solve the password problem: FIDO strong authentication.

The FIDO Alliance is the cross-industry consortia that provides a rich set of specifications and certifications for an emerging and interoperable ecosystem of hardware, mobile and biometrics-based devices. This ecosystem enables web service providers to deploy strong authentication solutions that reduce password dependencies and provide a superior, simpler and trusted user experience.

The Alliance today announced a number of proof points highlighting the global adoption of FIDO authentication over the past 18 months since the FIDO specifications were released, and a mere 12 months since the launch of the FIDO® Certified program:

The number of FIDO Certified products continues to expand.
More than 200 products from global technology leaders are now FIDO Certified, the Alliance announced today, giving service providers a diverse and flexible range of turnkey options to deploy FIDO standards. This represents a 100-percent increase since the start of 2016.

Organizations with new FIDO Certified products announced today include: Austria Card; Aware, Inc.; Beijing SHENQI Technology Co. Ltd.; Century Longmai Technology Co., Ltd; Coolpad Group Limited; Goodix; GOTrust Technology Inc.; IDEX; Infineon Technologies; INITECH Co., Ltd.; Institute for Information Industry; KDDI CORPORATION; KONA I Co., Ltd; Koscom Corporation; KT; KYOCERA Corporation; Ledger; LeEco; Lenovo; LG Uplus; Lightfactor; Neoframe, Inc.; Open Security Research (OSR); Penta Security Systems Inc.; Safran Identity & Security; SGA Solutions Co., Ltd.; Shenzhen Excelsecu Data Technology Co., Ltd; VASCO Data Security International; Yubico.

These latest certifications include the first FIDO Certified products that support Bluetooth® for wireless strong authentication. With these products, the Bluetooth authenticator needs only to be near a Bluetooth-enabled device for the user to be strongly authenticated to web apps on that device.

More details on the latest FIDO Certified products and updates to the program are the focus of a June 23rd FIDO Alliance webinar at 2 pm EDT. To register, visit https://fidoalliance.org/events/fido_certification_validating_next_generation_auth/.

FIDO authentication is increasingly available for online authentication.
FIDO authentication is now enabled on devices from the top five global handset manufacturers. Additionally, service providers including Google, PayPal, Samsung, Bank of America, NTT DOCOMO, Dropbox, GitHub and GOV.UK Verify have made FIDO authentication available to protect hundreds of millions of end-users' desktop and mobile apps, while RSA and eBay are among the many companies that have launched FIDO Certified solutions to facilitate enterprise and commercial deployments.

Coming soon: Microsoft also will be integrating FIDO into Windows 10 for passwordless authentication, while the FIDO Alliance is working with the World Wide Web Consortium (W3C) to standardize FIDO strong authentication across all web browsers and related web platform infrastructure.

Service providers are realizing the benefits from deploying FIDO.
In a recently-published two-year study of its FIDO deployment with security keys, Google revealed that using FIDO strong authentication is markedly faster than other strong authentication methods, has zero authentication failures, reduces hardware and support costs over one-time password (OTP) tokens, and provides all of the necessary privacy and security protections from phishing and man-in-the-middle attacks.

According to Google, "our users have been very happy with the switch: we received many instances of unsolicited positive feedback."

FIDO strong authentication is simpler than other options.
FIDO authentication is much simpler than remembering all kinds of passwords or other forms of strong authentication. The user simply needs to look at something (iris scan, facial recognition), touch something (fingerprint sensor, security key, wearable), say something (voice recognition) to be securely authenticated to any online service that supports FIDO. For security, FIDO uses public key cryptography and is strongly resistant to phishing, while user credentials and biometric templates are never stored on servers and never leave the user's device.

"When we started tackling the password problem, we knew that our solution first and foremost would have to be based on proven security to stop the ongoing onslaught of data breaches," said Brett McDowell, executive director of the FIDO Alliance. "Second, users will have to actually want to use it. And third, it would have to be an open industry standard so it could become ubiquitously adopted by the whole internet ecosystem. This is what we have designed with FIDO, and as the adoption momentum demonstrates, we are well on the path towards that ubiquity."

Learn more about the FIDO Alliance, FIDO standards and certification at www.fidoalliance.org.

About FIDO® Certified
FIDO certification testing is based on industry-standard best practices to objectively evaluate technical implementations of the FIDO specifications. FIDO certification is open to all who want to offer FIDO authentication in products and services compliant with FIDO specifications. There are two options for FIDO certification testing: interoperability testing events or on-demand testing.

The next FIDO Certified interoperability testing events will take place on August 30, 2016 for FIDO U2F and August 31 and September 1, 2016 for FIDO UAF. Subsequent testing sessions will occur approximately every 90 days or as demand dictates. Detailed information about the program and testing registration may be found at the FIDO Alliance website.

On Demand Testing has been introduced as an alternative to attending interoperability events. On Demand Testing is available year-round, with three options: virtual; shipped; and in-person. For more details, visit the FIDO Alliance website.

About the FIDO Alliance
The FIDO Alliance, www.fidoalliance.org, was formed in July 2012 to address the lack of interoperability among strong authentication technologies, and remedy the problems users face with creating and remembering multiple usernames and passwords. The FIDO Alliance is changing the nature of authentication with standards for simpler, stronger authentication that define an open, scalable, interoperable set of mechanisms that reduce reliance on passwords. FIDO authentication is stronger, private, and easier to use when authenticating to online services.

The FIDO Alliance Board of Directors includes leading global organizations: Aetna, Inc. (NYSE: AET); Alibaba Holdings (NYSE: BABA); American Express (NYSE: AXP); ARM Holdings plc (LSE: ARM) (NASDAQ: ARMH); Bank of America Corporation (NYSE: BAC); BC Card; CrucialTec (KRX: 114120); Daon; Egis; Google (NASDAQ: GOOG); Intel (NASDAQ: INTC); ING (NYSE: ING); Infineon Technologies AG (FSE: IFX) (OTCQX: IFNNY); Lenovo (NASDAQ: LNVGY); MasterCard (NYSE: MA); Microsoft (NASDAQ: MSFT); Nok Nok Labs, Inc.; NTT DOCOMO, INC. (NYSE: DCM); NXP Semiconductors N.V. (NASDAQ: NXPI); Oberthur Technologies OT; PayPal (NASDAQ: PYPL); Qualcomm, Inc. (NASDAQ: QCOM); RSA®; Samsung Electronics, Ltd (KOSCOM: SECL); Synaptics (NASDAQ: SYNA); USAA; VASCO Data Security International, Inc. (NASDAQ: VDSI); Visa Inc. (NYSE: V); Yubico.

Rapidly Growing Open Source Project Sustains Quarterly Release Cadence

MENLO PARK, Calif. – ONOS Project today announced the availability of "Goldeneye," its seventh release of the leading open source Software-Defined Networking (SDN) Operating System. Designed by Service Providers for Service Providers, ONOS is designed with scale, High Availability (HA), strong performance, and the right abstractions. A rapidly growing community and broad set of industry stakeholders support ONOS as it continues its quarterly release cadence and expands in size, diversity, and technical contributions at every layer of the software stack to deliver a comprehensive set of service provider use case solutions. ONOS Project is hosted by The Linux Foundation, the nonprofit advancing professional open source management for mass collaboration.

Today's Service Providers face the dual challenge of building out the datacenter and network infrastructure required by glut of mobile data, without the agility or cost model needed to support the demand. SDN and NFV solutions are emerging to address this pain point, enabling service providers to take control of their infrastructure, advance cloud and Internet innovations and reduce capital and operational costs. Developed into commercial products and deployed into large production networks, ONOS enables compelling SDN and NFV use cases and solutions, including NREN deployments, traffic engineering, multicast content distribution, VPLS, SDN-IP peering, packet-optical convergence and [A, R, E, and M]-CORD (Central Office Re-architected as a Datacenter).

ONOS scale, performance and HA facilitates separation of control from forwarding devices and creation of a logically centralized control, bringing the real disruptive SDN value proposition to Service Providers. Additionally, ONOS' growing support of southbound protocols, such as NetConf/Yang, BGP-LS, PCEP, TL-1 and others, enables ONOS utilization with legacy devices to help Service Providers incrementally deploy SDN.

"Thanks to the broad range of Service Providers, industry leaders and developers actively contributing to and developing ONOS, the project is promoting network disruption through open source software and whitebox switches, while providing incremental SDN delivery to support migration and evolve carrier networks. ONOS is the only SDN control plane that can support both disruptive and incremental SDN for Service Providers," said Vice President of Engineering at ON.Lab, Bill Snow.

Notable technical contributions to Goldeneye include the following:

  • R&E Deployments announced ONOS integration into an international, industrial, federated testbed
  • Testing infrastructure, which is conceptually similar to 'Chaos Monkey,' added to drive to even higher levels of reliability testing
  • Build Environment moved to use Buck, enabling 10 times the performance of builds, and improving the overall development experience
  • Applications' Performance of Adaptive Flow Monitoring & Selective DPI for ONOS from ETRI has been improved, providing lower overhead flow monitoring in addition to Yang toolchain support from Huawei, which provides improved integration with legacy devices
  • Northbound Intent subsystem is now integrated with the Flow objectives subsystem
  • Core performance improved six times for strongly consistent distributed operations, continuing the project's focus on highly performant distributed operations
  • Southbound improvements to Cisco IOS NETCONF and YANG toolchain

The full list of ONOS features provided in the Goldeneye release can be found here.

ONOS Technical Performance White Paper
In the spirit of providing the networking Community with useful performance benchmarks, ONOS collaborates with the OpenDaylight project, also hosted by The Linux Foundation, to establish a common methodology for performance evaluations of SDN control planes.

"ONOS continues its demonstrated leadership in scale, performance, and HA," said ON.Lab Chief Architect Thomas Vachuska. "Every release of ONOS is tested for various performance, scale and HA metrics, established in the comprehensive Technical White Paper published in April 2015, and we continue to meet and exceed the April 2015 results, which remain the best reported results in the industry."

Support from the ONOS community partners and collaborators who contributed to Goldeneye:

"AT&T values our collaboration with ON.Labs on ONOS," said Tom Anschutz, Distinguished Member of Technical Staff at AT&T. "Among many improvements, we found the work in Goldeneye on programmatic abstractions both simplifies application programming as well as reduces time to adapt to new hardware. So we are really happy with the new capability supporting the Intent framework through the Flow Objectives subsystem. Moreover, the exemplary applications have helped both to mature ONOS as well as the entire SDN ecosystem. Thanks to all the additional applications, working with ONOS feels less like working with a bare Linux kernel and more like working with an entire distribution."

"Adaptive Flow Monitoring (AFM) improves flow statistics monitoring accuracy without imposing any additional performance overhead to the core of ONOS," said Taesang Choi, principal research staff and UST adjunct professor at ETRI. "Its capabilities are realized by collecting flows in fine grained multiple intervals in such way that best reflects flow characteristics of various flow length."

"In the Goldeneye release, ONOS demonstrated the important capability of controlling Dis-aggregated ROADM software and hardware components in E-CORD configuration," said Hisayuki Sekine, head of the network solutions business unit of Fujitsu. "Fujitsu is very pleased to contribute to the overall design of E-CORD, the 1FINITY T100 transponder blades and related southbound software components to make E-CORD successful."

"We are pleased to see ONOS steadfastly making progress in adoption of variety of deployable use cases and improving the code quality simultaneously," said Ayush Sharma, CTO and SVP of the Networks business division of Huawei. "We also witnessed it gaining traction with carrier customers and wider community, in particular China Unicom deploying its first commercial version with our support. We are committed to continuously invest and contribute in this endeavor."

ONOS Community Expands, Meets at ONOS/CORD Mini Summit
The ONOS community comprises a core engineering team at ON.Lab, along with developers from Service Providers, vendors and Research and Educational Networks spanning across industries. Additionally, the following organizations recently joined ONOS as collaborators: Argela, Calix, IPT Solutions, SDNLAB and Villa-Tech.

Whether an individual or an organization, as an open source project all are encouraged to get involved with the growing ONOS community today. Download and test ONOS, join the project as a member and be sure to check out the live ONOS demonstration at the ONOS and CORD Mini Summit co-located at OPNFV Summit in Berlin, Germany on Monday, June 20.

About the ONOS project
ONOS is the open source SDN networking operating system for Service Provider networks architected for high performance, scale and availability. The ONOS ecosystem comprises ON.Lab and organizations that are funding and contributing to the ONOS initiative. The ONOS ecosystem comprises ON.Lab and organizations that are funding and contributing to the ONOS initiative. These include AT&T, China Unicom, NTT Communications Corp., SK Telecom Co. Ltd., Verizon, Ciena Corporation, Cisco Systems, Inc., Ericsson, Fujitsu Ltd., Huawei Technologies Co. Ltd., Intel Corporation, NEC Corporation and Nokia. See the full list of members, including ONOS' collaborators, and learn how you can get involved with ONOS at onosproject.org.

ONOS is an independently funded software project at The Linux Foundation, the nonprofit advancing professional open source management for mass collaboration to fuel innovation across industries and ecosystems.


New Networking Disaggregation Model Includes Pre-Integrated, Fully Supported Networking Software for Private Label Distribution

SANTA CLARA, Calif. – Avaya today announced its flagship networking operating system software is now available on industry standard hardware for specialized solutions providers. Avaya's move enables managed service providers, cloud service providers, systems integrators, and data center hosting companies to apply their own brand to the Avaya network operating system software, which reinforces the quality that is expected within their own brand promise.

Avaya's latest offering provides organizations with benefits including:

  • A proven network operating system with a robust network management application with years of live deployment exposure and more than 100,000 test scenarios ensuring comprehensive quality with each new release.
  • Pre-integrated software and hardware to reduce operational burdens and ensure a production- ready solution every time.
  • Avaya's end-to-end virtualization capabilities and full network orchestration suite to enable automation at scale.
  • 24/7/365 single call comprehensive technical support from Avaya, offering the same level that customers have come to expect from branded solutions.

Today's announcement marks the first phase of Avaya's networking disaggregation model rollout, which is targeted at high density data center environments requiring platforms such as 64 port 40G or 32 port 100G. A member of the Open Compute Project, Avaya is building an ecosystem of partners to deliver an enterprise-ready networking solution.

To become a supplier of hardware, Original Device Manufacturers must be certified into the Avaya ecosystem. The first Original Device Manufacturer to certify for this program is Delta Networks, Inc., a leading Original Design Manufacturer from Taipei, Taiwan. As part of the Avaya's ecosystem, Delta Networks Inc. will be selling standard switching platforms pre-loaded with Avaya's network operating system.

Click to Tweet: .@Avaya launches disaggregated network OS; puts proven software into hands of MSPs and others #AvayaNation http://bit.ly/1UijdbS


"We find that customers are attracted by the promise of running third-party network software on standardized network hardware provided by multiple vendors, and they see benefits accruing from simplified management and reduced vendor lock-in. Many, though, do not want to compromise the service and support that typically accompanies purchases of vertically integrated switches. Avaya is responding to these concerns by offering the benefits of network disaggregation in conjunction with a support program that is familiar to enterprise and service-provider customers."
--Brad Casemore, director of Research for Data Center Networking at IDC

"As the leading mobile broadband services provider in China, Avaya's solution is an ideal fit for us. As we look to grow our switching business, our customers trust our brand, and we trust Avaya's fabric technology and support services. This is a great partnership for both companies."
--Mr. Zhao, CCT Software chairman and president of CCT Group (China Communications Technology)

"We have been watching the white-box market for some time waiting for a network operating system that was powerful and practical for end customers, and at the same time, would be manageable for us. Because Avaya's network operating system is proven, innovative, and vendor-supported, we have confidence to sell the solution in a big way."
--Mr. Jeff Chen, president of Delta Networks, Inc.

"The disaggregation market for switching has been confined to hyper-scale data centers that have a large expert programming staff. With today's news, Avaya is offering a high-value alternative with well-established software that's been proven across millions of ports globally for nearly two decades. This is a disruptive move for Avaya that opens the door into markets where we haven't sold to in the past."
--Liam Kiely, vice president, Avaya Networking

Avaya software will be offered exclusively through systems integrators certified in the program and qualifying for direct purchases with approved Original Device Manufacturers. For more information on becoming a certified partner or locating a partner in your market, please click here.

Tags: Avaya, Avaya network operating system, Avaya networking software, disaggregation, network operating system, branded networking software, private label

About Avaya

Avaya is a leading provider of solutions that enable customer and team engagement across multiple channels and devices for better customer experience, increased productivity and enhanced financial performance. Its world-class contact center and unified communications technologies and services are available in a wide variety of flexible on-premises and cloud deployment options that seamlessly integrate with non-Avaya applications. The Avaya Engagement Environment enables third parties to create and customize business applications for competitive advantage. The Avaya fabric-based networking solutions help simplify and accelerate the deployment of business critical applications and services. For more information please visit www.avaya.com.

About CCT

CCT has a subsidiary that is publicly traded on the Shenzhen stock exchange with a market cap of $2-3bn with annual revenue of $1+bn and YoY growth of more than 80%. CCT is headquartered in Shenzhen, China, and has offices in Xian, Nanjing, and Chengdu. Considered the leading mobile broadband network integrated services provider in China, CCT is focused on high-speed mobile broadband communications technology and application of state-level high-tech enterprises. For more information please visit www.huaxunchina.cn.

About DNI

Delta Networks, Inc. is a leading ODM, original design manufacturer, of networking communications equipment. Delta Networks has worldwide sales offices, R&D Development Centers, and Manufacturing plants in Taiwan and mainland China. DNI has a rich product portfolio that ranges from Enterprise to Service Provider grade Ethernet switches to home broadband networking peripherals and equipment.

Certain statements contained in this press release may be forward-looking statements. These statements may be identified by the use of forward-looking terminology such as "anticipate," "believe," "continue," "could," "estimate," "expect," "intend," "may," "might," "plan," "potential," "predict," "should" or "will" or other similar terminology. We have based these forward-looking statements on our current expectations, assumptions, estimates and projections. While we believe these are reasonable, such forward looking statements involve known and unknown risks and uncertainties, many of which are beyond our control. These and other important factors may cause our actual results to differ materially from any future results expressed or implied by these forward-looking statements. For a list and description of such risks and uncertainties, please refer to Avaya's filings with the SEC that are available at www.sec.gov. Avaya disclaims any intention or obligation to update or revise any forward-looking statements.

All trademarks identified by ®, TM, or SM are registered marks, trademarks, and service marks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners

Follow Avaya on Twitter, Facebook, YouTube, Flickr, and the Avaya Connected Blog.


Platform Offers Seamless Access to All Mobile Supply Channels and Advanced Data and Audience Management Tools

BERLIN, GERMANY –  AppLift, a leading mobile ad tech company, today announced DataLift 360, the first platform to unify app advertising across the entire app lifecycle, from launch to growth and retention. DataLift 360 enables mobile marketers to access and target desired users through seamless and unified connections to all major supply channels and offers extended data and audience management functionalities. The announcement was made at AppLift's inaugural FirstScreen Conference in Berlin, Germany.

With DataLift 360's unified platform, app marketers can programmatically access and control entire mobile supply sources through a single proprietary technology platform, including RTB exchanges, social channels, direct publishers and all categories of networks. In addition, the platform supports all ad formats relevant to performance advertising, including banner, interstitial, native, video and rich media ads.

"As consumers engage with a variety of apps and mobile websites, the path to app profitability becomes exceedingly difficult for marketers to navigate," said Tim Koschella, CEO and Co-founder of AppLift. "Advertisers need to understand how to effectively reach their target audiences to gain maximum ROI. DataLift 360 simplifies this process by providing unified access to mobile inventory through an advertising platform tailored to each stage of the app marketing lifecycle."

For the first time, marketers launching their app can programmatically tap into rewarded channels, while those wishing to grow their user base can leverage DataLift 360's audience management tool, helping to acquire targeted users across any inventory. Marketers looking to retain or re-engage long standing users can also seamlessly leverage first party data to retarget them across programmatic exchanges, social and audience-enabled networks.

DataLift 360's underlying technology stack, such as its proprietary bidding algorithms, highly-scalable infrastructure, high data processing capacities, proprietary LTV optimization engine and fraud prevention system are all advantages created for mobile marketers to increase maximum benefit and ensure the success of their app businesses.

DataLift 360 will be publicly available in the second half of 2016 and is currently in beta mode for a few select clients. For further information about AppLift, visit: www.applift.com.

About AppLift:
AppLift is a leading mobile ad tech company that empowers mobile app advertisers to take control of every stage of the app marketing lifecycle. AppLift's programmatic platform, DataLift 360, enables advertisers to launch their apps as well as grow and retain quality users from one interface. With DataLift 360, app marketers can programmatically access all major mobile ad inventory worldwide and control their campaigns through a single proprietary technology platform, which provides advanced data integration as well as extended targeting and audience management capabilities.

The Business Continuity Institute - Jun 16, 2016 11:11 BST

Small businesses are leaving themselves open to potential threats with only 20% considering cyber security as a top business priority. This is according to new research by Barclaycard, which also found that 10% had never invested in improving the security of their website, putting them at risk from cyber crime.

The study also revealed that almost half (48%) had been hit by at least one cyber attack in the past year, with 10% experiencing more than four attacks. Almost one in five (16%) admit they were only prompted to review their cyber security when they were hit by an attack.

The latest Horizon Scan Report published by the Business Continuity Institute revealed that small businesses are no different to larger organizations when it comes to the main threats they face. In both cases the top threats were cyber attack and data breach.

Barclaycard's research found the majority (54%) of SMEs are concerned they could be at risk from an attack, but many lack the knowledge and expertise on how to better protect their business online. Only one in eight (13%) claim to be confident they understand enough about cyber crime to protect their business, and just one in six (15%) are very confident they have adequate measures in place.

Paul Clarke, Product Director at Barclaycard, said: “Businesses of all sizes face a constant and growing threat from cyber crime. As our research shows, many small businesses are failing take the necessary precautions, either because they don’t know how to protect themselves or, more worryingly, because they don’t think they need to. Cyber security is not a one-off investment that can then be forgotten about, especially as criminals are becoming increasingly sophisticated in the way they target businesses.”

Cisco Delivers a "Time Machine for the Data Center"

SAN JOSE, Calif. – Cisco (NASDAQ: CSCO) today announced Cisco Tetration Analytics™, a platform designed to help customers gain complete visibility across everything in the data center in real time -- every packet, every flow, every speed. Cisco Tetration Analytics gathers telemetry from hardware and software sensors, and then analyzes the information using advanced machine learning techniques. Tetration addresses critical data center operations such as policy compliance, application forensics, and the move to a whitelist security model. Through continuous monitoring, analysis, and reporting, the Tetration Analytics platform provides IT managers with a deep understanding of the data center that will dramatically simplify operational reliability, zero-trust operations and application migrations to SDN solutions and the cloud.

With Cisco Tetration Analytics, organizations can:

  • Understand what applications are dependent on each other throughout their data center and into the cloud
  • Move from reactive to proactive: make informed operational decisions and validate the effect of policy changes before they are implemented
  • Search across billions of flows in less than a second using Tetration's forensics search engine and user interface
  • Continuously monitor application behavior to quickly identify any deviation in communication patterns

The Challenge
There is currently no single tool designed to collect consistent telemetry across the entire data center and analyze large volumes of data in real time, at scale. Up till now, organizations have performed fragmented tasks without the correlation necessary to address operational issues comprehensively. As a result, these complex, slow and disjointed tools are costly in terms of time, money and lost opportunity. IT managers today are hampered by a lack of visibility and knowledge.

  • They lack pervasive visibility into data center infrastructure and how applications are interacting, which results in operational challenges.
  • They are unable to migrate applications to the cloud or set up a Disaster Recovery site effectively with precision and speed.
  • They're unable to adopt a zero trust model because they lack the critical information and resources to implement or maintain it.

The Solution: Cisco Tetration Analytics Platform
Tetration is designed to help enable pervasive and complete visibility across the data center using either server software sensors that require very low overhead, network hardware sensors that monitor packet-by-packet meta data, or both combined for the most complete solution. Tetration executes advanced data center analytics in real time and presents actionable analysis with easy to understand visuals. Tetration delivers information critical for data center operations, such as: application insights, automated white list policy recommendations, policy simulation and impact analysis, compliance management, and network flow forensics.

Tetration is like a time machine for the data center, enabling organizations to rewind what has happened in the past, view what is happening in the present in real time, and model what could happen:

  • Model a change before it's executed to understand the impact on applications to enable informed operational decisions;
  • Validate that policy changes have actually been applied and taken full effect;
  • Do real-time and historical policy simulation -- replay what happened in the network at any time, with long term data storage capabilities.

Early Field Trial: Cerner Corporation
"We were delighted to engage with Cisco to gain experience with Tetration as an early field trial participant," said Brett Jones, director of infrastructure technology for Cerner. "With the Tetration Analytics trial, we better understand application behavior and dependencies across our data center." Cerner is a global leader in health care technology. Cerner's health information technologies connect people, information and systems at more than 20,000 facilities worldwide.

How it works
Software sensors are installed on end hosts: either virtual machine or bare metal servers. In the first Tetration release, software sensors support Linux and Windows server hosts, while hardware sensors are embedded in the ASICs of Cisco Nexus 9200-X and Nexus 9300-EX network switches to collect flow data at line rate from all the ports. A single Tetration appliance will monitor up to one million unique flows per second. Both software and hardware sensors communicate the flow information in real time to the Tetration Analytics platform. The platform can be installed in any data center with any servers and any network switches.

The Tetration platform is a "one-touch" appliance: the servers and switches are prewired and the software is pre-installed. Setting up Tetration is easy: answering a few questions regarding the data center environment allows the Cluster to be configured. The big data complexity is hidden -- no special big data expertise is needed to deploy or operate Tetration. Available in July 2016, the first Tetration platform will be a full rack appliance that is deployed on-premise at the customer's data center.

Cisco Advanced Services
Although Tetration Analytics is easy to deploy in just hours to start gaining immediate benefits, some organizations may wish to engage Cisco Tetration Advanced Services expertise to gain even faster time to value through guidance on optimizing policies and application performance, and support for comprehensive adoption of the solution in their data centers. In addition, Cisco Solution Support for Tetration provides 24/7 global solution expertise for centralized issue management and resolution for Cisco Tetration Analytics and Tetration ecosystem partner products, with hardware, software and solution-wide support in a single service.

Supporting Quotes
"Real-time analytics -- based on recent advances in unsupervised machine learning, behavior analysis, and visualization -- facilitate the pervasive visibility required to gain insight into and control over application mobility, security, and datacenter-wide infrastructure," said Brad Casemore, Research Director, Data Center Networks, IDC. "In announcing the Tetration Analytics Platform, Cisco is delivering on the rich promise of real-time analytics, with application-behavior insights, policy simulation and impact analysis, automated whitelist policy generation, long-term data retention for forensics and analysis, and the capacity to detect policy deviations within minutes."

"You can't manage or secure what you can't see," said Zeus Kerravala, Principal Analyst, ZK Research. "The problem today is that customers do not have adequate visibility into application behaviors, traffic flows or dependencies, resulting in operational problems and security challenges. Tetration provides unprecedented visibility, enabling customers to search billions of flows to get actionable insight in less than a second, gaining insight into the past (with forensics), present (with real-time analysis) and future (with impact analysis)."

"Gaining much deeper visibility into the data center and automating actionable analysis across a company's infrastructure marks a critical technology advancement in building secure digital business models like cloud, mobile and IoT," said David Goeckeler, senior vice president and general manager of Cisco's Networking and Security Business Group. "We believe the insights we gain from applications and the data center overall will enhance existing software solutions and drive the future development of new advanced software that will improve business operations, efficiency and customer experiences."

Additional Resources
Read: Cisco CEO Chuck Robbins blog
Watch video: Your Data Center and Tetration Analytics
Watch animated video: Tetration Analytics
Learn more: IDC Business Value Brief - Cisco Tetration Analytics
View: Tetration Infographic
Read: Tetration Analytics "At a Glance"
Read: Tetration Analytics Data Sheet
Read: IDC Technology Spotlight
Learn more about: Cisco Data Center and Virtualization
Learn more about: Application Centric Infrastructure (ACI)
Learn How Cisco ACI delivers business outcomes
Learn more: Cisco Solution Support for Tetration Analytics

About Cisco
Cisco (NASDAQ: CSCO) is the worldwide technology leader that has been making the Internet work since 1984. Our people, products, and partners help society securely connect and seize tomorrow's digital opportunity today. Discover more at thenetwork.cisco.com and follow us on Twitter at @Cisco.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.

Availability Disclaimer: Many of the products and features described herein remain in varying stages of development and will be offered on a when-and-if-available basis. This products and features are subject to change at the sole discretion of Cisco, and Cisco will have no liability for delay in the delivery or failure to deliver any of the products or features set forth in this document.

Wednesday, 15 June 2016 00:00

What Does MAM-First Mean to You?

With more and more employees carrying smart devices, it’s natural for them to want to be able to use them for work. Bring-your-own-device (BYOD) programs and policies empower people to choose the best device to get their work done. Allowing employees to use their own mobile devices can also help businesses reduce hardware and service costs.

But corporate IT has a responsibility to protect corporate information wherever it resides. This includes employee-owned mobile devices.

The key is to find the right balance between corporate responsibility to keep enterprise data secure, and the employees’ expectations for a great user experience as well as the security and privacy of their own information.