LinkedIn survey: More Than One Third of Professionals are Uncomfortable Negotiating

 

New LinkedIn Research Reveals More Than One Third of Professionals are Uncomfortable Negotiating

 

Toronto, Ont. April 3, 2012LinkedIn, the world’s largest professional network with more than 5 million members in Canada, today released data about professionals’ attitudes toward career negotiations like asking for a raise or closing a business deal. 

 

LinkedIn surveyed more than 2,000 professionals globally. The study shows a direct correlation between being a more frequent user of LinkedIn and being more comfortable with negotiating. Forty-eight percent of professionals who visit LinkedIn on a daily basis report feeling confident about negotiating, while only one third of professionals who visit LinkedIn fewer than five times per month have the same feeling of confidence.

 

Professionals in eight countries were surveyed. Globally, 35 percent of people report feeling anxious or frightened about negotiating. Thirty-four percent are confident, while 10 percent say negotiations are exciting and 10 percent are indifferent about them.

  • According to LinkedIn's study, just over one-third of Canadians are confident negotiators (36 per cent), slightly above the global average.

·         Brazilian professionals had the highest percentage of respondents who stated they were frightened by negotiating (21 per cent).

·         Professionals in the United States are the most anxious about negotiating (39 per cent).

·         Germans have the most positive outlook on negotiating, with the highest rate of respondents reporting they are excited about negotiating (21 per cent) and the second-highest ranking for feeling confident (43 per cent).

·         India ranked as the most confident country when it comes to negotiating, with 47 percent of survey respondents from India reporting that they feel confident about negotiating.

 

The study also found that men feel more confident about negotiating than women, with 37 percent of men saying they feel confident compared to only 26 percent of women.

 

When asked to compare negotiating to various situations, more than one out of every five respondents (22 percent) feel that negotiating is similar to playing a game of poker, where players are forced to make moves based on incomplete information.


“Negotiating is a core skill for any professional, yet it’s something we seem to approach with trepidation,” said leading Executive Coach, Ray Williams, President and Owner at Ray Williams Associates Inc. “We can all benefit from getting smarter about making requests at work. Whether it’s consulting a salary calculator or conferring with a second-degree connection on LinkedIn to learn your counterpart’s style, careful preparation is key to being a successful negotiator.” 

Today PayScale unveiled a new tool that will easily allow professionals to prepare for salary negotiations. The PayScale Instant Salary Report application uses LinkedIn’s Application Programming Interface or API to allow LinkedIn members to log in with their LinkedIn account on the PayScale site. Professionals can then select a current title from their LinkedIn Profile and automatically see a salary report based on what similar professionals are currently earning.

 

In addition to the new application that was launched today, here are some other tips that will help you become a negotiating ninja:

 

Consult with Your Network: Your professional network is your most underused tool in a negotiation. Friends, peers and your LinkedIn connections (even your second and third degree connections) can offer all kinds of insights and motivation.

 

Do Pre-Work: Negotiators can gain an advantage by taking the initiative to write a draft plan for whatever is they are proposing. Try joining some of the same LinkedIn Groups your counterpart is a member of to gain insight into his or her motivations, attitudes and interests.

 

Don’t Give In: While in a negotiation, draw out the conversation – or even postpone it – if need be. Don’t just accept the first pushback you receive and surrender after your first attempt.

 

Learn more about LinkedIn’s negotiating study by visiting the LinkedIn’s Blog.

-Ends-

 

 

Press contacts
press@linkedin.com  

 

About LinkedIn
Founded in 2003, LinkedIn connects the world’s professionals to make them more productive and successful. With more than 150 million members worldwide, including executives from every Fortune 500 company, LinkedIn is the world’s largest professional network on the Internet. The company has a diversified business model with revenues coming from member subscriptions, marketing solutions and hiring solutions. Headquartered in Silicon Valley, LinkedIn has offices across the
globe.

 

Trend Micro Deep Security 8 Certified for VCE Vblock Infrastructure Platforms

 

Trend Micro Deep Security 8 Certified for VCE Vblock Infrastructure Platforms


New certification is a channel-ready solution: Deep Security is, the industry's first agentless security platform.

OTTAWA, April 3, 2012 /CNW/ - Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global virtualization and cloud security leader, today announced it is now part of the VCE independent software vendors (ISV) program. Trend Micro Deep Security has been certified on the VCETM VblockTM infrastructure platform and is the industry's first agentless security platform that unlocks virtual machine performance. This certification enables workloads to be deployed effectively with VCE's optimized cloud infrastructure, while meeting compliance and governance requirements.

VDI is at the forefront of increasing availability and scalability while maintaining security of enterprise data.

VCE Vblock Infrastructure Platforms combine industry-leading technologies from Cisco, EMC, and VMware to deliver a pre-configured, rapidly deployable, converged infrastructure for cloud computing. This certification provides Trend Micro customers with effective security solutions certified to work with the Vblock Infrastructure Platform.

Supporting quotes

D. Martin, vice president, global channels, VCE
"As customers move more mission critical workloads to virtualized and cloud infrastructures, security is a major requirement. We're providing our mutual customers and channel partners with the ability to leverage their Trend Micro and VCE investments and expertise to deploy a comprehensive converged infrastructure that meets their most demanding compliance and security requirements."

Parag Patel, vice president, global strategic alliances, VMware
"Through our work with Trend Micro over the years in creating security and compliance solutions for the VMware cloud infrastructure suite, we have come to appreciate Trend Micro's agility and determination in using new platforms and partner technologies to provide security solutions that help our customers accelerate their journey to the cloud. Their work with VCE is another example of Trend Micro's ability to consistently evolve as customers seek cost-effective and secure cloud environments."

Partha Panda, vice president of business development, Trend Micro
"Our official certification of Deep Security is an extension of the foundation we've already established with Vblock channel members and we're pleased to continue our collaboration with VCE, a true leader in converged infrastructure solutions. With this certification, Trend Micro will leverage its extensive partner ecosystem, offering our valued resellers a server and virtualization security product that's ready for Vblock platform, and giving them the tools and resources they need to help them grow a profitable and sustainable business around this new solution."

Supporting assets

  • VCE is leading the way in converged infrastructure solutions. For information on the Vblock Infrastructure Platform, click here.
  • For more information on how Trend Micro Deep Security provides advanced protection for physical, virtual and cloud servers, click here.
  • Trend Micro has been working closely with VMware for years to create cutting-edge solutions that leverage the VMware platform. To learn more about how the two companies are collaborating, click here.

About Trend Micro
Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers.

For further information:

Media contact: Claire M Tallarico:  416 616 9940


Ottawa's Openera Integrates with Box OneCloud to Deliver Mobile Enterprise

Openera Integrates with Box OneCloud to Deliver Mobile Enterprise

Posted by Krissie Thornton on Wednesday, March 28th, 2012

FOR IMMEDIATE RELEASE:

Ottawa, Ontario, March 28th, 2012 – Canadian based personal and business cloud provider announces mobile integration with Box OneCloud.

Openera, a personal and business cross cloud file manager that automatically distributes files and attachments to multiple cloud services announced today its integration with Box’s popular cloud file storage and collaboration service in its mobile iOS app. The Openera mobile app will be available on Box OneCloud, an ecosystem of over 30 powerful productivity applications that integrate with Box.

Openera’s integration with Box enables end users and professionals to have their files and email attachments automatically saved and sorted to their Box account based on business rules they create, ensuring that all of their important documents end up precisely where they are supposed to go, without changing the way they work. Users simply connect their email address and Box account with Openera; establish their business rules, and Openera takes care of the rest.

“Often a company’s most important documents, like signed contracts, proposals, and invoices, end up lost or buried inside someone’s inbox,” said Openera CEO, Peter Lalonde. “We have a lot of users who use other cloud storage services for personal use, but rely on Box for managing corporate content. We’re excited to be a part of OneCloud, and helping millions of Box users get their files and attachments into their Box account automatically.”

Peter says the feedback about the Openera web app (openera.net) has been tremendous so far. “Our customers are often shocked at just how much important data they had trapped in their inbox after they sync for the first time.”

Box customer Ari Gati, who has been using Openera since September agrees. “I was amazed by how many important documents I had lost in my email. I’m not sure I could live without Openera, it’s like my personal cloud assistant. Openera’s mobile app connected to my Box account will add a powerful, but simple way to set distribution rules and allow me to find and use content fast, no matter where I am.”

“The Openera mobile app and Box integration will make managing personal and company content in the cloud even simpler for both Box and Openera customers. MyMusic CEO Rob Lane has been using Openera to manage his daily influx of contracts and proposals. “It’s such a relief to know that my important files always end up in the right place in the cloud. It works flawlessly and assures me that I can always find what I need immediately. I can’t wait to have these capabilities in a mobile app.”

To get Openera for your Box account visit http://www.box.com/services/openera


About Openera

Openera makes the cloud work for you with elegant cloud, mobile, and social applications for business. Our goal is to deliver on the promise of cloud services and enterprise applications. Minimizing change forced on people by designing applications that extract value from their actual behaviour and inject it into cloud services and enterprise systems.

Openera’s Personal Cross-Cloud File Manager automatically distributes files and attachments to multiple cloud services. Users can then find, share, move and manage their files across all of the cloud services they use from a simple, intuitive web & mobile interface.

Find, share, and manage any file, from any cloud, on any device … in 2 taps. Make the cloud work for you without changing the way you work – visit www.openera.netfor more details.


About Box OneCloud

Box OneCloud is the first mobile enterprise platform that unifies business information across devices, applications and operating systems. Box OneCloud provides an ecosystem of over 30 powerful productivity applications that enable the enterprise to securely connect and share content from their mobile devices. Available immediately on iOS for all users, Box OneCloud delivers the best tools and services for the post-PC era enterprise – visit Box OneCloud for more details.

For media Inquiries  and sample copy contact:

Krissie Thornton

613.720.9536

krissie@openera.net

www.openera.net

Fujitsu Converts Fujitsu Toshiba Mobile Communications into a Wholly Owned Subsidiary

Fujitsu Converts Fujitsu Toshiba Mobile Communications into a Wholly Owned Subsidiary

Tokyo, Apr 2, 2012 - (JCN Newswire) - Fujitsu Limited and Toshiba Corporation today announced that, as of April 1, 2012, Fujitsu has acquired Toshiba's ownership stake in Fujitsu Toshiba Mobile Communications Limited, which develops and sells mobile phones for KDDI and other carriers. As a result, Fujitsu Toshiba Mobile Communications has been converted into a wholly owned subsidiary of Fujitsu.

Reason for making the company a wholly owned subsidiary of Fujitsu

With respect to the merger of the mobile phone businesses of Fujitsu and Toshiba, in October 2010 Fujitsu received an ownership stake of 80.1% in Fujitsu Toshiba Mobile Communications, making the company a consolidated subsidiary of the Fujitsu Group.

Fujitsu has now received Toshiba's 19.9% ownership stake, establishing Fujitsu Toshiba Mobile Communications as a wholly owned subsidiary of Fujitsu.

Due to the conversion of Fujitsu Toshiba Mobile Communications into a wholly owned subsidiary of Fujitsu, as of April 1, 2012, the company's name has been changed to Fujitsu Mobile Communications Limited.

About Fujitsu Limited

Fujitsu is a leading provider of information and communication technology (ICT)-based business solutions for the global marketplace. With approximately 170,000 employees supporting customers in over 100 countries, Fujitsu combines a worldwide corps of systems and services experts with highly reliable computing and communications products and advanced microelectronics to deliver added value to customers. Headquartered in Tokyo, Fujitsu Limited (TSE:6702) reported consolidated revenues of 4.5 trillion yen (US$55 billion) for the fiscal year ended March 31, 2011. For more information, please visit www.fujitsu.com.

Fortinet(R) Expands Industry's Broadest Security Portfolio With Strategic Appliance for Mid-Sized Businesses and Large Enterprise Branch Offices

Fortinet(R) Expands Industry's Broadest Security Portfolio With Strategic Appliance for Mid-Sized Businesses and Large Enterprise Branch Offices



SUNNYVALE, CA, Apr 02, 2012 (MARKETWIRE via COMTEX) -- Fortinet(R) (NASDAQ: FTNT) -- a world leader in high-performance network security -- today announced the introduction of a powerful multi-threat security appliance that meets the performance and deployment flexibility demands for small-to-medium sized businesses and branch offices of large enterprises and delivers significant headroom for growth. The new FortiGate-100D integrates a broad range of attack recognition and prevention technologies into a single platform to help smaller networks successfully protect users, data, and systems against targeted attacks aimed at penetrating networks and stealing valuable information.

The introduction of the FortiGate-100D coincides with a number of market dynamics calling for high performance network security. First, network bandwidth requirements are soaring due to increasing business use of data-intensive social media applications that frequently embed rich video content. Second, users are deploying multiple mobile devices including smart phones and tablets to access these applications that are becoming fundamental to conducting business. These mobile devices send data in much smaller packets, which drives the need for a firewall that's capable of higher connections per second. And third, many of today's most sophisticated threats emanate from the application layer, which requires the ability to detect and thwart attacks embedded in thousands of different applications. As a result, organizations face significant challenges to control and manage their fast-changing business infrastructure with advanced security solutions that can scale with ever-increasing performance requirements.

The new FortiGate-100D features significant capacity and performance improvements, as well as configuration options that facilitate network growth and the expansion of branch office deployments. By combining firewall, application control, IP Sec and SSL VPN, intrusion prevention, antivirus, antimalware, antispam, and Web filtering into a single device, the new appliance can help organizations meet regulatory compliance requirements and protect against the latest viruses, network vulnerabilities, worms, spam and phishing attacks.

In addition, the appliance provides substantial onboard storage to archive data for policy compliance, generate SQL-based reports locally, or enable WAN optimization. The WAN optimization feature, which is particularly important in light of the broad adoption of bandwidth-intensive applications that can slow performance between remote locations and a central office, increases network performance by reducing the amount of communication and data transmitted between applications and servers across a WAN.

Given the resource constraints in smaller organizations and branch offices, the FortiGate-100D is an attractive solution because it installs in minutes using the FortiExplorer configuration wizard and automatically downloads regular updates from Fortinet's FortiGuard(R) Security Subscription Services, which helps ensure up-to-date protection against sophisticated threats without the need for administrator intervention.

Like other appliances in the FortiGate product family, the FortiGate-100D is equipped with the FortiOS(TM) operating system that leverages specialized FortiASIC(TM) hardware to deliver increased levels of security and performance.

Enhancements in FortiGate-100D

The new FortiGate-100D features improved remote access capabilities, higher volume connectivity, increased IPS performance and improved flow-based and proxy-based antivirus throughput.

As a high performance and high capacity security appliance, the FortiGate-100D delivers 2.5 Gbps of firewall throughput, 950 Mbps of IPS throughput and can support up to 2.5 million concurrent firewall sessions.

Because of the increasing mobility of today's workforce and the growing importance of branch office operations transferring sensitive data, the new appliance supports 5,000 Client-to-Gateway IPSec VPN tunnels. In addition, it supports up to 200 concurrent SSL VPN users.

To improve antivirus performance, the FortiGate-100D delivers 700 Mbps of flow-based throughput or 300 Mbps of proxy-based throughput. Each of these performance benchmarks represent an approximately 4.5 X improvement over the FortiGate-110C.

To facilitate deployment in a wide range of network architectures as well as support network growth, the port density is among the highest of any device in its price range. The FortiGate-100D is equipped with twenty-two GbE interfaces that can be easily partitioned into independent security zones and custom combinations of LAN and WAN ports, dual-WAN redundant connections for maximum reliability and availability are supported by default, and a dedicated DMZ port adds an extra layer of protection for Web-facing servers. Out-of-band management using FortiExplorer, which provides an easy way to setup and configure the device, is provided by a USB management port. Dedicated management and HA ports make the FortiGate-100D easy to manage and deploy in high availability configurations.

"The FortiGate-100D is a strategic product because it intersects the small-to-medium business and large enterprise branch office markets where we are seeing significant demand," said Michael Xie, chief technology officer with Fortinet. "These markets are looking for very high performance network security solutions that can grow in lockstep with their fast changing business requirements. At the same time, they're looking for a cost-effective and simple solution to deploy security that doesn't require high administrative overhead. We've listened closely to our customers and are delivering a new appliance that addresses these needs."

Availability The FortiGate-100D is available now.

About Fortinet (www.fortinet.com) Fortinet (NASDAQ: FTNT) is a worldwide provider of network security appliances and the market leader in unified threat management (UTM). Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure. Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2011 Fortune Global 100. Fortinet's flagship FortiGate product delivers ASIC-accelerated performance and integrates multiple layers of security designed to help protect against application and network threats. Fortinet's broad product line goes beyond UTM to help secure the extended enterprise -- from endpoints, to the perimeter and the core, including databases and applications. Fortinet is headquartered in Sunnyvale, Calif., with offices around the world.

Copyright Copyright 2012 Fortinet, Inc. All rights reserved. The symbols (R) and (TM) denote respectively federally registered trademarks and unregistered trademarks of Fortinet, Inc., its subsidiaries and affiliates. Fortinet's trademarks include, but are not limited to, the following: Fortinet, FortiGate, FortiGuard, FortiManager, FortiMail, FortiClient, FortiCare, FortiAnalyzer, FortiReporter, FortiOS, FortiASIC, FortiWiFi, FortiSwitch, FortiVoIP, FortiBIOS, FortiLog, FortiResponse, FortiCarrier, FortiScan, FortiAP, FortiDB and FortiWeb. Other trademarks belong to their respective owners. Fortinet has not independently verified statements or certifications herein attributed to third parties, and Fortinet does not independently endorse such statements. Notwithstanding anything to the contrary herein, nothing herein constitutes a warranty, guarantee, binding specification or other binding commitment by Fortinet, and performance and other specification information herein may be unique to certain environments. This news release may contain forward-looking statements that involve uncertainties and assumptions. Changes of circumstances, product release delays, or other risks as stated in our filings with the Securities and Exchange Commission, located at www.sec.gov, may cause results to differ materially from those expressed or implied in this press release. If the uncertainties materialize or the assumptions prove incorrect, results may differ materially from those expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact are statements that could be deemed forward-looking statements. Fortinet assumes no obligation to update any forward-looking statements, and expressly disclaims any obligation to update these forward-looking statements.

FTNT-O

Media Contact: Rick Popko Fortinet, Inc. 408-486-7853 rpopko@fortinet.com

Cisco Joins Forces With EMC to Advance IT Skills in Cloud, Big Data and Data Center Technologies

Cisco Joins Forces With EMC to Advance IT Skills in Cloud, Big Data and Data Center Technologies

Training and Certifications Enable Organizations to Maximize Benefits of Transformational IT Technologies

 

SAN JOSE, CA--(Marketwire -04/02/12)- Cisco (NASDAQ: CSCO - News) today announced it is joining forces with EMC to offer comprehensive technical education solutions in the areas of cloud architecture, virtualization, storage, data center networking and data science. The joint education solutions from Cisco and EMC, which also incorporate courseware from VMware, will offer advanced training and certifications to help organizations acquire the skills required to successfully architect, build, and transform their IT infrastructures, adopt cloud computing, and realize the promise of big data and data science.

Explosive data growth and new transformational technologies such as cloud computing, converged infrastructure, unified networking and big data are changing the way organizations are running their businesses today. These new technologies affect not only IT systems and infrastructures, but also the practitioners that design, install, operate and manage them. New job roles are emerging that require next-generation skill sets. New skills and knowledge are needed for organizations, managers and individual end-users to maximize the benefits of these new technologies.

Key Facts/Highlights

  • The education solutions will combine the latest curricula from Cisco, EMC and VMware, to offer a logically organized framework to address disciplines such as Cloud Architect, Systems Administrator, Storage, Backup and Recovery, Data Center Networking, Data Center Network Design, Systems Management, and Data Scientist.
  • Learning paths will make it simple for IT managers and practitioners to create education development plans by prescribing the specific course of training required for proficiency in each discipline. For example, the Systems Administrator learning path includes the following courses: Cloud Infrastructure and Services, VMware vSphere®: Install, Configure, Manage, and Cisco Data Center Unified Computing Implementation (DCUCI). The Data Center Network Architect learning path includes the following courses: EMC Cloud Infrastructure and Services, Cisco Data Center Unified Fabric (DCUFD), and Configuring Cisco Nexus Data Center (CCNDC). Other courses include EMC's Data Science and Big Data Analytics and EMC's Information Storage and Management.
  • Bundles will offer convenient, flexible and value-priced purchase options for each of the prescribed learning paths and will make it easy for users to find, purchase and consume the most appropriate courseware for their needs. Courses will also be offered individually for those who prefer an a la carte option.
  • Cisco will deliver its training as instructor-led training (ILT) and EMC (or in some cases VMware) will deliver the EMC and VMware training as ILT. Select courses will be available for customer onsite instruction by either Cisco or EMC. Additionally, some EMC courseware is offered through EMC's convenient video instructor-led (VILT) training.

Supporting Quotes:

  • Jeanne Beliveau-Dunn, vice president and general manager of Learning@Cisco, said: "Today's data center is composed of heterogeneous technologies, with the cloud blurring the lines between technology silos. IT organizations must cultivate new cloud architecture skills, understand how to use big data and maintain deep domain expertise with a renewed understanding of virtualization and technology convergence. With this offering Cisco and EMC are leading the way in transforming skills for the next generation of IT professionals."

  • Tom Clancy, vice president of EMC Education Services, said: "EMC, Cisco and VMware are industry leaders offering best-of-breed data center and IT infrastructure technologies and services, through a strong and collaborative relationship. The education solutions Cisco and EMC are offering through this collaboration are conveniently packaged, flexible and value-priced. Our solutions will provide organizations, as well as the IT professional, a prescriptive and simple way to acquire the right skills at the right time, regardless of where they are in their journey to cloud computing, addressing big data or employing a data science strategy."

  • Hatem Naguib, vice president, Alliances, VMware, said:
    "Today's IT administrators are faced with a data center environment that is continuously evolving. VMware, Cisco and EMC's education offerings will empower customers to easily and efficiently obtain the skills required to leverage new virtualization, cloud and data center technologies for the benefit of their organizations."

  • David Vellante, CEO and chief analyst, The Wikibon Project, said: "Enterprises are transforming from siloed data center operations to cloud computing and converged infrastructures to improve efficiency and agility. IT pros likewise need to adapt their skills to support such modern architectures. That means new ecosystem-focused training and educational programs -- such as the new offering from Cisco, EMC and VMware -- are needed to help IT pros stay relevant and valuable to their organizations."

Offerings and Availability:

  • Convenient education solution bundles are aligned to key IT job roles and learning paths.
  • The courseware may also be purchased as traditional stand-alone training directly from Cisco and EMC.
  • The education solutions will be available beginning April 2, 2012 directly from Cisco or EMC at www.cisco.com/go/ase or http://education.EMC.com/CiscoEMCVMware

Supporting Resources:

Social Media Destinations:

Technorati Tags: Talent Development, Cisco Certified, Network, Certifications, IT Certifications, Data Center, Cloud Technologies, Data Center Could, Cisco, Cisco Learning Network, EMC, Collaboration, Education, CCNA, CCNP, Unified Communications, Learning@Cisco, VMware

RSS Feed for Cisco: http://newsroom.cisco.com/rss-feeds

About Cisco
Cisco (NASDAQ: CSCO - News) is the worldwide leader in networking that transforms how people connect, communicate and collaborate. Information about Cisco can be found at http://www.cisco.com. For ongoing news, please go to http://newsroom.cisco.com.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.

EMC is a registered trademark of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners.

VMware and VMware vSphere are registered trademarks and/or trademarks of VMware, Inc. in the United States and/or other jurisdictions. The use of the word "partner" or "partnership" does not imply a legal partnership relationship between VMware and any other company.

Embedded Video Available

Embedded Video Available: http://www2.marketwire.com/mw/frame_mw?attachid=1935412

Contact:
Press & Analyst Relations:
Cara Sloman
Cisco
831-440-2411
csloman@cisco.com

Dell Announces Intent to Acquire Wyse Technology

Dell Announces Intent to Acquire Wyse Technology

  • Extends Dell’s desktop virtualization capabilities and drives attachment of enterprise solutions, including servers, networking, storage and services
  • Strengthens Dell’s strategy to offer customers innovative, end-to-end IT solutions from the edge to the core to the cloud



Dell today announced it has signed a definitive agreement to acquire Wyse Technology, the global leader in cloud client computing, to significantly extend its desktop virtualization offerings. The addition of Wyse will expand Dell’s desktop virtualization capabilities and provide new solutions and services opportunities for the full range of Dell’s enterprise offerings. 

In some environments, a virtual desktop allows enterprises to more efficiently and securely manage their users and end point devices. With this acquisition, Dell expands its enterprise solutions portfolio and offers customers an ever broadening array of tailored solutions to meet their needs.

The total market for desktop virtualization solutions should continue to see strong growth globally, with the larger revenue and margin opportunities coming from the datacenter infrastructure, cloud and services offerings that are tied to thin client and desktop virtualization technology sales. Thin client and desktop virtualization solutions typically drive high attach rates to data center solutions, including servers, networking, storage and services. The end-to-end datacenter infrastructure stack for these solutions is expected to exceed $15 billion by 2015.

Wyse Technology Leadership
Wyse, ranked No.1 in thin client unit shipment volume on 4Q 2011[1], has shipped more than 20 million units worldwide and has over 200 million people interacting with its products each day. The company has more than 180 patents, both issued and pending, covering its solutions, software and differentiated intellectual property.

The Wyse solutions portfolio includes industry-leading thin client solutions with advanced management, desktop virtualization and cloud software.

  • Cloud clients: Wyse offers a wide selection of secure, reliable, cost-effective thin and zero clients designed to easily integrate into any virtualized or web-based infrastructure, while meeting the budget and performance requirements for any application.
  • Cloud software: Technology powering a new world of cloud connected smart devices.
    • Management software - Secure, easy and scalable remote device management for the extended enterprise.
    • Virtualization software - The best user experience with Microsoft, Citrix and VMware virtual desktop infrastructures.
    • Mobility software - Secure mobile connectivity to your personal, private or public cloud for mobile devices.
  • Services: Wyse offers a wide range of cloud computing services to complement its cloud clients and software solutions. Services are available for specific or on-going engagements.
Wyse Technology, founded in 1981, is headquartered in San Jose, Calif. and serves customers in more than 50 countries around the world. Wyse has more than 3,000 resellers and shipped more than 1 million units in 2011.

The transaction was approved by the board of directors of each company and is expected to be accretive to Dell non-GAAP earnings in the second half of its Fiscal Year 2013. Additional terms of the transaction were not disclosed. The transaction remains subject to customary conditions and is expected to close in the second quarter of Dell’s FY13.

Quotes
“Desktop virtualization can help organizations streamline IT management, improve productivity and security, and increase cost efficiency for discrete workloads or usage scenarios,” said Jeff Clarke, president, End User Computing Solutions at Dell. “The Wyse Technology desktop virtualization capability complements Dell’s strongest-ever device and computing solutions portfolio, and strengthens our position in offering customers among the broadest set of computing choices from the edge to the core to the cloud.”

“The combination of Wyse and Dell provides us with tremendous growth opportunities for our core desktop virtualization business, helps us expand into new and fast-growing market segments including mobility and cloud computing, and provides us with reach and scale we did not previously have,” said Tarkan Maner, president and CEO, Wyse Technology. “We believe that taking this step with Dell is a very natural progression for our business and offers our customers many great advantages not available to them today.”

An analyst call with Jeff Clarke, president, Dell End User Computing; Dave Johnson, senior vice president, Dell Corporate Strategy; and Tarkan Maner, president and CEO, Wyse Technology; will be webcast live today at 8:45 a.m. Central Time and archived at www.dell.com/investor

About Wyse Technology
Wyse Technology is the global leader in Cloud Client Computing. The Wyse portfolio includes industry-leading thin, zero and cloud PC client solutions with advanced management, desktop virtualization and cloud software supporting desktops, laptops and next generation mobile devices. Wyse has shipped more than 20 million units and has over 200 million people interacting with their products each day, enabling the leading private, public, hybrid and government cloud implementations worldwide. Wyse works with industry-leading IT vendors, including Cisco®, Citrix®, IBM®, Microsoft, and VMware® as well as globally-recognized distribution and service providers. Wyse is headquartered in San Jose, California, U.S.A., with offices worldwide.

About Dell
Dell Inc. (NASDAQ: DELL) listens to customers and delivers worldwide innovative technology, business solutions and services they trust and value. For more information, visit www.dell.com.

U of T-led Research Team Discovers New Quantum Encryption Method to Foil Hackers

 

 


U of T-led Research Team Discovers New Quantum Encryption Method to Foil Hackers

 

TORONTO, March 30, 2012 /CNW/ - A research team led by University of Toronto Professor Hoi-Kwong Lo has found a new quantum encryption method to foil even the most sophisticated hackers. The discovery is outlined in the latest issue of Physical Review Letters.

Quantum cryptography is, in principle, a foolproof way to prevent hacking. It ensures that any attempt by an eavesdropper to read encoded communication data will lead to disturbances that can be detected by the legitimate users. Therefore, quantum cryptography allows the transmission of an unconditionally secure encryption key between two users, "Alice" and "Bob," in the presence of a potential hacker, "Eve." The encryption key is communicated using light signals and is received using photon detectors. The challenge is that Eve can intercept and manipulate these signals.

"Photon detectors have turned out to be an Achilles' heel for quantum key distribution (QKD), inadvertently opening the door to subtle side-channel attacks, most famously quantum hacking," wrote Dr. Charles Bennett, a research fellow at IBM and the co-inventor of quantum cryptography.

When quantum hacking occurs, light signals subvert the photon detectors, causing them to only see the photons that Eve wants Bob to see. Indeed, earlier research results by Professor Lo and independent work by Dr. Vadim Makarov of the Norwegian University of Science and Technology have shown how a clever quantum hacker can hack commercial QKD systems.

Now, Professor Lo and his team have come up with a simple solution to the untrusted device problem. Their method is called "Measurement Device Independent QKD." While Eve may operate the photon detectors and broadcast measurement results, Bob and Alice no longer have to trust those measurement results. Instead, Bob and Alice can simply verify Eve's honesty by measuring and comparing their own data. The aim is to detect subtle changes that occur when quantum data is manipulated by a third party.

Specifically, in Measurement Device Independent QKD, the two users send their signals to an untrusted relay - "Charlie" - who might possibly be controlled by Eve. Charlie performs a joint measurement on the signals, providing another point of comparison.

"A surprising feature is that Charlie's detectors can be arbitrarily flawed without compromising security," says Professor Lo. "This is because, provided that Alice and Bob's signal preparation processes are correct, they can verify whether Charlie or Eve is trustworthy through the correlations in their own data following any interaction with Charlie/Eve."

A proof-of-concept measurement has already been performed. Professor Lo and his team are now developing a prototype measurement device independent QKD system, which they expect will be ready within five years.

As a result of implementing this new method, quantum cryptography's Achilles' heel in the fight against hackers has been resolved. Perhaps, a quantum jump in data security has now been achieved.

Professor Lo is a faculty member in The Edward S. Rogers Sr. Department of Electrical & Computer Engineering and the Department of Physics. His team includes Senior Research Associate Dr. Bing Qi, who is based in Professor Lo's laboratory, and Professor Marcos Curty of the University of Vigo in Spain.

To obtain a copy of the paper, please visit:
http://link.aps.org/doi/10.1103/PhysRevLett.108.130503.

For further information:

Professor Hoi-Kwong Lo
The Edward S. Rogers Sr. Department of Electrical & Computer Engineering
and the Department of Physics
University of Toronto
Tel: 416-946-5525
Email: hklo@comm.utoronto.ca

Liam Mitchell
Communications & Media Relations Strategist
Faculty of Applied Science & Engineering
University of Toronto
Tel; 416-978-4498
Email: media@ecf.utoronto.ca

 

Cisco Applauds Canadian Federal Budget Support for Greater Use of Telepresence Technology

Cisco Applauds Canadian Federal Budget Support for Greater Use of Telepresence Technology

TORONTO--(Mar 30, 2012) -  As a company focused on positively impacting innovation and productivity, Cisco Canada applauds the Government of Canada for leading by example in utilizing technology to increase productivity.

"This budget demonstrates that the Government of Canada is continuing to embrace new technologies such as telepresence, and is leading the world in recognizing the impact technology can have on improving productivity," said Nitin Kawale, president, Cisco Canada. "I commend Minister Flaherty and Prime Minister Harper for continuing to show leadership in modernizing public service delivery."

In the budget document, the Government states it "will explore ways to increase its productivity by using telepresence and other remote conferencing technologies more extensively. Telepresence technology is similar to videoconferencing; however, it enables participants to see life-size, full-motion video with high-quality sound. The Government will develop a strategy to expand the use of telepresence technology and other remote meeting solutions. Investments in this technology will be financed by reductions in travel expenses."

Many public and private sector organizations use TelePresence to realize meaningful productivity gains and drive process change. "The Government of Canada and Minister Flaherty are on the right track with this budget initiative," added Kawale.

About Cisco

Cisco, (NASDAQ: CSCO), the worldwide leader in networking that transforms how people connect, communicate and collaborate. Cisco Canada Co., a wholly owned subsidiary of Cisco, has offices across Canada dedicated to customer support, sales and service. For ongoing news, please go to http://newsroom.cisco.com/canada/.

-30-

Cisco, the Cisco logo and Cisco Systems are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. This document is Cisco Public Information.


Contact Information

Andrea Berry
StrategicAmpersand Inc. (for Cisco)
416-961-5595, Ext. 428
andberry@cisco.com

Karin Scott
Cisco
416-306-7164
kariscot@cisco.com

Symantec Completes Sale of Huawei Symantec Joint Venture to Huawei

Symantec Completes Sale of Huawei Symantec Joint Venture to Huawei

Mountain View, Calif.  – March 30, 2012 –Symantec Corp. (Nasdaq:  SYMC) today announced it has completed the sale of Symantec’s 49 percent stake in Huawei Symantec Technologies Co., Ltd. (Huawei Symantec) to  Huawei for USD $530 million. The completion of the sale liquidates Symantec’s ownership interest in the joint venture and gives Huawei sole proprietorship over all elements of the joint venture entity.

 

Huawei Symantec was a Hong Kong-based joint venture established by Huawei and Symantec in 2008. The decision by Symantec to sell its stake in the joint venture in November 2011 as made after several rounds of discussion and negotiations over the future of the joint venture. At the time, Huawei and Symantec mutually agreed that the next stage of growth for the joint venture would benefit from the direction of a single owner. Symantec achieved the objectives set four years ago prior to forming the venture, exiting with a good return on its investment, increasing its market penetration into China and growing its appliance business.

 

Appliances remain an important part of Symantec’s strategy to offer customers greater choice and flexibility in how they use Symantec’s solutions to manage and protect digital information. Symantec will continue to focus on expanding its appliance business and creating industry-leading appliance offerings.

 

China is one of Symantec’s fastest growing markets.  Business for Symantec in China has grown 46 percent over the last three fiscal years.  Symantec remains committed to ongoing investment in China and will continue to build relationships in the region.

 

About Symantec

Symantec’s Canadian operations are headquartered in Toronto with offices in Montreal, Ottawa, Calgary and Vancouver.  For more information on Symantec products or current promotions, access Symantec’s Canadian Web site at www.symantec.ca. Symantec is an active member of the Business Software Alliance (BSA). Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world.  Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

 

###

 

NOTE TO EDITORS: If you would like additional information on Symantec Corporation and its products, please visit the Symantec News Room at http://www.symantec.com/news. All prices noted are in U.S. dollars and are valid only in the United States. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

 

Forward-looking Statements: This press release contains forward-looking statements within the meaning of U.S. federal securities laws, including expectations regarding the closing of  the sale of Symantec’s interest in the joint venture, that involve known and unknown risks and uncertainties that may cause actual results to differ materially from those expressed or implied in this press release. Such risk factors include the satisfaction of closing conditions to the transaction. Actual results may differ materially from those contained in the forward-looking statements contained in this press release. Additional information concerning these and other risk factors is contained in the Risk Factors section of Symantec's most recently filed Form 10-K. Symantec assumes no obligation to update any forward-looking statement contained in this press release. The contents of the Symantec website shall not be deemed incorporated by reference into this press release.  Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and are subject to change.