Nokia Siemens Networks clarifies status on Motorola transaction


  Nokia Siemens Network

 

Press Release

Espoo

, Finland – March 9, 2011

 

 

Nokia Siemens Networks clarifies status on Motorola transaction

 

The acquisition by Nokia Siemens Networks of Motorola’s wireless networks infrastructure assets, originally announced on July 19, 2010, is still pending anti-trust approval from the Chinese regulatory authorities. Closing activities will not be completed in the first quarter of 2011 as previously targeted.

 

The proposed acquisition has entered phase three of the review process with the Anti-Monopoly Bureau of the Ministry of Commerce in China (MOFCOM).

 

Nokia Siemens Networks remains committed to the acquisition but will provide no further guidance on when it is likely to be completed.

 

 

About Nokia Siemens Networks

Nokia Siemens Networks is a leading global enabler of telecommunications services. With its focus on innovation and sustainability, the company provides a complete portfolio of mobile, fixed and converged network technology, as well as professional services including consultancy and systems integration, deployment, maintenance and managed services. It is one of the largest telecommunications hardware, software and professional services companies in the world. Operating in 150 countries, its headquarters are in Espoo, Finland. www.nokiasiemensnetworks.com

 

Talk about Nokia Siemens Networks’ news at http://blogs.nokiasiemensnetworks.com and find out if your country is exploiting the full potential of connectivity at www.connectivityscorecard.org

 

 

Nokia - Forward Looking Statements
It should be noted that certain statements herein which are not historical facts are forward-looking statements, including, without limitation, those regarding: A) the timing of the deliveries of our products and services and their combinations; B) our ability to develop, implement and commercialize new technologies, products and services and their combinations; C) expectations regarding market developments and structural changes; D) expectations and targets regarding our industry volumes, market share, prices, net sales and margins of products and services and their combinations; E) expectations and targets regarding our operational priorities and results of operations; F) the outcome of pending and threatened litigation; G) expectations regarding the successful completion of acquisitions or restructurings on a timely basis and our ability to achieve the financial and operational targets set in connection with any such acquisition or restructuring; and H) statements preceded by "believe," "expect," "anticipate," "foresee," "target," "estimate," "designed," "plans," "will" or similar expressions. These statements are based on management's best assumptions and beliefs in light of the information currently available to it. Because they involve risks and uncertainties, actual results may differ materially from the results that we currently expect. Factors that could cause these differences include, but are not limited to: 1) the competitiveness and quality of our portfolio of products and services and their combinations; 2) our ability to timely and successfully develop or otherwise acquire the appropriate technologies and commercialize them as new advanced products and services and their combinations, including our ability to attract application developers and content providers to develop applications and provide content for use in our devices; 3) our ability to effectively, timely and profitably adapt our business and operations to the requirements of the converged mobile device market and the services market; 4) the intensity of competition in the various markets where we do business and our ability to maintain or improve our market position or respond successfully to changes in the competitive environment; 5) the occurrence of any actual or even alleged defects or other quality, safety or security issues in our products and services and their combinations; 6) the development of the mobile and fixed communications industry and general economic conditions globally and regionally; 7) our ability to successfully manage costs; 8) exchange rate fluctuations, including, in particular, fluctuations between the euro, which is our reporting currency, and the US dollar, the Japanese yen and the Chinese yuan, as well as certain other currencies; 9) the success, financial condition and performance of our suppliers, collaboration partners and customers; 10) our ability to source sufficient amounts of fully functional components, sub-assemblies, software, applications and content without interruption and at acceptable prices and quality; 11) our success in collaboration arrangements with third parties relating to the development of new technologies, products and services, including applications and content; 12) our ability to manage efficiently our manufacturing and logistics, as well as to ensure the quality, safety, security and timely delivery of our products and services and their combinations; 13) our ability to manage our inventory and timely adapt our supply to meet changing demands for our products; 14) our ability to protect the complex technologies, which we or others develop or that we license, from claims that we have infringed third parties' intellectual property rights, as well as our unrestricted use on commercially acceptable terms of certain technologies in our products and services and their combinations; 15) our ability to protect numerous Nokia, NAVTEQ and Nokia Siemens Networks patented, standardized or proprietary technologies from third-party infringement or actions to invalidate the intellectual property rights of these technologies; 16) the impact of changes in government policies, trade policies, laws or regulations and economic or political turmoil in countries where our assets are located and we do business; 17) any disruption to information technology systems and networks that our operations rely on; 18) our ability to retain, motivate, develop and recruit appropriately skilled employees; 19) unfavorable outcome of litigations; 20) allegations of possible health risks from electromagnetic fields generated by base stations and mobile devices and lawsuits related to them, regardless of merit; 21) our ability to achieve targeted costs reductions and increase profitability in Nokia Siemens Networks and to effectively and timely execute related restructuring measures; 22) developments under large, multi-year contracts or in relation to major customers in the networks infrastructure and related services business; 23) the management of our customer financing exposure, particularly in the networks infrastructure and related services business; 24) whether ongoing or any additional governmental investigations into alleged violations of law by some former employees of Siemens AG ("Siemens") may involve and affect the carrier-related assets and employees transferred by Siemens to Nokia Siemens Networks; 25) any impairment of Nokia Siemens Networks customer relationships resulting from ongoing or any additional governmental investigations involving the Siemens carrier-related operations transferred to Nokia Siemens Networks; as well as the risk factors specified on pages 11-32 of Nokia's annual report Form 20-F for the year ended December 31, 2009 under Item 3D. "Risk Factors." Other unknown or unpredictable factors or underlying assumptions subsequently proving to be incorrect could cause actual results to differ materially from those in the forward-looking statements. Nokia does not undertake any obligation to publicly update or revise forward-looking statements, whether as a result of new information, future events or otherwise, except to the extent legally required.

 

Media Enquiries

 

Nokia Siemens Networks

Ben Roome

Media Relations

Phone: +44 7827 300203

E-mail: ben.roome@nsn.com

 

Media Relations

Phone: +358 7180 31451

E-mail: mediarelations@nsn.com

 

Nokia Siemens Networks
Media Relations
PO Box 1
FI-02022 Nokia Siemens Networks

If you would rather not receive future communications from Nokia Siemens Networks, let us know by clicking here.
Nokia Siemens Networks, Karaportti 3, Espoo, NA 02610 Finland

Manuel Pietra, Pres. & CEO of FreeBalance, to Reveal Gov Financial Management Implementation Secrets

Manuel_pietra_president_ceo_fr


Presentation will share how FreeBalance has adapted to the international PFM needs 

Ottawa, Canada (March 9, 2010) – Manuel Pietra, President & CEO at FreeBalance will be presenting at the Trust and Accountability in Public Financial Management (PFM) conference organized by the Chartered Institute of Public Finance and Accountancy (CIPFA). The conference takes place March 15-17 at the Queen Elizabeth II Conference Centre, London, UK.

Mr. Pietra will be presenting on the “Implementing Integrated Financial Management Information Systems (IFMIS) - Lessons Learned and Value Added in the Developing World” panel on Tuesday, March 15 at 13:40.Mr. Pietra’s presentation will describe how Government Resource Planning (GRP) vendors achieve government financial management implementation success. The presentation describes how public financial management software design, implementation and support methodology can be adapted to improve success. It will also describe how adaptable open systems are less expensive to implement and sustain. Roger Tabor, Chair of the IFAC Professional Accountants in Business Committee will moderate the panel.

“Trust and accountability in Public Financial Management have become significant factors to improve government effectiveness and achieve country objectives,” said Manuel Pietra, President & CEO of FreeBalance. “In this era of the ‘new normal’, it has become more important for FreeBalance as a For Profit Social Enterprise (FOPSE) to share good practices in GRP software development, implementation and sustainability.”

This conference is aimed at Accountants General and Auditors General, public sector CFOs, international accounting bodies and IFAC members, donors and aid organizations, and international development professionals and advisors. The conference PFM focus is with transparency, governance and anti-corruption good practices. The critical needs for government trust, support of international standards, and achieving value for money will be discussed by leading PFM experts.

FreeBalance customers span the globe and the user community includes public financial management professionals in 18 countries, including Canada, Liberia, Namibia, Sierra Leone, Uganda, and Southern Sudan. FreeBalance operates in 15 customer time zones. FreeBalance has more than 60,000 users around the world. FreeBalance software manages a global civil service workforce of 1,500,000, and also manages a quarter trillion ($US) annual budgets worldwide. 

About FreeBalance
FreeBalance helps governments around the world leverage robust Government Resource Planning (GRP) technology to accelerate country growth. FreeBalance software solutions for public financial and human resource management support reform and modernization to improve governance, transparency and accountability. Good governance is required to improve development results.For more information, visit www.freebalance.com.

###


FreeBalance Media Contact:
James Elrick
Email: jelrick@freebalance.com
Ph: +1 613 218 4938

If you would rather not receive future communications from FreeBalance Inc, let us know by clicking here.
FreeBalance Inc, 1101 Prince of Wales Dr. Ste. 200, Ottawa, ON NA Canada

Symantec VoR - Microsoft March 2011 Patch Tuesday


Good afternoon,

 

Today, Microsoft issued three security bulletins which address four vulnerabilities. Only one of these vulnerabilities has been rated critical by Microsoft.

 

“The lone critical issue this month – the DVR-MS vulnerability – will be somewhat trivial for attackers to exploit,” said Joshua Talbot, security intelligence manager, Symantec Security Response. “It also allows attackers to skip a few of the traditional steps needed to get malicious code to execute on a targeted computer. This is because when processing DVR-MS files, Windows Media Player and Media Center use data in these files themselves to determine what code in memory gets executed. This allows an attacker to jump directly to executing malicious code.”

 

“To exploit this issue a user has to open a malicious file, so some social engineering would need to be employed,” Talbot added. “However, because DVR-MS files are media files used by common Windows applications, it’s not hard to imagine a scenario where an attacker spreads a malicious file purporting to be a video clip related to some popular current event.”

 

“The other vulnerabilities fixed this month all relate to the DLL issues Microsoft has been working to address for some time now,” Talbot concluded. “These are fairly easy to exploit, but because an attack would require a user to take some fairly uncommon steps – such as opening up malicious files from SMB or WebDAV servers  – they’re less likely to pose a serious threat.”

 

Symantec strongly encourages users to patch their systems against all vulnerabilities addressed this month.

 

Please visit the Symantec Security Response blog for more information and also let me know if you’re interested in speaking with a Symantec expert in greater detail about any of the vulnerabilities addressed this month.

 

The Symantec Security Response blog can be viewed here:

http://www.symantec.com/connect/symantec-blogs/sr

 

Additional information on Microsoft’s security bulletins can be found here:

http://www.microsoft.com/technet/security/bulletin/ms11-mar.mspx

 

Best,

Elana

 

Elana Ziluk

Account Coordinator | MAVERICK Public Relations

(416) 640-5525 x 243 | 37 Madison Avenue | Toronto | M5R 2S2

w: maverickpr.com | t: MAVERICK_PR

 

 

Logicalis Recognized by Cisco for Excellence in U.S. Customer Satisfaction


Logicalis Recognized by Cisco for Excellence in U.S. Customer Satisfaction

 

Farmington Hills, MI, March 8, 2011– Logicalis, an international provider of integrated information and communications technology (ICT) solutions and services (www.us.logicalis.com), announced today that it has achieved a Customer Satisfaction Excellence Gold Star from Cisco.  This designation recognizes Logicalis for delivering outstanding customer service to customers in the United States.

 

Logicalis is in the enviable position of having earned this distinction multiple times.  “Achieving this level of customer satisfaction is a direct reflection on the breadth and depth of our ability both in terms of solution design and Cisco product knowledge and implementation,” said Bob Hankins, Vice President, Cisco Solutions, for Logicalis.  “It’s an honor to have our customers voice their positive opinion of Logicalis, and a distinction that clearly indicates to prospective customers that Logicalis is a best-of-breed Cisco solution partner.”

 

“Customer service is a cornerstone of the Cisco Resale Channel Program.  We are pleased to recognize and congratulate Logicalis for achieving outstanding customer satisfaction,” said Edison Peres, senior vice president of the worldwide channels go-to-market group at Cisco.

 

Cisco measures the customer satisfaction levels achieved by its Gold, Silver, and Premier Certified partners based on regional target goals, providing a weighted average of a partner's pre- and post-sales support over a rolling 12-month period. Partners that achieve outstanding customer satisfaction are awarded the Customer Satisfaction Excellence Gold Star and can be found using the advanced search menu in the Cisco Partner Locator.

 

The Cisco Resale Channel Program provides a framework for partners to build the sales, technical, and Cisco Lifecycle Services skills required to deliver Cisco solutions to end customers. Through the program's specializations and certifications, Cisco recognizes a partner's expertise in deploying solutions based on Cisco advanced technologies and services. Using a third-party audit process, the program validates partner qualifications such as technology skills, business best practices, customer satisfaction, and presales and postsales support capabilities - critical factors in choosing a trusted partner.

 

Find More Information Online:

Cisco Certified Partners

Customer Satisfaction

 

About Logicalis

Logicalis is an international provider of integrated information and communications technology (ICT) solutions and services founded on a superior breadth of knowledge and expertise in communications & collaboration; data center; and professional and managed services.

 

Logicalis Group employs over 1,900 people worldwide, including highly trained service specialists who design, specify, deploy and manage complex ICT infrastructures to meet the needs of over 5,000 corporate and public sector customers.  To achieve this, Logicalis maintains strong partnerships with technology leaders such as Cisco, HP, IBM and Microsoft.

 

The Logicalis Group has annualized revenues of $1 billion, from operations in the UK, US, Germany, South America and Asia Pacific, and is fast establishing itself as one of the leading IT and Communications solution integrators, specializing in the areas of advanced technologies and services.

 

The Logicalis Group is a division of Datatec Limited, listed on the Johannesburg and London AIM Stock Exchanges, with revenues in excess of $4 billion.

 

For more information, visit www.us.logicalis.com.

 

Cisco, the Cisco logo and Cisco Systems are registered trademarks of Cisco Systems Inc. in the United States and certain other countries.

If you would rather not receive future communications from Webbed Marketing, let us know by clicking here.
Webbed Marketing, 1465 Northwest Blvd., Columbus, OH 43212 United States

TWO NEWS RELEASES: EMC VNX Unified Storage Delivers 25 per cent More Storage Efficiency; New EMC VNXe and VNX Unified Storage Now Shipping Worldwide

Good morning,

Please see below for two announcements from EMC regarding EMC VNX and
VNXe unified storage solutions.

1) EMC VNX Unified Storage Delivers 25 per cent More Storage
Efficiency
2) New EMC VNXe and VNX Unified Storage Now Shipping Worldwide

Thank you.

---

FOR IMMEDIATE RELEASE

EMC VNX Unified Storage Delivers 25 per cent More Storage Efficiency
– Guaranteed

HOPKINTON, MA – March 8, 2011 – EMC Corporation (NYSE: EMC) today
announced its EMC® VNX® unified storage solutions are guaranteed to be
25 per cent more efficient
(http://www.emc.com/products/unified-storage-guarantee/index.htm)
than any other unified storage solution in the market – with no hidden
caveats. The guarantee is timed with the general availability
(http://www.emc.com/about/news/press/2011/20110308-01.htm) of the VNX
family of unified storage systems (introduced
(http://www.emc.com/about/news/press/2011/20110118-05.htm) in January
2011), and highlights the simplicity, efficiency and power of EMC’s
unified storage offerings.

In May 2010 EMC established a 20 per cent more efficient guarantee.
Numerous customers proved that guarantee to be too conservative, which
is why EMC is increasing its commitment to helping our customers
maximize storage efficiency.

Announcement Highlights

* The new EMC 25 per cent Storage Efficiency guarantee is based on
out-of-the-box best practices. Now, EMC customers can purchase 25 per
cent less raw capacity than products from any other unified storage
solution while benefiting from the same amount of useable capacity.
Buying less raw capacity can substantially reduce acquisition and
operational costs, while enabling customers to buy more raw and usable
capacity from EMC for the same amount of money as they would pay for a
competing solution.
* The 25 per cent Storage Efficiency guarantee covers the EMC VNX
series and EMC Celerra® unified storage systems.
* In related news, EMC announced worldwide general availability of the
VNXe series and VNX series of storage solutions.

Boston Medical Center, a private, not for profit, 626-licensed bed
academic medical centre that is the primary teaching affiliate for
Boston University School of Medicine, uses EMC unified storage.

“EMC unified storage enables Boston Medical Center to manage our
information simply and efficiently – while being powerful enough to
handle our growth and the demands of our virtualized applications. EMC
Unisphere™ made management a breeze – just a few clicks to provision,
protect and report on both physical and virtual resources. Our EMC
unified storage deployment was more than 20 per cent more efficient than
competitive offerings, and we feel that EMC can easily attain its new 25
per cent guarantee,” said Joe Pesaturo, Senior Storage Architect,
Boston Medical Center.

Azimut Yachts, an Italian luxury yacht builder, chose EMC unified
storage over products from HP, IBM and NetApp.

“EMC unified storage is simple, efficient and powerful. We’ve been
approached by other companies with guarantees – but EMC is the only
company with no hidden caveats. The company’s confidence in its
storage efficiency is evident by this 25 per cent guarantee. This is
part of the reason we chose EMC – based on innovations to maximize
SSDs, SAN/NAS multiprotocol connectivity, and the price/performance
ratio. Another key criteria has been EMC’s quality consulting and
service throughout the selection process – a true added value to the
offering,” said Claudio Bertotti, ICT System Architect at Azimut
Yachts.

“The simplicity, efficiency and power of EMC unified storage is
unmatched in the market,” said Rich Napolitano, President, Unified
Storage Division at EMC Corporation. “The EMC 25 per cent storage
efficiency guarantee is EMC’s promise to customers that we help them
do more with less – in virtualized environments or standard
deployments. While other companies have ‘
guarantees’, they come with
pages of caveats and fine print. The EMC guarantee is plain and simple
– manage your information simply, for less money with the most
powerful unified storage solutions available.”

About EMC

EMC Corporation (NYSE: EMC) is the world’s leading developer and
provider of information infrastructure technology and solutions that
enable organizations of all sizes to transform the way they compete and
create value from their information. Information about EMC’s products
and services can be found at www.EMC.com.

EMC Canada (www.EMC2.ca), headquartered in Toronto with nine offices
from coast to coast, is a wholly owned subsidiary of EMC Corporation.

- 30 -

For more information contact:
Mike Martin/Michelle Chang
StrategicAmpersand
416-961-5595
mike@stratamp.com
michelle@stratamp.com


EMC, VNX, Unisphere and Celerra are registered trademarks or trademarks
of EMC Corporation in the United States and other countries. All other
trademarks used herein are the property of their respective owners.

******************************
FOR IMMEDIATE RELEASE

New EMC VNXe and VNX Unified Storage Now Shipping Worldwide

Broad Customer and Partner Demand for the VNX Family’s Simplicity,
Efficiency, Power and Affordability

HOPKINTON, MA - March 8, 2011 - EMC Corporation (NYSE: EMC) today
announced EMC® VNXe® and VNX® unified storage solutions (introduced in
January 2011 (http://www.emc.com/about/news/press/2011/20110118-05.htm))
are now available and shipping worldwide. The systems are available from
both EMC and a wide range of distributors and resellers.

Announcement Highlights

* EMC announced worldwide general availability of the EMC VNXe series
targeting small and medium-sized businesses (SMB) and offered primarily
through EMC partners; and the EMC VNX series, which consolidate the
leading features and functionality of the award-winning EMC CLARiiON®
and EMC Celerra® systems into a single, powerful family of unified
storage arrays that scale to data centre-class solutions.
* The VNXe series (http://www.emc.com/products/series/vnxe-series.htm)
is breaking records as the world’s simplest unified storage system,
providing the ability to deploy - in just a few clicks - storage for
hundreds of Exchange mailboxes or VMware data stores. The VNXe series,
designed for the IT generalist with limited storage experience, offers
an entry price of under US$10,000.
* The VNX series is breaking records as the fastest and most efficient
midrange storage system on the market. According to
(http://www.emc.com/about/news/press/2011/20110224-01.htm) a recent
benchmark performance test (SPECsfs2008_nfs.v3
(http://www.spec.org/sfs2008/results/sfs2008nfs.html)) VNX Series is
49 per cent faster than an HP system (BL860c i2 4-node HA-NFS Cluster)1,
23 per cent faster than an IBM system (IBM Scale Out Network Attached
Storage 16-node cluster, Version 1.2)2, and 160 per cent faster than the
NetApp FAS 6240 Series system 3.
* In related news
(http://www.emc.com/about/news/press/2011/20110308-02.htm), the new
EMC 25 per cent Storage Efficiency Guarantee
(http://www.emc.com/products/unified-storage-guarantee/index.htm)
enables VNX series customers to now purchase 25 per cent less raw
capacity than products from any other unified storage solution while
benefiting from the same amount of useable capacity.

What Partners Are Saying

“Our customers want storage that is simple, reliable and able to
seamlessly integrate with the applications they use to run their
business. EMC has hit a home run with the VNX family, making it easy for
customers to deploy. They've made the investment to help us make VNX the
foundation of our comprehensive solutions with some of the most
extensive training we've seen,” said Daniel Serpico, President of
FusionStorm.

“EMC's VNX and VNXe have enabled ICI to expand its reach into
midrange and SMB markets. To keep up with the accelerated demand that
ICI is already seeing with the VNXe in
 the SMB space, ICI is adding more
members to its SMB focused team. EMC has also made it easier than ever
for partners to complete product training in no time at all,” said
Jamie Shepard, EVP, Technology Solutions at International Computerware,
Inc. (ICI).

VNXe Series Product Highlights

* Powerful application-based provisioning wizards for breakthrough
simplicity, including support for Microsoft Exchange and Microsoft
Hyper-V.
* Compact 2U and 3U packaging fits almost any environment.
* Built-in support for file-based (CIFS, NFS) and block-based (iSCSI)
storage.
* No single-point-of-failure design.
* Built-in data protection, including replication.
* Advanced efficiency features including thin provisioning, file
deduplication and compression.
* Integrated self-help and support infrastructure automates and speeds
problem resolution.
* Advanced 6Gbps SAS and Nearline SAS drive support.
* Scalable up to 120 disk drives (240 TB).

VNX Series Product Highlights

* Combines the market-leading capabilities of EMC CLARiiON and EMC
Celerra into a single, unified platform - with 3-times the performance
of previous generations.
* Based on Intel Xeon 5600 multicore processor technology to maximize
solution throughput and bandwidth.
* Industry’s most advanced automated storage tiering (FAST VP).
* Only storage solution offering both automated file and block sub-LUN
tiering using FAST VP and powerful, extendable system cache with FAST
Cache.
* Supports 6Gbps SAS, Nearline SAS, and SSD drive types.
* Scales up-to 2 PB per system (1000 drives).
* Support for multiple protocols and data-types including: FC, iSCSI,
FCoE, NFS, CIFS, SOAP, REST.
* Integrated data protection, security and compliance.

The general availability of the VNX family of unified storage systems
coincides with the new EMC 25 per cent more efficient storage guarantee,
highlighting the simplicity, efficiency and power of EMC’s unified
storage offerings.

The general availability of VNX and VNXe complete a recent string of
record breaking unified storage news coming from EMC, which maintained
its standing as the top provider of external disk storage systems for
the 14th consecutive year in factory revenue, according to the latest
IDC Worldwide Quarterly Disk Storage Systems Tracker, March 2011 (see
related announcement
(http://www.emc.com/about/news/press/2011/20110304-01.htm)).
Additionally, in February EMC shattered benchmark performance records
(http://www.emc.com/about/news/press/2011/20110224-01.htm) with a
Standard Performance Evaluation Corporation benchmark (see
SPECsfs2008_nfs.v3
(http://www.spec.org/sfs2008/results/sfs2008nfs.html)).

“When EMC unveiled the new VNX family, we made a very public and
worldwide commitment to our customers - and channel partners - that we
had developed and would deliver the industry’s most simple, efficient,
powerful and affordable unified storage solution in the market. Since
then, we’ve spoken with thousands of customers and partners and
enthusiasm, interest and demand for the VNXe and VNX have been
excellent. We’re looking forward to helping customers take advantage
of the many features of our unified solutions to more easily and more
effectively manage their information,” said Rich Napolitano,
President, Unified Storage Division at EMC Corporation.

About EMC

EMC Corporation (NYSE: EMC) is the world’s leading developer and
provider of information infrastructure technology and solutions that
enable organizations of all sizes to transform the way they compete and
create value from their information. Information about EMC’s products
and services can be found at www.EMC.com.

EMC Canada (www.EMC2.ca), headquartered in Toronto with nine offices
from coast to coast, is a wholly owned subsidiary of EMC Corporation.

- 30 -

For more information contact:
Mike Martin/Michelle Chang
StrategicAmpersand
416-961-5595
mike@stratamp.com
michelle@stratamp.com


EMC, VNX, CLARiiON and Celerra are registered t
rademarks or trademarks
of EMC Corporation in the United States and other countries. SPEC® is
registered trademark of the Standard Performance Evaluation Corporation.
Competitive benchmark results
(http://www.spec.org/sfs2008/results/sfs2008nfs.html) reflect results
posted on February 23, 2011. All SPECsfs2008 NFSv3results are at
http://www.spec.org/sfs2008/results/sfs2008nfs.html. All other
trademarks used herein are the property of their respective owners.


If you do not wish to receive news releases from EMC Canada please
reply to this e-mail with "remove" in the subject header.

OpenText To Acquire UK-based Mobile App Company


Hi,

OpenText today announced an agreement to acquire UK-based weComm, a provider of a unique and powerful mobile application platform that takes OpenText Everywhere to a whole new level. weComm’s technology will enable OpenText’s enterprise customers to create their own mobile applications quickly and economically, making them available across any device.  This is expected to be popular not only in industries such as media and entertainment but in other markets such as retail, banking and government, where mobile applications are becoming more critical.  OpenText will also be able to use the technology to create and deliver mobile Enterprise Content Management (ECM) applications to customers.  More details are in the release that follows here, and if you’d like to speak with an OpenText spokesperson please let me know by return email or at 905-866-2656.

Cheers, Shelley

S. Grandy, Sr. PR Advisor, OpenText, 905-866-2656

OpenText Accelerates Mobile App Strategy with weComm Acquisition Agreement

With weComm, OpenText Enters a High-Growth Market to Help Companies Deliver Mobile Apps For Any Device to Reach Their Customers, Consumers


Waterloo, ON., Canada, and London, UK– March 8, 2011 – OpenText™ (NASDAQ: OTEX, TSX: OTC) announced today it has reached an agreement to acquire London-based weComm, a deal that will propel OpenText forward in a fast-growing segment of the mobility market.  weComm’s leading technology will facilitate OpenText delivering a strategic platform to companies which will help them provide rich, immersive mobile apps cost-effectively across the multitude of mobile operating systems and devices to reach their customers, consumers or partners.

“As mobile devices are changing the consumer landscape, more enterprise customers are moving to mobile apps to reach everyone from customers to employees,” said Eugene Roman, Chief Technology Officer at OpenText.  “This advanced technology allows our customers to rapidly deliver highly functional apps on all types of devices economically, giving them an enormous edge over their competitors both in efficiency and time to market.”  According to Roman, weComm will enable OpenText to accelerate the mobility strategy it launched in 2010 with the introduction of OpenText Everywhere.

Founded in 1999 and serving major customers today, weComm is a pioneer of the mobile application industry.  The company’s innovative software platform offers fast, low-cost deployment of high-quality, media rich applications for all leading mobile devices, including smartphones and tablets -- iPhone, iPad, Android, Blackberry, Windows Mobile, Symbian, Java -- more than 900 devices in all.

Because weComm’s WAVE platform is technology agnostic, it helps solve the biggest problem corporate customers, government organizations and app creators have today:  The dilemma of whether to select a single platform for app delivery or to incur the high cost of porting, deploying, updating and maintaining apps across the entire landscape of devices.  Without such technology, inclusivity comes at a very high price in the mobile app world. 

“weComm’s device-independent platform adds real value over the other options our enterprise customers have today,” said Roman. “weComm offers exciting leading-edge technology and a great new opportunity for OpenText.  It’s a logical fit for our major brand-name customers, in banking, retail, media and entertainment and other markets no matter what type of content application they use.”

A Natural Move

The move into mobile apps is a natural one for OpenText which today is a leading provider of Web experience management solutions and digital asset management software.  Adding a powerful platform for mobile apps gives OpenText a full array of capabilities to meet the evolving needs of enterprise CMOs. The next iteration of Web experience management systems requires mobile content creation, development and delivery. The combination of its existing customer engagement offerings and the weComm WAVE platform puts OpenText in pole position, ahead of other Enterprise Content Management vendors in the battle for the Mobile Enterprise Application Platform market.

weComm also strengthens OpenText Everywhere’s position in mobile ECM by providing enterprises with the ability to create, deliver, and maintain mobile applications to their employees for all mobile operating systems. OpenText Everywhere provides pre-packaged mobile applications for the OpenText ECM Suite focused on collaboration, document management and workflows.  With weComm, OpenText can also offer mobile applications and solutions in a compliance-based environment, requiring security and policy controls as well as develop and deliver content based mobile applications that may be consumed by anyone.

weComm, OpenText Agreement

Details of the transaction were not disclosed.  The transaction is expected to close this quarter, subject to customary closing conditions.  The acquisition does not bring significant pre-existing revenues or profit. Details will be disclosed in the OpenText next regular quarterly release.

For more information on OpenText Everywhere, go to:  OpenText Everywhere.

For more information about weComm, go to www.weComm.com

Follow OpenText on Twitter @opentext.

About OpenText

OpenText, a global ECM leader, helps organizations manage and gain the true value of their business content.  OpenText brings two decades of expertise supporting 100 million users in 114 countries.  Working with our customers and partners, we bring together leading Content Experts™ to help organizations capture and preserve corporate memory, increase brand equity, automate processes, mitigate risk, manage compliance and improve competitiveness.  For more information, visit www.opentext.com.

Certain statements in this press release may contain words considered forward-looking statements or information under applicable securities laws. These statements are based on Open Text’s current expectations, estimates, forecasts and projections about the operating environment, economies and markets in which the company operates. These statements are subject to important assumptions, risks and uncertainties that are difficult to predict, and the actual outcome may be materially different. Open Text’s assumptions, although considered reasonable by the company at the date of this press release, may prove to be inaccurate and consequently its actual results could differ materially from the expectations set out herein.  For additional information with respect to risks and other factors which could occur, see Open Text’s Annual Report on Form 10-K, Quarterly Reports on Form 10-Q and other securities filings with the SEC and other securities regulators. Unless otherwise required by applicable securities laws, Open Text disclaims any intention or obligations to update or revise any forward-looking statements, whether as a result of new information, future events or otherwise.

Copyright © 2011 by Open Text Corporation. OPENTEXT and OPENTEXT EVERYWHERE are trademarks or registered trademarks of Open Text Corporation in the United States of America, Canada, the European Union and/or other countries. This list of trademarks is not exhaustive. Other trademarks, registered trademarks, product names, company names, brands and service names mentioned herein are property of Open Text Corporation or other respective owners.

News Release: VMware Delivers New Operations Model for Cloud Environments with VMware vCenter Operations

FOR IMMEDIATE RELEASE

VMware Delivers New Operations Model for Cloud Environments with VMware
vCenter Operations

VMware to Integrate Performance, Capacity and Configuration Analytics
to Streamline Management of Intelligent Virtual Infrastructure

PALO ALTO, Calif., March 8, 2011 - VMware, Inc. (NYSE: VMW), the global
leader in virtualization and cloud infrastructure, today announced a
strategy and a new solution to simplify and automate how IT
organizations manage services in dynamic virtual and cloud environments.
VMware vCenter™ Operations will help customers transform IT operations
to achieve the agility and economics of cloud computing.

Cloud computing represents a fundamentally different approach to IT
where resources are pooled across multiple sources, provisioning and
capacity are highly dynamic, and configurations are fluid. Traditional
management tools and processes, which were designed to handle discrete
processes across static computing stacks, cannot keep pace with the
velocity of these new, intelligent virtual environments.

"For opportunistic organizations, the move to cloud computing may
enable the 'breaking' of the traditional IT management model," said
Cameron Haight, research vice president, Gartner. "Decades of investment
in complex infrastructures, processes and management tools have
contributed to high IT operations and service delivery costs. Cloud
computing, or more specifically, the cloud operating model, represents a
real opportunity for enterprise IT to overcome the complexity that has
been dragging down overall IT efficiency and agility. But to do this, we
need to completely reassess the conventional wisdom of the role of
management in relation to the build-out of these emerging cloud
environments."

VMware vSphere® has helped thousands of companies transform their
datacentres, simplifying many core systems management functions, such as
resource allocation and load balancing, by building them into the
virtualization platform. VMware’s management strategy is to further
simplify IT by integrating performance, capacity and configuration
management and applying analytics to help customers achieve the degree
of automation required to operate a cloud environment.

"IT management is being turned on its head as enterprises expand their
virtual infrastructures to achieve improved efficiencies and
responsiveness," said Ramin Sayar, vice president product strategy,
enterprise management, VMware. "Increasingly, our customers are
realizing that a management model designed for yesterday’s IT systems
is making it difficult to keep up with the demands of today’s business
environment. We believe VMware vCenter™ Operations will help our
customers modernize their operations and take the next step in the
journey toward a more simplified, agile approach to IT."

Visibility, Analytics and Actionable Intelligence Drive New IT
Management Approach
vCenter Operations will be tightly integrated with VMware vSphere,
understand its advanced infrastructure management functionality and be
able to collect data from its underlying physical components (servers,
storage, network) as well as other management tools within the
enterprise. It will then analyze the millions of data points these
systems produce in real-time to get to the information that matters and
visually present it in a simple, actionable way through dashboards. This
means infrastructure and operations teams will have the intelligence
they need to make fast, informed operational decisions in order to:

- Proactively ensure service levels in dynamic cloud environments
Real-time performance dashboards with patented analytics and powerful
visualization of the health of the environment will allow IT to
proactively pinpoint performance issues and risks before they become
problems and impact SLAs.

- Get to the root cause of performance problems faster
The combination of patented analytics and infrastructure-awareness will

allow vCenter Operations to more accurately and rapidly determine
symptoms so that infrastructure and operations teams quickly get to the
root cause of performance problems. By enabling a more collaborative
approach, vCenter Operations can speed problem resolution and change
management cycles and reduce manual efforts by 40 per cent.

- Optimize deployments in “real-time” to enable self-service
provisioning
vCenter Operations will provide real-time analysis of performance and
capacity to help teams make fast, informed decisions on deployment. This
capability will be critical to enabling rapid and reliable provisioning
needed in self-service environments.

- Maintain compliance in the face of constant change
Automated provisioning and configuration analysis will ensure optimal
configuration by automatically detecting configuration changes and
enabling rollback to help IT maintain continuous compliance with
operational best practices and industry or regulatory compliance
requirements.

"To us, cloud computing means dynamic resources that are
self-provisioning, and VMware vCenter™ Operations is purpose-built to
support this type of environment," said Brian Alexander, systems
architect, information technology, Mentor Graphics Corporation. "Two
things set VMware vCenter™ Operations apart: the hooks into VMware
vSphere® that give it broad understanding of the system — storage,
network, VM performance — and the analytics that will transform the
data it gleans into actionable information."

vCenter Operations Pricing and Availability
vCenter Operations is designed as a set of products and solutions that
will bring together the performance, capacity and configuration
management capabilities VMware has developed and acquired, including
VMware vCenter CapacityIQ™, VMware vCenter Configuration Manager and
Integrien Alive™. vCenter Operations will be available in three editions
to meet the needs of customers managing both VMware vSphere-virtualized
and physical environments.

- vCenter Operations Standard offers performance management with
capacity and change awareness for VMware vSphere-virtualized and cloud
environments.
- vCenter Operations Advanced adds more advanced capacity analytics and
planning to vCenter Operations Standard’s performance management for
VMware vSphere-virtualized and cloud environments.
- vCenter Operations Enterprise offers performance, capacity and
configuration management capabilities for both virtual and physical
environments and includes customizable dashboards, smart alerting and
application awareness.

The first versions of these editions will be available in late Q1 with
prices starting at US$50 per VM. vCenter Operations will be available
through VMware sales and via VMware’s more than 25,000 channel
partners.

Additional Resources
- Download vCenter Operations screenshots at
http://www.vmware.com/files/zip/vcenterops-images.zip
- Learn more about vCenter Operations at
http://www.vmware.com/files/pdf/products/vcenter-operations-datasheet-feb2011.pdf
- Learn more about the VMware vCenter family of products at
http://www.vmware.com/products/vcenter/
- Learn more about VMware’s Approach to Cloud Computing at
http://www.vmware.com/solutions/cloud-computing/

About VMware
VMware delivers solutions for business infrastructure virtualization
that enable IT organizations to energize businesses of all sizes. With
the industry leading virtualization platform — VMware vSphere™ —
customers rely on VMware to reduce capital and operating expenses,
improve agility, ensure business continuity, strengthen security and go
green. With 2009 revenues of US$2 billion, more than 170,000 customers
and 25,000 partners, VMware is the leader in virtualization which
consistently ranks as a top priority among CIOs. VMware is headquartered
in Silicon Valley with offices throughout the world and can be found
online at www.vmware.com.  VMware Canada is headquartered in Burlington,
Ontario, and can be found online at www.vmwar
e.ca.

-30-

VMware, VMware vSphere, VMware vCenter and VMware vCenter CapacityIQ
are registered trademarks and/or trademarks of VMware, Inc. in the
United States and/or other jurisdictions. All other marks and names
mentioned herein may be trademarks of their respective companies. The
use of the word "partner" or "partnership" does not imply a legal
partnership relationship between VMware and any other company.

Forward-Looking Statements
This press release contains forward-looking statements including, among
other things, possible transformations of IT business models, the
expected availability and features of its vCenter Operations solutions
and their benefits to customers. These forward-looking statements are
subject to the safe harbor provisions created by the Private Securities
Litigation Reform Act of 1995. Actual results could differ materially
from those projected in the forward-looking statements as a result of
certain risk factors, including but not limited to: (i) adverse changes
in general economic or market conditions; (ii) delays or reductions in
information technology spending; (iii) competitive factors, including
but not limited to pricing pressures, industry consolidation, entry of
new competitors into the virtualization market, and new product and
marketing initiatives by our competitors; (iv) our customers’ ability
to develop, and to transition to, new products and computing strategies,
(v) the uncertainty of customer acceptance of emerging technology; (vi)
rapid technological and market changes in virtualization software and
platforms for cloud and desktop computing; (vii) changes to product
development timelines; (viii) our ability to protect our proprietary
technology; (ix) our ability to attract and retain highly qualified
employees; and (x) the successful integration of acquired companies and
assets into VMware. These forward looking statements are based on
current expectations and are subject to uncertainties and changes in
condition, significance, value and effect as well as other risks
detailed in documents filed with the Securities and Exchange Commission,
including our most recent reports on Form 10-K and Form 10-Q and current
reports on Form 8-K that we may file from time to time, which could
cause actual results to vary from expectations. VMware assumes no
obligation to, and does not currently intend to, update any such
forward-looking statements after the date of this release.

For more information please contact:
Cindy Watson / Jennifer Rideout
StrategicAmpersand Inc.
cindy@stratamp.com
jennifer@stratamp.com
(416) 961-5595

SYMANTEC PRESS RELEASE: Ponemon Study Indicates Organizational Data Breach Costs Hit $7.2 Million and Show No Sign of Leveling Off


Good morning,

Today, Symantec Corp. and the Ponemon Institute released the findings of the 2010 Annual Study: U.S. Cost of a Data Breach, which reveals data breaches grew more costly for the fifth year in a row. The average organizational cost of a data breach increased to $7.2 million and cost companies an average of $214 per compromised record, markedly higher when compared to $204 in 2009. The study also found that for the second straight year organizations’ need to respond rapidly to data breaches drove the associated costs higher.  The sixth annual Ponemon Cost of a Data Breach report is based on the actual data breach experiences of 51 U.S. companies from 15 different industry sectors. Canada was not included in this study.

 

Key highlights from this announcement:

·         Rapid response to data breaches is costing companies 54 percent more per record than companies that moved more slowly.

·         In this year’s study, 31 percent of all cases of data breach involved a malicious or criminal act, up seven points from 2009, and averaged $318 per record, up 43 percent from 2009.

·         The average organizational cost of a data breach increased to $7.2 million, up seven percent from $6.8 million in 2009.

·         Sixty-three percent of respondents use training and awareness programs after data breaches, down four points from 2009, while 61 percent use encryption.

·         Based on six years of trend data, Symantec’s Data Breach Risk Calculator takes into account an organization’s size, industry, location and security practices to estimate how much a data breach would cost  on both a per record and organizational basis.

 

For more information about this announcement or to speak with a Symantec spokesperson, please feel free to contact me.

 

Best,
Elana

 

Elana Ziluk

Account Coordinator | MAVERICK Public Relations

(416) 640-5525 x 243 | 37 Madison Avenue | Toronto | M5R 2S2

w: maverickpr.com | t: MAVERICK_PR


Ponemon Study Indicates Organizational Data Breach Costs Hit $7.2 Million and

Show No Sign of Leveling Off

Symantec-sponsored Cost of a Data Breach report finds compliance pressures, cyber attacks drive companies to respond more quickly and incur higher costs

 

TORONTO, ON. – March 8, 2011 – Symantec Corp. (Nasdaq: SYMC) and the Ponemon Institute today released the findings of the 2010 Annual Study: U.S. Cost of a Data Breach, which reveals data breaches grew more costly for the fifth year in a row. The average organizational cost of a data breach increased to $7.2 million and cost companies an average of $214 per compromised record, markedly higher when compared to $204 in 2009. The study also found that for the second straight year organizations’ need to respond rapidly to data breaches drove the associated costs higher.  The sixth annual Ponemon Cost of a Data Breach report is based on the actual data breach experiences of 51 U.S. companies from 15 different industry sectors.

 

Click to Tweet: Ponemon Study: Organizational data breach costs hit $7.2 million and show no sign of leveling off: http://bit.ly/fwlC6j

 

Key findings from the study include:

·         Rapid response to data breaches is costing companies 54 percent more per record than companies that moved more slowly. Forty-three percent of companies notified victims within one month of discovering the breach, up seven points from 2009. In 2010, these quick responders had a per-record cost of $268, up 22 percent from 2009; companies that took longer paid $174 per record, down 11 percent.

·         Malicious or criminal attacks are the most expensive and are on the rise. In this year’s study, 31 percent of all cases involved a malicious or criminal act, up seven points from 2009, and averaged $318 per record, up 43 percent from 2009.

·         Negligence remains the most common threat. The number of breaches caused by negligence edged up one point to 41 percent and averaged $196 per record, up 27 percent from 2009. This steady trend reflects the ongoing challenge of ensuring employee and partner compliance with security policies.

·         Companies are more vigilant about preventing system failures. System failure dropped nine points to 27 percent in 2010. This trend indicates organizations may be more conscientious in ensuring their systems can prevent and mitigate breaches through new security technologies and compliance with security policies and regulations.

·         Data breach costs have continued to rise. The average organizational cost of a data breach this year increased to $7.2 million, up seven percent from $6.8 million in 2009. Total breach costs have grown every year since 2006. Data breaches in 2010 cost companies an average of $214 per compromised record, up $10 (5 percent) from last year.

·         Encryption and other technologies are gaining ground as post-breach remedies, but training and awareness programs remain the most popular. Sixty-three percent of respondents use training and awareness programs after data breaches, down four points from 2009. Encryption is the second most implemented preventive measure as a result of a data breach, with 61 percent. Both encryption and data loss prevention (DLP) solutions have increased 17 percent since 2008.

 

Symantec recommends organizations implement the following best practices, whether or not they have suffered a data breach:

  1. Assess risks by identifying and classifying confidential information
  2. Educate employees on information protection policies and procedures, then hold them accountable
  3. Deploy data loss prevention technologies which enable policy compliance and enforcement
  4. Proactively encrypt laptops to minimize consequences of a lost device
  5. Integrate information protection practices into businesses processes

 

The study, sponsored by Symantec and independently conducted by the Ponemon Institute, takes into account a wide range of business costs, including expense outlays for detection, escalation, notification, and after-the-fact (ex-post) response. The study also analyzes the economic impact of lost or diminished customer trust and confidence as measured by customer churn or turnover rates.

 

The U.S. Cost of a Data Breach Study was derived from a detailed analysis of 51 data breach cases with a range of nearly 4,200 to 105,000 affected records. The study found there is a positive correlation between the number of records lost and the cost of an incident. Companies analyzed were from 15 different industries, including finance, retail, healthcare, services, education, technology, manufacturing, research, transportation, consumer, hotels and leisure, media, pharmaceutical, communications and energy.

 

Companies can analyze their own risk by visiting Symantec’s Data Breach Risk Calculator.  Based on six years of trend data, the calculator takes into account an organization’s size, industry, location and security practices to estimate how much a data breach would cost  on both a per record and organizational basis.

 

Supporting Quotes

“We continue to see an increase in the costs to businesses suffering a data breach,” said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute. “Regulators are cracking down to ensure organizations implement required data security controls or face harsher penalties. Confronted with both malicious and non-malicious threats from inside and outside the organization, companies must proactively implement policies and technologies to mitigate the risk of costly breaches.”

 

“Securing information continues to challenge organizations at all levels, but the vast majority of these breaches are preventable,” said Francis deSouza, senior vice president, Enterprise Security Group, Symantec.  “Organizations must not only protect the data itself wherever it is stored or used, but also create a culture of security including training, policies and actions. The results of this study show that companies with information protection best practices in place can greatly lower their potential data breach costs.”

 

Related

·         2010 Annual Study: U.S. Cost of a Data Breach Press Kit

·         2010 Annual Study: U.S. Cost of a Data Breach Report (PDF)

·         Infographic: Data Breach Costs Soar Even Higher

·         Podcast: Ponemon Cost of a Data Breach Report

·         SlideShare: 2010 Annual Study: U.S. Cost of a Data Breach

·         Data Breach Cost Calculator

·         Symantec Encryption Products

·         Symantec Data Loss Prevention

 

Connect with Symantec

 

About the Ponemon Institute

The Ponemon Institute is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a variety of industries.

 

About Symantec

Symantec’s Canadian operations are headquartered in Toronto with offices in Montreal, Ottawa, Calgary and Vancouver.  For more information on Symantec products or current promotions, access Symantec’s Canadian Web site at www.symantec.ca. Symantec is an active member of the Business Software Alliance (BSA).

 

Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world.  Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

###

NOTE TO EDITORS: If you would like additional information on Symantec Corporation and its products, please visit the Symantec News Room at http://www.symantec.com/news. All prices noted are in U.S. dollars and are valid only in the United States.

 

Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Forward-looking Statements: Any forward-looking indication of plans for products or programs is preliminary and all future release or delivery dates are tentative and are subject to change. Any future program plans, or release of the product or planned modifications to product capability, functionality, or feature are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making program participation or product purchasing decisions.

 

Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

 

Free video vault on offer from Vzaar

Kenmoss_oliverstone


Free video vault on offer from Vzaar

Any businessman knows, storage doesn’t come cheap, but Vzaar, the world’s fastest growing online video platform, has announced today that it is giving unlimited virtual space away to its larger customers for nothing, enabling them to generate a huge archive of video content without paying a penny extra.

This concession is the latest of many unique features offered to clients by this innovative and inventive company, which has seen a relatively brief meteoric rise and now sits at the top of its game.

In recent months Vzaar hit the headlines when it reeled in high profile investor, American film director Oliver Stone, the man behind cinematic blockbusters like Platoon, Natural Born Killers and Wall Street: Money Never Sleeps. So impressed was Stone with the Vzaar platform technology that he starred in a Vzaar promotional video when he visited the UK for the release of his latest box office hit.

“Businesses accumulate a great deal of video content on their web-sites – ecommerce demos, educational material, corporate movies and the like. Without video a website is essentially a dead entity, and the movers and shakers realise this. The Vzaar platform allows our clients to accumulate huge amounts of video content online without having to pay a hefty extra fee for storage, as is the case with most other platforms,” said Ken Moss, founder and Chairman of Vzaar.

 “This is yet another quality offering we want to provide for our customers. Our aim is to ensure that Vzaar has the best value offering in the video solutions market,” said Mr Moss.


ENDS

New Intel Business Processors Deliver Leading Security,

 

Today, Intel launched its 2nd generation Intel Core vPro processor
family<http://www.intel.com/itcenter/products/core/index.htm> for
business PCs which feature the performance and capabilities of Intel's
new microarchitecture, enhancements to Intel vPro technology and new
security features, including a 3G "poison pill" option to help protect
a PC's data.

News highlights:

 *   Intel Core vPro processor-based PCs provide the performance and
 capabilities to reshape business computing to address desktop
 virtualization, client-aware cloud computing and the PC's
 complementary relationship with the growing variety of other
 computing devices. *   A 2nd generation Intel Core vPro i5 processor
 can speed up business applications by 60 percent, multitasking by 100
 percent and data encryption 300 percent. *   Intel has further
 simplified IT's job by completely automating Intel vPro Technology
 set-up and by enhancing the capabilities of Intel (r)
 Keyboard-Video-Mouse Remote Control. *   Intel(r) Anti-Theft
 Technology Ver. 3.0 protects data on missing PCs with 3G "poison
 pill" and GPS, while new Intel(r) Identity Protection Technology
 helps protect against identity theft.
If you are interested in speaking with Intel Canada about today's news
and what this means for business computing, please let me know. I
would be happy to arrange an interview for you with Elaine Mah,
Business Marketing Manager, Intel Canada.

Best,
Natasha

New Intel(r) Business Processors Deliver Leading Security,
Manageability and
Performance<http://newsroom.intel.com/community/intel_newsroom/blog/2
0
11/03/07/new-intel-business-processors-deliver-leading-security-manage
ability-and-performance>

SANTA CLARA, Calif., Mar. 7, 2011 - Bringing industry leading security
and manageability, and better, more flexible performance to business
computing, Intel Corporation today unveiled its newest family of
business processors. The new 2nd generation Intel(r) Core(tm) vPro(tm)
processor
family<http://www.intel.com/itcenter/products/core/index.htm> features
the performance and capabilities of Intel's new microarchitecture,
enhancements to Intel(r)
vPro(tm)<http://www.intel.com/products/core_vpro/index.htm?wapkw=ALL
%2
8vPro%29+EXACT%28Host+Based+Configuration%29+ANY%28Web%29
> technology
and new security features, including a 3G "poison pill" option to help
protect a PC's data.

Computer makers around the world, including Dell, Fujitsu, HP and
Lenovo, are introducing new laptop, convertible-tablet, desktop and
all-in-one PCs for businesses based on the new Intel Core vPro
processors.

"Businesses face numerous challenges today, but also opportunities in
the wealth of new technologies that are helping workers be more
productive, businesses to be more creative and IT to be more
innovative," said Rick
Echevarria<http://www.intel.com/pressroom/kits/bios/rechevarria.htm>,
vice president, Intel Architecture Group, and general manager,
Business Client Platform Division. "Providing the right combination of
technologies at the right time, the new Intel Core vPro processor
family continues Intel's advancement in performance, security and
management. Possibly more critical, it readies businesses for major
changes to come in such areas as desktop
virtualization<http://www.intel.com/itcenter/topics/virtualization/cli
ent.htm
>, cloud
computing<http://software.intel.com/en-us/articles/intel-cloud-builder
s/
> and the complementary relationship between PCs and the growing
variety of other computing devices."

 Performance Matters
To take full advantage of emerging innovation, the new Core vPro
processors offer the increased performance of Intel's new
microarchitecture, enhanced Intel(r) Turbo Boost Technology
2.0<http://www.intel.com/technology/turboboost/index.htm> and new
Intel(r) Advanced Vector Extensions
(AVX<http://software.intel.com/en-us/avx/>). Compared to a 3-year-old
Intel(r) Core(tm) 2 Duo processor, a new Intel(r) Core(tm) vPro(tm) i5
processor speeds up business applications by 60 percent, multitasking
by 100 percent and data encryption by 300 percent.1

"This kind performance equates to enormous promise for the PC, for
example, as the 'hub' for the varied combination of tablets, smart
phones, netbooks and operating systems filling our pockets and
briefcases," said Echevarria. "The new Core vPro processor family has
the capacity to offload tasks or even better share them to get the
most from companion devices. With such performance, the PC could be a
service provider, coordinating encryption, virus scanning, near
transparent syncs and remote control."

Protecting Data on Missing Laptops
To provide stronger defense against the problem of laptop theft and
data loss<http://newsroom.intel.com/docs/DOC-1544>, Intel today
introduced Intel(r) Anti-Theft Technology Ver.
3.0<http://anti-theft.intel.com/> (AT 3.0), included on all 2nd
generation Intel Core and Core vPro processors.

Previous versions of Intel Anti-Theft Technology enabled authorized IT
or service personnel to send a coded "poison pill" over the Internet
to completely disable a lost or stolen computer and help prevent
access to its encrypted data and deter theft. New Intel AT 3.0 enables
the poison pill to be sent as an encrypted, authenticated SMS message
by an authorized administrator over a 3G cellular network as well
within moments after a missing laptop is turned on. When recovered,
the PC can be similarly re-activated with another message. Its new
Locator Beacon capability gives authorities the ability to pinpoint a
missing laptop using GPS technology on select 3G modems.

Finally, the new Intel AT 3.0 standby protection feature helps protect
encrypted PCs that go missing in the vulnerable standby state (S3).
When awakened, the new standby protection feature can change normal
procedure to require an encryption login, which is much more secure
than the usual username and password.

Drying Up the Ol' Phishing Hole
New Intel(r) Identity Protection Technology<http://ipt.intel.com/>
(IPT), which is integrated into select 2nd generation Intel Core and
Core vPro processors, helps stymie phishing attacks aimed at gaining
unlawful access to corporate, e-banking, e-commerce and other secure
sites. IPT supplements normal password procedures by generating a new
six-digit numerical password every 30 seconds to help ensure only
authorized access.

Symantec<https://idprotect.verisign.com/mainmenu.v> and
VASCO<http://www.vasco.com/products/digipass/digipass_index.aspx> are
the first to use this technology to provide easy-to-use, secure
communications between PCs, and businesses and e-commerce sites.

Making IT Simpler
The 2nd generation Intel Core vPro processors also help make IT
simpler with the new Host-Based
Configuration<http://www.intel.com/products/core_vpro/index.htm?wapkw=
ALL%28vPro%29+EXACT%28Host+Based+Configuration%29+ANY%28W

eb%29>
feature that completely automates the process of setting up the vPro
functions on new computers. Now even thousands of computers can be
configured simultaneously in a couple of minutes.

Intel's Keyboard-Video-Mouse (KVM) Remote
Control<http://www.intel.com/products/core_vpro/index.htm?wapkw=ALL%2
8
vPro%29+EXACT%28Host+Based+Configuration%29+ANY%28Web%29>
feature now
enables a remote technician to see the worker's screen presentation in
higher resolutions to accommodate HD video and screen sizes.

Visually Smart Performance for the New Office
When a workload requires extra performance, the enhanced Intel(r)
Turbo Boost Technology 2.0 steps up processor speeds beyond their
rated frequency by analyzing temperature and power consumption. New
Intel AVX improves the performance of computing-intensive
applications, such as image manipulation, audio/video processing,
scientific simulations, financial analytics, and 3-D modeling and
analysis.

To meet the growing dominance of video as the potential heir to
traditional white papers, product briefs and slide presentations, the
new processor family integrates Intel(r) HD
Graphics<http://www.intel.com/technology/graphics/intelhd.htm> and
advanced media processing into its entire line, eliminating the need
for separate graphical processing units for performance-intensive
graphical applications.

Also the Intel(r) Quick Sync
Video<http://www.intel.com/technology/quicksynch/index.htm> feature
doubles the speed of creating DVDs or Blu-ray* discs, editing and
converting video files into other formats over the preceding
generation of Intel Core vPro processors.

Intel vPro Technology Expands Into New Realms
The soon-to-be-released Intel(r) Xeon(r) processor E3-1200 product
family will bring all of the advances of Intel's new microarchitecture
to entry-level workstations. It is the first entry-level workstation
platform to integrate professional-level graphics onto the processor,
enabling visual and 3-D graphics capabilities previously only
available with separate graphics cards. Intel is also extending
support for Intel(r) vPro(tm) technology to these workstations.

In addition to workstations and servers, Intel(r) vPro
Technology<http://newsroom.intel.com/servlet/JiveServlet/download/38-4
179/Intel_vPro_Technoloy_for_Embedded.pdf
> also can be found in a
variety of innovative applications beyond PCs, such as retail, digital
signage and banking devices. With features such as Intel(r) Active
Management Technology
7.0<http://edc.intel.com/Intel-Product-Technologies/AMT/> built-in,
2nd generation Intel Core vPro i5 and
i7<http://newsroom.intel.com/www.intel.com/consumer/products/processor
s/core-family.htm
>, and Intel(r) Xeon(r) E3 processors, embedded
customers are able to manage multiple devices from a single host
station, which enables them to troubleshoot problems real-time and
effectively lower costs for manual checks.

About Intel
Intel (NASDAQ: INTC) is a world leader in computing innovation. The
company designs and builds the essential technologies that serve as
the foundation for the world's computing devices. Additional
information about Intel is available at newsroom.intel.com and
blogs.intel.com<http://blogs.intel.com/>.

Intel, Core, vPro, Xeon and the Intel logo are trademarks of Intel
Corporation in the United States and other countries.

* Other names and brands may be claimed as the property of others.

1 Comparing Intel(r) Core(tm) i5-2520M processor based laptops to
theoretical installed base of Intel(r) Core(tm)2 Duo Processor T7250.
Business productivity claims based on SYSmark* 2007. Multitasking
claims based on PCMark Vantage. Security workload consists of
SiSoftware Sandra* 2010 - AES256 CPU Cryptographic subtest measures
CPU performance while executing Advanced Encryption Standard
encryption and decryption algorithm. Software and workloads used in
performance tests may have been optimized for performance only on
Intel microprocessors.

________________________________


[cid:image001.gif@01CBDCC8.BA4009C0]


Natasha Parnanzone


Assistant Consultant


Hill & Knowlton Canada

Direct Line: +1 416 413 4740


Fax: +1 416 413 1550


natasha.parnanzone@hillandknowlton.ca<mailto:natasha.parnanzone@hill
an
dknowlton.ca>

160 Bloor Street East, Suite 700, Toronto, Ontario, M4W 3P7 Canada


http://www.hillandknowlton.com

________________________________
Privileged/Confidential Information may be contained in this message.
If you are not the addressee indicated in this message (or responsible
for delivery of the message to such person), you may not copy or
deliver this message to anyone. In such case, you should destroy this
message and kindly notify the sender by reply email. Please advise
immediately if you or your employer does not consent to email or
messages of this kind. Opinions, conclusions and other information in
this message that do not relate to the official business of Hill &
Knowlton Canada shall be understood as neither given nor endorsed by
it.

------- End of forwarded message -------
Thank you,
Dave Chappelle, editor
infoexecutive.itincanada.ca
secur-it.itincanada.ca



Image001

Click here to download:
- (11 KB)

Click here to download:
- (37 KB)