Privacy Commissioners Help Developers Seize Opportunity to Create Privacy-Friendly Apps

Privacy Commissioners Help Developers Seize Opportunity to Create Privacy-Friendly Apps

OTTAWA, Oct. 24, 2012 /CNW/ - Today's app economy is like a new frontier marked by innovation, thousands of jobs and millions of consumers worldwide equipping themselves with useful, convenient, informative and entertaining tools. Like any new frontier though, this one has risks, including those to privacy.  To help heighten personal information protection in the mobile era, the Privacy Commissioner of Canada, and the Information and Privacy Commissioners of Alberta and British Columbia today issued new guidance to help mobile app developers set themselves apart by making user privacy central in their design process.

The mobile era has led to the placing of an increasing amount of personal data such as contacts, photos, emails and texts onto one device, which can be tracked in real time. As a result, mobile apps may not just provide users with unparalleled information and fun at their fingertips, but also hold the potential for comprehensive individual surveillance.

A recent study showed that privacy concerns are swaying consumer choices. In September, the Pew Research Center released a report finding 57 per cent of users surveyed had either dropped or avoided installing an app over concerns about use of their personal information.

"Canadians shouldn't have to choose between sacrificing their privacy and benefitting from the next new mobile app," said Jennifer Stoddart, Privacy Commissioner of Canada. "Our guidance shows developers how they can meet their legal obligations to respect individual privacy while allaying consumer fears."

"Mobile's emergence is another wave in a larger digital revolution that has individual knowledge and empowerment as two of its cornerstones," said Elizabeth Denham, British Columbia Information and Privacy Commissioner. "Developers who respect these and don't try to turn them upside-down to consumers' detriment can gain an edge."

"Being first is important in the app economy, but this doesn't mean privacy should be compromised in the process," said Jill Clayton, Alberta Information and Privacy Commissioner. "Developers who resist shortcuts and put privacy first can gain a competitive advantage through consumer trust and loyalty."

The guidance, shared with international data protection authorities and released today upon the close of the 34th International Conference of Data Protection and Privacy Commissioner in Punta del Este, Uruguay, provides app developers with insights in the following areas:

  • Accountability under the law:  Developers are accountable for the information handling practices of their work, whether working for themselves or a third party and their products generally fall under Canadian private sector privacy laws;
  • Transparency: Privacy law requires informing users of how their personal information is being collected and used in a clear and understandable way;
  • Collection: Privacy law calls upon developers to justify why an app needs to collect personal information to function. Collecting unnecessary information may also increase the risk of a damaging data breach;
  • Gaining meaningful consent despite the "small screen" challenge: Developers can use colours, sounds and graphics to inform users and give them clarity and control over their privacy protection choices; and
  • User notice and consent timing: Users need to be informed upfront about what will happen with their data upon using the app while real-time notices should follow as privacy-sensitive functions occur (such as, for example, when geolocation information is accessed).

The full guidance can be found on the web site of either: the Office of the Privacy Commissioner of Canada; the Office of the Information and Privacy Commissioner of Alberta; or the Office of the Information and Privacy Commissioner of British Columbia.

SOURCE: Office of the Privacy Commissioner of Canada

For further information:

For media inquiries, please contact:

Scott Hutchinson
Office of the Privacy Commissioner of Canada
Scott.Hutchinson@priv.gc.ca
(613) 947-7261

Diane McLeod-McKay
Office of the Information and Privacy Commissioner of Alberta
DMcleod-McKay@oipc.ab.ca
(403) 297-6452

Cara McGregor
Office of the Information and Privacy Commissioner of British Columbia
cmcgregor@oipc.bc.ca
(250) 217-5535































































































































Diversinet Strengthens Mobile Healthcare Platform

Diversinet Strengthens Mobile Healthcare Platform
 
36 New Features Enhance Patient Engagement 

TORONTO Oct. 25, 2012 – Diversinet Corp. (TSX Venture: DIV, OTCQB: DVNTF), a leader in secure mobile health that “Powers Care Coordination through Mobility,” has strengthened its MobiSecure® mobile healthcare platform with 36 new features in its 4.5 version release. The features help providers and payers rapidly deploy simple, secure mobile applications and improve care coordination and patient health outcomes. 

The company’s mHealth platform recently became the first to have its encryption technology awarded Federal Information Processing Standards (FIPS) 140-2 validation.

“Our new MobiSecure Version 4.5 will enable healthcare organizations to more efficiently engage and activate patients in a meaningful way,” said Dr. Hon Pak, Diversinet CEO. “We listened to the market, and we added significant features to help our customers innovate rapidly with mobile applications while overcoming concerns about protecting personal data. Healthcare’s understanding of engaging patients/consumers in health and healthcare is evolving, and many in healthcare are attempting to determine how best to engage and activate our patients in a meaningful way. Diversinet’s platform supports this rapid innovation for patient engagement.”

New MobiSecure features include:

  • Autonomous alerts: This industry-first characteristic means a patient’s or caregiver’s mobile device does not need to have a cellular or Wi-Fi connection to issue alerts, such as appointment or medication reminders. Apps can provide notifications even when a user is in a rural area without cellular coverage or has a device in airplane mode.
  • App wakeup: MobiSecure enables apps to wake up a device to issue an alert. This feature is important to users because it eliminates the need for multiple clicks to open an app.
  • Remote data wipe: If a user’s device is lost or stolen, MobiSecure enables a remote erasure of all data. This feature is particularly valuable for an organization that develops apps for physicians, home health workers and other caregivers under a bring-your-own-device (BYOD) policy that could otherwise create risks of exposing confidential information.
Among many other new features are a connection indicator that shows network status and an ability to select from a drop-down list of unlimited length. 
 
MobiSecure supports app development for a variety of uses, including medication adherence, case management, physical therapy, behavioral health, cardiac and vocational rehabilitation, and sharing of personal health records. 
 
Diversinet’s patented technology enables healthcare organizations to serve users with nearly all kinds of mobile devices, including feature phones, smartphones and tablets that run iOS, Android, BlackBerry, Java or Windows Mobile. Apps built on MobiSecure may be configured once and then rapidly deployed across multiple mobile operating systems, meeting customers’ needs for efficiency and flexibility.
 
MobiSecure can be used as a development platform, or healthcare organizations can implement Diversinet’s pre-configured solutions to enhance care coordination, and patient and physician engagement.
 
Customers using Diversinet-powered apps are future-proofed for meeting government security requirements exceeding HIPAA specifications. MobiSecure offers multi-factor authentication for apps involving remote access to patient information, in line with U.S. government standards proposed to take effect in 2015 with Stage 3 of the HITECH Act’s meaningful use incentive program.
 
About Diversinet

Diversinet Corp. (TSX Venture: DIV, OTCQB: DVNTF) is answering the challenges of today’s healthcare landscape with a secure enterprise mobile healthcare platform and integrated solutions. This technology can be leveraged and customized quickly to meet the ever-changing needs of healthcare organizations and patients – driving patient-provider and payer communications and improving outcomes while lowering costs. Learn more about Diversinet at www.diversinet.com.

The Private Securities Litigation Reform Act of 1995 and Canadian securities laws provide a “safe harbour” for forward-looking statements. Certain information included in this press release (as well as information included in oral statements or other written statements made or to be made by the company) contains statements that are forward-looking, such as statements relating to the success of current product offerings. Such forward-looking information involves important risks and uncertainties that could significantly affect anticipated results in the future and, accordingly, such results may differ materially from those expressed in any forward-looking statements made by or on behalf of the company. For a description of additional risks and uncertainties, please refer to the company’s filings with the Securities and Exchange Commission available at www.sec.gov and Canadian securities regulatory authorities available at www.sedar.com.

The TSX Venture Exchange has not reviewed and does not accept responsibility for the adequacy or accuracy of this release.

MobiSecure is a registered trademark of Diversinet Corp.




















































































































BSA Statement on Toronto Resident Software Piracy Ruling

 

BSA Statement on Toronto Resident Software Piracy Ruling

 

TORONTO (October 25, 2012) – BSA | The Software Alliance today applauded the recent judgment of the Federal Court of Canada against Toronto resident Dale Thompson, who illegally sold copyrighted commercial software programs created by BSA members Adobe, Microsoft and Rosetta Stone via his own website, appletreesolutions.ca, and online marketplace websites such as Kijiji and Craigslist. The court described the evidence of Thompson’s copyright infringement “overwhelming” and ordered Thompson to pay statutory damages, punitive damages, and costs amounting to $445,000, in addition to pre and post-judgment interest.

Evidence presented to the court established that Thompson engaged in the unauthorized reproduction of software programs and cover art and offered the counterfeit software for sale on the Internet under the name Appletree Solutions. In addition, Thompson assisted purchasers of the pirated software by supplying detailed instructions for circumventing copy-protection mechanisms and activating the counterfeit software programs.

 “BSA is extremely pleased with the outcome of this case,” said Jon Berroya, BSA’s Director of Global Internet Enforcement.  “Consumers who purchase pirated software from individuals like Mr. Thompson may not realize that, in exchange for a low price, they are likely to receive software that is impossible to update or patch, and in some cases is bundled with malware that can result in data loss or identity theft.  When purchasing software– it is important to remember that “too good to be true” deals are often exactly that.”

Victims of online software sales scams and those wishing to report instances of software piracy can do so confidentially at www.NoPiracy.ca. Through its Faces of Internet Piracy website, SAM Advantage course, and resources available on BSA.org, BSA has worked to educate consumers on proper software asset management and the inherent technical, financial, and legal dangers involved in utilizing unlicensed software.

 

About BSA

BSA | The Software Alliance (www.bsa.org) is the leading global advocate for the software industry. It is an association of more than 70 world-class companies that invest billions of dollars annually to create software solutions that spark the economy and improve modern life. Through international government relations, intellectual property enforcement, and educational activities, BSA expands the horizons of the digital world and builds trust and confidence in the new technologies driving it forward.

(download)

Internet Society Board of Trustees Calls on Policymakers to Preserve the Internet’s Openness ...

October 22, 2012 03:00 PM Eastern Daylight Time 

Internet Society Board of Trustees Calls on Policymakers to Preserve the Internet’s Openness, Innovation, and Interoperability in Proposed Changes to the International Telecommunications Regulations

At the World Conference on International Telecommunications, the 193 ITU Member States will modify the International Telecommunications Regulations

WASHINGTON & GENEVA--(BUSINESS WIRE)--During its recent meeting in Toronto, Canada, the Internet Society Board of Trustees called on policymakers, in advance of the World Conference on International Telecommunications (WCIT) in December, to preserve the openness, dynamism, and growth of the Internet when modifying the International Telecommunications Regulations (ITRs).

“ITU Member States have important decisions to make at the WCIT”

The Internet Society Board was encouraged by recent remarks by ITU leaders that the WCIT is about promoting greater connectivity and not about regulating the Internet. At the same time, the Board noted that some of the proposals to modify the ITRs could have far-reaching impacts on individuals who use the Internet, businesses that rely on global interoperability, and developing-market economies where Internet growth is essential to economic prosperity. The Board underscored the need for care, pointing out that seemingly small word changes in the treaty could have unintended consequences for the Internet.

“ITU Member States have important decisions to make at the WCIT,” stated Eva Frölich, Chair of the Internet Society Board of Trustees. “It is the Board’s sincere hope that delegations to the WCIT will chart a course that supports global interoperability and enables continued growth, competition, and innovation in the telecommunications sector.”

As in previous statements on WCIT, the Internet Society Board reiterated its belief that any revisions to the ITRs should:

  • Reinforce Member States’ commitment to open, transparent, and inclusive policy-making processes;
  • Enshrine a commitment to open, voluntary international standards;
  • Emphasize policy approaches such as competition, liberalization, and transparency;
  • Be based on thorough technical and socio-economic analysis; and
  • Retain the high-level nature of the ITRs.

The Board noted that a number of proposals to the WCIT would apply telecommunications regulations to Internet traffic. This approach could result in fragmentation of networks, higher costs for end-users, and could ultimately stifle innovation and creativity.

“The Internet Society, along with our members and Chapters around the world, remains committed to working with all stakeholders in preparation for the WCIT,” said Internet Society President and Chief Executive Officer Lynn St. Amour. “The 1988 ITRs encompassed high level principles that enabled exceptional growth for the telecommunications industry and provided countless benefits for people around the world. It is the Internet Society’s hope that WCIT will build on what has worked in the past, and that the new treaty will have an even more profound and positive impact.”

For more information on WCIT, visit http://internetsociety.org/wcit.

About the Internet Society

The Internet Society is the trusted independent source for Internet information and thought leadership from around the world. With its principled vision and substantial technological foundation, the Internet Society promotes open dialogue on Internet policy, technology, and future development among users, companies, governments, and other organizations. Working with its members and Chapters around the world, the Internet Society enables the continued evolution and growth of the Internet for everyone. For more information, visit www.internetsociety.org.

Contacts

Media:
Internet Society
Wende Cover, +1-703-439-2773
cover@isoc.org































































































Gartner Reveals Top Predictions for IT Organizations and Users for 2013 and Beyond

Gartner Reveals Top Predictions for IT Organizations and Users for 2013 and Beyond

Analysts Examine Latest Industry Directions at Gartner Symposium/ITxpo, October 21-25 in Orlando

ORLANDO, Fla., October 24, 2012—  

Gartner, Inc. has revealed its top predictions for IT organizations and IT users for 2013 and beyond. Gartner analysts presented their findings during Gartner Symposium/ITxpo, being held here through October 25.

 Gartner's top predictions focus on economic risks, opportunities and innovations that will impel CIOs to move to the next generation of business-driven solutions. Selected from across Gartner's research areas as the most compelling and critical predictions, they address the trends and topics that underline the reduction of control that IT has over the forces that affect it.

 "The priorities of CEOs must be dealt with by CIOs who exist in a still-turbulent economy and increasingly uncertain technology future," said Daryl Plummer, managing vice president and Gartner fellow. "As consumerization takes hold and the Nexus of Forces drives CEOs to certain expectations, CIOs must still provide reliability, serviceability and availability of systems and services. Their priorities must span multiple areas. As the world of IT moves forward, it is finding that it must coordinate activities in a much wider scope than it once controlled, and as a result, a loss of control echoes through several predictions we are making."

Gartner's top predictions for IT organizations include the following:

Through 2015, 90% of enterprises will bypass broad-scale deployment of Windows 8.
Windows 8 is Microsoft's attempt to bring the touch interface to its flagship product to counter gains by Apple in rapid-growth markets. Microsoft had to make this change to modernize its offering, and its approach is to push IT organizations to this new interface as quickly as possible. However, most enterprises and their trusted management vendors are not yet prepared for this change, and Gartner predicts that enterprises will want to wait for more stability before proceeding. While Microsoft as a technology company can make these changes at a more advanced pace, the preponderance of the customer base cannot move so quickly. The market will take time to mature, and most enterprises will sit on the sideline for now.

By Year-End 2014, three of the top five mobile handset vendors will be Chinese.
Mobile phone penetration in emerging markets has resulted in a changing of the guard in terms of the leading vendors. The openness of Android creates new markets for OEMs that previously did not have the necessary software expertise and engineering capabilities. The market continues to consolidate around Android and iOS, with other ecosystems struggling to gain traction, and, with most vendors committed to Android, it has become difficult to differentiate. The result is that the traditional mobile phone players are getting squeezed, being unable to compete with Apple and Samsung at the high end and struggling to differentiate from aggressive new vendors, most notably Huawei and ZTE, which are using the same Android platform for their models. Chinese vendors have the opportunity to leverage their strong position in the domestic Chinese market for entry-level smartphones and expand to other regions, because this is not just an emerging-market phenomenon.

 By 2015, big data demand will reach 4.4 million jobs globally, but only one-third of those jobs will be filled.
The demand for big data is growing, and enterprises will need to reassess their competencies and skills to respond to this opportunity. Jobs that are filled will result in real financial and competitive benefits for organizations. An important aspect of the challenge in filling these jobs lies in the fact that enterprises need people with new skills — data management, analytics and business expertise and nontraditional skills necessary for extracting the value of big data, as well as artists and designers for data visualization.

By 2014, European Union directives will drive legislation to protect jobs, reducing offshoring by 20 percent through 2016.
An upward trend in unemployment has continued in the European Union during the ongoing financial crisis. With little expectation of a short-term recovery, Gartner expects to see the European Union introducing directives before the end of 2014 to protect local jobs. The impact of this protectionist legislation would be a net reduction of offshoring by 20 percent through 2016. This does not mean that organizations would abandon the use of global delivery models, but it would result in the rebalancing of where labor is located with such models. Opportunities would be created for firms to invest further in lower-cost parts of Europe, or in areas within their domestic location, where costs may be lower.

 By 2014, IT hiring in major Western markets will come predominantly from Asian-headquartered companies enjoying double-digit growth.
An increasing number of successful Asian companies — particularly from China and India — are enjoying double-digit growth rates and will substantially grow their geographic footprints, making significant investments in major Western markets through 2015. Consequently, these organizations will be responsible for major hiring of IT professionals to support their growth at a time when Western companies will still be coping with the impact of the economic crisis. Exacerbating the disparity between the hiring practices of Western and Asian organizations will be the increased use of industrialized IT solutions, which will further reduce the IT staffing needs of Western firms.

By 2017, 40 percent of enterprise contact information will have leaked into Facebook via employees' increased use of mobile device collaboration applications.
Facebook is one of the top five applications installed on smartphones and tablets, and many organizations are being pressured to permit interlinking with Facebook and similar products, because those products provide a high degree of leverage for new contacts. While many organizations have been legitimately concerned about the physical coexistence of consumer and enterprise applications on devices that interact with IT infrastructure, there has been little discussion about the underlying technologies that permit transfer of information between legitimate enterprise-controlled applications and consumer applications. These interactions are difficult to track, and the technologies to control the transfer are more difficult to build, deploy and manage.

Through 2014, employee-owned devices will be compromised by malware at more than double the rate of corporate-owned devices.
Corporate networks will become more like college and university networks, which were the original "bring your own device" (BYOD) environments. Because colleges and universities lack control over students' devices, they focus on protecting their networks by enforcing policies that govern network access. Gartner believes that enterprises will adopt a similar approach and will block or restrict access for those devices that are not compliant with corporate policies. Enterprises that adopt BYOD initiatives should establish clear policies that outline which employee-owned devices will be allowed and which will be banned. In the BYOD era, security professionals will need to diligently monitor vulnerability announcements and security incidents involving mobile devices and respond appropriately with policy updates.

Through 2014, software spending resulting from the proliferation of smart operational technology will increase by 25 percent.
Previously "dumb" operational devices or objects, like a vending machine, medical device, marine engine or parking meter, are now having software embedded in them, and sensors are being linked to the Internet to create and receive data streams. This machine-to-machine communication has the potential to trigger significant new software costs for four reasons: (1) because of the amount of software like light databases or operating systems embedded within large numbers of operational devices; (2) because of the traditional software vendors starting to charge license fees, in certain circumstances, if the devices even indirectly hit their applications; (3) because operational technology vendors are developing IT-like platforms and getting away from hardware sales and into annuity software sales; (4) because the people buying and paying for this may not even be in IT, are not experts in software procurement, and may make expensive mistakes signing license agreements with hidden, or not so hidden, costs and risks.

 By 2015, 40 percent of Global 1000 organizations will use gamification as the primary mechanism to transform business operations.
Seventy percent of business transformation efforts fail due to lack of engagement. Gamification addresses engagement, transparency of work, and connecting employees' actions to business outcomes. Companies apply feedback, measurement and incentives — the same techniques that game designers use, to keep players interested — to achieve the needed engagement for the transformation of business operations. Diverse industry segments are already finding gamification effective, and Gartner predicts that the worldwide market will grow from $242 million in 2012 to $2.8 billion in 2016, with enterprise gamification eclipsing consumer gamification in 2013.

By 2016, wearable smart electronics in shoes, tattoos and accessories will emerge as a $10 billion industry.
The majority of revenue from wearable smart electronics over the next four years will come from athletic shoes and fitness tracking, communications devices for the ear, and automatic insulin delivery for diabetics. Wearable smart electronics, such as fitness trackers, often come with data analysis applications or services that create useful insights for the wearer. Applications and services will create new value for consumers, especially when combined with personal preferences, location, biosensing and social information. CIOs must evaluate how the data from wearable electronics can be used to improve worker productivity, asset tracking and workflow. Wearable electronics will also provide more-detailed information to retailers for targeting advertisements and promotions.

 By 2014, market consolidation will displace up to 20 percent of the top 100 IT services providers.
A Nexus of Forces, including cloud, big data, mobility and social media, along with continued global economic uncertainty, will accelerate the restructuring of the nearly $1 trillion IT services market. By 2015, low-cost cloud services will cannibalize up to 15 percent of top outsourcing players' revenue, and more than 20 percent of large IT outsourcers not investing enough in industrialization and value-added services will disappear through merger and acquisition. This will limit and endanger the typical offshore/nearshore approach run by dedicated IT services providers and create low-cost options onshore or facilitate a globalized approach to staffing. CIOs should reevaluate the providers and types of providers used for IT services, with particular interest in cloud-enabled providers supporting information, mobile and social strategies.

About Gartner Symposium/ITxpo
Gartner Symposium/ITxpo is the world's most important gathering of CIOs and senior IT executives. This event delivers independent and objective content with the authority and weight of the world's leading IT research and advisory organization, and provides access to the latest solutions from key technology providers. Gartner's annual Symposium/ITxpo events are key components of attendees' annual planning efforts. IT executives rely on Gartner Symposium/ITxpo to gain insight into how their organizations can use IT to address business challenges and improve operational efficiency.

Additional information about Gartner Symposium/ITxpo in Orlando, is available at www.gartner.com/symposium/us. Video replays of keynotes and sessions are available on Gartner Events on Demand at www.gartnerondemand.com. Follow news, photos and video coming from Gartner Symposium/ITxpo on Facebook at http://www.facebook.com/GartnerSymposium, and on Twitter at http://twitter.com/Gartner_inc and using #GartnerSym.

Upcoming dates and locations for Gartner Symposium/ITxpo include:

October 29-31, Sao Paulo, Brazil: www.gartner.com/br/symposium
November 5-8, Barcelona, Spain: www.gartner.com/eu/symposium
November 12-15, Gold Coast, Australia: www.gartner.com/au/symposium
March 5-7, 2013, Dubai, UAE: www.gartner.com/technology/symposium/dubai/

Contact:

Christy Pettey
Gartner
+1 408 468 8312
christy.pettey@gartner.com


About Gartner:
Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. Gartner delivers the technology-related insight necessary for its clients to make the right decisions, every day. From CIOs and senior IT leaders in corporations and government agencies, to business leaders in high-tech and telecom enterprises and professional services firms, to technology investors, Gartner is the valuable partner to clients in 12,000 distinct organizations. Through the resources of Gartner Research, Gartner Executive Programs, Gartner Consulting and Gartner Events, Gartner works with every client to research, analyze and interpret the business of IT within the context of their individual role. Founded in 1979, Gartner is headquartered in Stamford, Connecticut, U.S.A., and has 5,000 associates, including 1,280 research analysts and consultants, and clients in 85 countries. For more information, www.gartner.com.

Dell’s New Tablets and PCs Push the Boundaries of Computing

 

 

Dell’s New Tablets and PCs Push the Boundaries of Computing

·         Dell Tablets in Latitude and XPS brands easily transition from content creation to consumption now available with Microsoft Windows 8

·         Tablets, Notebooks, Flip Convertibles and Modular Devices all Available Today 

·         XPS Devices bridge the divide between work and play

·         New Latitude Tablet and Notebook provide industry’s leading security and manageability

 

TORONTO, Oct. 23, 2012 Dell is ushering in the next era of computing with a redesigned portfolio of business and consumer PCs designed to take advantage of advances in new operating systems.  Built to best optimize Windows 8, Dell has crafted inspired designs that enable new user experiences and make touch computing available to more customers than ever before.  Dell today is making available for purchase the XPS 10 tablet, Latitude 10 tablet, Latitude 6430u Notebook, OptiPlex 9010 All-in-One with touch and the Inspiron 15z. These new systems join the XPS 12 convertible, XPS One 27 All-in-One with touch and Inspiron One 23 All-in-One with touch which were announced last week. 

 

The new offerings free customers from carrying multiple devices, helping them save time and be more productive. The gorgeous and durable designs offer unparalleled security and manageability, empowering users to keep pace in an always-connected world.  .   

 

The combination of new Dell hardware and Microsoft software will allow customers to create and consume content in new and exciting ways,” said Sam Burd, Vice President and General Manager Personal Computer Product Group. “We’re unveiling a comprehensive refresh of all our consumer and commercial products to take advantage of Windows 8.  These stylish new products include clean and intuitive touch experiences, the security and manageability required by IT departments, and features to allow anytime, anywhere access to data and applications.”

 

New Dell Tablets: Built for Work & Play

The XPS 10 is designed for mobile professionals and delivers a tablet experience that enhances work productivity and life experience. Offering uncompromised design for on-the-go content creation and consumption, the XPS 10 delivers laptop-like productivity in a tablet so users can fluidly transition from work projects to their personal pursuits. Dell understands that time is precious; the HD multi-touch display with split screen capability is ideal for multitasking, while an optional mobile keyboard dock features a full-sized keyboard, touchpad, ports, stereo speakers and an extra battery for maximum productivity and collaboration.  The XPS 10 is powered by Microsoft Windows RT and dual-core ARM architecture. 

 

The 10-inch Latitude 10 tablet fits simply and securely into existing IT environments and offers rich multi-media features, accessory compatibility, and full compatibility with current Windows applications. Like all products in Dell’s commercial laptop line, the Latitude 10 plugs easily into existing management consoles, features a swappable battery and touts robust optional security features such as Dell Data Protection | Encryption for encryption from the hard drive to USB port.

 

For industries such as healthcare and government, the new tablet will feature an optional fingerprint and smart card reader for two-factor authentication; available in early 2013. The Latitude 10 also offers up to 18 hours of battery life and an optional productivity dock and active stylus. Ideal for work and great for home, the Latitude 10 will be available for purchase to all customers.

 

Making the Enterprise Cool

The Latitude 6430u, Dell’s first business Ultrabook, is the perfect balance between aesthetic and corporate needs with the combination of a thin, highly-mobile form factor with striking design and the security, manageability and durability companies require.  The Latitude 6430u is a highly manageable notebook in addition to being the most durable, having undergone a broader set of United States’ Military’s MIL-STD 810G standard tests than any other system in its class. The Latitude 6430u is the first to offer a wireless docking based on WiGig technology, which allows devices to communicate wirelessly at multi-gigabit speeds for data, video, and audio. With 10 hours of battery life on a single battery charge, the Latitude 6430u delivers all day battery life, crucial for road warriors and on-the-go executives.

 

The sleek 23-inch OptiPlex 9010 All-in-One empowers productivity while preserving limited desk space. As businesses incorporate touch interfaces into work environments, collaboration and productivity can increase; however, some workers have space limitations. The business-class All-in-One offers options for a multipoint touchscreen, fixed or rotating camera and an articulating stand and is optimized for Microsoft Lync to enhance the user’s work experience with Windows 8.   

 

New Touchscreen Experiences for the Holidays

Dell is also unveiling the Inspiron 15z Ultrabook just in time for the holidays.  The Ultrabook has an optional touchscreen interface and packs loads of features into a svelte silhouette, perfect for those who want “more” – more display size, more entertainment options, and more processing power. Measuring less than 1-inch thick, the Inspiron 15z boasts plenty of performance, great battery life and responsiveness, along with an attractive aluminium finish.

 

Dell is not only designing great tablets and PCs for Windows 8, it also is updating its line of computing peripherals.  Dell is making available a 23-inch S2340T multi-touch monitor and TP713 wireless touchpad designed specially to extend the Windows 8 experience. The S2340T is Dell’s first multi-touch monitor, designed to maximize a media entertainment experience with beautiful aesthetics, performance and a multi-position, 90-degree articulating stand. Unlike most other touchpads, the TP713 has a full-touch work surface that extends across the entire device top, allowing users to swipe and scroll with ease.  Users can place multiple fingers on the smooth, durable glass touch surface; the multi-touch functionality provides expanded capabilities when using the new apps on Windows 8.   Seamless and intuitive to use, the S2340T monitor and the TP713 wireless touchpad bring Windows 8 alive across Dell’s entire range of work systems, helping users tackle projects with efficiency and productivity. 

 

Quotes:

“Dell continues to address the requirements of consumers who desire innovative blends of style and performance, and IT which needs to support flexible, yet controlled, computing environments,” said Charles King, president and principal analyst, Pund-IT, Inc. “The new Windows 8-based XPS, Latitude and OptiPlex lineups should certainly appeal to consumers and IT alike. Dell’s solutions are designed to support the core security and manageability processes which concern business IT and are key to fulfilling the promise of BYOD.”

 

Availability and Pricing:

The following systems are available for purchase today for delivery beginning this week: 

·         XPS One 27 with touch – starting at $1599.99 CDN

·         XPS13 – starting at $999.99 CDN

·         S2340T multi-touch monitor – starting at $699.99 CDN

·         TP713 wireless touchpad – starting at $69.99 CDN

 

The following products are available for purchase today and delivery in the coming days and weeks:

·         XPS 12– starting at $1,199.99 CDN

·         XPS 10 tablet – starting at $499 CDN

·         Latitude 10 tablet – starting at $749 CDN

·         Latitude 6430u – starting at $999 CDN

·         OptiPlex 9010 All-in-One with touch– starting at $1299 CDN

·         Inspiron 15z– starting at $699.99 CDN ($899.99 CDN with touch)

 

For more information and product images please visit Dell’s virtual press kit.

 

Additionally, all currently shipping Dell PCs and Precision workstations are now available with Windows 8 for pre-order on www.dell.ca.

 

About Dell

Dell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.ca.

 

Dell World

Join us at Dell World 2012 – The Power to Do More. Technology professionals will learn from one another and identify key challenges and opportunities connected to the top forces changing business today. Learn more at www.DellWorld.com or follow #DellWorld on Twitter.

 

Dell, XPS, Inspiron, Latitude and OptiPlex are trademarks of Dell Inc.  Dell disclaims any proprietary interest in the marks and names of others.

 

 

Media  Contacts:

Janet Fabri

Dell

+1 (416) 758-3398

Janet_fabri@dell.com

Melissa Lee

Cohn & Wolfe

+1 (416) 259-3266

Melissa.lee@cohnwolfe.ca

 

 

 

 

 























































































































 

 

 

Microsoft Simplifies Big Data for the Enterprise

Microsoft Simplifies Big Data for the Enterprise
Oct. 24, 2012
New Apache Hadoop-compatible solutions for Windows Azure and Windows Server enable customers to easily extract insights from big data.

NEW YORK — Oct. 24, 2012 — Today at the O’Reilly Strata Conference + Hadoop World, Microsoft Corp. announced new previews of Windows Azure HDInsight Service and Microsoft HDInsight Server for Windows, the company’s Apache Hadoop-based solutions for Windows Azure and Windows Server. The new previews, available today at http://www.microsoft.com/bigdata, deliver Apache Hadoop compatibility for the enterprise and simplify deployment of Hadoop-based solutions. In addition, delivering these capabilities on the Windows Server and Azure platforms enables customers to use the familiar tools of Excel, PowerPivot for Excel and Power View to easily extract actionable insights from the data.

“Big data should provide answers for business, not complexity for IT,” said David Campbell, technical fellow, Microsoft. “Providing Hadoop compatibility on Windows Server and Azure dramatically lowers the barriers to setup and deployment and enables customers to pull insights from any data, any size, on-premises or in the cloud.”

The company also announced today an expanded partnership with Hortonworks, a commercial vendor of Hadoop, to give customers access to an enterprise-ready distribution of Hadoop with the newly released solutions.

“Hortonworks is the only provider of Apache Hadoop that ensures a 100 percent open source platform,” said Rob Bearden, CEO of Hortonworks. “Our expanded partnership with Microsoft empowers customers to build and deploy on platforms that are fully compatible with Apache Hadoop.”

More information about today’s news and working with big data can be found at http://www.microsoft.com/bigdata.

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.

Note to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://www.microsoft.com/news. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://www.microsoft.com/news/contactpr.mspx.

Cisco Global Cloud Index Forecasts Cloud Traffic to Grow Sixfold by 2016

Cisco Global Cloud Index Forecasts Cloud Traffic to Grow Sixfold by 2016

SAN JOSE, Calif. – Oct. 23, 2012 – In the second annual Cisco® Global Cloud Index (2011-2016) issued today, Cisco forecasts global data center traffic to grow fourfold and reach a total of 6.6 zettabytes annually by 2016. The company also predicts global cloud traffic, the fastest-growing component of data center traffic, to grow sixfold – a 44 percent combined annual growth rate (CAGR) – from 683 exabytes of annual traffic in 2011 to 4.3 zettabytes by 2016.

For context, 6.6 zettabytes is equivalent to:

  • 92 trillion hours of streaming music – Equivalent to about 1.5 years of continuous music streaming for the world's population in 2016.
  • 16 trillion hours of business Web conferencing – Equivalent to about 12 hours of daily Web conferencing for the world's workforce in 2016.
  • 7 trillion hours of online high-definition (HD) video streaming – Equivalent to about 2.5 hours of daily streamed HD video for the world's population in 2016.

The vast majority of the data center traffic is not caused by end users but by data centers and cloud-computing workloads used in activities that are virtually invisible to individuals. For the period 2011-2016, Cisco forecasts that roughly 76 percent of data center traffic will stay within the data center and will be largely generated by storage, production and development data. An additional 7 percent of data center traffic will be generated between data centers, primarily driven by data replication and software/system updates. The remaining 17 percent of data center traffic will be fueled by end users accessing clouds for Web surfing, emailing and video streaming.

From a regional perspective, the Cisco Global Cloud Index predicts that through 2016, the Middle East and Africa will have the highest cloud traffic growth rate, while the Asia Pacific region will process the most cloud workloads, followed by North America.

 

Overview:

  • The Cisco Global Cloud Index (2011-2016) was developed to estimate global data center and cloud-based Internet Protocol (IP) traffic growth and trends. The Cisco Global Cloud Index serves as a complementary resource to existing network traffic studies, providing new insights and visibility into emerging trends affecting data centers and cloud architectures. The forecast becomes increasingly important as networks and data centers become more intrinsically linked in offering cloud services.
  • The Cisco Global Cloud Index includes a "workload transition" forecast, which shows the workload shifting from traditional data centers to more virtualized cloud servers.
  • The forecast also includes a supplement on Cloud Readiness Regional Details, which examines the fixed and mobile network abilities of each global region (from nearly 150 countries) to support business and consumer cloud-computing applications and services.
  • The Cisco Global Cloud Index is generated by modeling and analysis of various primary and secondary sources, including 40 terabytes of traffic data sampled from a variety of global data centers over the past year; results from more than 90 million network tests over the past two years; and third-party market research reports.

 

Key Highlights/Findings:

  • Cloud traffic growth by region: The Middle East and Africa will have the highest cloud traffic growth rate from 2011 to 2016: The Cisco Global Cloud Index now includes regional forecast data for cloud traffic growth.
  • In 2011, North America generated the most cloud traffic (261 exabytes annually); followed by Asia Pacific; (216 exabytes annually); and Western Europe (156 exabytes annually).
  • By 2016, Asia Pacific will generate the most cloud traffic (1.5 zettabytes annually); followed by North America (1.1 zettabytes annually); and Western Europe (963 exabytes annually).
  • From 2011 to 2016, Cisco foresees the Middle East and Africa as having the highest cloud traffic growth rate (79 percent CAGR); followed by Latin America (66 percent CAGR); and Central and Eastern Europe (55 percent CAGR).
  • Workload growth by region: By 2016, Asia Pacific will have processed the most cloud workloads, followed by North America: The Cisco Global Cloud Index now includes regional forecast data for workload growth.
    • In 2011, North America had the most cloud workloads (8.1 million, or 38 percent of the global cloud workloads); followed by Asia Pacific, which had 6.7 million, or 32 percent of the global workloads in 2011.
    • By 2016, Asia Pacific will process the most cloud workloads (40.6 million, or 36 percent of the global cloud workloads); followed by North America, which will have 17.4 million, or 26 percent of the global workloads in 2016.
    • From 2011 to 2016, the Middle East and Africa region is expected to have the highest cloud workload growth rate (73 percent CAGR); followed by Latin America (60 percent CAGR); and Central and Eastern Europe (50 percent CAGR).
    • In North America, traditional data center workloads will actually decline from 2011 to 2016 (from 18.3 million in 2011 to 17.4 million in 2016), falling to a negative 1 percent CAGR.
  • Global data center traffic growth will increase fourfold by 2016. Cisco forecasts that global data center traffic will nearly quadruple, from 1.8 zettabytes in 2011 to 6.6 zettabytes annually in 2016, representing a 31 percent CAGR.
  • Global cloud traffic will account for nearly two-thirds of total global data center traffic. Globally, cloud traffic will grow from 39 percent (57 exabytes per month and 683 exabytes annually) of total data center traffic in 2011 to 64 percent (almost two-thirds - 355 exabytes per month and 4.3 zettabytes annually) of total data center traffic in 2016.
  • Global cloud traffic will grow faster than overall global data center traffic. The transition to cloud services is driving global cloud traffic at a growth rate greater than global data center traffic. Global data center traffic will grow fourfold (a 31 percent CAGR) from 2011 to 2016, while global cloud traffic will grow sixfold (a 44 percent CAGR) over the same period.
  • Workload transitions: From 2011 to 2016, data center workloads will grow 2.5-fold; cloud workloads will grow 5.3-fold. In 2011, 30 percent of workloads were processed in the cloud, with 70 percent being handled in a traditional data center.
    • 2014 will be the first year when the majority of workloads shift to the cloud; 52 percent of all workloads will be processed in the cloud versus 48 percent in the traditional IT space.
    • By 2016, 62 percent or nearly two-thirds of total workloads will be processed in the cloud.
    • The average workload per physical cloud server will grow from 4.2 in 2011 to 8.5 by 2016. In comparison the average workload per traditional data center physical server will grow from 1.5 in 2011 to 2.0 in 2016.
  • Cloud readiness: Asia Pacific, Central and Eastern Europe, North America, and Western Europe can currently support advanced cloud-computing applications over fixed networks; currently, only Western Europe has average network performance to support intermediate cloud-computing applications over mobile networks. To assess cloud readiness, various fixed and mobile network attributes were analyzed. Average upload and download speeds and average latency were assessed across each of the following geographic regions: Asia Pacific, Central and Eastern Europe, Latin America, Middle East and Africa, North America, and Western Europe.
  • From a fixed network perspective, the average network performance characteristics for the Middle East and Africa and Latin America can currently support intermediate cloud-computing applications such as high-definition video streaming and video chat applications.
  • The average fixed broadband performance for Asia Pacific, Central and Eastern Europe, North America, and Western Europe can currently support advanced cloud-computing applications such as 3-D video streaming and high-end virtual office services. Note: Some countries within every region have average fixed network capabilities to support advanced cloud computing applications today.
  • From a mobile network perspective, only the average network performance characteristics for Western Europe were sufficient to support intermediate cloud-computing applications today.
  • The average mobile broadband performance for all other regions can support basic cloud-computing applications, such as web surfing and text communications. Note: Some countries within every region can support intermediate mobile cloud services today. Hungary is the only country that can support advanced mobile cloud services today.

Supporting Quotes:

  • Doug Merritt, senior vice president, Corporate Marketing, Cisco

"As cloud traffic continues to proliferate in a new world of many clouds, the Cisco Global Cloud Index provides all cloud computing stakeholders with a very valuable barometer to make strategic, long-term planning decisions. This year's forecast confirms that strong growth in data center usage and cloud traffic are global trends, driven by our growing desire to access personal and business content anywhere, on any device. When you couple this growth with projected increases in connected devices and objects, the next-generation Internet will be an essential component to enabling much greater data center virtualization and a new world of interconnected clouds."

Embedded Videos:    

Supporting Resources:

Editor's Note:

  • Cisco welcomes analysts, bloggers, media, regulators, service providers, and other interested parties to use and reference Cisco's research with proper attribution: "Source: Cisco Global Cloud Index."

Tags/Keywords:

  • Cisco, Global Cloud Index, Data Center Traffic, Cloud Traffic, Cloud, Cloud Computing, Data Center, Virtualization, Service Provider, Telecom, Enterprise, Consumer, Zettabytes

Cisco "The Network" RSS Feeds:

About Cisco:
Cisco (NASDAQ: CSCO) is the worldwide leader in networking that transforms how people connect, communicate and collaborate. Information about Cisco can be found at http://www.cisco.com. For ongoing news, please go to http://newsroom.cisco.com.

#   #   #

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.

Canadian companies realize the opportunity with mobile and social media but slow to capitalize on it: PwC

All talk? Canadian companies realize the opportunity with mobile and social media but slow to capitalize on it: PwC

TORONTO, October 23, 2012 — Eighty-one per cent of Canadian private companies say they want to grow and expand, relying primarily on sales and marketing as well as gaining market share from their competitors to do so — however, they could be using mobile and social media in better ways to help get them there. This is according to PwC’s 2012 Business Insights Survey. The report, released today, surveyed over 400 Canadian private companies CEOs on the major issues affecting their business growth.

Companies are on the right track: more than half (53%) say that mobile computing is their priority when it comes to technology development, while almost half (47%) also say they plan to use social media for sales and marketing purposes.

“Mobile and social media platforms are transforming the way business gets done,” says Tahir Ayub, PwC’s Canadian Private Company Services Leader. “If Canadian private company leaders are looking to grow their top line, they need to have a very good understanding of technology in general – but if they don’t, they need to invest the time in overcoming that learning curve because it’s a business imperative.”

But despite the majority’s desire to invest in mobile and social media, only 13% of CEOs who are using social media plan to use it to develop new products. Aayaz Pira, Director, Management and Technology Consulting, PwC, says, “This is a huge missed opportunity. Social media gives consumers a voice to be part of the business and the ability to collaborate with companies to develop the products and services they want.”

A quarter of Business Insights respondents also say they have no plans to invest in mobile and even more than that (28%), say they don’t plan to use social media at all. Pira says, “This reflects organizations unaware of the factors involved with managing social media, such as cost and labour, the lack of knowledge around the return on investment, and being weary of risks associated with social media.”

“Businesses need to make an investment in social media before than can determine the overall return. In order for them to be effective and stay head of their competitors, they need to continue to innovate by embracing and using social media and other digital technologies,” adds Pira.

Catering to customers
Personalized services, such as having immediate access to a service or completing a retail transaction at anytime, is key for customers and in the next year, 41% of private-held companies plan to optimize their websites for mobile and 24% aim to create a mobile application. Many of these will be tailored to suit consumer preferences.

Ayub says that companies need to do a better job of listening to customers because it is one of the most important ways to help ensure a company’s success and to differentiate it from competitors. A quarter of this year’s respondents are using social media to hear what customers have to say.

“Each customer wants to be viewed as the most important one to a company, this means companies need to do more to understand their preferences, their feelings about the brand and how they want to engage with the company,” says Ayub.

Closing the labour gap
With labour shortages and the recruitment of skilled staff as one of the top three issues for private companies in the next 12 months, social media can be a powerful way to attract and retain new talent. Thirty-four per cent of respondents plan to use social media to do just that.

“Social media allows companies to take a targeted approach to finding the right talent and speaks directly to Millennials, a demographic group that has grown up with technology,” says Pira. “Millennials expect to use the same technology in their personal and professional life in order to be productive in their jobs. If they realize companies are not using social media inside the organization, it’s going to be difficult to retain that talent.”

In terms of employee engagement, only 16% of respondents using social media plan to use it to foster internal collaboration. Pira says this is another area of improvement for private company leaders as employees are ‘selfsumers’ – they have their own technology preferences enabling them to work more efficiently and they enjoy working together using social networks.

“The ability to collaborate and create new ideas with peers and companies in real time is quickly becoming one of the key differentiators between companies that can vs. companies that can’t,” adds Pira.

Driving change from the top
For organizations to innovate and initiate change, the push has to start from the top. Seventy-seven per cent of company leaders clearly communicate their company’s business focus on innovation as a priority.

“Organizations and people are naturally resistant to change,” says Mr. Ayub. “And what has the greatest impact on that is the leader of a company. When leadership embraces and rewards change, it cascades down throughout the organization, regardless of its size.”

Mr. Ayub adds, “Leaders set the vision, encourage, engage, inspire and establish the culture that says it’s okay to fail, to try new things, to improve, do better and ultimately perform better.”

For more information on the 2012 Business Insights Survey, please visit http://www.pwc.com/ca/businessinsights.

About Business Insights
The eighth annual Business Insights®: Survey of Canadian Private Companies examines issues affecting privately held companies including ownership, foreign markets, current & future performance, innovation, leadership and talent. In the summer of 2012, we surveyed over 400 leaders of Canadian privately-held companies from a broad range of industries. Data is also available for the 406 respondent companies by revenue, number of employees, age and region. For more information, please visit: www.pwc.com/ca/businessinsights.

Follow PwC on Twitter at @PwC_Canada_LLP and on Facebook at http://www.facebook.com/pwccanada.

About PwC’s Private Company Services (PCS)
More than 65% of PwC Canada's clients are private companies, ranging from high net worth individuals to owner-managed family businesses and large, professionally-managed businesses. PwC's Private Company Services (PCS) group is a dedicated team of business advisors who help private company owners resolve day-to-day business issues and achieve long-term success. PCS offers the perspective of a third party with professional industry knowledge, business consulting, tax and accounting expertise. For more information about PwC's Private Company Services, please visit www.pwc.com/ca/private.

About PwC Canada
PwC Canada helps organizations and individuals create the value they’re looking for. More than 5,700 partners and staff in offices across the country are committed to delivering quality in assurance, tax, consulting and deals services. PwC Canada is a member of the PwC network of firms with close to 169,000 people in 158 countries. Find out more by visiting us at www.pwc.com/ca.

© 2012 PricewaterhouseCoopers LLP, an Ontario limited liability partnership. All rights reserved.

Strategy Analytics Research Study finds the BlackBerry Enterprise Solution to have lowest Total Cost of Ownership

Strategy Analytics Research Study finds the BlackBerry Enterprise Solution to have lowest Total Cost of Ownership

Study over one year shows that securely managing non-BlackBerry devices using a ‘Walled Garden’ approach is 39% more expensive

According to a new research study from Strategy Analytics, the BlackBerry® Enterprise Solution not only provides the most secure mobile platform but also the lowest total cost of ownership (TCO) for mobile deployments.

The study, commissioned by Research In Motion (RIM) (NASDAQ: RIMM; TSX: RIM), considered typical industry best practices, using the UK government as an example. The entire mobile solution was examined, including device management and devices themselves for a 100 user smartphone deployment running at IL2*, the minimum security standard for all Government departments including schools, health departments and local government. It compared two recommended approaches to mobility: the BlackBerry Enterprise Solution and a ‘Walled Garden’ approach to mobility where any non-BlackBerry device is given VPN access to a secure limited zone on a network and is managed by third-party mobile device management software. After one year, the cost to securely manage non-BlackBerry devices using a Walled Garden architecture was found to be 39% more expensive than BlackBerry devices in a BlackBerry Enterprise Server (BES) deployment. The analysis further indicated that a Walled Garden approach would continue to cost more than the BlackBerry solution in subsequent years. 

“This study highlights that the cost of setting up and managing devices using a ‘Walled Garden’ architecture is more expensive than using BlackBerry Enterprise Server with BlackBerry smartphones,” said Andrew Brown, Director of Enterprise Research at Strategy Analytics. “When looking to define a cost-efficient, long-term enterprise mobility strategy, we would caution all organisations across both the public and private sectors to look at the total cost of supporting multiple devices with multiple operating systems over several years.”

Strategy Analytics also assessed the security of the BlackBerry® 7, Apple iOS® 5, Symbian S60 and Windows Phone 7 (WP7) operating systems, using eleven key threats as a framework. The BlackBerry solution proved the most secure, scoring a low-threat level in ten of the eleven categories. The report also found that the end-to-end architecture of the BlackBerry solution, including encryption for data-at-rest and in transit, mitigates the maximum amount of risk and offers essential support for corporate IT policies.

“OEMs and device OS manufacturers need to ensure greater technical controls on their platforms to limit platform vulnerabilities and other operating systems have a long way to go before they can be considered viable options,” concluded Brown.

Scott Totzke, Senior Vice President, BlackBerry Security Group at RIM said, “As the only mobile solution to be approved by the UK government to protect material classified up to and including ‘Restricted’, the BlackBerry Enterprise Solution continues to set the standard for mobile security. This research study also further underlines that at a time when all types of organisations are looking to drive efficiencies, the BlackBerry solution remains the most cost-effective enterprise mobility option.”

For a copy of the full report, please visit:   http://uk.blackberry.com/business/StrategyAnalyticsReport.pdf

Notes to editors  *Excerpts and tables from Strategy Analytics report follow below:

As with most businesses, Levels IL2, IL3 require adherence to so-called “CIA” standards, where Confidentiality (C) means that data cannot be eavesdropped or stolen, Integrity (I) means that data cannot be changed or corrupted, Availability (A) means that in the presence of certain kinds of attacks the system retains its ability to provide communications services.

IL2 is the security level which the UK Government believes that all service providers should be operating at and should be implemented across the public sector. IL3, with its requirement for enhanced data security (C, I) carries more stringent and potentially expensive requirements, necessary to maintain the confidentiality and integrity of data.

The optimal solution encompasses a layered security approach. A solution should incorporate:

· High level cryptographic standards such as AES 256 and/or Triple DES and can take account of securing data in transit and data at rest.

· Device Operating Systems must be secured using comprehensive device management, encompassing a comprehensive range of IT polices that can be enforced through a central, administrative console.

· Devices themselves need a high number of technical controls that do not require user intervention and can be administratively controlled; a reliance on procedural or manual controls opens the way for a higher degree of residual risk.

TABLES:

Figure 9: Strategy Analytics: Operating System Threat Analysis Summary

Strategy Analytics: Operating System Threat Analysis Summary

Source: Strategy Analytics

Overall TCO for Year 1 & Year N:  BlackBerry & Walled Garden Architecture (100 Users)

Overall TCO for Year 1 & Year N: BlackBerry & Walled Garden Architecture (100 Users)

Source: Strategy Analytics

About Research In Motion

Research In Motion (RIM), a global leader in wireless innovation, revolutionized the mobile industry with the introduction of the BlackBerry® solution in 1999. Today, BlackBerry products and services are used by millions of customers around the world to stay connected to the people and content that matter most throughout their day. Founded in 1984 and based in Waterloo, Ontario, RIM operates offices in North America, Europe, Asia Pacific and Latin America. RIM is listed on the NASDAQ Stock Market (NASDAQ: RIMM) and the Toronto Stock Exchange (TSX: RIM). For more information, visit www.rim.com or www.blackberry.com.

Forward-looking statements in this news release are made pursuant to the "safe harbor" provisions of the U.S. Private Securities Litigation Reform Act of 1995 and applicable Canadian securities laws. When used herein, words such as "expect", "anticipate", "estimate",  "may",  "will", "should", "intend," "believe", and similar expressions, are intended to identify forward-looking statements. Forward-looking statements are based on estimates and assumptions made by RIM in light of its experience and its perception of historical trends, current conditions and expected future developments, as well as other factors that RIM believes are appropriate in the circumstances. Many factors could cause RIM's actual results, performance or achievements to differ materially from those expressed or implied by the forward-looking statements, including those described in the "Risk Factors" section of RIM's Annual Information Form, which is included in its Annual Report on Form 40-F (copies of which filings may be obtained at www.sedar.com or www.sec.gov). These factors should be considered carefully, and readers should not place undue reliance on RIM's forward-looking statements. RIM has no intention and undertakes no obligation to update or revise any forward-looking statements, whether as a result of new information, future events or otherwise, except as required by law.

The BlackBerry and RIM families of related marks, images and symbols are the exclusive properties and trademarks of Research In Motion Limited.  RIM, Research In Motion and BlackBerry are registered with the U.S. Patent and Trademark Office and may be pending or registered in other countries. All other brands, product names, company names, trademarks and service marks are the properties of their respective owners. RIM assumes no obligations or liability and makes no representation, warranty, endorsement or guarantee in relation to any aspect of any third party products or services.