Tuesday, January 12, 2016

Diablo Raises $19 Million, Appoints New CEO

Diablo Technologies, a start-up developing flash memory technology, secured an additional $19 million in capital for its Series C Financing round.

Diablo's technology is able to deliver flash-as ‘system memory’ without any changes to server hardware, operating systems, or end-user applications. The resulting Memory1 platform provides greater memory capacity with fewer servers and lowers data center costs by up to 70 percent.

In addition, the company named Mark Stibitz as its new Chairman and Chief Executive Officer. He has previously worked at Anobit, Elliptic Technologies, PMC-Sierra, Agere Systems and Lucent/AT&T-Microelectronics. Stibitz assumes this position after having served as an independent member of Diablo’s Board of Directors since February 2012. Diablo Co-founder and previous CEO, Riccardo Badalone, has been appointed the technology-centric and customer-facing role of Chief Product Officer.

The new funding was led by new investor ICV with participation from Battery Ventures, BDC Capital, Celtic House, and Hasso Plattner Ventures. The funding will be used to further accelerate customer deployments via expansion of sales, applications support and R&D.

http://www.diablo-technologies.com/


  • Diablo Technologies has developed a Memory Channel Storage (MCS) technology that provides tens of terabytes of ultra-fast NAND flash storage in a DIMM form factor, and enables it to interface with the CPU via DDR3 at near-DRAM speeds. The company says its Memory Channel Storage allows for extremely large "big data" sets to be placed entirely within the NUMA system architecture, resulting in real-time processing and analytics. MCS significantly minimizes storage latency and provides a level of predictability that cannot be attained with pre-existing flash storage technologies. With the MCS architecture, systems in big data clusters, such as Hadoop, have access to terabytes of deterministic, ultra-low latency persistent memory.

Converged Memory Acceleration: Combining DRAM with Flash


In this 3-minute video, Riccardo Badalone, CEO of Diablo Technologies, discusses Converged Memory -- a powerful new concept that combines the best performance attributes of DRAM with the advantages of Flash, including persistence and low cost.

Diablo's NanoCommit technology supports hundreds of millions of transactions per second, with nanosecond latency.

Click to view on YouTube - http://youtu.be/LV5BtBO11u0

PCCW Global Picks CPLANE to Orchestrate OpenStack Cloud Services

PCCW Global has selected CPLANE NETWORKS’ OpenStack Product Suite to provide its worldwide Multi-Site and Multi-Tenant Networking and Lifecycle Service Orchestration for components of its distributed cloud offering.

PCCW Global’s Inter-Domain Cloud Federation solution allows customers to quickly and easily build clouds that span multiple sites using a self-service interface. The customer can continue to adjust their compute, storage, and network connectivity configuration to meet dynamic business and operational demands across multiple continents.

CPLANE’s Dynamic Virtual Networks – Data Center (DVNd) product provides a scalable solution for OpenStack SDN Networking where high-performance virtual machine communication, operational ease of use, service assurance, and seamless integration across multi-site and worldwide OpenStack deployments are required.

CPLANE’s Multi-Site Manager (MSM) consolidates multiple requests from PCCW Global’s customer portal and OSS/BSS environments while simultaneously orchestrating OpenStack cloud provisioning across multiple sites. MSM then creates a single cloud image by automatically provisioning an Overlay Gateway Router at each site to provide secure connectivity across the wide area network.

“A crucial aspect of multi-site cloud orchestration is assuring the creation of a single view of the customer. DVNd provides seamless network integration across OpenStack networks instances and helps extend them to other cloud-based service providers. MSM federates the customer image across all sites, and then synchronizes and orchestrates the service requests from the various front-end systems. CPLANE’s rich northbound API services, combined with the transactional integrity and operational visibility of our carrier-grade service orchestration platform, ensure that all OpenStack service requests are completed quickly and reliably across multiple sites,” said John Casey, CTO, CPLANE NETWORKS.

http://www.cplanenetworks.com

Wind River Intros Helix Cockpit for Automotive Controls

Wind River introduced an automotive software platform for the command center of the connected car.

The Wind River Helix Cockpit, which is a GENIVI-aligned, Linux Yocto Project–based software platform, incorporates technologies from consumer-oriented embedded devices such as infotainment, telematics, and digital cluster systems; safety-oriented systems such as advanced driver assist systems (ADAS) and autonomous driving systems; and cloud-based development tools and enhancements for the applications.

Key features for Cockpit include the following:

  • Connectivity framework: Integrated connectivity solutions help to extend and bridge the car experience to the IoT devices and landscape, including the cloud.
  • Firmware and software over-the-air (OTA) management: Cockpit includes the ability to manage and update software over-the-air throughout its lifecycle.
  • Flexible platform: Flexibility in car system design, from consolidated to distributed architecture, allows functional services to be distributed across ECUs.
  • Long term support: A secure Linux base from the market leader in commercial embedded Linux allows for extensibility over time with evolving IoT offerings, protocols, and developments.
  • Built-in security: Security Profile for Wind River Linux delivers secure data handling from boot to run time.

Wind River has also updated its software for ISO 26262 certifiable automotive safety-critical applications, Wind River Helix Drive. Cockpit and Drive are the latest offerings under Wind River Helix Chassis.

“The emergence of IoT is pushing automotive systems to become more connected within and outside of the car through the use of software. As such, carmakers must have a strong grasp of the holistic software environment in order to orchestrate a successful vision of the connected car,” said Marques McCammon, general manager of connected vehicles at Wind River. “Wind River Helix Cockpit provides carmakers with the framework to fully own the software environment and realize their vision. By turning to Wind River’s decades of embedded software leadership and rich technology expertise in mission-critical industries such as aerospace and defense, the auto industry can quickly become software savvy and begin their IoT transformation.”

http://www.windriver.com

AT&T Supplies Cloud Connectivity for FCC

AT&T was awarded a 5-year contract by the FCC to provide an IP solution that will support mobile and cloud-based applications.

AT&T said its secure service will link a number of offices and data centers and let the FCC change network and Internet needs on demand. Using AT&T's services, the FCC can connect to diverse cloud service providers.

"Our set of strategic services can help the FCC modernize its technology and use cloud services in a highly secure manner," said Mike Leff, vice president-Civilian, AT&T Government Solutions.

http://www.att.com

MultiPhy Raises $17 Million for 100/400G DSP-ICs

MultiPhy, which specializes in digital-signal-processing based integrated circuits for high-speed communications, announced $17 million in new funding from existing and new investors, comprising of both venture capitalists and major strategic corporate leaders. The company supplies 100 Gbps and 400 Gbps CMOS chipsets with advanced modulation schemes.

“We are pleased to have such a strong vote of confidence from both our investors and the industry”, said Avi Shabtai, CEO at MultiPhy. “The commitment and support of our investors sends a clear message that MultiPhy is the leading player in high speed 100G single lambda Data Center connectivity. As the market sets clear demand for significant increase in throughput connectivity and cost effectiveness, we expect single lambda 100G modules to become the mainstream with millions of ports deployed worldwide.”

http://www.multi-phy.com/en-us/newsevents/pressreleases/prmultiphyraises17million.aspx


U.S. Army Implements Secure Command Post Wi-Fi from Aruba

The U.S. Army is implementing secure Command Post Wi-Fi from Aruba at Army, Army National Guard, and Army Reserve Tactical Units worldwide.

Fielded as part of the Army’s Warfighter Information Network-Tactical Increment 1 (WIN-T), the U.S. Army’s tactical communications network backbone, the deployment of Aruba 802.11ac wireless infrastructures will reduce the time it takes to install and dismantle critical communications networks from hours to minutes, increasing force agility by expediting the mobility of troops when needed.

The NSA-accredited unclassified and classified secure Command Post Wi-Fi solution is being supplied to the Army as kits. Each kit will include Aruba indoor and outdoor Gigabit Wi-Fi access points (APs), which deliver high performance in high-density environments, 7000 Series Cloud Services Controllers with RFProtect, Policy Enforcement Firewall and Advanced Cryptography, and AirWave for network management. The kits have been purchased through the CHS4 contract.

“Operational flexibility is critical to modern military practices,” said Jon Green, Senior Director of Security Architecture for Aruba. “Aruba’s Command Post Wi-Fi solution gives armed forces the maneuverability they need, backed by the secure, robust network access they require, to accomplish their missions and achieve their objectives.”

http://www.arubanetworks.com

Radisys Sees Preliminary Q4 Revenue at High End of Guidance

Radisys reported preliminary results for its Q4 2015, saying it now expects revenue to be approximately $44 million and non-GAAP earnings of approximately $0.08 per diluted share -- at the high end of the company's previous guidance.

“We continue to build momentum across all of our product lines as customers look to Radisys to solve implementation challenges for next-generation communications networks, including VoLTE and the key building blocks for Software-Defined Networks,” commented Brian Bronson, Radisys President and Chief Executive Officer. “Our performance during the quarter enabled us to exceed the full year revenue and earnings expectations that we set at the beginning of 2015, while also supporting incremental investments in key growth product lines to set the stage for growth in 2016 and beyond.”

http://www.radisys.com


Monday, January 11, 2016

Blueprint: What’s Coming in 2016 and Beyond for Cybersecurity

by Vincent Weafer, VP of Intel Security’s McAfee Labs, Intel Corporation

A five-year look ahead at how cybersecurity is likely to evolve

Clouds, devices, and sophistication are three of the big areas that will affect cyber threats and security over the next five years, according to McAfee Labs 2016 Threats Predictions report. Cloud applications, storage, and services are converging with rapid growth in mobile and connected devices to create an ever-expanding attack surface. At the same time, increasing sophistication and sharing among cybercriminals is making attacks more targeted and harder to detect. These issues will drive significant changes in cybersecurity over the next five years, including transformation of the efficiency and effectiveness of defenses, broader threat intelligence collaboration, and sophisticated behavioral analytics.

Criminals follow the money, so as long as we have valuable digital assets, we will have cybercrime. The increasing attack surface gives them more vectors of attack and increasingly valuable assets. The value of personal data is growing rapidly, and is already outpacing payment card info as the prime target. This trend will only continue, as criminals apply big data techniques to build warehouses of personal information for sale.

The increasing sophistication of attackers and malware developers will have an interesting effect, as they develop more targeted and stealthy attacks, but also deliver packaged cybercrime-as-a-service tools to a growing audience possessing fewer tech skills. This commoditization of cybercrime will fuel new waves of personal and customized attacks, with new criminal motivations including embarrassment, harassment, and vandalism.

Security industry response

Our research and predictions dictate some fundamental changes to digital security. Network perimeters, isolated security tools, and file or signature based defenses are a rapidly fading paradigm. Instead, we will need to re-architect the tools to operate more efficiently. Using machine learning techniques, we will improve scanning speeds by identifying trusted processes and focusing resources on suspicious activities. Security in silicon will be necessary, not only to combat the growth of low-level hardware and firmware attacks, but also to protect the billions of devices that may not have sufficient general-purpose computing power to protect themselves. Secure boot, trusted execution environments, tamper protection, active memory protection, and immutable device identity will improve the effectiveness of our digital defenses as we fight attacks that try to go lower in the stack to remain undetected.

Improved defenses will be insufficient unless we take them out of isolation. Sharing and integrating threat intelligence between endpoints, gateways, and centralized analytics will improve detection and significantly speed up correction efforts, quickly blocking new attack vectors and protecting vulnerabilities before they can be exploited in multiple locations. Threat data sharing and collaboration between businesses, governments, industry organizations, and security vendors will also deliver faster and better protections, as threat exchanges expand throughout supply chains, industries, and nations.

Behavioral analytics will augment detection capabilities as the newest weapon for defenders. Baselines for normal behavior and continuous monitoring will quickly separate legitimate activities and identities from suspicious and compromised ones. These products are in their early stages today, but applying skills from big data and other analytics and machine learning research will help them to mature rapidly over the next five years.

Poor integration, talent shortages, and the costs of failure

The lack of integrated security technology, shortage of skilled talent, and rising cost of breaches. These factors will drive increased automation and machine learning, greater simplification of security controls, and predictable funding and insurance models for security operations.

With attacks growing in sophistication and stealth, isolated individual defenses quickly fall behind. Fileless attacks, remote shell exploits, and credential theft are increasing in popularity as ways to evade detection by traditional tools. The speed of these attacks means that response times of minutes or hours leave the system open to compromise and data exfiltration. Machine learning and greater automation are necessary to match defense speed to attack speed. We are seeing steady progress in the ability of systems to translate alerts and behavior into appropriate action, detecting and correcting an attack far faster than a human operator can. At the same time, the automation will notify the operations center of its actions, so that they can begin further investigations and take any additional necessary steps.

Automation and machine learning will also help alleviate the growing shortage of skilled security personnel. Shared threat intelligence, behavioral analytics, and contextual information will enable much better orchestration between the various defense elements. An endpoint under attack will immediately publish that information so that other endpoints and gateways can block the malicious files and addresses. Threat intelligence exchanges will deliver context, scored for trust and quality, and corroborate attack info to reduce false positives. Perhaps more important, these tools will reduce the complexity of security system configurations and operations, easing the transactional burden on security personnel. Whether it is improved default configurations, automated actions based on learned behavior, or intelligently filtered and scored alerts, machines will play a vital role in augmenting the skills and resources of the security team.

Finally, the rising cost of breaches and demand for increased predictability will bring innovations in risk management, investment, and even insurance. As the value of personal data goes up, so does the total cost of a security breach. At the same time, the increasing range of security tools will make it more difficult to plan and budget. Insurance and hedging products will emerge that enable predictable levels of security investments, or limit the organization’s financial exposure to a catastrophic security event. Security as a service will continue to evolve, shifting more of the security budget to operating expenses instead of capital outlays.

Over the next five years, we are going to see some far-reaching changes in digital security, as the perimeter-based models that we have worked with almost since the dawn of the industry are replaced by a more fluid, mobile, and cloudy reality.

For a more detailed look at these and other predictions, download McAfee Labs 2016 Threats Predictions report.

About the Author

Vincent Weafer is a Sr. Vice President of McAfee Labs at Intel Security, where he oversees a team of hundreds of researchers in dozens of countries, as well as millions of sensors around the globe, all dedicated to helping protect Intel customers from the latest cyber threats. He has presented at numerous international security conferences, is the coauthor of a book on Internet security has also been invited to testify on multiple government committees, including the United States Senate Committee on the Judiciary hearing on Combating Cyber Crime and Identify Theft in the Digital Age; the United States Sentencing Commission’s public hearing on Identity Theft and the Restitution Act of 2008; and the United States Senate Committee on Commerce, Science, and Transportation on Impact and Policy Implications of Spyware on Consumers and Businesses.


Got an idea for a Blueprint column?  We welcome your ideas on next gen network architecture.
See our guidelines.

Arbor Uncovers Trochilus RAT

Arbor Networks disclosed details of a newly-discovered Remote Access Trojan (RAT) named "Trochilus" attacking various government websites and non-governmental organizations.

Arbor’s Security Engineering & Response Team (ASERT) said this Trochilus RAT is likely driven by East Asian threat actors. It is part of a seven-piece malware cluster that offers threat actors a variety of capabilities, including espionage and the means to move laterally within target networks in order to achieve more strategic access.

http://arbor.link/xo0jq


AT&T Offers Unlimited Mobile Data for DirecTV or U-Verse Customers

AT&T introduced an unlimited wireless data offer for new and existing AT&T consumer wireless customers who have or add AT&T DIRECTV or AT&T U-Verse TV.

The new AT&T Unlimited Plan includes unlimited data and unlimited talk and text. Customers can get the AT&T Unlimited Plan on a smartphone for $100 per month. Additional smartphones are $40 per month each, and a fourth smartphone can be added at no additional cost.

“Our new unlimited plan is our best offer yet. It’s the perfect reward for our valued customers who like to take advantage of our integrated offers of TV and wireless services,” said Ralph de la Vega, CEO of AT&T Mobile and Business Solutions. “Video traffic continues to grow on our network as fast as ever because people enjoy viewing their favorite video content on their favorite devices.”

http://www.att.com

Accelerite to acquire Citrix CloudPlatform

Accelerite agreed to acquire Citrix CloudPlatform, powered by Apache CloudStack and CloudPortal Business Manager. Financial terms were not disclosed.

Citrix CloudPlatform (powered by Apache CloudStack) is cloud computing software for creating, managing, and deploying public and private cloud infrastructure services. CloudPortal Business Manager is a unified cloud services delivery and business management platform that enables cloud services automation for provisioning, billing, metering and user management.

"Customers are our top priority and we are confident that Accelerite will nurture our customers who are heavily invested in running their clouds on these solutions," said Steve Wilson, vice president, Core Infrastructure at Citrix. "Accelerite has been successful in acquiring product lines from other large companies to grow cloud computing and virtualization software products. Citrix will work closely with Accelerite to build on CloudPlatform integrations with our key offerings that enable the secure delivery of apps and data."

Accelerite said that in addition to increasing the level of investment in the product line to reinvigorate the roadmap with new features and functions to meet the evolving needs of CloudPlatform users, it will continue to work closely with Apache Foundation and contribute its CloudPlatform roadmap to the Apache CloudStack project.

http://www.accelerite.com

SAP Says New Cloud Bookings Rose 103% in 2015

SAP reported exceptional momentum with fast growth in cloud and double-digit growth in its core license business in the fourth quarter. For the full year, non-IFRS cloud and software revenue grew by 20% or 12% at constant currencies and exceeded the outlook of 8% - 10% growth at constant currencies.

Some highlights:

  • New cloud bookings, the key measure for SAP's sales success in the cloud, increased 103% in the full year 2015 to €0.89 billion and 75% in the fourth quarter to €0.35 billion1. Non-IFRS cloud subscriptions and support revenue was €2.30 billion (€2.00 billion2 at constant currencies, achieving the outlook of €1.95 to €2.05 billion at constant currencies) for the full year. Non-IFRS operating profit was €6.35 billion (€5.902 billion at constant currencies, beating the full year outlook of €5.6 - €5.9 billion at constant currencies).
  • Customer adoption of SAP S/4HANA continues to accelerate sharply, with more than 2,700 customers across all regions at the end of 2015, more than doubling quarter over quarter. SAP S/4HANA, built on SAP HANA, the most advanced in-memory platform available today, provides the digital core that companies need to reduce complexity, digitize their business and connect every part of their enterprise.

"We decisively beat our full year guidance for cloud and software revenue," said Bill McDermott, CEO of SAP. "SAP gained significant share against core and best of breed competitors. Across markets and industries SAP is extending its lead as the trusted innovator in the business software industry. Our completeness of vision in the cloud and soaring adoption of S/4HANA gives us tremendous confidence in our business in 2016 and beyond."

http://www.sap.com

BT Names Clive Selley as new CEO of Openreach

BT announced the appointment of Clive Selley as the new CEO of Openreach, replacing Joe Garner, who is leaving to become CEO of Nationwide Building Society. The handover will take place this quarter.

Selley previously served as CEO of BT Technology, Service and Operations (BT TSO) -- the "engine room" of BT, responsible for the company’s core networks and IT systems across the globe – including TV, Mobile and Conferencing - as well as its world class research and development arm at Adastral Park, Suffolk. As CEO of BT TSO, Clive is responsible for twelve thousand staff, eight thousand contractors and a multi-billion pound budget. He chairs BT’s cyber security council and has an extensive knowledge of regulatory affairs.

http://www.btplc.com/News/#/pressreleases/clive-selley-to-be-ceo-of-openreach-1289587

AWS Activates Data Center in Korea

Amazon Web Services launched commercial services from a new facility in Korea.

The new Seoul region has two Availability Zones (raising the global total to 32). It supports Amazon EC2 (T2, M4, C4, I2, D2, and R3 instances are available) and related services including Amazon Elastic Block Store (EBS), Amazon Virtual Private Cloud, Auto Scaling, and Elastic Load Balancing.

https://aws.amazon.com/blogs/aws/

Abu Dhabi Hotel Boasts 1.2 Gbps Wi-Fi

The Jannah Burj Al Sarab, a new hotel in Abu Dhabi, is claiming the fastest Wi-Fi of any hotel in the world - 1.2 Gbps, according to  http://www.hotelwifitest.com  .


http://www.jannah.ae

Sunday, January 10, 2016

Blueprint: How Advanced Analytics Will Change Business in 2016

by Shawn Rogers, Chief Research Officer, Dell Statistica

As advanced analytics continue the trajectory from buzzworthy idea to business imperative, we will see companies and consumers alike beginning to optimize their processes for data gathering and analysis in new ways. From healthcare to manufacturing, virtually no industry will be untouched as advanced analytics reach a new level of maturity in the coming year. Here are four specific ways I expect advanced analytics to evolve and impact businesses this year:


1. Analytics at the edge becomes the new normal as the Internet of Things (IOT) expands.

Thanks largely to advancements in modern data technology, more organizations than ever before are putting the right data on the right platform for the right reason. This new level of data efficiency greatly reduces – and, ultimately, may eliminate – the need to pull data into a centralized source, such as a data warehouse or analytic sandbox, for the purpose of analysis. Instead, given the distributed nature of connected devices and the explosive growth of IoT infrastructures, more organizations will look to execute analytics on the data-gathering devices themselves, a model commonly known as analytics at the edge. Applying a predictive model and running the analytics where the data lives eliminates the time, bandwidth and expense required to transport the data, enabling immediate action to be taken in response to insights. For example, if surveillance cameras have the ability to distinguish between routine and non-routine video images, they can transmit only the suspicious images to long-term storage, reducing cost and avoiding bandwidth issues. In 2016, the growth of IoT in particular will spur the movement of analytics out to the edge, in order to give companies the ability to harness and use IoT data quickly and economically. The power of IoT ultimately lies with the ability to analyze data and move at the real-time speed of a specific workflow. Analytics at the edge makes that possible.

2. “Citizen data scientists” continue to emerge across the workplace and shape applications of analytics.

We are starting to see a new breed of analytics users cropping up throughout organizations – non-analyst employees known as citizen data scientists. These every-day, non-technical users typically leverage a basic background in math or social sciences to analyze data as an add-on to their other workplace responsibilities, helping to fill the gap between the amount of data companies need crunched and the number of trained data scientists they can hire. Citizen data scientists are going to play a large role this year in increasing the demand for processes and interfaces that make analytics more easily digestible. As citizen data scientists experience a learning curve in wrangling data, running the optimal analytics and presenting the outcome of those insights, vendors will need to focus on delivering quick-start analytics templates and reusable workflows. Once the learning curve has been overcome and the right capabilities have been delivered, citizen data scientists will be the driving force behind the use of analytics to drive innovation.

3. Analytics will show the highest ROI for targeted, vertical market use cases.

We’ve already seen evidence that advanced analytics produce the highest ROI when applied to targeted, vertical markets. Regulated manufacturing in particular will continue to lead other industries in advanced analytics adoption and ROI in 2016, as this industry features not only numerous processes that greatly impact the precision and quality of a given production run, but often a large number of regulatory requirements necessitating data and documentation. As such, regulated manufacturers will increasingly rely on advanced analytics platforms to help them identify strengths and weaknesses in their processes, while also documenting the information they need to meet regulatory requirements. For example, pharmaceutical manufacturers might leverage advanced analytics to optimize the drug creation process and avoid catastrophic batch losses, while also using analytics tooling to confirm that their processes have been tested and validated as required by governing regulatory bodies.

4. Analytics will become the starting point for virtually all innovations.

Advanced analytics not only help companies optimize and improve processes but also better serve their customers through new innovations. This trend will grow exponentially in 2016 as organizations continue to realize the true value in leveraging predictive analytics. Service departments will have the ability to take prescribed actions to prevent issues from arising. Doctors will increasingly run analytics to offer precision healthcare and personalized medicine that better serves patients. Patients themselves will bring their own data to the table, creating a new layer of both challenges and opportunities for data-driven healthcare leaders. This trend of data-driven analytics advancing each and every aspect of the business – from inception to completion – will only continue to evolve until, ultimately, all forms of innovation trace back to analytics in some way.

If your company hasn’t begun to incorporate advanced analytics, bear in mind that 2016 is poised to mark a tipping point in the evolution of corporate data science. Until now, having the ability to leverage advanced analytics has been a competitive advantage. By this time next year, it will be status quo. Not only will companies without advanced analytics find themselves falling behind their competition, but they will have an extremely difficult time catching back up, as their competitors with analytics improve and optimize operations at an exponential, not linear, rate. It’s a time of great opportunity for those prescient enough to make bold, decisive moves. And it’s a year that will define who owns the future of innovation and who gets left behind.

About the Author

Shawn Rogers is Chief Research Officer, Dell Statistica, Dell Software.  He is an internationally recognized thought leader, speaker, author and instructor on the topics of big data, cloud, data integration, analytics, data warehousing and social analytics. Prior to joining Dell, he was Vice President of Research for Business Intelligence and Analytics at Enterprise Management Associates, a leading analyst firm. He co-founded the BeyeNETWORK, a global online publication covering business intelligence, data warehousing and analytics. He was also a partner at DMReview magazine and has held various executive level positions with technology companies.



Got an idea for a Blueprint column?  We welcome your ideas on next gen network architecture.
See our guidelines.


Saturday, January 9, 2016

Nokia Announces Board and Leadership Team

Following the successful public exchange offer for Alcatel-Lucent securities, Nokia confirmed its new Board of Directors:

  • Risto Siilasmaa (Chairman);
  • Olivier Piou (Vice Chairman);
  • Vivek Badrinath;
  • Bruce Brown;
  • Louis Hughes,
  • Simon Jiang;
  • Jouko Karvinen;
  • Jean Monty;
  • Elisabeth Nelson; and
  • Kari Stadigh.

The Nokia Group Leadership Team comprises the following thirteen (13) members; the President and Chief Executive Officer, five (5) business group leaders and seven (7) unit leaders:


  • Rajeev Suri, President and Chief Executive Officer;
  •  
  • Samih Elhage, President of Mobile Networks;
  • Federico Guillén, President of Fixed Networks;
  • Basil Alwan, President of IP/Optical Networks;
  • Bhaskar Gorti, President of Applications & Analytics;
  • Ramzi Haidamus, President of Nokia Technologies; 


  • Timo Ihamuotila, Chief Financial Officer;
  • Hans-Jürgen Bill, Chief Human Resources Officer;
  • Kathrin Buvac, Chief Strategy Officer;
  • Ashish Chowdhary, Chief Customer Operations Officer;
  • Barry French, Chief Marketing Officer;
  • Marc Rouanne, Chief Innovation & Operating Officer; and
  • Maria Varsellona, Chief Legal Officer.             

http://www.nokia.com

Alcatel-Lucent Changes its Governance

Alcatel-Lucent announced changes to its Board of Directors following the the settlement of Nokia’s public exchange offer for all outstanding ordinary shares, American depositary shares (“ADSs”) and OCEANE convertible bonds of Alcatel-Lucent, in exchange for Nokia shares or Nokia ADSs.

Jean Monty, Louis Hughes, Olivier Piou, Stuart Eizenstat, Kim Crawford Goodman and Francesco Caio have resigned and Risto Siilasmaa, Rajeev Suri, Timo Ihamuotila, Maria Varsellona and Samih Elhage have been coopted to the Board, subject to ratification by the shareholders of Alcatel-Lucent at the next shareholders’ general meeting. Nokia has stated that it would vote in favor of such ratification.

Philippe Camus has been confirmed in his position of Chairman of the Board and CEO of Alcatel-Lucent. The Board has approved his compensation as Chairman and CEO.

The newly constituted Board decided to terminate Alcatel-Lucent’s program for ADSs following the settlement of the initial period of the Offer and to seek the delisting of Alcatel-Lucent’s ADSs from the New York Stock Exchange following the settlement of the reopened Offer.

Alcatel-Lucent and Nokia will proceed with their integration plans.

https://www.alcatel-lucent.com\

See also