Tuesday, April 12, 2016

Perspica Emerges from Stealth with Incident Replay Time Machine for Apps

Perspica, a start-up based in San Jose, California, emerged from stealth with a solution that delivers application infrastructure intelligence across hybrid-cloud environments.

Perspica describes its Incident Replay subscription-based service as a time machine for performance data, logs and topology. It provides TechOps and DevOps teams with tools to visualize all layers and siloes of the application stack, enabling definitive post-mortem and real-time automated root cause analysis to improve mean time to repair. The system uses machine learning algorithms to distinguish between critical events and false positive alarms.  The idea is to provide leverage behavior profiling and predictive analytics to detect anomalous trends and prevent dangerous issues before they impact application performance.

"We are excited to bring to market the world's first 'application infrastructure time machine' that combines topology and performance data. It helps overburdened IT teams identify problems and mitigate risks by analyzing the continuous changes to the application infrastructure stack. We are able to track when an incident occurs and automatically identify the root cause to provide IT departments with the ability to gain real answers immediately. Similar to instant replay during the big game, Perspica provides Incident Replay for big data," stated Dan Maloney, CEO, Perspica.

Perspica is funded by March Capital, The Fabric and The Hive.


Datera Launches Elastic Block Storage Software

Datera, a start-up based in Mountain View, California, emerged from stealth and unveiled an AWS-like elastic block storage solution for enterprises and Service Providers.

Datera Elastic Data Fabric is scale-out storage software that turns standard, commodity hardware into a RESTful API-driven, policy-based storage fabric for large-scale clouds. The company said its mission is to bring the operational efficiencies enjoyed by AWS and Google to the open market.  Datera Elastic Data Fabric natively integrates through iSCSI with OpenStack, CloudStack, VMware vSphere and container orchestration platforms such as Docker, Kubernetes and Mesos.

Key features include:

  • API-first operations provides web-scale automation with full infrastructure programmability.
  • Policy based configuration leaves the details to Datera Elastic Data Fabric so customers can optimize price/performance for each application without hand-crafting every LUN.
  • Grow-as-you-go model so customers only buy what they need when they need it. The scale-out architecture of Datera Elastic Data Fabric means customers do not need to compromise on performance or capacity.
  • Flash-first design delivers high efficiency and low latency (< 1ms) across distributed, diverse storage media types. This maximizes application performance and access density.
  • Multi-tenancy and quality of service for cloud-native and traditional workloadsoptimizes asset utilization and simplifies operations across containers, VMs and bare-metal.
  • Heterogeneous component support makes it possible for IT and DevOps to seamlessly scale across many configurations and generations of industry standard x86 servers with multiple storage media types.

Datera also announced $40 million in funding from Khosla Ventures, Samsung Ventures and Silicon Valley luminaries Andy Bechtolsheim and Pradeep Sindhu:

"In the cloud era, things scale up and down constantly. It's always in flux. At scale, you can't operate this kind of environment manually. It must be automated," said Marc Fleischmann, Co-Founder and CEO of Datera. "In this world, customers want their storage fast, at scale, with a self-service delivery model. They can't afford to wait for someone to hand-craft a LUN whenever a developer needs some storage."


Australia's nbn Signs Telstra for HFC Broadband

nbn, the company building Australia’s new broadband network, signed a contract with Telstra to manage the design and construction of fast broadband to more than three million homes currently in the footprint of Telstra’s pay-TV cable network (Hybrid-Fibre Coaxial or HFC cable). Once the build is completed, it will be handed to nbn for operation. Telstra valued the contract at approximately A$1.6 billion.

The deal streamlines the existing arrangements nbn has with Telstra, creating a faster rollout schedule and access to all nbn retailers.

nbn said it is on track to make the initial 10,000 HFC premises available for orders by the end June 2016.

nbn CEO Bill Morrow said:  “The nbn™ network is now available to two million homes and businesses, with close to one million already connected.  This deal will extend the nbn™ network to millions more, bringing new opportunity in education, health and online services to more families.


  • In 2011, nbn and Telstra signed the initial Definitive Agreements for the use of existing Telstra infrastructure and the migration of former wholesale customers from Telstra’s legacy network to the nbn network, with payments progressively scheduled as the new services were activated.
  • In 2014, the nbn and Definitive Agreements were amended to allow nbn to access and progressively acquire existing Telstra network infrastructure to enable the deployment of the multi-technology mix as required.

Openreach Hits 25 Million Premises Milestone in UK

Openreach's wholesale fibre network has passed the 25 million premises milestone -- marking what the company claims as one of the fastest rollouts of fibre broadband in the world.

Clive Selley, CEO of Openreach, said: “The UK is making great progress with fibre broadband. Availability and take up are well ahead of most European countries and I’d like to thank the thousands of Openreach engineers who have worked so tirelessly to make this happen.

“The job isn’t finished however and we are working hard to get coverage to 95 per cent and above. We are also exploring how we can improve speeds for the million or so premises in the final few per cent of the country.


USB Type-C Gets Authentication Protocol

A new USB Type-C Authentication specification defines cryptographic-based authentication for USB Type-C chargers and devices. This will enable systems to confirm the authenticity of a USB device or USB charger at the moment a wired connection is made – before inappropriate power or data can be transferred.

“USB is well-established as the favored choice for connecting and charging devices,” said Brad Saunders, USB 3.0 Promoter Group Chairman. “In support of the growing USB Type-C ecosystem, we anticipated the need for a solution extending the integrity of the USB interface. The new USB Type-C Authentication protocol equips product OEMs with the proper tools to defend against ‘bad’ USB cables, devices and non-compliant USB Chargers.”

Key characteristics of the USB Type-C Authentication solution include:

  • A standard protocol for authenticating certified USB Type-C Chargers, devices, cables and power sources
  • Support for authenticating over either USB data bus or USB Power Delivery communications channels
  • Products that use the authentication protocol retain control over the security policies to be implemented and enforced
  • Relies on 128-bit security for all cryptographic methods
  • Specification references existing internationally-accepted cryptographic methods for certificate format, digital signing, hash and random number generation

The newly completed USB 3.1 specification adds enhancements to enable operation at at up to 10 Gbps.

SuperSpeed USB 10 Gbps uses a more efficient data encoding and will deliver more than twice the effective data through-put performance of existing SuperSpeed USB over enhanced, fully backward compatible USB connectors and cables. Compatibili

Nexenta, Micron and SuperMicro Partner on All Flash Arrays

Nexenta announced a strategic relationship with Micron Technology and Supermicro to engineer and deliver innovative solutions for next-generation all-flash data centers. The companies are jointly engineering the Micron-Accelerated NexentaEdge for block and object storage. The solution will be optimized to cost-effectively provide high performance native block, iSCSI block, Swift and S3 object services to OpenStack, VMware and Container-based infrastructures.


ADTRAN Posts Q1 Sales of $142 Million

ADTRAN reported Q1 sales of $142.2 million, compared to $142.8 million for the first quarter of 2015. Net income was $5,014,000 compared to $3,317,000 for the first quarter of 2015. Earnings per share, assuming dilution, were $0.10 compared to $0.06 for the first quarter of 2015.

ADTRAN Chief Executive Officer Tom Stanton stated, “ADTRAN delivered a solid performance this quarter resulting in earnings coming in ahead of initial expectations. Compared to the same period last year, Q1 domestic revenue was up over 39% with increases in both our products and services businesses. Improved gross margins and lower operating expenses helped us increase operating income over 181% versus Q1 of 2015. Longer term, we expect further improvement in the carrier environment as customers accelerate investments in upgrading their network infrastructure to meet customer demand.”


Juniper Issues Q1 Financial Warning

Juniper Networks updated its financial outlook for its quarter ended March 31, 2016, saying revenue is now expected to be in the range of $1,090 million to $1,100 million, below its previous guidance of $1,150 million to $1,190 million.

Juniper cited weaker than anticipated demand from Enterprise customers and the timing of deployments of certain U.S. and EMEA Tier 1 Telecoms. The company now expects non-GAAP net income per diluted share of $0.35 to $0.37, compared to the Company's previous guidance of $0.42 to $0.46 per diluted share.

"Although we expect results to be lower than our initial guidance for the first quarter, we remain constructive on fiscal 2016 and expect growth from new products to contribute to our topline, coupled with our ongoing focus on cost discipline to drive non-GAAP operating margin expansion for the full year," stated Rami Rahim, chief executive officer of Juniper Networks.


Monday, April 11, 2016

Blueprint: Endpoint Visibility in the IoT

A Five-Step Action Plan for Securing the Network in the Age of IoT

by Tom Kelly, CEO, AccelOps

A report from BI Intelligence projects that Internet of Things (IoT) deployments will create $421 billion in economic value for cities worldwide in 2019. Cities will enjoy benefits such as improved traffic flow, a reduction in air pollution and better public safety.

This is just one example of the advancements the IoT will bring to all sectors. However, along with all the positives comes the negative of heightened security concerns. The IoT represents a proliferation of endpoints such as has never been experienced, and at a stunning rate.

All these endpoints are creating pinholes across the enterprise security landscape. It is clear that the malicious intent of hackers has not only increased, but it has become more creative. The reality is that the IoT is changing everything, especially cyber security, and without the proper tools, it is nearly impossible to know what is connecting to your network.

The IoT’s Dark Side

Smart devices have proven to be a double-edged sword. While delivering greater work efficiencies, they also offer more inroads for crime. By using connected devices that are agentless, malicious actors are able to gain access to corporate networks and may not be discovered until after an attack.

To add to the problem, the vendor landscape has become more complex. CISOs now must extend their security monitoring policies and procedures to incorporate every supplier and vendor in the supply chain, no matter how benign their products might seem to network security.

A real-world example will serve to drive the point home. A major carrier recently suffered a breach, resulting in hackers posting 300,000 customer records online. Imagine the look on the CEO’s face when he learned that the data was stolen from a third-party marketing firm involved in the carrier’s supply chain. Smart CISOs and CIOs must look to implement vendor risk management processes as part of their own operational security reviews before they find themselves facing an angry board of directors who are looking for answers as to how the latest breach occurred.

Five Recommendations for Today’s Network Security

Security, availability and compliance have become inextricably linked as a result of the hyper-connected world of cloud-based apps, sensors and mobile devices. More importantly, if you can’t see it, you can’t protect it, so before proceeding, be sure you know what is connecting to your network.

Here are five recommendations to manage the corporate IoT environment.

1. Analyze and measure it to fix it. Turn to real-time network topology monitoring and best practices to improve correlation accuracy. Best-of-breed solutions incorporate rich analytics collection and cross-correlation along with third party big data analytics tools to help network and security operations personnel apply methods that are faster and more accurate. If you can’t measure it, you can’t fix it.

2. Analyze root causes and cross-correlate. It’s no longer good enough to simply monitor your network. Today’s security challenges require that network operations and security operations work together to ingest all meaningful data for analysis. Gone are the days of keeping technology domains in silos. Correlate across security, availability and performance for events, logs and configuration files. By pulling together all available network data, it is possible to turn data collection into a weapon against hackers and create actionable information that provides a mechanism for improved root cause analysis.

3. Compare intention to behavior. Network forensics will be easier if you map user identities, locations and behaviors. Look for solutions that help ingest more than just an event, but also correlate performance, log and security data. Additionally, by looking at user IDs, locations and behavior patterns, you can determine if the user connecting to the network through proper login and password entries is authorized or is a malicious actor with stolen credentials.

4. Use visual analytics to describe security health. Does upper management understand what has happened after a breach? With accountability moving down the chain of command, it is more important than ever to use the language of the business stakeholder. Communicate issues so that business people understand how IT affects the health of the business.

5. Manage compliance for audits proactively. Look for solutions that report across common compliance frameworks such as PCI, ITIL, COBIT, SOX, HIPAA etc. No matter your industry, establish a compliance posture for formalized management and gain a deep understanding of how compliance failures may affect your organization, looking beyond the revenue impacts and potential for fines, plus embarrassing media exposure, to things like impact on brand, reputation, trust with customers, supplier relationships and employee productivity.

Keeping IoT Devices in Check

There’s no practical way around IoT devices connecting to the network. These devices provide the promise of many new and useful tools in their ability to perform business better and to predict unforeseen risks. Where you have identified the needs for IoT devices in your organization, insure you fully understand the risk benefit analysis, before deploying them. Methodologies such as Synthetic Transaction Monitoring can help you safely identify what the baseline behavior, or “normal” functionality, is as well as expected behaviors for how it should interact with other devices, and applications in the network.

Like any vulnerable and protected resource, it is important to insure these devices are kept behind trusted firewalls and, as with any device in your network, constantly monitor them for changes against normal. Other best-practice methods include establishing a “multi-tenant” reporting environment consolidating and isolating IoT devices into a unique and highly granulated reporting domain.

About the author

Tom Kelly is a technology industry veteran, having led companies through founding, growth, IPO and strategic acquisition. He has served as a CEO, COO or CFO at Cadence Design Systems, Frame Technology, Cirrus Logic, Epicor Software and Blaze Software.  Tom led successful turnarounds at Bluestar Solutions, MonteVista Software and Moxie Software, having served as CEO in repositioning and rebranding the companies in advance of their new growth. He serves on the Boards of Directors of FEI, Fabrinet, and ReadyPulse.  Tom is a graduate of Santa Clara University where he is member of the University’s Board of Regents.

Got an idea for a Blueprint column?  We welcome your ideas on next gen network architecture.
See our guidelines.

Dell SecureWorks Sets IPO

SecureWorks, a provider of information-security services based in Atlanta, announced its initial public offering of 9,000,000 shares of its Class A common stock. The initial public offering price is expected to be between $15.50 and $17.50 per share.

SecureWorks will trade on the NASDAQ Global Select Market under the symbol “SCWX.”

Some background notes on the company:

  • Dell acquired SecureWorks in 2011.
  • Claims 4,200 clients worldwide.
  • Generates revenue from managed security and threat intelligence solutions through subscription-based arrangements, as well as revenue from security and risk consulting engagements through fixed-price or retainer-based contracts. 
  • Total revenue was $339.5 million in fiscal 2016, $262.1 million in fiscal 2015 and $205.8 million in fiscal 2014, for annual growth of 30% and 27%, respectively. 
  • Incurred net losses of $72.4 million in fiscal 2016, $38.5 million in fiscal 2015 and $44.5 million in fiscal 2014. 
  • Headed by Michael R. Cote
  • Total of 2,47 employees


IDC: Worldwide Cloud IT Infrastructure Spend Grew 21.9% in 2015

Vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public and private cloud, grew 21.9% year over year to $29.0 billion in 2015, according to a new report from IDC.

"The cloud IT infrastructure market continues to see strong double-digit growth with faster gains coming from public cloud infrastructure demand," said Kuba Stolarski, Research Director for Computing Platforms at IDC. "End customers are modernizing their infrastructures along specific workload, performance, and TCO requirements, with a general tendency to move into 3rd Platform, next-gen technologies."

Some highlights:

  • Compared to overall IT infrastructure spending, the share of cloud IT infrastructure sales climbed to 32.2% in 4Q15, up from 28.6% a year ago. 
  • Revenue from infrastructure sales to private cloud grew by 17.5% to $3.3 billion, and to public cloud by 14.6% to $4.9 billion. 
  • In comparison, revenue in the traditional (non-cloud) IT infrastructure segment decreased 2.7% year over year in the fourth quarter, with declines in all three technology segments (server, storage and Ethernet switch).
  • All three technology markets showed strong year-over-year growth in both private and public cloud segments, except for storage in the public cloud, which declined 4.0% in 4Q15 on a difficult compare with a very strong quarter in the prior year. 
  • Private cloud growth was led by Ethernet switch with 19.6% growth. In public cloud, Ethernet switch led the way with 56.9% year-on-year growth, while public cloud revenue from server grew 28.9% year on year in 4Q15. For the full year, server revenue in private cloud grew by 23.0% year on year, while Ethernet switch revenue in public cloud grew by 36.6% during the same period.


SmartSky Picks Brocade + VMware for NFV Capabilities

SmartSky Networks selected Brocade and VMware to supply the pre-certified network functions virtualization (NFV) capability for its air-to-ground broadband network. SmartSky's new Air-to-Ground, pan-US network network connects more than 250 cell sites strategically placed across the continental U.S.

SmartSky is deploying the Brocade Virtual Evolved Packet Core (vEPC) running on VMware vCloud NFV. The network will deliver differentiated services for different types of customers.

“We are building SmartSky’s network from the ground up, enabling us to rethink how a cross-continental air-to-ground network such as this should be built,” said David Claassen, Vice President of Network and Service Architecture at SmartSky. “As we worked through the design, it became clear that using an NFV approach and leveraging commodity hardware for the underlying physical fabric would deliver the best ROI while increasing our service-ability and reducing many of the operational headaches common with traditional hardware-based networks. Brocade and VMware are delivering a combined NFV solution that will help us accelerate our delivery of this unique service offering.”

Brocade said its full-function vEPC features independent slices of control, data and session management capabilities. The vEPC provides seamless data service across the continent while eliminating redundant functionalities and internode dependencies.

“Brocade and VMware have collaborated for years as NFV partners, driving performance, scalability and life-cycle management for network functions to customers such as SmartSky,” said Nishi Kant, vice president of mobile networking, Brocade. “Stability, ease of deployment and ongoing management of the Brocade vEPC solution are recurring themes in our customer deployments, and certification of the Brocade vEPC as VMware Ready for NFV gives customers confidence in the interoperability of our NFV platforms.”


SanDisk Brings 12 Gbps to InfiniFlash for Data Centers

SanDisk introduced its InfiniFlash IF150 system featuring upgraded 12Gbps SAS connectivity and the same massive capacity for big data and hyperscale workloads.

The IF150 system delivers up to two million raw IOPS and consistently low latency, the IF150 system supports demanding workloads by addressing scalability and availability challenges. It offers up to half a petabyte (512 terabytes) of flash storage in one 3-rack-unit (3U) system and can directly connect up to eight off-the-shelf-servers.

SanDisk cites a $1 per GB price point for raw flash.  Compression and de-dupe capability in storage software (available from SanDisk InfiniFlash ecosystem partners) can further reduce the effective price per GB.

“Since its launch, the game-changing performance and economic benefits of the InfiniFlash System have been recognized by customers—from data centers in research institutions doing big data analytics to web providers, hyperscalers and video streaming companies who manage data on a massive scale, and more,” said Ravi Swaminathan, vice president and general manager of systems and software solutions at SanDisk. “With our new IF150 system, we have pushed the performance even further, while at the same time delivering massive-scale storage at a price point that makes business sense.”


DragonWave and Mitel Target 5G

DragonWave and Mitel are collaborating on 5G technology development.

Mitel, which supplies network function virtualization (NFV) mobile solutions, will contribute software and mobile network expertise to the project. DragonWave will contribute all outdoor networking expertise combined with small cell-focused and high-capacity, spectrally-efficient packet wireless backhaul solutions.

"Enabling increased coverage in both dense urban and rural environments while supporting the thrust for virtualization drives the need for new relationships," said Peter Allen, President and CEO, DragonWave. "We are pleased to work closely with Mitel who has both scale and a common customer base. We share a focus to bring innovative solutions to the 5G mobile market."

"5G opens the door to a fundamental new way to architect mobile networks, including increased integration between access and backhaul components and smaller cell sizes, where an integrated solution becomes more critical," said Pardeep Kohli, President of 5G Cloud Connectivity, Mitel. "This collaboration enables an integrated 5G solution set that will be easier to deploy, optimize and maintain."


Sunday, April 10, 2016

OpenStack Mitaka Focuses on Scalability

The OpenStack community released the 13th version of its open source software for building clouds, with a focus on manageability, scalability and end-user experience. OpenStack is an integration engine that can manage bare metal, virtual machines, and container orchestration frameworks with a single set of APIs.

OpenStack is approaching its sixth anniversary.

Here are some highlight's of the OpenStack Mitaka release:

  • Simplified Manageability - includes numerous advancements that focus on improving day-to-day ease of use for cloud deployers and administrators. One highlight is a simplified configuration for the Nova compute service that introduces additional standard defaults and reduces the number of options that must be manually selected. The Keystone identity service, too, has been greatly simplified, with multi-step processes for setting up the identity management features of a cloud network—installing, running, authenticating, distributing tokens, etc.—streamlined into a one-step process. Another example of the enhanced manageability available in Mitaka is found in Neutron, which now features improved Layer 3 networking and Distributed Virtual Router (DVR) support.
  • Greater Scalability - Heat’s convergence engine, which first appeared in the Liberty release, can now handle larger loads and more complex actions for horizontal scaling, while delivering better performance for stateless operations. Similarly, in Keystone, fernet tokens increase the number of API operations the identity service can support. Developers also made significant progress on Cells v2, another feature introduced in Liberty that aids in horizontally scaling out OpenStack compute clouds.
  • Improved User Experience -  a unified OpenStack Client provides a consistent set of calls for creating resources so end users don’t have to learn the intricacies of each service API. Mitaka also delivers improved support for software development kits (SDKs) across a number of different languages. Another improvement that simplifies that experience for application developers is the ongoing work to add the “get me a network” function in Neutron. This feature will remove all the steps necessary to create a network, attach a server to it, assign an IP to that server, and make the network accessible, and consolidates these steps into a single action. Elements of this functionality are introduced in Mitaka.

The next OpenStack Summit will be held in Austin on April 25-29.


Sprint to Sell and Lease-back of Certain Network Assets

Sprint announced an arrangement to sell and lease back certain existing network assets, thereby raising $2.2 billion for addressing upcoming debt maturities.

Under the deal, several bankruptcy remote entities (collectively “Network LeaseCo”) will acquire certain existing network assets and then lease them back to Sprint. The assets acquired by Network LeaseCo will be used as collateral to raise approximately $2.2 billion in borrowings from external investors, including SoftBank. The $2.2 billion of cash proceeds Sprint expects to receive from the transaction is scheduled to be repaid in staggered, unequal payments through January 2018.

“Sprint and SoftBank have worked together again to create a unique structure that provides Sprint with an attractive source of capital,” said Sprint CFO Tarek Robbiati. “This transaction is an important first step in addressing upcoming debt maturities and allows us to stay focused on our corporate transformation, which involves growing topline revenues and aggressively taking costs out of the business to improve operating cash flows.”


KT Tests 5G Backhaul in E-Band with NEC

KT completed a 5G wireless backhaul proof of concept (PoC) in conjunction with NEC.

The test, which was conducted at Phoenix Park Ski World in PyeongChang, South Korea, used KT's commercial mobile network infrastructure. NEC supplied its ultra-compact, iPASOLINK EX microwave communications system operating in E-Band spectrum (70-80GHz).  The microwave radios were used to interconnect KT's LTE base stations.

NEC's iPASOLINK EX supports ultra-multilevel modulation (256QAM) technology for high capacity transmission of up to 3.2Gbps. It also supports narrow band transmission (channel width of 250MHz and 500MHz).

KT aims to launch 5G trial services in 2018. This PoC is based on a collaboration agreement in the field of 5G networks signed between KT and NEC in August 2015. The carrier is considering microwave backhaul using E-Band spectrum for 5G services in mountainous areas, where it is difficult to lay optical fibers.

“We are honored to have contributed to KT's 5G-related trial," said Hideyuki Muto, Deputy General Manager, Mobile Wireless Solution Division, NEC Corporation. “NEC's iPASOLINK EX can operate in harsh environments, and is easy to install at various outdoor locations without large scale installation works because it is compact and light weight. This joint PoC took advantage of these features in order to implement a high-capacity mobile backhaul network in snowy, mountainous areas very quickly. Going forward, NEC will strengthen its partnership with KT to contribute to the launch of their 5G trial services in 2018."


Corning to Acquire AFOP for Passive Optical Components

Corning agreed to acquire Alliance Fiber Optic Products (AFOP) for $18.50 per share in cash, representing a transaction value of approximately $305 million.

AFOP, which is based in Sunnyvale, California designs and manufactures high-performance passive optical components that are used by cloud data-center operators and leading datacom and telecom OEMs (original equipment manufacturers). Corning uses AFOP products in a number of its existing connectivity solutions. AFOP was founded in 1995 and has manufacturing and product development capabilities in the U.S., Taiwan and China.

Upon closing of the acquisition, Corning will integrate AFOP into its Optical Communications business segment. Corning expects the acquisition to expand its market access to cloud data-center operators and OEMs, broaden its presence in Asia, and provide product and cost synergies. Corning expects the acquisition to be accretive to its earnings per share during the first year.

“Combining AFOP’s components expertise with Corning’s broad portfolio of connectivity solutions further strengthens our position in the high-growth, cloud data-center market segment,” said Clark S. Kinlin, executive vice president, Corning Optical Communications. “And, it adds additional products that Corning can offer our broad customer base while providing an opportunity for manufacturing synergies.”

Peter C. Chang, AFOP founder and CEO, commented, “We are excited to join forces with Corning. We believe Corning’s scale provides an excellent platform for our products to access a broader customer base and drive a higher level of growth than we would be able to achieve as a standalone company. Our board believes that this transaction is in the best interests of our stockholders and provides our stockholders with substantial cash value for their investment. In addition, we believe becoming part of a larger company with Corning’s strong track record benefits both our employees and customers.”


SAP's Cloud Revenue Rises 33% in Q1

SAP reported strong growth for its cloud services in Q1.  Cloud subscriptions & support revenue, along with software support revenue, reached 69% share of total revenue for the quarter.

First quarter non-IFRS cloud subscriptions and support revenue grew 33% year-over-year (33% at constant currencies) to €0.68 billion. New cloud bookings grew a solid 22% (25% at constant currencies) in the first quarter and reached €0.14 billion.

Another highlight: SAP added more than 500 S/4HANA customers in the quarter, of which approximately 30% are net new SAP customers.

"SAP's fundamental growth drivers are rock solid – from our best-in-class S/4HANA applications to our completeness of vision in the cloud," said Bill McDermott, CEO of SAP. "We expect increasing momentum as the year progresses, fully consistent with our guidance for the full year. SAP continues to be a highly profitable growth company."


Alibaba Joins OpenDaylight

The Alibaba Group has joined The OpenDaylight Project at the Silver level.

Alibaba's SDN-enabled infrastructure supported its record-breaking 11.11 Global Shopping Festival, which was the largest one-day online sales event in 2015. On 11.11, Alibaba attracted over 115 million buyers to its marketplaces and enabled RMB91.2 billion (US$14 billion) in GMV settled through Alipay on Alibaba’s platforms. Alibaba’s network infrastructure supported 467 million delivery orders during a 24-hour period and enabled about 140,000 peak transactions processed per second. To support all these, Alibaba’s network had to handle a surge of more than ten times the normal daily volume.

“Open Standards and Open Source are complementary and both important to the Internet industry. Nowadays, standardization helps improve interoperation, reduce costs and can increase the products’ scalability, etc. Open source is an effective way in accelerating the application of standards,” said Judy Zhu, Standardization director, Alibaba Group.