The document discusses trends impacting IT from the perspective of a CIO at Juniper Networks. It summarizes data showing that the majority of CIOs see growth, efficiency, and understanding customer needs as important responsibilities. It also outlines megatrends like cloud, big data, and mobility that are driving new demands. The rest of the document focuses on how Juniper's network architecture and products help organizations address these trends and demands.
Iain Morton from Tyco Integrated Security, a solution provider at the marcus evans Distribution Technology & Innovation Summit 2013, provides insight on how the industry can prepare for government standards and compliance.
Interview with: Iain Morton, Vice President Canada, Tyco Integrated Security
Slides for the Greening Your Technology session at the Nonprofit Technology Conference (NTC) 2010 in Atlanta, GA.
Learn how to reduce the environmental impact of your information technology and how to effectively use IT to improve your organizations’ efficiency.
This report addresses the common challenge of BMS cyber security and its underlying components. Vulnerable elements across a range of components were investigated, with the vulnerabilities potentially affecting more than 10 million people.
During the research, some of the risks discovered within these BMS components include the potential ability for threat actors to:
Remotely lock or unlock doors and gates;
Control physical access of restricted areas;
Deny service (shutdown controllers);
Manipulate alarms and video surveillance;
Control temperature, boilers, air-condition, windows blinds, gas readings, etc.
Through a detailed analysis of the affected components, we provide clear cyber security recommendations for end users, vendors and system integrators, as well as a thorough technical breakdown including Proof of Concept exploit code, which allow unauthenticated remote code execution against the affected BMS products.
https://applied-risk.com/resources/i-own-your-building-management-system
Building IT Infrastructures to Interact with Big Data - Doug Roberts, Associ...IT Network marcus evans
Doug Roberts, a speaker at the marcus evans CIO Summit 2012, discusses how CIOs can handle and interact with big data sets.
Interview with: Doug Roberts, Associate Vice President for Digital Technologies and Chief Technology Officer, Adler Planetarium and Astronomy Museum
Iain Morton from Tyco Integrated Security, a solution provider at the marcus evans Distribution Technology & Innovation Summit 2013, provides insight on how the industry can prepare for government standards and compliance.
Interview with: Iain Morton, Vice President Canada, Tyco Integrated Security
Slides for the Greening Your Technology session at the Nonprofit Technology Conference (NTC) 2010 in Atlanta, GA.
Learn how to reduce the environmental impact of your information technology and how to effectively use IT to improve your organizations’ efficiency.
This report addresses the common challenge of BMS cyber security and its underlying components. Vulnerable elements across a range of components were investigated, with the vulnerabilities potentially affecting more than 10 million people.
During the research, some of the risks discovered within these BMS components include the potential ability for threat actors to:
Remotely lock or unlock doors and gates;
Control physical access of restricted areas;
Deny service (shutdown controllers);
Manipulate alarms and video surveillance;
Control temperature, boilers, air-condition, windows blinds, gas readings, etc.
Through a detailed analysis of the affected components, we provide clear cyber security recommendations for end users, vendors and system integrators, as well as a thorough technical breakdown including Proof of Concept exploit code, which allow unauthenticated remote code execution against the affected BMS products.
https://applied-risk.com/resources/i-own-your-building-management-system
Building IT Infrastructures to Interact with Big Data - Doug Roberts, Associ...IT Network marcus evans
Doug Roberts, a speaker at the marcus evans CIO Summit 2012, discusses how CIOs can handle and interact with big data sets.
Interview with: Doug Roberts, Associate Vice President for Digital Technologies and Chief Technology Officer, Adler Planetarium and Astronomy Museum
How Schneider Electric Connects Over 140,000 Employees Around the Globetibbr
Schneider Electric needed to revolutionize its business processes. Schneider chose enterprise social networking to discover in-house expertise, to collaborate more effectively across regions, and to create a single destination for all knowledge.
We are excited to announce the release of MetaFabric, a new end-to-end architecture that encompasses Juniper Network’s switching, routing, software and security portfolios. It provides the freedom and flexibility to use any technology, any protocol, any orchestration platform, any SDN controller, for any data center application with the assurance of interoperability and minimal disruption.
Thought Leadership Session: Realities of BYOD and MDMSolarWinds
The BYOD trend has reached a peak and you’re probably being asked to do something about it. Come and learn what the options are and how you can tackle this challenge without a lot of pain.
Leading Media and Marketing Solutions Company Yellow Pages Group Uses Enterpr...tibbr
Yellow Pages Group is a leading media and marketing solutions company in Canada with its roots in the declining print industry. By facilitating better communication between its 1,100 consultants, YPG has made huge strides in transforming itself into a digital powerhouse.
Managing and Controlling Application Performancedigitallibrary
In many situations the end user notices application degradation before the IT organization does and this damages the creditability of IT. In addition, there has been a recent explosion in regards to how much bandwidth-intensive recreational traffic (such as Internet Radio) transits the typical corporate WAN. Learn key techniques that IT organizations can use to better manage and control application usage on the corporate WAN.
To take action before IT security attacks become critical, organizations need the analytics capabilities necessary to identify anomalous and suspicious behavior quickly.Our Anomalous Behavior Detection Solution addresses security issues that conventional methods can’t. It can help to detect and prevent theft of data or intellectual property (IP), for instance at the behest of nation states, organized crime, or by a disenchanted employee. It can quickly identify when a user is behaving in a way that is abnormal for them and take appropriate action to limit what they can do, or flag up the situation for managerial attention. It can also predict when anomalous behavior is likely to occur, flagging events of interest for further investigation for potential security breach.
Cloud Computing IT Lexicon's Latest Hot SpotTech Mahindra
Cloud computing, a highly flexible deployment model is emerging because of enhancing interdependence of business and IT. Effective and efficient resource sharing, interconnecting between people, department and companies is possible because of this emerging technology. Cloud computing also provides a stable environment where Telcos can improve business outcomes by leveraging their experience in offering IT centric managed services. Though not without its flaws, cloud computing looks to change the way companies do business in the near future.
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 yearsJay McBain
The Managed Services model continues to grow and evolve. This presentation makes the case for building a cloud and mobility practice on top of the recurring revenue MSP model to drive success over the next 5 years. Supported by data from CompTIA, the cloud and mobility opportunity is very real in all customers segments and industries. The Channel is well positioned to take advantage of the consulting, policy and compliance services as well as the ongoing management and infrastructure needs of this emerging opportunity.
CompTIA’s 2nd Annual Trends in Enterprise Mobility study builds on previous CompTIA research in the mobility space and further explores mobility trends, challenges and opportunities. Understand the variables and trade-offs involved in a company’s decision on provisioning devices; ascertain benefits realized from using mobile/remote work solutions; identify the challenges in supporting and managing mobile/remote work; and
gauge the need for training and/or standards.
How Schneider Electric Connects Over 140,000 Employees Around the Globetibbr
Schneider Electric needed to revolutionize its business processes. Schneider chose enterprise social networking to discover in-house expertise, to collaborate more effectively across regions, and to create a single destination for all knowledge.
We are excited to announce the release of MetaFabric, a new end-to-end architecture that encompasses Juniper Network’s switching, routing, software and security portfolios. It provides the freedom and flexibility to use any technology, any protocol, any orchestration platform, any SDN controller, for any data center application with the assurance of interoperability and minimal disruption.
Thought Leadership Session: Realities of BYOD and MDMSolarWinds
The BYOD trend has reached a peak and you’re probably being asked to do something about it. Come and learn what the options are and how you can tackle this challenge without a lot of pain.
Leading Media and Marketing Solutions Company Yellow Pages Group Uses Enterpr...tibbr
Yellow Pages Group is a leading media and marketing solutions company in Canada with its roots in the declining print industry. By facilitating better communication between its 1,100 consultants, YPG has made huge strides in transforming itself into a digital powerhouse.
Managing and Controlling Application Performancedigitallibrary
In many situations the end user notices application degradation before the IT organization does and this damages the creditability of IT. In addition, there has been a recent explosion in regards to how much bandwidth-intensive recreational traffic (such as Internet Radio) transits the typical corporate WAN. Learn key techniques that IT organizations can use to better manage and control application usage on the corporate WAN.
To take action before IT security attacks become critical, organizations need the analytics capabilities necessary to identify anomalous and suspicious behavior quickly.Our Anomalous Behavior Detection Solution addresses security issues that conventional methods can’t. It can help to detect and prevent theft of data or intellectual property (IP), for instance at the behest of nation states, organized crime, or by a disenchanted employee. It can quickly identify when a user is behaving in a way that is abnormal for them and take appropriate action to limit what they can do, or flag up the situation for managerial attention. It can also predict when anomalous behavior is likely to occur, flagging events of interest for further investigation for potential security breach.
Cloud Computing IT Lexicon's Latest Hot SpotTech Mahindra
Cloud computing, a highly flexible deployment model is emerging because of enhancing interdependence of business and IT. Effective and efficient resource sharing, interconnecting between people, department and companies is possible because of this emerging technology. Cloud computing also provides a stable environment where Telcos can improve business outcomes by leveraging their experience in offering IT centric managed services. Though not without its flaws, cloud computing looks to change the way companies do business in the near future.
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 yearsJay McBain
The Managed Services model continues to grow and evolve. This presentation makes the case for building a cloud and mobility practice on top of the recurring revenue MSP model to drive success over the next 5 years. Supported by data from CompTIA, the cloud and mobility opportunity is very real in all customers segments and industries. The Channel is well positioned to take advantage of the consulting, policy and compliance services as well as the ongoing management and infrastructure needs of this emerging opportunity.
CompTIA’s 2nd Annual Trends in Enterprise Mobility study builds on previous CompTIA research in the mobility space and further explores mobility trends, challenges and opportunities. Understand the variables and trade-offs involved in a company’s decision on provisioning devices; ascertain benefits realized from using mobile/remote work solutions; identify the challenges in supporting and managing mobile/remote work; and
gauge the need for training and/or standards.
VMware Cloud Infrastructure and Management on NetAppNetApp
This ESG Lab Validation describes the hands-on testing of a VMware cloud infrastructure and management on NetApp solution with a focus on the value of integrated manageability, policy-based provisioning and automation, and data management for business continuity.
Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...Emulex Corporation
This webcast is the second in a monthly series on why I/O is strategic for the data center. Bob Laliberte, senior analyst from ESG, will present the importance of I/O to virtualized environments. As they continue to mature and become more flexible and dynamic, I/O becomes critical to a successful deployment.
Keynote presentation from Cloud Connect Chicago 2012 summarizing results from a joint Everest Group - Cloud Connect survey on enterprise cloud adoption
Do you know how the cloud is
impacting your IT group today?
Regardless of how much or how little you are using the cloud today, it's having an impact on how your users consume IT and your view your services. Emerging trends in the IT and cloud industry will have profound impacts on how you deliver IT services to your users in 2013.
This presentations covers:
- How to take advantage of shifting IT delivery models
- Detailed real-world examples of organizations like your shifting IT from a cost center to an internal service provider
- How metering IT resource consumption gives you the foundation to massively improve your IT efficiency
- How you can make better decisions about where and how IT workloads are deployed
Modernizing Your IT Infrastructure with Hadoop - Cloudera Summer Webinar Seri...Cloudera, Inc.
You will also learn how to understand key challenges when deploying a Hadoop cluster in production, manage the entire Hadoop lifecycle using a single management console, deliver integrated management of the entire cluster to maximize IT and business agility.
Why Juniper, Driven by Mist AI, Leads the MarketJuniper Networks
While the rest of the industry has started to copy our AIOps Client to Cloud message recently, we understand that others are nowhere close to delivering on the promise of the AI-Driven Enterprise, both in terms of depth of features and breadth of portfolio. Take a look at this SlideShare to truly understand why Juniper, driven by Mist AI, leads the market.
Experiences are everything and Juniper knows this. From when a user engages with an app on their smartphone to when a workload is generated in the cloud to pick up the request, we know that every point of contact along the way impacts the user’s experience, from client to cloud. Learn more about what Juniper has recently announced in this SlideShare!
As much the workforce continues to work remotely, The COVID-19 Pandemic has taught us that the WAN is more important than ever, and troubleshooting it couldn’t be more difficult. Learn how MARVIS & Mist AI simplify the burdensome process of troubleshooting the WAN.
Real AI. Real Results. Mist AI Customer Testimonials.Juniper Networks
See what Juniper customers have to say about how Mist AI has statistically improved the way they run their business. For more information on how Mist AI can improve your network, join us for Transformation Thursdays at: https://www.juniper.net/us/en/forms/ai-driven-demo/
Juniper Networks is introducing the fourth expansion of the AI-driven enterprise to bring artificial intelligence to the LAN, WLAN and now WAN for end-to-end optimization of user experiences and proactive troubleshooting driven by Mist AI.
With the new Juniper Mist WAN Assurance service, customers will receive even better automation and insight in branch locations with AI-driven service level expectations, client-to-cloud event correlation for rapid fault resolution, anomaly detection, and proactive support.
Are you able to deliver reliable experiences for connected devicesJuniper Networks
Here are 5 things you can do with Mist Wired Assurance. With Wired Assurance, you can leverage Juniper EX switch telemetry to enable simpler operations, shorter mean time to repair, and better visibility into end-user experiences for your connected devices, including access points, servers, and IoT endpoints.
It's time to scale way back on those support tickets from your branch users. Security shouldn’t come at the cost of performance. Register now to attend a live demo. You may be eligible to receive a free SRX!
https://www.juniper.net/sdwan-thursdays
Securing IoT at Scale Requires a Holistic ApproachJuniper Networks
Enterprises are moving from small IoT pilots to large-scale
implementations. What are the biggest security
concerns, and how can you overcome them?
Juniper partnered with the IoT Institute to find out. We surveyed 176 technology decision makers and
influencers who have been personally involved in their IoT security strategy and implementations. Here's what the survey found:
We recently conducted a 16-country survey to gauge the appetite for Digital Cohesion. The results suggest business and consumer users see Digital Cohesion as an inevitable, positive societal development.
SDN and NFV: Transforming the Service Provider OrganizationJuniper Networks
As competition increases, service providers must be able to respond quickly to competitive pressures and rapidly evolving customer demands. Learn how NFV and SDN allows service providers to embrace a holistic approach to their business transformation and maximize existing capabilities: http://juni.pr/1JQZYOl
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveJuniper Networks
Service providers are facing more and more pressure as customers demand immediacy. Learn how adopting a carrier-grade, open network platform closes the innovation gap to create value for your network. http://juni.pr/1JQZYOl
Network service providers—those with access networks like DSL, cable, or mobile—continue
to face a dual threat: rising operating expenses associated with explosive bandwidth growth
and declining revenues driven by commoditization. A true Telco cloud, featuring automation
and dynamic scalability, becomes a comprehensive delivery platform enabling network service
providers to offer differentiated services that solve their customer’s business demands.
With mobile subscriptions expected to reach 8.5 billion users by the end of 2016, mobile attack surfaces are growing at an alarming rate. Juniper’s SRX5800 is primed for this increase - with speeds up to 2 Tbps the SRX5800 enables customers to inspect more traffic faster. Mobile has met its match. http://juni.pr/1MKBQDu
High performance data center computing using manageable distributed computingJuniper Networks
Terrapin Trading Show Chicago, Thursday, June 4
Andy Bach, FSI Architect, Juniper Networks
Distributed computing concepts (QFX5100-AA)
Scale and performance enhancements (QFX10000 Series)
Automation capabilities (tie in QFX-PFA)
Larry Van Deusen, Director of the Network Integration Business Unit, Dimension Data
Automation
Value Added Partner Services
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
A View From the CIO's Driver Seat
1. A VIEW FROM THE
CIO’S DRIVER SEAT
Bask Iyer
CIO / SVP, INFRASTRUCTURE, JUNIPER NETWORKS
2. HIGH EXPECTATIONS
Efficiency Growth
Provides Greater
72% Growth Driver
19% Understanding of
Customer Needs
& New Opportunities
Unprepared to Contribute
52% Primary
Responsibility 20% to Growth Beyond Daily
Tech Responsibilities
Rarely Involved
42% Main Strength
28% in Developing New
Products or Services
Source: Economist Intelligence Unit, December 2012
3. MEGATRENDS IMPACTING IT
Cloud Big Data Mobility
Increase Data Increased
44% in Cloud
Usage
53% Capture
Requests 47% Demand
for BYOD
Significant Grappling
58% Network
Impact 52% with Data
Storage 72% Mobile Apps
Top Priority
Source: Forrester Research
8. JUNIPER ON JUNIPER
Edge Data Center WAN Campus & Consumer
Branch Business Devices
1400
24%
Security
53%
Switching
23%
Juniper Products Other
Globally Installed
9. OUR NETWORK POWERS
THE BUSINESS
Security &
Cloud Strategy
Compliance
End User
Applications
Computing
10. CUSTOMER #1
Advanced Services Customer Support Engineering
J Care Plus JTAC PSD / SSD
Edge Campus & Data Center WAN Consumer
Branch Business Devices
JUNIPER ON JUNIPER