Tuesday, 31 August 2010

OpSource Cloud Under the hood

In business since 2002, OpSource sells hosting services, infrastructure services for Software as a Service (SaaS) companies, and now VMware-based cloud services in a bid to compete with Amazon Web Services. But how does it stack up?

The OpSource Cloud is made up of these components:
  • Cloud Servers, or the virtual machines (VMs) or instances running in the OpSource cloud.
  • Cloud Networks, or the private, cloud-based networks used for communication in the OpSource cloud. These private networks can be accessed via a Cisco VPN connection that OpSource offers for free (and in a very intuitive manner).
The OpSource cloud is fairly intuitive to use...and overall the performance is acceptable.
Jason Langone, Contributor
Making assumptions from this graphic, one can assume that OpSource uses Dell servers running a VMware hypervisor, Cisco networking gear and both EMC and HP back-end storage for Cloud Files and the storage of the actual VMs.
OpSource also offers a 100% availability guarantee (which I'm not sure is even possible). After signing up for the OpSource cloud (a very straightforward process), the first step is to deploy a network.
OpSource Network

A network in the OpSource cloud is essentially a cloud-based LAN dedicated to a customer's environment. This cloud-based LAN is not accessible from the naked Internet; it requires the customer to establish a VPN connection into the cloud-based LAN. This network is the default network for VMs and allows the configuration of components such as firewalls, load balancing parameters, NAT rules and multicast networks.
For customers looking to host solutions with a publicly accessible address, a simple change to map a public IP address to an OpSource VM will allow anyone to hit the resource without requiring the VPN connection first.

OpSource Server
Once at least one network has been defined, it's now time to provision a VM or two. The list of available images is as follows:
  • Red Hat 5 Standard
    • 64-bit 1 vCPU
    • 64-bit 2 vCPU
    • 64-bit 4 vCPU
  • Windows 2008 Server Standard
    • 32bit 1 vCPU
At this time, there are no partner images available, although with OpSource allowing you to import your own VM, an argument could be made that the VMware Appliance Marketplace is a potential source of available images as well.

For this example, I deployed a Windows Server 2008 Standard Edition 32-bit with 1 vCPU, 2 GB of RAM and a 32 GB OS drive. The VM takes 10-15 minutes to fully build and customize. Once it is ready for use, it shows up in the "Servers" section of the user interface (UI).

More from Jason Langone:
Reviewing bluelock vCloud ExpressWorking with Hosting.com, Logica and Melbourne IT
Analyzing Terremark as a VMware vCloud Express provider
On first login to the VM, my first impression is that the "Preparing Desktop" phase of my Windows VM goes very quick. In other providers, I've seen this last approximately 60 seconds, but I was on my desktop in less than 10 seconds.

I also deployed a few other VM, including a 2 vCPU instance. A few basic tests were run; overall, the performance within the OpSource cloud is good but could also be characterized as "unpredictable." For example, a 2 vCPU server had low CPU utilization but high CPU % ready times and overall felt sluggish, while another VM ran effortlessly.

The OpSource Cloud experience: What's good
The OpSource cloud is fairly intuitive to use, OpSource users can import their own images, and overall the performance is acceptable. Establishing a VPN connection (via the Cisco-based solution) is very simple and worked flawlessly every time it was tested.

The OpSource Cloud experience: What's bad
The UI could use a "Tasks" area that shows pending, queued, active and completed tasks. When a user creates a VM, for example, they are clueless as to the level of progress. After 10-15 minutes, the VM shows up under "Servers," but I wasn't sure that it took properly the first time so I unnecessarily created a second. After that, I checked the logs to make sure my "create" task was working properly.
The user (if they had access) could certainly check the log to verify that the "create" task was executed, but right now there is no way to check and see how much longer it will take to complete. Finally, I occasionally received several "there has been a problem communicating with the OpSource cloud" messages when performing random tasks from within the UI.

How OpSource can improve its cloud experience
Other than what's noted in "the bad" section above, a few other changes would be nice.
First off, having the ability to hide the "VMware Tools" icon so that the underlying platform is less obvious to the end user. Along the same lines, the option to make it less obvious as to which version of the VMware hypervisor the OpSource cloud is using. Savvy customers will note the dated version of VMware tools.
It would also be beneficial to have a dashboard, similar to Vizioncore's vFoglight, to monitor all of a customer's VM in the OpSource cloud. This could certainly be a cost-based option, but if I was to move a large portion of my environment to the OpSource cloud, I would want a dashboard to monitor the health of my environment without having to tap into application programming interfaces (APIs) or other measures.
The argument could be made that an admin would monitor his OpSource virtual machines just like any other server in the environment; however, if this environment was on-premise in my own data center, I'd have vCenter or System Center to monitor my environment at a bird's eye level.

Finally, it would be great if, during a "delete" action on a VM, it was obvious that the underlying storage was zeroed out. Just because the VM's disk(s) have been deleted, it doesn't mean that the data is completely removed from the (assumedly) EMC or HP storage array(s). While the OpSource cloud meets a handful of industry compliance guidelines, it would still be nice to see and know that the underlying disks on the storage array(s) were overwritten with zeroes.

ABOUT THE AUTHOR: Jason Langone heads virtualization, cloud computing and storage for MicroTech, a service-disabled, veteran-owned and 8(a) small business. Langone won the VMware Vanguard Award in 2007 and has architected some of the largest virtualization and cloud computing implementations to date.


Join Us: http://bit.ly/joincloud

Friday, 27 August 2010

Meraki Webinar: 5 Success Factors for Upgrading Your Wireless ...

Meraki Webinar:
5 Success Factors for Upgrading to 802.11n

Thursday, September 2 11:00 am PDT 

Deploying and maintaining a wireless network need not be a challenge. During this webinar, we will explore how advancements in radio technologies, wireless management, and network automation have enabled small, leveraged IT staffs to deploy wireless, and meet employee's needs for bandwidth and mobility.
Join us as we examine the components of successful wireless deployments:
  • Radio technologies, including 802.11n
  • Safe, isolated Internet access for guests
  • Secure LAN access for employees with WPA2
  • Centralized management and remote administration
  • Simple, cost-effective scalability
Sign Up for the Webinar here - https://www1.gotomeeting.com/register/745260216

Join Us: http://bit.ly/joincloud

Thursday, 19 August 2010

Managing and securing iOS 4 devices at work | Phones | iPhone Central | Macworld

Apple’s iPhone has always had something of an image problem in the workplace, which isn’t surprising given that Apple has always marketed its smartphone more to consumers than to the business world.

In fact, when the iPhone debuted in 2007, there was no way to put third-party apps on one without jailbreaking the device, it didn’t support 3G data networks, it didn’t integrate with Microsoft’s Exchange, and you had to use iTunes to activate it initially and back up or sync data later on. Plus, there were security concerns, since there was no way to require a passcode, encrypt business data or remotely wipe an iPhone if it was lost or stolen.

A lot has changed for the iPhone, its operating system and the smartphone industry as a whole in three years. For people who want to use the iPhone at work and the IT departments that support them, the changes have been good. In fact, some of the major updates in each new iteration of the iPhone operating system (now called iOS) were the ones that made it easier to manage and secure Apple’s mobile platform.

With each passing summer, Apple has polished the business and enterprise features of iOS. It has added Exchange support, support for remote wipe, security and configuration policies (either through Exchange or with configuration profiles that can be loaded onto each device), VPN options and encryption—both whole-device encryption on the iPhone 3GS and targeted app data encryption in iOS 4.

While each of the changes was an improvement, it wasn’t until this year’s arrival of iOS 4—and the iPhone 4 itself—in June that Apple included a new mobile device management (MDM) service that companies could use. As a result, businesses finally got something sorely needed for enterprise iPhone adoption to make sense: the ability to more easily deploy, manage and monitor iPhones used by employees — a capability that has long made Research In Motion’s BlackBerry one of the most trusted mobile platforms.

Note: Although iOS 4 has been rolled out for the iPhone, the iPad won’t get the operating system upgrade until this fall.

Third-party vendors are part of the equation

One surprising thing about how Apple rolled out MDM is that the company largely left implementing it via a server up to other companies. Considering Apple’s penchant for secrecy about upcoming products and its tight control over the App Store, this move seemed out of character. Most people, myself included, figured Apple would offer a robust over-the-air device management solution. And we expected Apple to take a page from RIM’s BlackBerry Enterprise Server and ship something as part of its own Mac OS X Server platform. (That could still happen in the next major OS X Server release.)

Whether or not Apple comes out with its own management server, there are advantages for companies looking to support iOS devices in a secure and managed way. The most obvious one is competition. With seven different options either already on the market or slated to be available by year’s end, companies can choose the one that works best for them. Although many of the core management features of iOS 4 and the MDM service offered by each vendor are essentially the same, there’s still plenty of differentiation among them.

In some cases, the main difference may simply be the management interface. Or it can mean different levels of integration with other technologies such as Active Directory. Other variables run the gamut from the type and format of reports about mobile device use to system requirements (one option is completely Mac-based), cost, existing relationships with providers and the number of non-iOS platforms each can manage.

Standardizing on a mobile platform is tough

Having a standard computing platform is a relatively simple task for most businesses, partly because there’s a limited set of choices: some variation of Windows or Mac OS X. (Yes, Linux and Unix are options, but they typically aren’t chosen for people outside of IT.)

Getting hardware is also easy, since most purchases are made in bulk and typically from a single vendor. If you’re a Mac shop, you’re buying Apple hardware; if you opt for Windows, hardware choices are plentiful.
That kind of standardization doesn’t work as well for smartphones and tablets. Even if your company pays for a smartphone for each employee, IT shops are still apt to encounter problems. Being tied to a single carrier may not be a good choice for all workplaces; different phone models may sport different features (and potentially different management capabilities); phones might only run certain versions of operating systems or offer different sets of bundled or available apps; and there may be varying levels of integration with other systems like VPN, mail servers and intranets.

When workers bring their personal devices to work—as more of us are doing these days—there’s even more potential for problems. IT shops may not even know what devices employees are using, or for what purpose—to say nothing about how secure they are.

A few years ago, companies could afford to buy mobile hardware for their employees. That’s no longer true, and many organizations are embracing the concept of bring-your-own-hardware-to-work. That saves a lot of money, since there’s no hardware to buy and no monthly cell phone bill (for the company). But then you have to manage and secure those devices—or try to dictate what your workers use. (Good luck with that one.)
The most important advantage to Apple’s approach to MDM is that all but one of the third-party companies that have announced or released management servers offer support for platforms beyond iOS. Two of them, Absolute Manage and AirWatch, offer management capabilities for devices other than smartphones or tablets.
Apple would be hard-pressed to develop its own such multiplatform system, as would any smartphone manufacturer. Of course, the specific mix of supported platforms varies with each product, as does the extent of supported features. But that’s the advantage of competition: You should be able to get the one that best meets corporate needs.

Understanding configuration profiles in iOS

A central component to managing mobile devices involves what Apple calls configuration profiles. These are XML lists of different configuration features and optional restrictions that automatically configure an iOS device.

A single configuration file can contain all of the available settings for an iPhone—complete with user credentials for various network resources—or it may contain just a single value that’s not user-specific, such as the details for accessing your mail server, VPN or wireless network. If you put in a server or network-related configuration without specific user credentials, the user will be asked to authenticate the first time they access the resource.

You can assign as many separate granular profiles as you like to any or all phones and they’ll all be enforced. This is helpful if you need to assign configuration data based on job function or department.
The most important features you can set using configuration profiles involve security: requiring a passcode, setting passcode restrictions and forcing employees to use long and complex passcodes. You can also specify how quickly a device locks when not in use and how many failed attempts to unlock it with a passcode are allowed before the device automatically wipes data.

Another security-related option allows you to disable an iPhone’s built-in camera(s). Since it is common for employers to ban camera-enabled devices to avoid sensitive information from leaking, this is an important option in many organizations.
Beyond the security options, there are a number of ways to customize an iOS device for use with your company’s network and resources. You can preconfigure access to Wi-Fi networks, VPN and e-mail servers. You can also pre-populate bookmarks for the mobile Safari browser to ensure that users can easily access internal (or external) Web-based resources. You can even specify Web pages or Web apps to appear as icons on a devices home screen for easier access.

In short, you can do a lot with configuration files to lock down an iPhone.

For more details about configuration profiles, check out Apple’s documentation of the iPhone Configuration Utility. This is the free tool (available for Mac and Windows) that Apple developed for creating and testing configuration profiles. Apple also offers information about various management and deployment scenarios as well as overviews for iOS 4 business integration.

In addition to setting configurations through profiles, the MDM service allows you to query any managed device for more than 20 different pieces of data (including device- and carrier-specific details, as well as usage and verification that security policies are being enforced).

Beyond setting configuration profiles and querying devices, the MDM service allows you to take certain actions on managed devices. You can, for instance, force the device to lock and/or wipe all data. And you can temporarily remove a passcode (in case a remote user has forgotten it). If a passcode is required, the user will be required to create a new one.

You can also install or update configuration profiles as well as installed apps and enterprise application provisioning profiles and in-house apps. All this can be done in the background without user intervention, allowing you to make sure that software, configuration and security policies are in place.
(See below for a full list of the available management and monitoring capabilities of iOS 4.)

Enrolling iOS devices for management

Apple made the process of setting up device management pretty simple using SCEP. A user is instructed to visit a secure Web site and authenticate with his or her user account (typically an Active Directory account or some other LDAP-based directory service). This allows the iPhone to generate a certificate enrollment request and then an identity certificate for the device.

Using that identity certificate and the user’s credentials to establish a secure connection, the device then processes the list of assigned configurations and presents them to the user. When the user agrees to the configurations, the device will download and install the related profiles and can be fully managed.

Management server options

Now that we’ve covered the what and the how of enterprise management, here’s the list of vendors and the expected ship dates for their products:
  • Absolute Manage: Expected availability in the third quarter of this year.
  • Afaria by Sybase: iOS 4 beta program now in progress, with availability also expected in the third quarter.
  • AirWatch: Availability listed as summer 2010.
  • Good for Enterprise: Now available.
  • MobileIron: Now available, and offering discounts to existing Good customers.
  • Tangoe Mobile Device Manager: Now available.
  • Tarmac by Equinux: Now available.
Note: Equinux is known for media and networking tools for Mac OS X and iOS. Tarmac is its first step into the realm of device management and is an iOS-specific solution. It lists a Mac as part of its system requirements, and overall it might be better for small and midsize organizations — particularly those that have a strong Apple presence.

Management and monitoring options for iOS devices

When building configurations, you can specify details about the following: Exchange or POP/IMAP mail servers; VPN configurations; Wi-Fi networks (including hidden networks and networks requiring a passcode or radius authentication); LDAP directories for contacts, access to a CalDAV and/or CardDAV server, public or private calendars that support iCal (.ics) subscriptions; carrier (APN) settings; digital certificates; and Web clips.
You can also mandate a variety of security policies, such as requiring an unlock passcode; allowing a simple passcode or requiring an alphanumeric passcode with a special characters; setting how long a passcode can be used; specifying the length of time before automatic screen locking takes place; setting the number of failed passcode attempts allowed before the device is wiped automatically; requiring that the backup created when syncing to iTunes be encrypted; and indicating whether users can remove configuration profiles.
When it comes to locking down an iOS device, you can restrict access to the following: app installation, the camera, screen captures, automatic mail sync while roaming, voice dialing while the device is locked, in-app purchases, items tagged by iTunes as explicit and access to the security settings for the mobile Safari browser. You can also keep users from launching Safari, YouTube, the iTunes Store and the App Store.
The goal is simple: You want to set as many parameters as needed to ensure that the device is as locked down as your company needs.

In addition to device management, MDM is a service that relies on Apple’s push notification system to receive queries and instructions from a management server to interact with any iOS 4 device in the background. That it runs as an always-on background process is the reason third-party vendors couldn’t create such a solution on their own.

You can build queries for a single device or multiple devices that encompass the following areas: unique device identifier (a value unique to each iOS device); the device name; iOS version; model name and hardware version; serial number; total storage capacity and available free space; IMEI number; the modem firmware version; SIM card ICCID; MAC addresses for both the Wi-Fi and Bluetooth receivers; current carrier (home carrier or roaming); the carrier identified by the installed SIM card as the primary carrier; the version of the carrier settings (APN) data; phone number; whether data roaming is allowed; the installed profiles; installed security certificates and their expiration dates; enforced restrictions; hardware encryption capability; whether a passcode is set; installed applications (including app identifier, name, version, and size); and any application provisioning profiles and their expiration dates—something that’s required for internal corporate iPhone apps distributed outside of the App Store.

Some final thoughts

It’s still unclear whether iOS 4 will truly end the belief that the iPhone (and iPad) platform is more about personal entertainment than workplace functionality. It’s also hard to know for now which smartphone and tablet platforms will have the staying power to dominate the market — though I wouldn’t bet against Apple. For now, it seems clear that workers and businesses will have a wide variety of choices over the next few years, with Apple being just one of many players trying to get their feet in the enterprise door.

Being able to effectively support and manage multiple platforms is crucial for any organization that wants an effective mobile strategy. For iOS 4 devices, and others, these tools offer ways to make the coming diversification easier to manage and secure. And while they certainly don’t ensure that Apple’s devices will be welcomed by IT shops, they do make them increasingly viable options for companies in the years ahead.

[Ryan Faas is a freelance writer and technology consultant specializing in Mac and multiplatform network issues. He has been a Computerworld columnist since 2003 and is a frequent contributor to Peachpit.com. Ryan was also the co-author of O’Reilly’s Essential Mac OS X Panther Server Administration.]

http://www.macworld.com/article/153316/2010/08/ios4_devices_workplace.html?lsrc=rss_weblogs_iphonecentral


Join Us: http://bit.ly/joincloud

Wednesday, 18 August 2010

Remington College Deploys WiFi with Cloud-Based Control -- Campus ...

Remington College, a confederation of private career colleges, has deployed campus wireless networks that are managed centrally through a cloud-based service. The 19 schools in 10 states have chosen Meraki to supply 802.11n WiFi gear to extend wireless access to previously uncovered areas. The campuses have a total of about 9,000 students and 1,400 staff.

The previous setup included a multitude of vendors' access points. As the students' consumption of digital content increased, the strain on the network--and the college's IT staff--grew. Remington wanted to standardize on a wireless platform that could be managed centrally from its headquarters and that would deliver a better user experience.

After an evaluation of systems from various vendors, Meraki was chosen. The expansion with Meraki didn't require deployment of a wireless controller at each location, according to the college. Meraki's access points can be managed over the Web by the vendor's Cloud Controller, a Web-based network management console.
"I would definitely recommend Meraki and have already referred it to other school groups who would benefit from this offering," said CIO Chuck Farraj. "We are big fans of the Cloud Controller, and Meraki has created the most user-friendly dashboard we've seen. It's a great product and a very ingenious way to approach enterprise wireless."

http://www.google.com/url?sa=X&q=http://campustechnology.com/Articles/2010/08/09/Remington-College-Deploys-WiFi-with-Cloud-Based-Control.aspx&ct=ga&cad=:s7:f1:v0:d2:i1:lt:e0:p0:t1281486641:&cd=gpZ13GojqbE&usg=AFQjCNE1CFyM7x2TdiDxcQKez7cvMLR-wA


Join Us: http://bit.ly/joincloud

Tuesday, 17 August 2010

Expand Networks Joins The HP AllianceONE Program

Expand Networks, (www.expand.com) the leader in WAN optimization for branch office consolidation and virtualization, today announced that it has joined the HP AllianceONE partner program, gaining network specialisation partner status. 

The HP AllianceONE program provides hardware and software vendors, original equipment manufacturers (OEM) and systems integrators the tools and resources they need to more effectively address client needs. Expand Networks will leverage HP AllianceONE solutions, tools and resources to help clients speed time to application deployment, optimize infrastructure capacity, reduce power consumption and free resources to focus on innovation that drives business growth.

Adam Davison, VP corporate sales & marketing at Expand Networks, comments, “Our approach to WAN optimization is complementary to the strategic networking investments of enterprises today, acting as a key technology enabler to IT initiatives such as server based computing and VDI. We are excited to become an HP AllianceONE partner. The collaborative program provides real market benefits as WAN optimization increasingly becomes a key piece of the networking puzzle.” 

“HP partners such as Expand Networks are looking for ways to increase efficiency, focus on their business, and deliver excellent customer service,” said Robin Hensley, director, Solution and Strategic Alliances, HP. ”By leveraging the solutions, tools, services and expertise offered through AllianceONE, Expand can focus on the continued support of its clients while growing its business at the same time.”

As part of the HP AllianceONE partner program, Expand’s integrated technology, flexibly delivered as a Virtual Accelerator (VACC), Accelerator appliance (ACC) or as mobile client software (MACC), plus its comprehensive management platform ExpandView, will add significant value to WAN investments across all network environments. 

The HP AllianceONE partner program offers a solid framework for collaboration by integrating servers, storage, networking, security, power & cooling and services. As a member of the AllianceONE program, Expand Networks can significantly extend market reach and improve selling success.

http://expand.com/news-events/release.aspx?pressID=e7a9502e-d6c0-4a9c-a4cc-2feb1740e46b


Join Us: http://bit.ly/joincloud

Monday, 16 August 2010

802.11n Technology sponsored by Meraki

The 802.11n draft 2.0 standard offers several technical benefits over previous technology generations, which result in improved throughput to 802.11n-based clients, as well as greater reliability for legacy 802.11a/b/g clients.

802.11n is much more than just a new radio for 802.11. In addition to providing higher bit rates (as was done in 802.11a, b, and g), 802.11n makes dramatic changes to the basic frame format that is used by 802.11 devices to communicate with each other. This section will describe the changes incorporated in 802.11n, including MIMO, radio enhancements, and MAC enhancements.

Environmental characteristics and network density plays a significant role in the ultimate performance of a network. In well designed networks, each access point can serve over 130Mbps of TCP throughput to clients using 802.11n technology, and multiple radios can operate simultaneously to provide several gigabits of throughput.

http://searchstorage.bitpipe.com/detail/RES/1281124703_555.html?asrc=RSS_BP_KABPMANAGEIT


Join Us: http://bit.ly/joincloud

Friday, 13 August 2010

A New Mobile Operating System for IT

Had a very interesting conversation this week with a forward-thinking IT department.  They are trying to address the mobile client fragmentation and consumerization problem head on.  They know the demand they are seeing from users will only increase and they know unnatural restrictions on that demand will only inhibit innovation and the growth of the business.

Their strategy is to have a single central management platform that operates across client OS and apps, and then push the decisions and responsibilities for the applications themselves to the lines of business.  In other words, set the standards, enforce the policies, but get out of the way of the applications.  So an agnostic core that supports a diverse and evolving set of user experiences.

It struck me that the central management platform actually becomes IT’s mobile “operating system”.  If we assume that user devices will continue to be spread across multiple client operating systems (e.g. BlackBerry, iOS, Android, Windows variants, Symbian), the only way for IT to truly scale is to reduce the complexity IT itself faces at the core.  Users get to use what they need, lines of business get to deploy what they want, and IT doesn’t get fragmented beyond repair.

95% of the IT teams I talk to these days believe multi-OS is the future.  So the notion that multi-OS management is required is broadly accepted.  However, some look to it as a band-aid to solve the immediate problem of the CEO buying a cool new unsupported device.  What it needs to be, however, is a strategic foundation to ensure IT efficiency and responsiveness in the smartphone era.

http://mobileiron.com/blog/2010/08/management-as-operating-system/


Join Us: http://bit.ly/joincloud

Thursday, 12 August 2010

OpSource Named Top Cloud and Infrastructure Company on the ...

OpSource, Inc., the leader in enterprise cloud and managed hosting, today announced that OpSource has been named the top cloud and infrastructure company on the AlwaysOn Global 250 list.

The companies selected for the AlwaysOn Global 250 represent the top private companies that are demonstrating significant market traction and pursuing game-changing technology. The list is selected by AlwaysOn editors in collaboration with partners at Manatt, Morgan Stanley, the Blackstone Group, KPMG, Silicon Valley Bank, Sonnenschein, and Bridge Bank, as well as industry experts across the globe. Judges recognize honorees based on market opportunity, nature of innovation, media buzz and awareness, commercialization and ability to create stakeholder value.

http://www.sourcews.com/opsource-named-top-cloud-infrastructure


Join Us: http://bit.ly/joincloud

Meraki Adds High-Resolution Spectrum Analysis to Cloud-Based Wireless Optimization Suite

Meraki Auto RF, now with spectrum analysis, automatically delivers consistent, reliable performance under challenging interference conditions

SAN FRANCISCO — August 11, 2010 – Meraki, the cloud-based wireless networking company, today announced the addition of high-resolution spectrum analyses to Meraki Auto RF, their cloud-based wireless optimization system. Auto RF with spectrum analysis is included with Meraki’s Enterprise Cloud Controller, and will be available free-of-charge to all Meraki enterprise customers beginning September 30.

While wireless networks are becoming more and more business-critical for organizations, new and greater numbers of interference sources – new Bluetooth headsets, microwave ovens, cordless phones, and neighboring wireless networks – are appearing every day. As a result, many organizations have turned to costly and complex wireless optimization solutions to ensure high performance. Meraki Auto RF offers an alternative: an incredibly powerful, yet completely automated RF optimization system, completely integral to the wireless network, that delivers optimal performance under dynamic interference conditions. The addition of high-resolution spectrum analysis now enables Auto RF to detect and mitigate non-802.11 interference sources.

Benefits of Auto RF with Spectrum Analysis
• Increased reliability under challenging RF conditions
• Better coverage with fewer access points
• Higher client throughput
• Requires no additional hardware, software licenses, cost or complexity

Spectrum Analyzer Key Features
• Granular reporting from dedicated spectrum analysis hardware on APs
• Quantifies interference from Bluetooth devices, microwave ovens, etc.
• Real-time spectrum visualization over the web
• Available on all Meraki 802.11n access points

Cloud-Based Optimization Architecture
With Auto RF, every access point on the network continuously and automatically monitors its surroundings for any source of interference that could affect Wi-Fi performance. Interference metrics, including newly added spectrum analysis data, are continually uploaded to the Cloud Controller from the access points. Armed with real-time and historical data, the Cloud Controller continually assesses the health of the entire network, dynamically tuning wireless channel selection, transmit power, and client connection settings to automatically adapt to changing interference conditions. Auto RF, leveraging the power of multi-tenant cloud computing, tunes optimization algorithms with inputs from 15,000+ networks.

“What our customers love about Auto RF is that they don’t have to worry about complex radio settings – they just set it and forget it,” says Kiren Sekar, Product Marketing Manager at Meraki. “Adding high-resolution spectrum analysis now makes Auto RF even more capable of quickly and accurately responding to interference from non-Wi-Fi sources, ensuring that our customers get optimal network performance in even the toughest interference conditions.”
Join Us: http://bit.ly/joincloud

Meraki Debuts First Cloud-Based Application Traffic Shaper

SAN FRANCISCO — August 11, 2010 – Meraki, the cloud-based wireless networking company, today announced the launch of Meraki Traffic Shaper, an application aware bandwidth control system integrated with Meraki’s wireless networking solutions. Traffic Shaper is the first cloud-managed traffic shaper, as well as the first intelligent bandwidth control to be integrated into a wireless LAN. It enables administrators to see precisely how their network is being used, and to reserve bandwidth for critical applications while restricting recreational network usage.

Traffic Shaper enables administrators to:
• Analyze network traffic by application or application class
• Enforce traffic shaping policies (e.g., limit each user’s peer to peer traffic)
• Stay up to date with hundreds of constantly updated application signatures
• Prioritize critical applications using QoS policies

Traffic Shaper is Business Critical
Wireless LANs have become a critical part of a network infrastructure. Yet mission-critical applications increasingly compete with bandwidth-intensive recreational applications like video streaming and peer-to-peer file. The result? The ability to intelligently control wireless traffic translates directly to business application performance.

Controlling Traffic with a Wireless Network
While dedicated traffic shaping appliances are available, they come at a considerable cost – often tens or even hundreds of thousands of dollars – and require yet another solution to be deployed, maintained, and managed. Integrating Traffic Shaper directly into the wireless LAN provides intelligent bandwidth control with no additional cost and complexity.

Cloud Based Application Signatures are Always Up to Date
Traffic Shaper’s cloud-based signature database is constantly updated, enabling Traffic Shaper to identify new and changing applications without requiring the administrator to download and install software updates. Meraki’s cloud-based architecture also enables Traffic Shaper to continually learn from Meraki’s 15,000+ networks and millions of users, increasing the accuracy and precision of application fingerprints.

Line-Rate Layer 7 Fingerprinting on Every Access Point
Traffic Shaper operates through a custom-built layer 7 packet inspection engine running on each Meraki 802.11n access point. Meraki Traffic Shaper recognizes hundreds of applications, including recreational applications such as YouTube and BitTorrent, and business applications like Salesforce.com and Google Apps. Traffic Shaper provides extensive visibility and control into network usage. Administrators may view and control bandwidth consumption by application, by content type (e.g. video, audio, text), and by user. Meraki Traffic Shaper runs at line rate, with no loss of performance.

Beta-Tested by Top Universities and Enterprises
Traffic Shaper has been beta-tested by a number of Meraki Enterprise customers, including Stanford University’s Computer Science department, Foster Pepper PLLC, and Sweet Briar College.

“For wireless-heavy campuses like ours, this is an essential tool for managing bandwidth,” said Aaron Mahler, Director of Network Services at Sweet Briar College. “As we move critical applications for staff and faculty to the cloud, we have to ensure uninterrupted access to these tools while maintaining a quality experience for recreational users. Traffic Shaper empowers us with detailed knowledge of how people are actually using the network so we can make educated decisions when it comes time to add bandwidth.”

“With the proliferation of business-critical web applications, and bandwidth-intensive recreational applications spilling over to business and campus networks, application-aware bandwidth control is a key to a high-performance wireless network,” says Meraki CEO Sanjit Biswas. “Traffic Shaper is a huge step forward in enabling administrators to understand and control what is flowing over their networks Our cloud-based architecture lets us deliver features like Traffic Shaper without adding cost or complexity to our customers’ networks.”

Traffic Shaper will be available for use by all Meraki Enterprise customers, with no additional hardware or software, and at no additional cost. Traffic Shaper is currently in beta, and will be generally available September 30.

Join Us: http://bit.ly/joincloud

Wednesday, 11 August 2010

A New Paradigm for Mobile Device Management - Mobile Device ...

LIMITED DISTRIBUTION:Get a COMPLIMENTARY copy of IDC's new report "A New Paradigm for Mobile Device Management," available for a limited time.
TARGET AUDIENCE:
Network professionals and enterprise architects looking to implement solutions that will deliver enhanced application and data center availability, as well as provide comprehensive management for mobile devices and wireless LANs (WLANs).

Key findings from IDC Analysts:

Mobile device management market growth drivers. 
  • Large smartphone shipments to businesses and consumers
  • Rapid growth in mobile applications
Mobile device management challenges for the enterprise
  • Controlling access on a variety of converged mobile devices (smartphones) brought into the enterprise
  • Allowing employees to be productive with the devices of their choice
IDC Analysts Sean Ryan and Stacy Crook report: "MobileIron brings a compelling offering that addresses the dynamics of today's market for enterprise mobility. Its unique attributes, including robust capabilities across the leading enterpise OS platforms and a compelling price point, cause us to expect MobileIron will grow significantly faster than the overall market."


http://info.mobileiron.com/IDC_Step1_201007.html


Join Us: http://bit.ly/joincloud

Tuesday, 10 August 2010

MobileIron Raises $16M for Smartphone Management


Converge Network Digest
MobileIron, a start-up based in Mountain View, California, has raised $16 million in Series C financing for its multi-OS smartphone management solutions. ...



Monday, 9 August 2010

Expand Networks Demonstrates Optimized Military Communications at LandWarNet 2010


Expand Networks www.expand.com, the largest supplier of WAN Optimization products to US Government and Military agencies, will demonstrate the latest innovations in acceleration techniques for military communications, to include tactical cloud computing and comms-on-the move at LandWarNet 2010.

As military organizations continue to seek the best methods to deliver network services, visitors to the booth can learn how Expand’s technology eliminates congestion, latency and reliability  issues experienced by the forces over satellite links; maximizing military communications, even in the most  harsh locations on land, in air and at sea. A live demonstration will also enable delegates to witness how Expand’s unique optimization techniques are bringing real-time network services closer to the forward edge of the battle area and accelerate the kill-chain.

“Within any military environment, performance is everything and we understand that the network is no exception to this rule,” explains Howard Teicher, Vice President for Public Sector & Satellite Markets at Expand Networks. “The military cannot afford to be limited by unreliable wireless or satellite links for mission-critical communications in combat environments.  They require optimization to squeeze every possible bit of performance out of a network, whether for intelligence, command and control, or tactical communications - or morale, welfare and recreation – all critical components to achieving a mission.”
Expand Networks continued technology innovations have long inspired confidence in the delivery of military communications tools; since its initial 1999 rollout in the Defense Information Systems Agency (DISA), more than 11,000 Expand Networks Accelerators have been deployed throughout the US government and in all branches of the American Military and US Coast Guard.

 “We have a long experience and leadership position in the military and government sectors at Expand, and we are committed to delivering the superior performance and communication so vital to the military in these challenging environments,” Teicher continues. “Operating enterprise-class applications over low bandwidth-high latency satellite links demands a dynamic, robust WAN Optimization capability to satisfy the soldiers’ network performance requirements.  Expand’s flexible deployment options, including virtual appliances running on commodity hardware, and client software for individual workstations, provide the Army with an efficient optimization capability for every environment.

The technology demonstration will enable military experts to explore Expand’s superior capabilities including integrated Space Communication Protocol Standard technology, Layer 7 traffic discovery and Quality of Service, acceleration and optimization in a real-time environment where changes can be configured on the fly to simulate any military environment.

Expand Networks will be demonstrating its Virtual Accelerator and Mobile Accelerator Client for optimizing tactical cloud computing and comms-on-the move at LandWarNet 2010, Tampa Convention Centre, Tampa, Fl. from August 3rd- 5th . Visit booth# 1646 to find out more.

Expand Networks’ Accelerators have recently been deployed with US Army and Marine Corps forces in Southwest Asia since the start of Operation Enduring Freedom, and the Expand Accelerator Operating System is also utilized within the US Army’s WIN-T architecture. Find out more at: http://www.expand.com/satellite/default.aspx#military

Thursday, 5 August 2010

Meraki Extends "Free The Net" Project In San Francisco To ...

Meraki, the company that is pioneering new technologies to bring the next billion people online, announced today it will "unwire" affordable housing in San Francisco, another milestone in the company's effort to bring free broadband wi-fi access to the city's residents.

"The Meraki mission is to change the economics of Internet access for everyone, including those who live in some of our most underserved communities," said Sanjit Biswas, CEO and founder of Meraki. "For a fraction of the cost of hardwiring these communities, we will bring high-speed Internet access to families who have never had access in their home before. And we're bringing new communities online everyday across the globe."

Already Meraki has established free wireless access in Altamont Hotel and Dunleavy Plaza, two of the city's affordable housing communities that provide single occupancy and family housing to over 100 tenants. Over the coming months, Meraki will extend Free the Net to dozens of similar communities in San Francisco.

Mayor Gavin Newsom and Sanjit Biswas appeared together today at the Altamont Hotel and Valencia Gardens where they spoke about unwiring the city.

"San Francisco is one of the most connected cities in the country and we are excited to support the work of companies such as Meraki in their endeavor to bring wifi access to every neighborhood in the city," said Mayor Gavin Newsom. "It is due to local based companies like Meraki who blend the best technology with the best intentions and an ability to execute which make our city great."

Meraki also said it has added new neighborhoods to its "Free the Net" network in the city. Residents in Noe Valley and Bernal Heights are now connecting to the network. Residents in those neighborhoods as well as those in the Mission, Alamo Square Hayes Valley, Nob Hill, Russian Hill and the Castro can now sign up at http://sf.meraki.com ; to find out how they can help spread access throughout their community. Meraki is providing this free access as it tests its ability to bring wireless access to an entire city.

San Francisco residents have transferred more than 25 terabytes of data on the Meraki network and activity on the network has increased 120% since January of this year. In the meantime, Meraki wireless networks continue to proliferate around the country. Thousands of Meraki networks have been established in more than 100 countries across the globe.

Meraki's technology is unlike any other wireless access technology currently available. Every point in the network communicates with each access point and reports information back to a central server which can optimize speed and performance throughout the network.

Meraki is funding the entire cost for establishing the network across the city, including affordable housing communities. The company is funding "Free the Net" in order to demonstrate to other communities around the world that Meraki technology can be used to create city-wide wireless networks at a fraction of current costs. No public funds will be used to build the Meraki wireless network in San Francisco.

Meraki said it will initially use Wi-Fi technology to build its network, but plans on updating and improving the technology infrastructure with technology innovations developed by the company or others.

The company expects to have "Free the Net" access points up and running in every neighborhood of the city by the end of this year. Meraki makes their new home in San Francisco this week.

http://lifestyletom.com/path/rao10925685146ros/roin59012456772


Join Us: http://bit.ly/joincloud

Wednesday, 4 August 2010

OpSource Redefines Strategy and Extends Application Management and ...

OpSource, Inc., the leader in enterprise cloud and managed hosting, today announced that it has redefined its strategy to better address the needs of enterprises and the channel. OpSource has restructured its product portfolio and developed customized solutions to enable its customers to use both cloud and managed hosting services together to support more complex IT requirements. Additionally, the company has introduced the OpSource Partner Ecosystem partner program to deliver joint solutions.

"In order to be more flexible and cost-efficient, CIOs must be able to use cloud computing resources and SaaS applications as easily and securely as internally-managed resources," said Treb Ryan, CEO, OpSource. "More than 30% of our managed hosting customers with dedicated environments also use our pay-as-you-go cloud services. At the same time, more and more of our OpSource Cloud customers were asking for help to scale their mission-critical applications running on the cloud. It just made sense to integrate our product portfolio."

OpSource has reorganized its offerings into services and solutions.
Services now include:
  • OpSource Managed Hosting: a bundled managed service including colocation, network connectivity, dedicated or virtual servers, operating system management, storage, firewalls, load balancers, and backup infrastructure
  • OpSource Cloud Hosting: a pay-as-you-go service that includes a virtual server, Linux or Microsoft Windows operating system, CPU, RAM, storage and customer-configurable VLAN, firewall, and load balancer
  • OpSource Application Operations: application management services including Database Management, Change Management, Performance Management, Application Optimization and Compliance
  • OpSource Business Operations: business tools that simplify billing, analytics and customer support
Customized solutions include:
  • SaaS ISV Solutions: Cloud and Managed Hosting services paired with Application Operations and Business Operations to scale operations and shorten time to market
  • Telecom Solutions: White Label resale of the OpSource Cloud with Business Operations billing integration
  • Cloud Platform Solutions: integration of the OpSource Cloud into Platform-as-a-Service (PaaS) solutions
"Many enterprises are beginning to see the intrinsic value of sourcing both managed hosting, colocation and cloud infrastructure service from a single provider," said Ted Chamberlin, Gartner Research Director. "Managed service providers who understand this trend, and offer these services with a single pane of glass management tools, will be the long term winners in the hosting market."

To support its new focus, OpSource today announced the OpSource Partner Ecosystem, a comprehensive new partnership program. This program expands the company's commitment to its partners by providing benefits for: developers and consultants; cloud platforms; integrators and MSPs; telecoms; and distributors and resellers.

"OpSource really understands how to help its partners make the most of the cloud, offering customized solutions like white labeling," said NTT America Vice President of Products and Solutions Doug McMaster. "Working with OpSource we were able to quickly and easily build the NTT America Cloud, which not only brings our customers a leading cloud offering but also demonstrates our commitment to providing our customers with as complete and competitive hosting portfolio as possible."

http://andhranews.net/Business/2010/July/19-OpSource-Redefines-Strategy-Extends-29843.asp


Join Us: http://bit.ly/joincloud

Tuesday, 3 August 2010

WiFi at your event should just work

Meraki at SF Beta 

It doesn't matter ho larger or small the conference is, it seems like they always have WiFi problems. The networks are consistently slow, frequently fail, and usually require some arcane security measure that involve weirdly-small scraps of paper and bizarre usernames.

There's no reason for WiFi to be this frustrating!

At Meraki, we've had some experience setting up WiFi at large events so we know it can be done, it's just a matter of having the right equipment and a little know-how. We'll give you both, for free.

We've started a new project to loan our enterprise-grade WiFi gear to smaller tech conferences, meetups, BarCamps, WordCamps, Tweetups, whathaveyou … for free. You provide the Internet connection, and we'll provide a rock-solid WiFi connection. All we ask in return is that if you like our products, tell your friends, and if not, let us know how we can make them better.

We've just gotten started with this project, but so far, meetups like SF BetaWordCamp Boulder, and Hacks/Hackers NYC have had great experiences.
"One of the best decisions we made for our conference. Not only was the delivery and setup effortless, our network remained stable throughout the entire day. No matter your wireless needs, this experience alone tells me Meraki's solutions are some of the best." —WordCamp Boulder
As part of this project, we're excited to be partnering with Social Media Club and WordCamp.org. We'll offer a streamlined signup process for the many BarCamp-style events that these organizations sponsor throughout the year.

If you run an event and would like to participate in our new Free Event WiFi project, we'd love it if you signed up! We're looking for small to medium-sized events that have enough bandwidth to support that group.
More information
If you're interested, head on over to the signup page to learn more or take a look at our plug-and-play setup guide, or ask any questions below!

Monday, 2 August 2010

Meraki Wireless LAN Reviewed – SmallNetBuilder « Chicago Mac/PC ...

Meraki Wireless LAN Reviewed – SmallNetBuilder. This is a great way for small business of under 5000 to get wireless access without having to pay for expensive consulting or design. Enhanced by Zemanta ...

Chicago Mac/PC Support - http://chimac.net/