Quantcast
Channel: Video – Huawei Enterprise Blog
Viewing all 147 articles
Browse latest View live

How Does Big Data Analytics Enhance Network Security?

$
0
0

Big data or big data analytics has become a hot topic in recent years. Unlike traditional analysis methods where the law of cause and effect applies, big data analytics generates predictions based on large amounts of data, often meaning that links leading to results are not immediately evident.

An interesting real-life case study on the use of data analytics is Google’s prediction of a flu pandemic in the United States . The national medical agencies tried to collect information on patients to predict trends and prevention. But the collection and analysis of this data is a slow and difficult process. However, search engine giant Google detected the spread of a flu virus before any medical organization by analyzing search data. The data showed that many people conducted Google searches to learn about flu symptoms and remedies. Google’s findings were completely aligned with the health authorities’ reports filed after the flu pandemic.

This is the amazing ability of big data analytics. It enables us to generate reliable analyses, even if there are no clear links or causes.

So why didn’t we start leveraging big data analytics earlier? The processing and analysis of huge volumes of data requires advanced computing and storage resources that were not available in the past. Big data analytics has a significant impact on databases. Traditional databases typically synchronize data to determine the causality between the data. While big data analytics does not have these requirements, it presents new database-related challenges, which requires a new type of database. From the networking, storage, and computing architecture perspective, the impact of big data is relatively low.

The Challenges of Internet of Things

The Internet of Things (IoT) is also a popular topic in the ICT industry. IoT is expected to connect everything around the globe, which will enable centralized big data collection and analysis. Therefore, a rise in the use of IoT will result in wider adoption of big data analytics.

IoT is expected to present major challenges to the bandwidth, reliability, and security of networks. With a sharp increase in the number of network access nodes, expanded bandwidth is required. The reliability and security of data transmission pipes is also extremely important for the IoT.

Protecting Networks with Big Data Analytics

So how can enterprises enhance network security to prepare for this? We have discovered that with a comprehensive overview of an entire network, network administrators can detect more threats compared with threat detection from a single access point. Enterprise can achieve this with software-defined networking (SDN)-based controllers and big data analytics. For example, many hospitals use behavior analysis software to prevent the misuse of patients’ personal information. Behavior analysis software is used to detect abnormal network behavior to identify employees that may be leaking patient information.

Big data analytics also enables network administrators to predefine the policies or actions of the controller to reduce maintenance workload and ensure secure operations throughout the entire network. It can preset rules to ensure that suspicious traffic is imported to the security center and eliminated, as appropriate.

In addition, another benefit of big data analytics is its ability to process large amounts of data quickly to generate real-time results. It can analyze network security attacks immediately, detect network security problems, and discover potential security risks to prevent security disasters.

The Technical Details

For enhanced security, an agile switch that supports the next-generation firewall service board and multiple security protection functions including an Intrusion Prevention System (IPS), Intrusion Detection System (IDS), and anti-DDoS is needed. The aggregation switch at the aggregation layer will be required to analyze various security events.

Let’s look at an example. In network operations, the traffic traveling through some of the agile switch’s ports at the aggregation layer may suddenly increase due to DDoS attacks. When traffic volume reaches a threshold, the agile switch alerts the controller. The security behavior analysis module of the controller predefines rules for importing suspicious traffic. After receiving the alert, the controller conducts Policy-Based Routing (PBR) for traffic importing to the aggregation switch and imports suspicious traffic to the security center. The security center then cleans the DDoS traffic and sends the traffic to the aggregation switch. This way, network attacks are not spread across the network. Other policies, such as a drop policy, can also be configured.

Alternatively, enterprises can let the system alert the administrator first, and then have the administrator configure policies accordingly to address the potential breach. The advantage of doing this is to prevent risks in case preconfigured policies are incorrect, which can interrupt network operations.

Network administrators can also choose to automate the entire process. This helps improve efficiency and reduce IT costs. We believe that the automation of network management will happen over time, similar to automation of the computer and industrial control fields.

In addition, enterprises also need protective measures against its network administrators, who have the authority to access and manage its networks. Operational errors, incorrect configurations, or intentional damage by network administrators can have a seriously impact on networks. An audit can be conducted to monitor network administrators.

The power of big data is limitless. It enables information analysis for early detection even if there is no apparent cause. For network security, enterprises can leverage big data to effectively detect and quickly remove threats to ensure that their user data and networks are well protected.

By Swift Liu, President, Switch & Enterprise Communications Product Line, Huawei 

The post How Does Big Data Analytics Enhance Network Security? appeared first on Huawei Enterprise Blog.


The Intelligent Video Analysis in Video Surveillance

$
0
0
Video Surveillance

As video surveillance is developing quickly, it is impossible for people to manually process massive video feeds in an effective manner.

With intelligent video analysis technology, video surveillance systems efficiently filter out a large number of useless data, trace and analyze moving objects in video feeds, detect abnormal behaviors, and generate alarms for monitoring personnel to take appropriate measures. Intelligent video analysis is the most concerned video image processing technology in the security protection industry.

Video surveillance is an essential part of a security protection system. Quick development of computer technologies provides a large platform for video surveillance, particularly intelligent video analysis, to apply to the security protection industry. In this case, high-risk behaviors can be prevented in advance. This dramatically improves video surveillance quality and reduces the workload for monitoring personnel.

Significance

Traditional video surveillance systems depend on manual monitoring and recording to enable security protection. However, it is impossible for personnel to accurately and efficiently monitor all scenarios around the clock. In addition, people can play back video recordings only after event occurrence, which consumes a large amount of time while failing to minimize losses.

These problems can be well resolved by video surveillance based on intelligent analysis. A key feature of an intelligent video analysis system is as follows: Without manual intervention, the system sorts, recognizes, and traces behaviors in video images shot by cameras. This feature enables the system to support routine management and take appropriate and timely measures in case of an exception.

Intelligent video analysis provides an impressive array of advantages, including behavior analysis, intrusion detection, moving object tracking, abandoned object detection, moved object detection, camera protection, full utilization of video resources, and dramatic decrease in labor costs.

Implementation Principles

Intelligent video analysis is an intelligent video surveillance technology based on object behaviors. Unlike traditional mobile detection technology, intelligent video analysis separates objects from the scenario background, removes background interferences (such as shaking leaves, surface waves, and lighting changes), identifies the real objects, and tracks object behaviors.
The essential difference between intelligent video analysis and mobile detection is: the former accurately identifies moving objects in video images, while the latter only recognizes the changes in video images, unable to distinguish objects and background interferences. Therefore, the former has a higher anti-interference capability than the latter.

Intelligent video analysis technology uses background subtraction to detect changes (such as intrusion, abandoned object, and reverse driving) in video images: compares video frames and background frames; regards pixel changes in the same location as the real changes; processes, identifies, and tracks the location to obtain basic information about objects, including location, size, shape, speed, and stay time; establishes mapping relationships between video images and descriptions; and eventually generates alarms based on preset rules.

Classification

In a broad sense, intelligent video analysis technology is classified into the following three categories:

1. Video analysis:

Video analysis helps people find out objects in video images; and detect moving features of the objects, such as pixel position, moving direction, and moving speed, object shape and change. Video analysis includes the following functional modules: intrusion detection, moving direction detection, object movement detection, object appearance and disappearance detection, people traffic statistics, vehicle traffic statistics, automatic Pan-Tilt-Zoom (PTZ) tracking, and intelligent system self-check.

2. Video recognition:

Video recognition includes face, gait, and license plate recognition. Video recognition helps people find out common features from video images. For example, a face must have two eyes. If the two eyes are found, it will be easy to determine the face location and size.

3. Video enhancement:

Video enhancement helps people optimize low-definition, blurry, and swinging video images to improve image quality. Specific video enhancement approaches include: infrared night vision image enhancement, license plate recognition deblurring, light change and shadow suppression, tide and object size filtering, and video image stabilization. Intelligent video analysis technology can be implemented in either of the following ways: front-end solution based on intelligent video processors; and back-end intelligent video analysis solution based on video surveillance.

Front-end solution based on intelligent video processors: The front-end video analysis devices perform object tracking, behavior recognition, and alarm generation. Only alarms are sent to the surveillance center via a network. Advantage: Video analysis devices are placed next to IP cameras, which effectively reduces the bandwidth consumed by video streams. Disadvantages: Complex installation increases investment costs; dispersed device deployment leads to high damage risks; and alarms are separated from video surveillance.
Back-end intelligent video analysis solution based on video surveillance: All cameras can only collect video data, and collected data must be sent to the video surveillance center for analysis. Advantage: Without front-end detection devices (such as infrared sensors), the solution effectively integrates with existing surveillance systems, and delivers high flexibility and scalability. Disadvantage: The solution controls only key surveillance sites, and poses high requirements for computer performance and network bandwidth.

Application Status Quo and Future Trend

1. Status Quo

Intelligent video analysis has aroused extensive concern in recent years, but has not been effectively popularized. On the one hand, intelligent video analysis systems have been primarily applied in special industries (such as prisons, museums, warehouses, factories, and subway stations), but still face many problems when coming to social or civil surveillance scenarios, including high false alarm rate due to complex environmental conditions. On the other hand, system architecture and CPU performance have become bottlenecks to intelligent video analysis at a large number of surveillance sites.

Future Trend

Intelligent video surveillance demands vary remarkably according to industries. To meet increasing security requirements, intelligent video surveillance systems must be able to recognize and analyze a growing number of behaviors.  The widespread application of intelligent video analysis is determined by the ability to suit industry-specific customer needs. Video surveillance will be more intelligent and networked to recognize behaviors just like people’s eyes and generate alarms accurately. Due to continuous development of security standards and constant increase of governmental supervision, intelligent video analysis will grow and prosper in a variety of industries.

The post The Intelligent Video Analysis in Video Surveillance appeared first on Huawei Enterprise Blog.

Huawei eLTE Solution for Smart Grids

$
0
0
Huawei eLTE Solution for Smart Grids

Huawei eLTE solution can also be customized for smart grids, providing wide coverage, ultra-high connectivity, ensuring always online, few delays, and high reliability, valuable features for grid monitoring and operations. The single network also features automatic power allocation and measurement, wireless video surveillance, and emergency communication services. Watch the video to learn more.

The post Huawei eLTE Solution for Smart Grids appeared first on Huawei Enterprise Blog.

How LTE Becomes Intrinsic Part of Critical Communications?

$
0
0
How LTE Becomes Intrinsic Part of Critical Communications

The world is becoming connected and with the comes the need for enhanced communications that narrow band just won’t be able to service. We need a broadband requirement. We will need solutions like LTE in order to be able to service that need.

Thomas Lynch, Director of IHS Critical Communications Group IHS Inc, talks about how LTE will become an intrinsic part of critical communications users need in the future. Watch the for more details and information.

Q: Why do the critical communications industries need broadband?

Thomas Lynch : If you look at critical communications industries, they originated from analogue technologies. Over the past 15 years we have had other technologies such as TETRA, P25 and more recently the DMR based cost optimized technologies. However, these only have a small capacity compared to what broadband capability does offer. More so our general consumer via their iPhone or Samsung has an enhanced capability especially with regard to voice, data and video, and these are the killer APPs that could increase functionality for our critical communications users as we move forward. And this is what broadband LTE offers and this is what the market is looking at right now as a future viable solution to service these particular needs.

Q: Can you talk about the importance of broadband data for critical communications?

Thomas Lynch : Broadband data will become intrinsic in operations. I have no doubt about that. We conduct a number of end user research surveys. I talk to engineers. We run case studies and I also speak with all the global manufacturers for critical communications technologies. And I can confirm now that operational requirements in the future (and I am not just talking about 10 years down the line but I am talking about 1-2 years even less so) will require broadband capability. So we will see frontline central office, fire ambulance users requiring video in order to be able to service their population. We will see scene of incident commanders to use video to be able to coordinate effectively scene of incident response. And we will see in other industries oil and gas, in utilities, in transportation the world has moved on and will require broadband capability and ultimately and this equals efficiency and effectiveness and a higher rate of operations by utilizing communication services needs. I have no doubt that LTE will become an intrinsic part of critical communications users need in the future.

Q: For the new markets, such as industry 4.0, IOT, LTE-M, how enterprise LTE solution used for those new markets?

Thomas Lynch : Those markets in critical communications are developing today as you mentioned industry 4.0, IOT. The world is becoming connected with that requirement becomes enhance communications needs that narrow band that just won’t be able to service. We will need a broadband requirement. We will need solutions like LTE-M in order to be able to service that need. And the ability to stay connected through multiple tiers and multiple layers of device, will become paramount to the success of future efficiencies within those particular industries and verticals. Huawei has launched LTE based broadband trunking solutions, and in February last year, Huawei initiated the founding of the eLTE Industry Alliance.

Q: How do you think the contribution of Huawei in the critical communications market?

Thomas Lynch : The future critical communications broadband market will be unlike what we have seen in terms of the narrow band market. Where there is quite specific technologies that have fantastic standards bodies behind them but the world has moved on applications, data, security. There is a variety of different layers of need with future LTE and future beyond LTE technologies that requires a body, an alliance to form to be able to coordinate and effectively move forward the agenda so that critical communications end users know exactly what to expect, what the value proposition is. And ensure that they have the right communications with as open standards as possible with end user suppliers to that market working together to ensure that market is fulfilled for their needs. I think Huawei has done a fantastic job by this industry alliance and I have met many partners at these alliances And I know for sure that it will become and intrinsic part of the success of LTE for critical communications users moving forward.

The post How LTE Becomes Intrinsic Part of Critical Communications? appeared first on Huawei Enterprise Blog.

Enable Business Transformation with Cloud Communications

$
0
0
Cloud-Communication

Huawei cloud communications converges all communication means in a unified communications platform. It allows you to enjoy video communication and collaboration anytime anywhere, from conference room to desktop, even to your pocket, promotes business agility and reduces costs.

Cloud-Communication

Register for a free entry ticket of Integrated Systems Europe 2016

ISE 2016 – the best-attended professional AV and systems integration event in the world. Experience Huawei Agile Communication solutions during February 9-12, at Amsterdam RAI, the Netherlands; and register for a free entry ticket by Huawei invitation code 915297 below.

The post Enable Business Transformation with Cloud Communications appeared first on Huawei Enterprise Blog.

Selex ES on Huawei Integrated ICT Solution

$
0
0
Robert-Consigli

Roberto Consigli, head of railway systems at Italy’s Selex ES, has been working with Huawei for almost ten years. In this video, Consigli shares with us his impression of Huawei over the years and how he considers the competitiveness of Huawei’s ICT solution. For more on Huawei’s solutions for the transportation industry, download our case book to know more.

Download the RAMS White Paper and Case Studies of Huawei in Railway Industry


About the Case Studies

Huawei is dedicating to promote the adaption and application of innovative ICT solutions in the railway industry. Through eLTE, GSM-R, Cloud Computing, BYOD & Agile Network Solution, Huawei cooperates with global partners to help railway customer to build a better connected railway. This case book will give you some examples how Huawei applies latest ICT solutions in the railway environments.

About the RAMS white paper

RAMS, short for reliability, availability, maintainability, and safety, is a standard used to assess the non-functional quality of a system. RAMS was first used in the aviation industry, then in the rail transportation, military, and other fields. Now, RAMS has become a corner stone of rail transport. Almost every rail transport project contains RAMS deliverables. Rail Transport RAMS Introduction and Calculation White Paper helps the transport system to calculate RAMS parameters and how to ensure system reliability.

[contact-form-7]

The post Selex ES on Huawei Integrated ICT Solution appeared first on Huawei Enterprise Blog.

CeBIT 2016 Opening Preview

$
0
0

Smart cars, safe cities, Big Data, IoT, SDN, Cloud Computing and more. Are you ready for the New ICT Era? ‪‎Huawei‬ is and we’re ready to share it with you CeBIT, hall 2, booth 54. http://bit.ly/1SKAhbk

The post CeBIT 2016 Opening Preview appeared first on Huawei Enterprise Blog.

Amsterdam Arena – Huawei ICT Case Story

$
0
0

Amsterdam Arena – home of football club Ajax – deploys Huawei ICT as a concentrated Smart City for enhanced fan experience, traffic guidance, crowd management, Enhanced video surveillance and security, player and tactics analytics, save energy and recycle waste and new commercial and fan communications applications. The best connected stadium in the world is upgrading in all aspects of being an elite events venue to prepare for co-hosting the European Football Championship in 2020.

The post Amsterdam Arena – Huawei ICT Case Story appeared first on Huawei Enterprise Blog.


Introducing iBMC — the Intelligent Management System

Huawei Showcases Expanding Smart City Solutions Portfolio at IoTx 2016

$
0
0

Huawei has been showcasing its latest infrastructure and utilities technologies, supporting the region’s ongoing Smart City adoption plans. At this year’s ioTx event held at Dubai World Trade Centre from 29-31 March 2016, Huawei exhibited its Internet of Things (IoT) infrastructure solutions at its stand and shared valuable insights on the future of IoT during the conference. Huawei showcased a number of IoT solutions including the newly launched Connected Cities Lighting Solution, an innovative IoT solution for city street lighting that was first announced at CeBIT 2016 in Germany. Huawei also highlighted its partnership with Landis+Gyr AG to jointly develop smart metering solutions for the Middle East market based on Huawei’s Hi-PLC module and Landis+Gyr’s E350 modular electricity meter. The move will see the development of a smart power metering solution for specific utility initiatives in the Middle East.

The post Huawei Showcases Expanding Smart City Solutions Portfolio at IoTx 2016 appeared first on Huawei Enterprise Blog.

Videxio:Embracing Cloud Video Conferencing With Huawei

$
0
0

Tom Erik Lia, CEO & Co-founder of Videxio, talks about the cooperation with Huawei in cloud videoconferencing field at CeBIT 2016.
Videxio is a video service provider. Through reseller partners, the use of professional video communications is simplified for organizations of any size. The unique architecture and operation of Videxio’s cloud-based service allows individual users and businesses to be fully operational in minutes.

The post Videxio:Embracing Cloud Video Conferencing With Huawei appeared first on Huawei Enterprise Blog.

iCITA Builds Biggest Public Cloud in Australia

$
0
0
iCITA Builds Biggest Public Cloud in Australia

The International Cloud Integrators & Telecommunications Alliance (iCITA) is the largest association of public Cloud Service Providers (CSPs) in Australia, and offers cloud computing applications and server lease services to over 100 enterprises and data centers around the world.

By Luo Zhidan
Data Center Solutions, Huawei Switch & Enterprise Communications Product Line

Challenges for iCITA

A growing number of global enterprises use public cloud services and broadly require the following features for their data centers:

[su_list icon=”icon: circle”]
  • Secure — Private networks with protection from increasingly sophisticated attacks.
  • High-Performing — Reliability in peak traffic hours via dynamic allocation of resources.
  • Redundant — Active failover systems that compensate for routine system interruptions.
  • Scalable — Dynamic resource allocation to support customer and infrastructure growth.
  • iCITA has rebuilt its current data center infrastructure to meet these demands.
[/su_list]

The Huawei Cloud Fabric Solution

Established in 2013, the iCITA-Huawei partnership was commissioned to build a new generation of cloud data centers able to provide end-to-end portfolio solutions. To meet the (then) unique requirements of iCITA’s specification, Huawei developed the Cloud Fabric Solution.

Huawei’s end-to-end product portfolio, industryleading solutions, and high-quality services are the basis for our continuing partnership. I expect that iCITA will continue to team with Huawei to carry out further cooperation in the market for highly secure and reliable public cloud services.

— Damien Stephens, CEO, iCITA

The cloud fabric solution provides cloud data centers with large-capacity, high-quality, and long-term stability with the following components:

Huawei CloudEngine12800 Series data core switches — Hot Standby (HSB) design with full bus redundancy. Access to 13,000 servers, and support for GE, 10 GE, 40 GE, and 100 GE network connectivity. CloudEngine Series data center switches, using standard protocols, are seamlessly compatible with a full range of devices on the live network. Customers are assured a smooth, interruption-free, evolution to their new network architecture.

OceanStor Dorado2100 Series Solid-State Disk (SSD) — Dedicated desktop cloud networks help tenants implement differentiated Service Level Agreements (SLAs) based on hierarchical storage functionality.

OceanStor S5600T Series mid-range and high-end storage systems, and E6000 Series mid-range and high-end servers — E6000 blade servers support routine enterprise applications organized in converged resource pools, including Microsoft Exchange, Structured Query Language (SQL) databases, and desktop cloud networks.

USG6000 Series mid-range firewalls — Firewalls isolate internal-external traffic and guarantee secure, reliable IT services.

For redundancy, the Huawei Cloud Fabric Solution has implemented a number of device-stacking technologies that protect routine device failures from affecting overall system performance, including Intelligent Stacking (iStack) and the Cluster Switch System (CSS). Additionally, Equal-Cost Multi-Path Routing (ECMP) has been integrated for load balancing and multiple link backup of Transparent Interconnection of Lots of Links (TRILL) and IP networks.

Using tunneling technologies such as Ethernet Virtual Network (EVN) and Virtual Private LAN Service (VPLS), the cloud fabric solution enables Layer 2 Data Center Interconnect (DCI) between data centers — allowing seamless switching across data centers, maximum application transparency, and ever-ready disaster recovery contingencies.

The Huawei Cloud Fabric Solution has brought a sustaining vitality to iCITA’s current and future cloud computing services.

The post iCITA Builds Biggest Public Cloud in Australia appeared first on Huawei Enterprise Blog.

Huawei Portugal Whitestar Case Story

$
0
0

Whitestar, the largest financial services provider in Portugal, manages about 5 billion euros in assets. The company trusts Huawei exclusively to deliver flexible IT server, storage, and security technologies that allow the firm to grow consistently, while protecting its clients’ sensitive personal and financial data.

The post Huawei Portugal Whitestar Case Story appeared first on Huawei Enterprise Blog.

Huawei Launches Enterprise ICT Solutions Open Lab in Germany

$
0
0

In today’s digital era, industries are being disrupted by new business models. To speed-up digital transformation, enterprises need to transform traditional IT systems and build new ICT infrastructures with cloud, IoT, and big data at the core. Based on Huawei Open ICT platforms, and developing agile innovation, Huawei has launched the Huawei Enterprise ICT Solutions Open Lab, in Munich, Germany, in collaboration with partners and software vendors.

The post Huawei Launches Enterprise ICT Solutions Open Lab in Germany appeared first on Huawei Enterprise Blog.

French Criteo Builds Europe’s Largest Hadoop Cluster with Huawei

$
0
0

Huawei has been chosen by Criteo to supply 700 servers for its new Hadoop Cluster datacenter based in Pantin (Seine St Denis). The new Hadoop platform of Huawei servers represents a gain of 30% in processing performance, thereby improving the Criteo Engine’s performance. In this first stage of the project, some 700 machines have been installed within the data center, providing more computing power and storage than the Criteo Datacenter in Amsterdam, which has a total of 1,200 servers. In the longer term, the Pantin datacenter will consist of up to 5,000 servers over 350m2 with a power of 2 MW.

The post French Criteo Builds Europe’s Largest Hadoop Cluster with Huawei appeared first on Huawei Enterprise Blog.


Huawei Delivering IoT Solutions That Drive Predictive Maintenance in Agriculture Machinery

$
0
0

In collaboration with its partner Fraunhofer, Huawei is demonstrating a jointly-developed solution for HOLMER Maschinenbau GmbH, a leading German agricultural machinery manufacturer. The solution consists of more than 200 sensors collecting operating data generated by HOLMER’s agricultural machinery in real time. The ‘big data’ is uploaded through Huawei industrial routers to the cloud for analysis on the data to improve the operating efficiency of HOLMER’s agricultural machinery

The post Huawei Delivering IoT Solutions That Drive Predictive Maintenance in Agriculture Machinery appeared first on Huawei Enterprise Blog.

The Story of OceanStor 18000 from Manufacturing to the End Users

$
0
0

OceanStor 18000 series enterprise storage systems are an optimal choice for mission-critical enterprise applications. The OceanStor 18500 and OceanStor 18800 have a storage platform designed for next-generation data centers that require virtualization, hybrid cloud, thin IT, and a low carbon footprint.

http://e.huawei.com/hk/products/cloud-computing-dc/storage/unified-storage/18000

The post The Story of OceanStor 18000 from Manufacturing to the End Users appeared first on Huawei Enterprise Blog.

Charlie Dai, Principal Analyst, Forrester commented on Huawei Enterprise’s marketing strategy

Leading New ICT, Building a Better Connected World

$
0
0

Shifts in today’s digital era including Cloud, Big Data, the Internet of Things (IoT), 5G and Software-Defined Networking (SDN) have added new challenges for enterprises to meet customer, partner and employee expectations, while aligning IT and enterprise goals. These shifts require Leading New ICT that helps enterprises achieve efficiency, agility and speed while lowering costs to drive business opportunities and growth.

The post Leading New ICT, Building a Better Connected World appeared first on Huawei Enterprise Blog.

Robert Parker, Group VP, IDC commented on Huawei Enterprise’s marketing strategy

Viewing all 147 articles
Browse latest View live




Latest Images