|By PR Newswire||
|August 21, 2014 07:00 AM EDT||
BROOMFIELD, Colo., Aug. 21, 2014 /PRNewswire/ -- Level 3 Communications, Inc. (NYSE: LVLT) today announced the expansion of its global data center network with the opening of its newest facility, located at 524 Van Buren Street in Herndon, Virginia. The new facility achieves Level 3's highest rating as a Premier Elite data center by offering fully redundant, high-density power and cooling systems, multi-tier security and direct connectivity to the global Level 3 network. These features provide enterprise and government customers with the necessary capabilities to manage rapid data growth and ensure business continuity – key elements to deliver today's mission-critical business applications in a secure and efficient operating environment.
Level 3 operates more than 350 data centers worldwide, comprised of Premier Elite, Premier Select and Premier facilities. Premier Elite data centers deliver the highest level of service, designed to meet the most stringent operating requirements and connectivity demands of business customers around the world. The Northern Virginia data center is one of three Premier Elite facilities in North America. Additional Premier Elite facilities are located at 200 Paul Avenue in San Francisco and 6805 Pine Street in Omaha. Level 3 operates another 17 Premier Elite data centers throughout Europe and Latin America.
Level 3's global data center footprint offers a streamlined solution with direct connectivity to its high-availability global fiber network, metro market reach and comprehensive services portfolio to provide customers data networking performance across North America, Europe and Latin America. From these locations, customers also have access to the Level 3 Cloud Connect Solutions ecosystem with secure, private connections to public, private and hybrid cloud platforms, including Amazon Web Services and Microsoft Azure.
"The Northern Virginia market is one of the top three data center markets in the world according to Ovum's global data center tracking information," states Mike Sapien, principal analyst from Ovum Global Enterprise Services. "Enterprise customers are seeing improved economics in using outside data centers, as well as avoidance of the capital to upgrade their aging private data centers. The use of external third-party data centers are necessary to address expanding their global coverage, increased use of cloud services, and improving application performance."
"Cloud-based services and mobile applications are increasingly critical to an organization's ability to focus on core initiatives while driving efficiency and growth. Successful use of these new technologies requires a thoughtful network strategy with direct access to networked data center facilities as a core component," said Paul Savill, senior vice president of Core Product Management for Level 3. "Level 3's Premier Elite data center facilities offer an ideal off-site space to house power-intensive applications, support business continuity, and grow an organization's global IT footprint with minimal capital investment and reduced operating costs."
Additional benefits offered by the Level 3 Premier Elite data center include:
- Global Connectivity – Direct connectivity to the global Level 3 network spanning 500 markets in 60 countries
- Carrier Neutrality – Carrier neutral facility that provides access to multiple global network operators, enabling customers to more effectively manage communications and data management between worldwide partners and locations.
- Cloud Services – Access to Level 3 Cloud Connect Solutions offers private network access to leading cloud services to deliver critical enterprise applications and information with greater performance, security and flexibility than the public Internet or other networks.
- On-site Security – 24 x 7 alarm monitoring and dual-mode secured access systems to address security and compliance requirements.
- Managed Technical Support – Skilled on-site technicians continuously maintain data systems and safeguard access to global carriers and critical cloud-based applications, ensuring efficient response times and adherence to service level agreements.
To learn more about Level 3's data center solutions, visit http://www.level3.com/en/products-and-services/cloud-and-it/data-center-services/data-center-management/.
- Level 3 Data Center Service Matrix: http://www.level3.com/~/media/Images/charts/datacenterlevels.ashx
- Level 3 Data Center Maps: http://www.level3.com/~/media/Assets/maps/datanetworks_datacentermaps.ashx
- Level 3 Herndon Data Center Video – Virtual Tour: http://your.level3.com/PremierEliteDataCenterHerndonVA?cid=201408
About Level 3 Communications
Level 3 Communications, Inc. (NYSE: LVLT) is a Fortune 500 company that provides local, national and global communications services to enterprise, government and carrier customers. Level 3's comprehensive portfolio of secure, managed solutions includes fiber and infrastructure solutions; IP-based voice and data communications; wide-area Ethernet services; video and content distribution; data center and cloud-based solutions. Level 3 serves customers in more than 500 markets in over 60 countries across a global services platform anchored by owned fiber networks on three continents and connected by extensive undersea facilities. For more information, please visit www.level3.com or get to know us on Twitter, Facebook and LinkedIn.
© Level 3 Communications, LLC. All Rights Reserved. Level 3, Level 3 Communications, Level (3) and the Level 3 Logo are either registered service marks or service marks of Level 3 Communications, LLC and/or one of its Affiliates in the United States and/or other countries. Any other service names, product names, company names or logos included herein are the trademarks or service marks of their respective owners. Level 3 services are provided by subsidiaries of Level 3 Communications, Inc.
Some statements made in this press release are forward-looking in nature and are based on management's current expectations or beliefs. These forward-looking statements are not a guarantee of performance and are subject to a number of uncertainties and other factors, many of which are outside Level 3's control, which could cause actual events to differ materially from those expressed or implied by the statements. Important factors that could prevent Level 3 from achieving its stated goals include, but are not limited to, the company's ability to: manage risks associated with continued uncertainty in the global economy; increase revenue from its services to realize its targets for financial and operating performance; maintain and increase traffic on its network; develop and maintain effective business support systems; manage system and network failures or disruptions; avert the breach of its network and computer system security measures; develop new services that meet customer demands and generate acceptable margins; manage the future expansion or adaptation of its network to remain competitive; defend intellectual property and proprietary rights; manage continued or accelerated decreases in market pricing for communications services; obtain capacity for its network from other providers and interconnect its network with other networks on favorable terms; attract and retain qualified management and other personnel; successfully integrate future acquisitions; effectively manage political, legal, regulatory, foreign currency and other risks it is exposed to due to its substantial international operations; mitigate its exposure to contingent liabilities; and meet all of the terms and conditions of its debt obligations. Additional information concerning these and other important factors can be found within Level 3's filings with the Securities and Exchange Commission. Statements in this press release should be evaluated in light of these important factors. Level 3 is under no obligation to, and expressly disclaims any such obligation to, update or alter its forward-looking statements, whether as a result of new information, future events, or otherwise.
SOURCE Level 3 Communications, Inc.
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
May. 6, 2016 06:15 PM EDT Reads: 1,423
As enterprises around the world struggle with their digital transformation efforts, many are finding that innovative digital teams are moving much faster than their hidebound IT organizations. Rather than struggling to convince traditional IT to get with the digital program, executives are taking advice from IT research firm Gartner, and encouraging existing IT to continue in their desultory ways. However, many CIOs are realizing the dangers of following Gartner’s advice. The central challenge ...
May. 6, 2016 06:00 PM EDT Reads: 302
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
May. 6, 2016 06:00 PM EDT Reads: 1,255
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
May. 6, 2016 06:00 PM EDT Reads: 857
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
May. 6, 2016 05:30 PM EDT Reads: 837
The pace of innovation, vendor lock-in, production sustainability, cost-effectiveness, and managing risk… In his session at 18th Cloud Expo, Dan Choquette, Founder of RackN, will discuss how CIOs are challenged finding the balance of finding the right tools, technology and operational model that serves the business the best. He will discuss how clouds, open source software and infrastructure solutions have benefits but also drawbacks and how workload and operational portability between vendors...
May. 6, 2016 05:00 PM EDT Reads: 325
Cloud Object Storage is effectively infinitely scalable and boasts the lowest total costs. But cloud SLAs and T&Cs are traditionally optimized for huge customers like Netflix, so applications demanding better confidentiality or higher availability typically can’t reap the benefits of public cloud storage. In his session at 18th Cloud Expo, Don Martin, CTO of Security First Corp, will provide an overview of innovative technologies available today – secret sharing and information dispersal algori...
May. 6, 2016 05:00 PM EDT Reads: 314
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
May. 6, 2016 04:00 PM EDT Reads: 874
As the rapid adoption of containers continues, companies are finding that they lack the operational tools to understand the behavior of applications deployed in these containers, and how to identify issues in their application infrastructure. For example, how are multiple containers within an application impacting each other’s performance? If an application’s service is degraded, which container is to blame? In the case of an application outage, what was the root cause of the outage?
May. 6, 2016 04:00 PM EDT Reads: 1,212
When it comes to IoT in the enterprise, namely the commercial building and hospitality markets, a benefit not getting the attention it deserves is energy efficiency, and IoT's direct impact on a cleaner, greener environment when installed in smart buildings. Until now clean technology was offered piecemeal and led with point solutions that require significant systems integration to orchestrate and deploy. There didn't exist a 'top down' approach that can manage and monitor the way a Smart Buildi...
May. 6, 2016 03:15 PM EDT Reads: 263
Cloud-based NCLC (No-code/low code) application builder platforms empower everyone in the organization to quickly build applications and executable processes that broaden access, deepen collaboration, and enhance transparency for all team members. Line of business owners (LOBO) and operations managers know best their part of the business and their processes. IT departments are beginning to leverage NCLC platforms to empower and enable LOBOs to lead the innovation, transform the organization, an...
May. 6, 2016 03:00 PM EDT Reads: 305
Unless you don’t use the internet, don’t live in California, or haven’t been paying attention to the recent news… you should be aware that self-driving cars are on their way to becoming a reality. I have seen them – they are real. If you believe in the future reality of self-driving cars, then continue reading on. If you don’t believe in the future possibilities, then I am not sure what to do to convince you other than discuss the very real changes that will roll out with the consumer producti...
May. 6, 2016 02:15 PM EDT Reads: 915
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
May. 6, 2016 01:45 PM EDT Reads: 1,375
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
May. 6, 2016 01:00 PM EDT Reads: 1,417
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
May. 6, 2016 12:45 PM EDT Reads: 1,190