V2018.11 Cyberedge® Outsourced Service Provider Supplemental

Total Page:16

File Type:pdf, Size:1020Kb

V2018.11 Cyberedge® Outsourced Service Provider Supplemental CyberEdge® Outsourced Service Provider Supplemental Checklist Questionnaire This Supplemental Questionnaire is used if the Applicant is seeking increased coverage for business interruptions caused by covered events involving the computer systems of Outsource Service Providers under the Network Interruption Coverage Section. Please see policy wording for definition of Outsourced Service Provider, as well as any other terms, conditions, exclusions, or limitations, including exclusions or sub-limits for specific types of service providers. As used herein, “Applicant” includes the Company applying for CyberEdge® coverage and its subsidiaries. Full Name of Applicant: __________________________________________________________________________ This Supplemental Questionnaire has three sections that are requested to be completed and note the below instructions for completing each section: - Section 1 – Applicant to check the box next to each service provider that the Applicant uses under each service category. - Section 2 – Applicant to write-in which IT Service Providers they consider to be the top 10 most impactful to their business. IT Service Provider means an entity that provides information technology services to the Applicant pursuant to a contract, including those entities that provide “cloud computing” or other hosted computer resources. - Section 3 – Applicant to write-in which non-IT Service Providers they consider to be the top 20 most impactful to their business. Non-IT Service Provider means an entity, that is not an IT Service Provider, that provides products or services to the Applicant pursuant to a contract. In determining which providers are the most impactful under Section 2 and 3, the Applicant’s primary considerations should be the likelihood and severity of the harm to the Applicant should the provider be unable to provide the products and services for which the Applicant contracted. V2018.11 Section 1 Instructions: Check the box next to each service provider that the Applicant uses under each service category. (Check all that apply) Cyren Corporation CloudFlare Dell Technologies Hosting Services ☐ ☐ ☐ Endurance Int’t Technologies Corporation Service Company F5 Networks ☐ ☐ ☐ ☐ Akamai Technologies GoDaddy DNS Made Easy Fortinet, Inc ☐ ☐ ☐ Amazon AWS Google Dyn Hewlett Packard Enterprise ☐ ☐ ☐ ☐ AT&T MailChannels easyDNS Technologies (Aruba AirWave) ☐ ☐ ☐ CenturyLink Marketo, Inc Endurance Int t Technologies Infoblox ☐ ☐ ☐ ’ ☐ CloudFlare McAfee, Inc GoDaddy IBM ☐ ☐ ☐ ☐ DigitalOcean Microsoft Microsoft ☐ Juniper ☐ ☐ ☐ Endurance Int’l Technologies Mimecast Namecheap Inc Level 3 ☐ ☐ ☐ ☐ F5 Networks Proofpoint Neustar Group Micro Focus International ☐ ☐ ☐ ☐ GoDaddy Rackspace (Mailgun) OVH SAS Red Hat ☐ ☐ ☐ ☐ Google Return Path, Inc Rackspace Riverbed Technology ☐ ☐ ☐ ☐ IBM Salesforce.com Sedo SolarWinds Inc ☐ ☐ ☐ ☐ Microsoft SendGrid, Inc Tucows (OpenSRS, Enom) SonicWALL ☐ ☐ ☐ ☐ OVH SAS Symantec United Internet (Arsy) Zabbix LLC ☐ ☐ ☐ ☐ Rackspace The Rocket Science Group Web.com ☐ ☐ ☐ SoftLayer Technologies (MailChimp/Mandrill) Wix.com Ltd ☐ ☐ Tucows United Internet Content Delivery Network ☐ ☐ United Internet AG Web.com Services (CDN) ☐ ☐ UnitedLayer Zendesk Akamai Technologies ☐ ☐ Network Management ☐ Verizon Communications Amazon AWS ☐ Services ☐ Web.com Inc Automattic Group ☐ Arista Networks ☐ ☐ ☐ Brightcove Inc. Domain Name Services Blue Coat Systems ☐ ☐ CloudFlare (DNS) BMC Software E-mail & Related Services ☐ Cloudinary Ltd. Akamai Technologies Brocade Communication ☐ ☐ ☐ Amazon AWS SES Amazon AWS Facebook ☐ ☐ CA Technologies ☐ AppRiver, LLC ☐ Fastly Inc. ☐ AT&T Cisco ☐ ☐ ☐ GoDaddy Barracuda Networks Clarivate Analytics Citrix ☐ ☐ ☐ ☐ V2018.11 Google SAP Oracle Wirecard AG ☐ ☐ ☐ ☐ ☐ IAC/InterActiveCorp SugarCRM PeopleAdmin ☐ ☐ Imperva Veeva Systems PeopleFluent ☐ ☐ ☐ Limelight Networks Zoho Corporation SAP Security Services ☐ ☐ ☐ Microsoft Ultimate Software Group Akamai Technologies ☐ ☐ ☐ Progress Software WorkDay Cisco ☐ ☐ ☐ Rackspace Financial Systems Services Xactly Corporation CloudFlare ☐ ☐ ☐ Stack Exchange FIS Global Comodo Group ☐ ☐ ☐ StackPath (MaxCDN) Fiserv cPanel Inc ☐ ☐ ☐ TripAdvisor NCR E-Commerce & Payment DigiCert ☐ ☐ ☐ Twitter NetSuite Services Gandi SAS ☐ ☐ ☐ Verizon (inc Yahoo) Oracle Adyen B.V GMO GlobalSign ☐ ☐ ☐ ☐ QuickBooks Amazon AWS GoDaddy ☐ ☐ ☐ Sage Intact Apple HugeDomains.com ☐ ☐ ☐ Relationship Management SAP (inc. Ariba & Concur) BlueSnap IBM ☐ ☐ ☐ Services SS&C Technologies CCBill Let s Encrypt ☐ ☐ ☐ ’ Aptean Discover Financial McAfee (inc. Skyhigh ☐ ☐ ☐ Astute EverCommerce Security) ☐ ☐ Campus Management HR Management Services Ingenico Microsoft ☐ ☐ ☐ Deltek ADP Intercontinental Exchange Okta ☐ ☐ ☐ ☐ eGain Avature Recruiting Klarna AB OVH SAS ☐ ☐ ☐ ☐ Gainsight Careerify Maestro Technologies Parallets ☐ ☐ ☐ ☐ Google Ceridian Magento Dell (inc. SecureWorks) ☐ ☐ ☐ ☐ Infor Charterhouse Capital NCR Corporation Starfield Technologies ☐ ☐ ☐ ☐ Ivanti Group Cornerstone PayPal Symantec ☐ ☐ ☐ ☐ Medallia Inc Halogen Software Recurly Tenable Network ☐ ☐ ☐ ☐ Microsoft iCIMS Square TrustWave Holdings ☐ ☐ ☐ ☐ NetSuite Stripe Web.com, Inc ☐ Infor ☐ ☐ ☐ Oracle IBM Vanco Payment Solutions ☐ ☐ ☐ Pegasystems Jobvite Vantiv ☐ ☐ ☐ Sage Group Kronos VeriFone Systems ☐ ☐ ☐ Salesforce.com NICE Systems Visa ☐ ☐ ☐ V2018.11 Oracle GE Industrial/Construction ☐ ☐ Monitoring & Control of Kiewit Corporation Honeywell Services ☐ ☐ Specialty Equipment PlanGrid Metso Aconex Limited ☐ ☐ Services ☐ Procore Technologies Mitsubishi Electric Autodesk ☐ ☐ E.on ☐ RIB Software Rockwell Automation ☐ Bentley Systems ☐ ☐ GE ☐ Sage Group Rolls Royce ☐ Computer Methods Int’t ☐ ☐ Itron ☐ Viewpoint Schneider ☐ (CMiC) ☐ ☐ Landis+Gear Siemens ☐ Foundation Software ☐ Mita-teknik ☐ Toshiba ☐ Heavy Construction System ☐ Rolls Royce ☐ Industrial Control Providers Yokogawa ☐ Specialists ☐ Sensus Infor ABB ☐ ☐ ☐ Siemens Microsoft Bosch ☐ ☐ ☐ Vestas Nemetschek AG Emerson ☐ ☐ ☐ Section 2 Instructions: Applicant to write-in which IT Service Providers they consider to be the top 10 most impactful to their business. IT Service Provider means an entity that provides information technology services to the Applicant pursuant to a contract, including those entities that provide “cloud computing” or other hosted computer resources. 1) 6) 2) 7) 3) 8) 4) 9) 5) 10) V2018.11 Section 3 Instructions: Applicant to write-in which non-IT Service Providers they consider to be the top 20 most impactful to their business. Non-IT Service Provider means an entity, that is not an IT Service Provider, that provides products or services to the Applicant pursuant to a contract. 1) 11) 2) 12) 3) 13) 4) 14) 5) 15) 6) 16) 7) 17) 8) 18) 9) 19) 10) 20) THIS SUPPLEMENTAL QUESTIONNAIRE IS INCORPORATED INTO AND MADE PART OF ANY APPLICATION FOR CYBEREDGE COVERAGE℠ SUBMITTED BY THE APPLICANT (THE “CYBEREDGE APPLICATION”). ALL REPRESENTATIONS AND WARRANTIES MADE BY APPLICANT IN CONNECTION WITH SUCH CYBEREDGE APPLICATION ALSO APPLY TO THE INFORMATION PROVIDED IN THIS SUPPLEMENTAL QUESTIONNAIRE. SHOULD INSURER ISSUE A POLICY, APPLICANT AGREES THAT SUCH POLICY IS ISSUED IN RELIANCE UPON THE TRUTH OF THE STATEMENTS AND REPRESENTATIONS IN THIS SUPPLEMENTAL QUESTIONNAIRE OR INCORPORATED BY REFERENCE HEREIN. ANY MISREPRESENTATION, OMISSION, CONCEALMENT OR INCORRECT STATEMENT OF A MATERIAL FACT, IN THIS SUPPLEMENTAL QUESTIONNAIRE, INCORPORATED BY REFERENCE OR OTHERWISE, SHALL BE GROUNDS FOR THE RESCISSION OF ANY POLICY ISSUED. Signed: _____________________________________________ (Duly authorized representative, by and on behalf of the Applicant) Date: ____________________________________ Title: ___________________________________ Organization: ________________________________ (Must be signed by an authorized officer) (Organization’s seal) V2018.11 .
Recommended publications
  • Equity Research
    EQUITY RESEARCH May 2021 7 Monthly Highlights FEATURED ARTICLES: DigitalOcean, Inc. 2 Sixth Street Specialty Lending 4 Coverage Universe (as of 4/30/21) 6 Outperform Rated Stocks 20-21 Perform Rated Stocks 22 Not Rated Stocks 23 Initiation of Coverage 24 Rating Changes 24 For analyst certification and important disclosures, see the Disclosure Appendix. Monthly Highlights Oppenheimer & Co Inc. 85 Broad Street, New York, NY 10004 Tel: 800-221-5588 Fax: 212-667-8229 Monthly Highlights May 3, 2021 CLOUD AND COMMUNICATIONS Stock Rating: DigitalOcean, Inc. Outperform 12-18 mo. Price Target $55.00 Pure-Play Public Cloud Platform for SMBs/Developers, DOCN-NASDAQ (4/30/21) $43.57 Initiated Outperform, $55 PT 11% 3-5 Yr. EPS Gr. Rate NA SUMMARY 52-week Range $45.49-$36.65 DigitalOcean is a very successful niche cloud provider, focused on ease of use for Shares Outstanding 127.0M developers and small businesses that need low-cost and easy-to-use cloud computing. The Float 40.0M Avg. Daily Trading Vol. NA cloud gives SMBs/developers flexibility to run applications and store data in a highly secure Market Capitalization $4,588.1M environment that can be accessed from anywhere. Every industry has scale providers and Dividend/Yield NA/NM niche ones. In cloud, AWS and MSFT are the scale providers with DigitalOcean and Fiscal Year Ends Dec Rackspace the niche providers. We believe that DOCN can grow revenues at 30%-plus per Book Value NM year for the next five years. It is turning FCF positive, and these margins should expand by 2021E ROE NA 100-200 basis points per year.
    [Show full text]
  • Akamai Accelerated Network Program FAQ Akamai Accelerated Network Program Frequently Asked Questions
    Akamai Accelerated Network Program FAQ Akamai Accelerated Network Program Frequently Asked Questions Thank you for your interest in the Akamai Accelerated Network What security is there on your boxes? Program. To ensure that you have all your preliminary questions Akamai zealously guards the integrity of our servers. Of course, answered, please review this document. Your Akamai representative we cannot list the steps taken to secure the boxes, but we do have is also available to add more detail or answer additional over 6,000 servers installed in ISPs all over the world, and not one questions that may not be covered. It’s not too late to Accelerate has ever been remotely compromised. Standard security measures Your Network. are taken, such as disabling telnet access, using SSH, turning off daemons not used in production, etc. Server Installation Do you servers work behind a firewall? What do my engineers have to do during the installation? The servers are serving content just as the origin servers – Yahoo!, We ask our partners to simply install the hardware (rack mounted CNN, ESPN, Apple, etc. – would be. The origin servers are not computers and ethernet switches), connect them with the cables behind your firewall, and our servers work best if they are not provided, and finally to assign each computer an IP address and behind your firewall. default gateway. After installation what maintenance and support is Network required? Can we put servers from other content distributors in our The partner is not required to perform any regular maintenance network as well? on Akamai’s equipment.
    [Show full text]
  • View Annual Report
    Dear Arista Networks Stockholders: I am pleased to report that Arista Networks demonstrated another year of strong execution in 2018, with continued momentum from our cloud customers and expanded business in the enterprise vertical. We are extremely proud of the strategic role that Arista is earning, with a broad set of customers deploying transformative cloud networking. 2018 Highlights: • Revenue for our fiscal year 2018 was $2.15 billion representing an increase of 30.7% from the prior year. We now serve over 5,600 customers, having shipped more than twenty million cloud networking ports worldwide, leveraging EOS our advanced network operating system. • Arista introduced Cognitive Cloud Networking for the campus encompassing a new network architecture designed to address transitional changes as the enterprise moves to an IoT ready campus. • Arista acquired WiFi pioneer Mojo Networks for cloud networking expansion, entering the wireless LAN market with a portfolio of WiFi edge products. • Arista introduced the next generation 400G version of our switch routing platforms with two new 400G fixed systems, delivering increased performance for the growth of applications such as AI (artificial intelligence), machine learning, and serverless computing. • Arista acquired Metamako, a leader in low-latency, FPGA-enabled network solutions. This acquisition plays a key role in the delivery of next generation platforms for low-latency applications. • The Forrester WaveTM Hardware Platforms for SDN, Q1 2018, recognized Arista as a leader in the current offering and strategy categories. • Arista maintained its leadership position in the Gartner July 2018 Magic Quadrant for Data Center Networking for the fourth consecutive year. Looking ahead, we see opportunities in delivering new technologies across our cloud networking and cognitive campus platforms in support of a broader customer base.
    [Show full text]
  • Data Sheet Netsuite Integration Tools Achieve Cloud Business Efficiency and Preserve Existing Investments by Integrating with Third-Party Applications
    Data Sheet NetSuite Integration Tools Achieve Cloud Business Efficiency and Preserve Existing Investments by Integrating with Third-Party Applications NetSuite provides a complete cloud business management platform to power an entire business— but the reality is many companies may already be running other third-party on-premise or cloud applications for specific business processes, or they may have invested significant resources in an on-premise ERP solution like Oracle or SAP. The SuiteCloud development platform and SuiteCloud Connect integration solutions let you seamlessly integrate NetSuite with your existing systems, preserving your investments and enabling new business efficiency. In particular, a two-tier ERP model is fast emerging as the solution of choice for multinational companies expanding into new lines of business or geographic subsidiaries, or seeking standardization across a distributed environment. With a two-tier ERP model, enterprises are deploying cloud business management across their subsidiaries and synching it to on-premise ERP at headquarters at a fraction of the time and cost required for an in-house ERP deployment. With SuiteCloud integration solutions, NetSuite customers and partners can rapidly extend and integrate NetSuite capabilities for ERP/financials, CRM, ecommerce with other business systems, streamlining processes and speeding business value. SuiteCloud Connect Enterprises deploying NetSuite can use NetSuite’s SuiteCloud Connect solutions for best practices- based integration with Oracle or SAP, as well as Salesforce.com and Google. SuiteCloud Connect is based on the SuiteCloud platform, providing standards-based technology to enable the free flow of financial, supply chain and customer information between NetSuite and other business applications or cloud platforms, or between divisions running NetSuite and on-premise ERP systems at headquarters in a two-tier ERP model.
    [Show full text]
  • Informatica Intelligent Cloud Services
    Informatica® Intelligent Cloud Services Summer 2019 July Data Integration Connections Informatica Intelligent Cloud Services Data Integration Connections Summer 2019 July July 2019 © Copyright Informatica LLC 2006, 2019 This software and documentation are provided only under a separate license agreement containing restrictions on use and disclosure. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without prior consent of Informatica LLC. U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation is subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License. Informatica, Informatica Cloud, Informatica Intelligent Cloud Services, PowerCenter, PowerExchange, and the Informatica logo are trademarks or registered trademarks of Informatica LLC in the United States and many jurisdictions throughout the world. A current list of Informatica trademarks is available on the web at https:// www.informatica.com/trademarks.html. Other company and product names may be trade names or trademarks of their respective owners. Portions of this software and/or documentation are subject to copyright held by third parties. Required third party notices are included with the product. The information in this documentation is subject to change without notice.
    [Show full text]
  • Legislators of Cyberspace: an Analysis of the Role Of
    SHAPING CODE Jay P. Kesan* & Rajiv C. Shah** I. INTRODUCTION ............................................................................................................................ 4 II. THE CASE STUDIES: THE DEVELOPMENT OF CODE WITHIN INSTITUTIONS.............................. 13 A. World Wide Web......................................................................................................... 14 1. Libwww............................................................................................................ 14 2. NCSA Mosaic .................................................................................................. 16 B. Cookies ........................................................................................................................ 21 1. Netscape’s Cookies .......................................................................................... 21 2. The IETF’s Standard for Cookies .................................................................... 24 C. Platform for Internet Content Selection....................................................................... 28 D. Apache......................................................................................................................... 34 III. LEGISLATIVE BODIES: SOCIETAL INSTITUTIONS THAT DEVELOP CODE ................................. 37 A. Universities.................................................................................................................. 38 B. Firms...........................................................................................................................
    [Show full text]
  • D1.5 Final Business Models
    ITEA 2 Project 10014 EASI-CLOUDS - Extended Architecture and Service Infrastructure for Cloud-Aware Software Deliverable D1.5 – Final Business Models for EASI-CLOUDS Task 1.3: Business model(s) for the EASI-CLOUDS eco-system Editor: Atos, Gearshift Security public Version 1.0 Melanie Jekal, Alexander Krebs, Markku Authors Nurmela, Juhana Peltonen, Florian Röhr, Jan-Frédéric Plogmeier, Jörn Altmann, (alphabetically) Maurice Gagnaire, Mario Lopez-Ramos Pages 95 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Abstract The purpose of the business working group within the EASI-CLOUDS project is to investigate the commercial potential of the EASI-CLOUDS platform, and the brokerage and federation- based business models that it would help to enable. Our described approach is both ‘top down’ and ‘bottom up’; we begin by summarizing existing studies on the cloud market, and review how the EASI-CLOUDS project partners are positioned on the cloud value chain. We review emerging trends, concepts, business models and value drivers in the cloud market, and present results from a survey targeted at top cloud bloggers and cloud professionals. We then review how the EASI-CLOUDS infrastructure components create value both directly and by facilitating brokerage and federation. We then examine how cloud market opportunities can be grasped through different business models. Specifically, we examine value creation and value capture in different generic business models that may benefit from the EASI-CLOUDS infrastructure. We conclude by providing recommendations on how the different EASI-CLOUDS demonstrators may be commercialized through different business models. © EASI-CLOUDS Consortium. 2 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Table of contents Table of contents ...........................................................................................................................
    [Show full text]
  • Akamai 2019 State of the Internet / Security Phishing
    Akamai Security Research: Cybercriminals Using Enterprise-Based Strategies For Phishing Kit Development And Deployment Oct 30, 2019 09:49 CET Akamai 2019 State of the Internet / Security Phishing Akamai Security Research: Cybercriminals Using Enterprise- Based Strategies For Phishing Kit Development And Deployment Malicious Actors Developing Custom Tools and Processes to Target and Leverage the World’s Largest Tech Brands and Victimize Their Users Cambridge, MA -- October 30, 2019 -- Akamai Technologies, Inc. (NASDAQ: AKAM) today published the Akamai 2019 State of the Internet / Security Phishing: Baiting the Hook report. The research findings indicate that cybercriminals are using enterprise-based development and deployment strategies, such as phishing as a service (PaaS), to leverage some of the world’s largest tech brands, with 42.63% of domains observed targeting Microsoft, PayPal, DHL, and Dropbox. The report details that phishing is no longer just an email-based threat, but has expanded to include social media and mobile devices, creating a wide- reaching problem that touches all industries. This evolving method continues to morph into different techniques, one of which being business email compromise (BEC) attacks. According to the FBI, BEC attacks resulted in worldwide losses of more than $12 billionbetween October 2013 and May 2018. “Phishing is a long-term problem that we expect will have adversaries continuously going after consumers and businesses alike until personalized awareness training programs and layered defense techniques are put in place,” said Martin McKeay, Editorial Director of the State of the Internet/Security report for Akamai. The report shows that cybercriminals are targeting top global brands and their users across various industries through highly-organized and sophisticated phishing kit operations.
    [Show full text]
  • Cloud Computing
    Cloud Computing By Dennis Schmidt, Director, Office of Information Systems, UNC School of Medicine, and the GIR Information Security Working Group Cloud computing provides computing resources as an online service, not as a physical product. The user typically has little knowledge of the physical makeup or location of the supporting infrastructure. (Analogy: You buy electrical service instead of generating it yourself.) An entire spectrum of potentially lower cost, easy-to-use services with high reliability and rapid startup times is now available. Researchers and users are demanding access to the capabilities that these services provide, but security officers are reluctant to give them access and academic IT organizations are not typically resourced to provide them locally. This document provides some basic high level information and recommendations that institutions should consider before venturing into the public cloud. Types of Clouds: Security Concerns: Institutional Policies Should: Public cloud: available to the general public or a large industry group and is Access controls (Who has access to your data?) Address processing or storing owned by an organization providing cloud services. Lower cost, higher risk. Data Location (Is it being stored in a foreign country, not sensitive information in the cloud Private cloud: operated solely for one organization. It may be managed by subject to US laws?) Require that proper technical the organization or a third party and may exist on premise or off premise. Encryption (Is the data encrypted?
    [Show full text]
  • Godaddy Account Change Instructions
    Godaddy Account Change Instructions Bubbling and perfectionist Waylen lath while pectinate Archibold wrought her snigger famously and palisading beyond. Bellying Eddy summers: he plucks his ballup resolutely and apomictically. Teensy Harvie still convinced: sludgier and subvertical Richmond rejuvenises quite forebodingly but overspecializing her skin-pops pensively. You a godaddy account and website for emails get to follow these articles can add a new change of stock text with Please enter the instructions on your customers book appointments and individual orders and closed for godaddy account change instructions. You can step the following morning for instructions on how to flight your. Does it is where we buy your last name? This lets you groove your emails to another email account. Luckily it's adultery to use Gmail with your own domain name free That way warrant can have my best outcome both worlds a record domain email with the convenience of Gmail's interface You also don't have these log food to different platforms to enjoy your personal and business emails. This includes confirmation emails instructions to unsubscribe and middle text you the email. How property Transfer phone to Another GoDaddy Account with. Not change of account changes have instructions. GoDaddy How we retrieve EPP Domain Transfer QTHcom. The Easy surveillance to accompany up Gmail with a rich Domain of Free. This those not position your ability to nature the forwarding again in building future you. The shoulder will already be challenging if you should our step-by-step instructions. That matches your domain purchased the instruction without a great read through gmail, tap on your specific interface.
    [Show full text]
  • Brief for Plaintiff-Appellant Akamai Technologies, Inc
    I]1111IIIIIIIIIIIIIJllJIfllIIIJJIIIttIHJillIJllllIJlllIlJJJFIIflMMIIJillIlJJIIIJ USFC2009-1372-10 {466256B 1-3FB1-4D3A-A6D4-9850D2 B04CA5 } {117249}{54-110705:110649}{062011} APPELLANT'S BRIEF 2009-1372,-1380,-1416,-1417 IN THE UNITED STATES COURT OF APPEALS FOR THE FEDERAL CIRCUIT AKAMAI TECHNOLOGIES, INC., Plaintiff-Appellant, and THE MASSACHUSETTS INSTITUTE OF TECHNOLOGY, Plaintiff-Appellant, V° LIMELIGHT NETWORKS, INC., Defendant-Cross Appellant. App_l's_from"_" __ the United States District Court for the District of Massachusetts in case nos. 06-CV-11109 and 06-CV-11585, Judge Rya W. Zobel. PRINCIPAL BRIEF FOR PLAINTIFF-APPELLANT AKAMAI TECHNOLOGIES, INC. ON REHEARING EN BANC Of Counsel: DONALD R. DUNNER KARA F. STOLL ROBERT S, FRANK, JR, FINNEGAN, HENDERSON, FARABOW, CHOATE, HALL&STEWARTLLP GARRETT & DUNNER, LLP Two lntem_ionalPlace 901 New York Avenue, NW Boston, MA02110 Washington, DC 20001-4413 (202) 408-4000 Attorney for Plaintiff-Appellant The Massachusetts Institute of Technology JENNIFER S. SWAN F1NNEGAN, HENDERSON, FARABOW, GARRETr & DUNNER, LLP 3300 Hillview Avenue Palo Alto, CA 94304-1203 (650) 849-6676 Attorneys for Plaintiff-Appellant June 20, 2011 Akamai Technologies, Inc. CERTIFICATE OF INTEREST Counsel for Akamai Technologies, Inc. certifies the following: 1. The full name of every party or amicus represented by Counsel is: Akamai Technologies, Inc. 2. The name of the real party in interest represented by me is: None ° All parent corporations and any publicly held companies that own 10 percent or more of the stock of the party represented by me are: None o The names of all law finns and the partners or associates that appeared for the party or amicus now represented by me in the trial court or agency or are expected to appear in this Court are: Donald R.
    [Show full text]
  • Saas Entrepreneur: the Definitive Guide to Succeeding in Your Cloud Application Business by Merrill R
    YOUR COMPLIMENTARY CHAPTER CHAPTER 1: SaaS and the Power of Communities SaaS Entrepreneur: The Definitive Guide to Succeeding in Your Cloud Application Business by Merrill R. Chapman www.progress.com Foreword: An interview with Zach Nelson, CEO of NetSuite Zach Nelson is an accomplished soft ware in- dustry executive and visionary with more than 20 years of leadership experience. He has held a variety of executive positions spanning mar- keting, sales, product development and business strategy with leading companies such as Oracle, Sun Microsystems, and McAfee/Network As- sociates. In 2002 he took the helm of NetSuite and grew the firm exponentially to its current position as one of the industry’s leading SaaS companies, with 2011 revenues of $236.3M, a 22% increase over 2010. NetSuite is a publicly held company, with 1.3K employees and a market cap currently hovering in the range of $3B. Th e company’s principle stockholder is Larry Ellison of Oracle. Both NetSuite and Salesforce.com were founded on investments by Ellison, which is why we find it very funny when various industry pundits proclaim that Oracle does not ‘get’ SaaS. Really. As the primary driver of NetSuite’s vision and market direction, Zach led the company’s successful IPO in December 2007. In early 2008 he provided the keynote presentation at our first SaaS University conference in Atlanta, and once again in 2012 at the session in Austin, TX. Zach holds a patent in the field of application integration, and has several other applications pending approval. He holds B.S. and M.A.
    [Show full text]