JUNIPER NETWORKS, INC. (Exact Name of Registrant As Specified in Its Charter)

Total Page:16

File Type:pdf, Size:1020Kb

JUNIPER NETWORKS, INC. (Exact Name of Registrant As Specified in Its Charter) UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K (Mark One) x ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2015 or o TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from__________ to____________ Commission file number 001-34501 JUNIPER NETWORKS, INC. (Exact name of registrant as specified in its charter) Delaware 77-0422528 (State or other jurisdiction of incorporation or organization) (I.R.S. Employer Identification No.) 1133 Innovation Way Sunnyvale, California 94089 (Address of principal executive offices) (Zip code) (408) 745-2000 (Registrant's telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Title of each class Name of each exchange on which registered Common Stock, par value $0.00001 per share New York Stock Exchange Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes x No o Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. Yes o No x Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filings requirements for the past 90 days. Yes x No o Indicate by check mark whether the registrant has submitted electronically and posted on its corporate Web site, if any, every Interactive Data File required to be submitted and posted pursuant to Rule 405 of Regulation S-T (§ 229.405 of this chapter) during the preceding 12 months (or for such shorter period that the registrant was required to submit and post such files). Yes x No o Indicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K (§ 229.405 of this chapter) is not contained herein, and will not be contained, to the best of the registrant's knowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-K. o Indicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, or a smaller reporting company. See the definitions of “large accelerated filer,” “accelerated filer” and “smaller reporting company” in Rule 12b-2 of the Exchange Act. Large accelerated filer x Accelerated filer o Non-accelerated filer o Smaller reporting company o (Do not check if a smaller reporting company) Indicate by check mark whether the registrant is a shell company (as defined in Rule 12b-2 of the Act). Yes o No x The aggregate market value of the common stock held by non-affiliates of the registrant was approximately $9,668,000,000 as of the end of the registrant's second fiscal quarter (based on the closing sale price for the common stock on the New York Stock Exchange on June 30, 2015). As of February 12, 2016 , there were 382,604,514 shares of the registrant's common stock outstanding. DOCUMENTS INCORPORATED BY REFERENCE As noted herein, the information called for by Part III is incorporated by reference to specified portions of the registrant's definitive proxy statement to be filed in conjunction with the registrant's 2016 Annual Meeting of Stockholders, which is expected to be filed not later than 120 days after the registrant's fiscal year ended December 31, 2015 . Juniper Networks, Inc. Form 10-K Table of Contents Page PART I ITEM 1. Business 4 ITEM 1A. Risk Factors 17 ITEM 1B. Unresolved Staff Comments 34 ITEM 2. Properties 34 ITEM 3. Legal Proceedings 34 ITEM 4. Mine Safety Disclosures 34 PART II ITEM 5. Market for Registrant's Common Equity, Related Stockholder Matters and Issuer Purchases of Equity Securities 35 ITEM 6. Selected Financial Data 37 ITEM 7. Management's Discussion and Analysis of Financial Condition and Results of Operations 39 ITEM 7A. Quantitative and Qualitative Disclosures About Market Risk 60 ITEM 8. Financial Statements and Supplementary Data 62 ITEM 9. Changes in and Disagreements With Accountants on Accounting and Financial Disclosure 114 ITEM 9A. Controls and Procedures 114 ITEM 9B. Other Information 115 PART III ITEM 10. Directors, Executive Officers and Corporate Governance 116 ITEM 11. Executive Compensation 116 ITEM 12. Security Ownership of Certain Beneficial Owners and Management and Related Stockholder Matters 116 ITEM 13. Certain Relationships and Related Transactions, and Director Independence 116 ITEM 14. Principal Accounting Fees and Services 116 PART IV ITEM 15. Exhibits, Financial Statement Schedules 117 SIGNATURES 118 Exhibit Index 121 2 Table of Contents Forward-Looking Statements This Annual Report on Form 10-K, which we refer to as the Report, including “Management’s Discussion and Analysis of Financial Condition and Results of Operations,” contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995 regarding future events and the future results of Juniper Networks, Inc., which we refer to as “we,” “us,” or the “Company,” that are based on our current expectations, estimates, forecasts, and projections about our business, our results of operations, the industry in which we operate and the beliefs and assumptions of our management. All statements other than statement of historical facts are statements that could be deemed to be forward-looking statements. Words such as “expects,” “anticipates,” “targets,” “goals,” “projects,” “would,” “could,” “intends,” “plans,” “believes,” “seeks,” “estimates,” variations of such words, and similar expressions are intended to identify such forward-looking statements. Forward-looking statements by their nature address matters that are, to different degrees, uncertain, and these forward- looking statements are only predictions and are subject to risks, uncertainties, and assumptions that are difficult to predict. Therefore, actual results may differ materially and adversely from those expressed in any forward-looking statements. Factors that might cause or contribute to such differences include, but are not limited to, those discussed in this Report under the section entitled “Risk Factors” in Item 1A of Part I and elsewhere, and in other reports we file with the U.S. Securities and Exchange Commission, or the SEC. While forward-looking statements are based on reasonable expectations of our management at the time that they are made, you should not rely on them. We undertake no obligation to revise or update publicly any forward-looking statements for any reason, except as required by applicable law. 3 Table of Contents PART I ITEM 1. Business Overview At Juniper Networks, we design, develop, and sell products and services for high-performance networks to enable customers to build highly scalable, reliable, secure and cost-effective networks for their businesses, while achieving agility, efficiency and value through automation. We sell our products in more than 100 countries in three geographic regions: Americas; Europe, Middle East, and Africa, which we refer to as EMEA; and Asia Pacific, which we refer to as APAC. We sell our high-performance network products and service offerings across routing, switching, and security. Our products address high-performance network requirements for global service providers, cloud environments, enterprises, governments, and research and public sector organizations who view the network as critical to their success. We believe our silicon, systems, and software represent innovations that transform the economics and experience of networking, helping our customers achieve superior performance, greater choice, and flexibility, while reducing overall total cost of ownership. In addition to our products, we offer our customers worldwide services, including technical support, professional services, and education and training programs. Together, our high-performance product and service offerings help our customers convert legacy networks providing commoditized services into more valuable assets providing differentiation and value as well as increased performance, reliability, and security to end-users. We were incorporated in California in 1996 and reincorporated in Delaware in 1998. Our corporate headquarters are located in Sunnyvale, California. Our website address is www.juniper.net. Strategy We deliver highly scalable, reliable, secure and cost-effective networks, while transforming the network's agility, efficiency and value through automation. We focus on customers and partners across our key market verticals who view these network attributes as fundamental to their business; including Telecom, Cable Providers, Cloud Providers, National Government, Financial Services, and Enterprise Strategic Verticals. Maintain and Extend Technology Leadership We are recognized as a leader in networking innovation, in both software and hardware. Our Junos OS, application-specific integrated circuit, or ASIC, technology, and network-optimized product architecture were key elements to establishing and, we believe, will continue to be key elements to maintaining our technology leadership. Leverage Position as Supplier of High-Performance Network Infrastructure From inception, we have focused on designing, developing, and building high-performance network infrastructure for the world's most demanding networking environments. We consistently deliver groundbreaking, leading technologies that transform the economics and experience of networking—significantly improving customer economics by lowering the capital expenditures required to build networks and the operating expenses required to manage and maintain them. We believe that many customers will deploy networking equipment from only a few vendors, and that the scale, performance, reliability, and security of our products will provide us with a competitive advantage, which is critical to being selected as one of those vendors.
Recommended publications
  • Juniper Networks Investor Relations May 2021
    Juniper Networks Investor Relations May 2021 1 © 2021 Juniper Networks Juniper Public Forward-Looking Statements This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended, which statements involve substantial risks and uncertainties. Except for historical information contained herein, all statements could be deemed forward-looking statement, including, without limitation, Juniper Networks’ views concerning our business outlook; economic and market outlook; our future financial and operating results (including our financial model); the expected impact of network transitions and timing of deployments with large customers; our capital return program; our expectations with respect to market trends; our future strategy; the strength of certain use-cases and customer segments; our ability to expand business opportunities (including in software, security, hyperscale-switching, 5G buildouts and with enterprise customers); our expectations with respect to revenue growth, gross margin or operating costs or our ability to improve profitability and make necessary investments; the introduction of future products; the strength of our solution portfolio; the timing of recovery from COVID-19 on customer demand; and overall future prospects. Actual results or events could differ materially from those anticipated in those forward-looking statements as a result of several factors, including: general economic and political
    [Show full text]
  • 2012 Annual Report
    2012 Annual Report Notice of 2013 Annual Meeting of Stockholders and Proxy Statement Report on Form 10-K Dear Juniper Stockholder, From a financial perspective, Juniper began to return to improving performance in the second half of 2012. While we were not satisfied with our results, we believe we can and will perform better. There were a number of challenges in 2012, including continued macro-economic uncertainty, a decline in the total addressable market for routing and tightening customer demand in major geographies and sectors including Europe and the US Federal Government. While navigating these challenges, we took decisive actions to address performance factors in our control, including restructuring the organization and driving initiatives that have raised our level of execution. These initiatives have contributed to three key areas that together put us in a stronger position for renewed growth and market share gains. Juniper strengthened our product portfolio in 2012. We sharpened our focus as a pure play in high performance networking in three product families: Routing, Switching and Security. We added new product offerings in each of these families in 2012 and we enhanced many of the core products in those families with new capabilities. Early this year we articulated a clear strategy for Juniper in the area of Software Defined Networks. Due to this hard work, we now have the broadest, deepest and highest-performance product lineup in our history, with an ambitious innovation roadmap that is addressing the transformative roles that mobility and cloud computing are playing in the new network. In routing, we remain a strong leader in the edge with our MX line which enables Service Providers to deliver and expand services and maximize revenues faster than other market solutions.
    [Show full text]
  • Juniper Networks J-Series Services Routers: J2320, J2350, J4350, and J6350
    Datasheet Juniper Networks J-series Services Routers: J2320, J2350, J4350, and J6350 Product Description Enterprises are faced with a number of challenges and opportunities by converging voice, video and data to one network. This consolidation of network elements reduces cost by easing deployment of SIP enabled voice over IP (VoIP), real-time high-definition Telepresence and standardizing on a consistent infrastructure network operating system like JUNOS software. These new technologies improve; customer relations, interactions with suppliers, and employee productivity. This mission-critical multi-media network must be always on and always available. To accomplish this, fully integrated stateful security is a key requirement, not merely forwarding packets without regard to the intended application or individual user session. JUNOS software with enhanced services provides the high-performance networking infrastructure that helps enterprises Juniper Networks J-series services routers extend implement key initiatives that: • Secure critical information and protect the network from vulnerabilities and attacks. Enterprise applications and deliver reliable Enterprises need to protect confidential information from external and internal connectivity to remote offices with a powerful attacks as they connect with their customers and suppliers. The inseparable routing and firewall offered by JUNOS software with enhanced services secures every location blend of high-performance network protection in the network and allows departmental segmentation out to remote locations of the network. Implementing IPSec VPNs with firewalls at remote sites allows for flexible and advanced services. J-series services routers network connectivity with security for split tunneling configurations. leverage the modular JUNOS® software operating • Minimize the cost of installing and operating the network.
    [Show full text]
  • The World Needs Network Innovation. Juniper Is Here to Help
    The world needs network innovation. Juniper is here to help. In a world where the pace of change is accelerating at an unprecedented rate the network has taken on a new level of importance as the vehicle for pulling together our best people, best thinking, and best hope for addressing the critical challenges we face as a global community. The JUNIPER BY THE macro-trends of cloud computing and the mobile Internet NUMBERS hold the potential to expand the reach and power of the network—while creating an explosion of new subscribers, • The world’s top five social media properties new traffic, and new content. In the face of such intense are supported by Juniper demand, this potential cannot be realized with legacy Networks. thinking. Juniper Networks stands as a response and a • The top 10 telecom companies challenge to the traditional approach to the network. in the world run on Juniper Networks. • Juniper Networks is deployed in more than 1,400 national Our Vision government organizations We believe the network is the single greatest vehicle for knowledge, collaboration, and around the world. human advancement that the world has ever known. Now more than ever, the world relies on high-performance networks. And now more than ever, the world needs network • Juniper has over 8,700 innovation to unleash our full potential. employees in 46 worldwide offices, serving over 100 The network plays a central role in addressing the critical challenges we face as a global countries. community. Consider the healthcare industry, where the network is the foundation for new models of mobile affordable care for underserved communities.
    [Show full text]
  • Juniper Networks Junos Space Network Management Platform, with Or Without Network Director and with Or Without Security Director in JA2500
    Juniper Networks Junos Space Network Management Platform, with or without Network Director and with or without Security Director in JA2500 Firmware: Junos Space 19.1R1_FIPS, Network-Director.3.6R3.15 and Security-Director-19.1R1.23 Non-Proprietary FIPS 140-2 Cryptographic Module Security Policy Document Version: 1.0 Date: December 14, 2020 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408.745.2000 1.888 JUNIPER www.juniper.net Copyright Juniper, 2020 Document Version 1.0 Page 1 of 40 Juniper Networks Public Material – May be reproduced only in its original entirety (without revision). Table of Contents 1 Introduction .................................................................................................................... 4 1.1 Cryptographic Boundary ..............................................................................................................6 1.2 Modes of Operation .....................................................................................................................8 1.2.1 FIPS Approved Mode ..........................................................................................................8 1.2.2 Non-Approved Mode ..........................................................................................................8 1.3 Zeroization ....................................................................................................................................9 2 Cryptographic Functionality ..........................................................................................
    [Show full text]
  • KINTSUGI Identifying & Addressing Challenges in Embedded Binary
    KINTSUGI Identifying & addressing challenges in embedded binary security jos wetzels Supervisors: Prof. dr. Sandro Etalle Ali Abbasi, MSc. Department of Mathematics and Computer Science Eindhoven University of Technology (TU/e) June 2017 Jos Wetzels: Kintsugi, Identifying & addressing challenges in embed- ded binary security, © June 2017 To my family Kintsugi ("golden joinery"), is the Japanese art of repairing broken pottery with lacquer dusted or mixed with powdered gold, silver, or platinum. As a philosophy, it treats breakage and repair as part of the history of an object, rather than something to disguise. —[254] ABSTRACT Embedded systems are found everywhere from consumer electron- ics to critical infrastructure. And with the growth of the Internet of Things (IoT), these systems are increasingly interconnected. As a re- sult, embedded security is an area of growing concern. Yet a stream of offensive security research, as well as real-world incidents, contin- ues to demonstrate how vulnerable embedded systems actually are. This thesis focuses on binary security, the exploitation and miti- gation of memory corruption vulnerabilities. We look at the state of embedded binary security by means of quantitative and qualitative analysis and identify several gap areas and show embedded binary security to lag behind the general purpose world significantly. We then describe the challenges and limitations faced by embedded exploit mitigations and identify a clear open problem area that war- rants attention: deeply embedded systems. Next, we outline the cri- teria for a deeply embedded exploit mitigation baseline. Finally, as a first step to addressing this problem area, we designed, implemented and evaluated µArmor : an exploit mitigation baseline for deeply em- bedded systems.
    [Show full text]
  • Juniper Networks Inc
    JUNIPER NETWORKS INC FORM 10-K (Annual Report) Filed 02/26/13 for the Period Ending 12/31/12 Address 1194 NORTH MATHILDA AVE SUNNYVALE, CA 94089 Telephone 4087452000 CIK 0001043604 Symbol JNPR SIC Code 3576 - Computer Communications Equipment Industry Communications Equipment Sector Technology Fiscal Year 12/31 http://www.edgar-online.com © Copyright 2013, EDGAR Online, Inc. All Rights Reserved. Distribution and use of this document restricted under EDGAR Online, Inc. Terms of Use. Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2012 OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from__________ to____________ Commission file number 001-34501 JUNIPER NETWORKS, INC. (Exact name of registrant as specified in its charter) Delaware 77-0422528 (State or other jurisdiction of incorporation or organization) (IRS Employer Identification No.) 1194 North Mathilda Avenue Sunnyvale, California 94089 (408) 745-2000 (Address of principal executive offices)(Zip Code) ( Registrant's telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Title of Each Class Name of Each Exchange on Which Registered Common Stock, par value $0.00001 per share New York Stock Exchange Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.
    [Show full text]
  • Juniper Networks Inc
    JUNIPER NETWORKS INC FORM 10-K (Annual Report) Filed 02/26/14 for the Period Ending 12/31/13 Address 1194 NORTH MATHILDA AVE SUNNYVALE, CA 94089 Telephone 4087452000 CIK 0001043604 Symbol JNPR SIC Code 3576 - Computer Communications Equipment Industry Communications Equipment Sector Technology Fiscal Year 12/31 http://www.edgar-online.com © Copyright 2014, EDGAR Online, Inc. All Rights Reserved. Distribution and use of this document restricted under EDGAR Online, Inc. Terms of Use. UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2013 or TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from__________ to____________ Commission file number 001-34501 JUNIPER NETWORKS, INC. (Exact name of registrant as specified in its charter) Delaware 77-0422528 (State or other jurisdiction of incorporation or organization) (I.R.S. Employer Identification No.) 1194 North Mathilda Avenue Sunnyvale, California 94089 (Address of principal executive offices) (Zip code) (408) 745-2000 (Registrant's telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Title of Each Class Name of Each Exchange on Which Registered Common Stock, par value $0.00001 per share New York Stock Exchange Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.
    [Show full text]
  • Ericsson.Com/ Networks
    ericsson.com/ networks End-to-end network capabilities simplify the journey to 5G for Swisscom 2 Ericsson | End-to-end network capabilities simplify the journey to 5G for Swisscom Wanting to ensure its consumers would reap the benefits of 5G at an early stage, Swiss operator Swisscom was looking for a vendor that could act as a one-stop shop in managing and maintaining its entire IP transport network. Our product portfolio and subsequent partnership with Juniper Networks made us the perfect choice. In November 2017, Swisscom was discussing how In the first end-to-end 5G transport network deal in the upcoming introduction of 5G would greatly the industry, Ericsson is delivering Swisscom’s new increase complexity in its IP transport network. end-to-end 5G IP transport network with Router Swisscom wanted to be early in the market with 5G 6672 as the site router, Router 6675 as the C-RAN technologies, and it was looking for a single vendor router, Router 6274 as the edge router and Juniper able to take full end-to-end responsibility for its MX 10008 as the core router. The architecture meets complete IP transport network from the radio site up scalability, availability, performance, latency and to the data center. synchronization demands, and it is functionally aligned end-to-end. All of the routers are managed Key characteristics of the network were the support by one single operations support system (OSS), for slicing, low latency, time/phase synchronization namely Ericsson Network Manager. and high performance, and the complete transport network had to be managed by one management Heinz Herren, CIO and CTO at Swisscom says: “We system.
    [Show full text]
  • May 28, 2021 Submitted Via ECFS
    May 28, 2021 Submitted via ECFS Marlene H. Dortch Federal Communications Commission Page | 1 45 L Street NE Washington, D.C., 20554 Re: Reply Comments of the Open RAN Policy Coalition on Promoting the Deployment of 5G Open Radio Access Networks, GN Docket No. 21-63. Dear Ms. Dortch, The Open RAN Policy Coalition (“ORPC” or “Coalition”)1 appreciates the opportunity to provide additional input to the Federal Communications Commission (“Commission”) on its Notice of Inquiry (“NOI”) Promoting the Deployment of 5G Open Radio Access Networks. Initial comments in this landmark proceeding provide a robust foundational record regarding the growing Open RAN market, show widespread consensus about the potential public benefits Open RAN can produce, and coalescence around several key steps the Commission and other policymakers can take to support these outcomes. Commenters also express consensus that policies supporting industry innovation and carrier choice – not government mandates or legal preferences – will enable the market to realize the benefits of Open RAN.2 Commenters describe active and diverse engagement in industry organizations that are driving standardization, testing, and other real-world advancement toward open and interoperable interfaces in the RAN.3 1 See https://www.openranpolicy.org/. As of this filing, the Coalition includes 60 members, including: Airspan, Altiostar, American Tower, Analog Devices, Arm, AT&T, AWS, Benetel, Bharti Airtel, Broadcom, Ciena, Cisco, Cohere Technologies, CommScope, Crown Castle, DeepSig, Dell Technologies, Deutsche Telekom, DISH Network, Facebook, Fujitsu, GigaTera Communications, Google, Hewlett Packard Enterprise, IBM, Inseego, Intel, JMA Wireless, Juniper Networks, Ligado Networks, Marvell, Mavenir, Microsoft, NEC Corporation, NewEdge Signal Solutions, Nokia, NTT, Nvidia, Oracle, Palo Alto Networks, Pivotal Commware, Qualcomm, Quanta Cloud Technology, Radisys, Rakuten Mobile, Reliance Jio, Rift, Robin, Samsung Electronics America, STL Tech, Telefónica, Texas Instruments, U.S.
    [Show full text]
  • Junos® OS Intrusion Detection and Prevention User Guide Copyright © 2021 Juniper Networks, Inc
    Junos® OS Intrusion Detection and Prevention User Guide Published 2021-09-21 ii Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Junos® OS Intrusion Detection and Prevention User Guide Copyright © 2021 Juniper Networks, Inc. All rights reserved. The information in this document is current as of the date on the title page. YEAR 2000 NOTICE Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036. END USER LICENSE AGREEMENT The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License Agreement ("EULA") posted at https://support.juniper.net/support/eula/. By downloading, installing or using such software, you agree to the terms and conditions of that EULA. iii Table of Contents
    [Show full text]
  • In Re: Juniper Networks, Inc. Securities Litigation 06-CV-04327
    Case 5:06-cv-04327-JW Document 83 Filed 06/07/2007 Page 1 of 3 1 NINA F. LOCKER, State Bar No. 123838 Email: [email protected] 2 STEVEN GUGGENHEIM, State Bar No. 201386 Email: [email protected] 3 JONI OSTLER, State Bar No. 230009 Email: [email protected] 4 WILSON SONSINI GOODRICH & ROSATI Professional Corporation 5 650 Page Mill Road Palo Alto, CA 94304-1050 6 Telephone: (650) 493-9300 Facsimile: (650) 565-5100 7 8 Attorneys for Defendants Juniper Networks, Inc., Scott Kriens, Pradeep Sindhu, Marcel Gani, Robert 9 M. Calderoni, Kenneth Goldman, William R. Hearst III, Stratton Sclavos, Vinod Khosla, 10 Kenneth Levy and William R. Stensrud 11 UNITED STATES DISTRICT COURT 12 NORTHERN DISTRICT OF CALIFORNIA 13 SAN JOSE DIVISION 14 In re JUNIPER NETWORKS, INC. ) No. C06-04327-JW SECURITIES LITIGATION ) 15 DECLARATION OF JONI OSTLER IN SUPPORT OF DEFENDANTS' MOTION 16 This Document Relates To: ) TO DISMISS AMENDED CONSOLIDATED CLASS ACTION 17 ALL ACTIONS. ) COMPLAINT 18 Date: September 10, 2007 Time: 9 :00 a.m. 19 Courtroom: 8 1 Before: Hon. James Ware 20 21 22 23 24 25 26 27 28 OSTLER DECL. ISO DEFENDANTS' MOTION TO Dismiss Case 5:06-cv-04327-JW Document 83 Filed 06/07/2007 Page 2 of 3 1 I, Joni Ostler, declare as follows: 2 1. I am an attorney associated with the law firm of Wilson Sonsini Goodrich & 3 Rosati, a Professional Corporation, counsel of record for Defendants Juniper Networks, Inc. 4 ("Juniper ), Scott G. Kriens, Pradeep Sindhu, Marcel Gani, Robert M. Calderoni, Kenneth 5 Goldman, William R.
    [Show full text]