Atlanta-based Birch Communications a technology service provider of IP-based communications, broadband, cloud and IT services to small, mid-sized, enterprise and wholesale businesses is expanding into Detroit. Birch already operates in all 50 states, Washington D.C., Canada and Puerto Rico. The firm is opening a new sales branch office in Livonia, MI, and expanding its sales force according to FierceTelecom.
The new office is located at 17197 North Laurel Park Drive, Suite 281, Livonia, MI, and occupies 2,305 square feet of space in the Laurel Office Park III. The new regional office will be fully staffed by the Summer of 2015.
Complementing the direct sales force is a series of Detroit-based indirect and enterprise sales channel partners. Leading the new Detroit sales team will be Birch’s regional general manager of direct sales, Michael Perrone said in a presser:
I’m very excited to open our Detroit office. Having lived in the community from 2009 to 2011, I’m very pleased to be serving the market with a new direct sales force. Our TotalCloud PBX offering and network capabilities are a win-win for this marketplace and we’re proud to deliver a full suite of products to our customers.
The opening of the new sales office in Detroit comes on the heels of Birch’s acquisition of Cbeyond to attract new customers and help keep existing ones from potentially churning to another CLEC or cable operator. Birch acquired Cbeyond in early 2014 through an all-cash $323 million deal. Cbeyond had a presence in Farmington Hills, MI until the Birch transaction.
The service provider said that it chose Detroit as its next area of expansion because it lies on the backbone of its IP network, which extends to 41 markets in 22 U.S. states.
rb-
Good to see a new player in the Detroit market. Hopefully, they can last for a while and shake up the Detroit IT services status quo.
Related articles
Stolen 5,000-pound bridge recovered in Michigan (reviewtimes.com)
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
The Let’s Encrypt CA, which will be available in the Summer of 2015. It aims to get people to encrypt their connections to their websites according to a recent GigaOMarticle. Let’s Encrypt goal is to make it easier to get a proper Secure Sockets Layer/Transfer Layer Security (SSL/TLS) certificate. That way the certs can be deployed to secure a Web server and its users.
Let’s Encrypt will help secure the Internet
According to the article Let’s Encrypt, comes as the tech industry scrambles to encrypt the web. This is more important after the mass surveillance revelations of NSA leaker Edward Snowden. The CA will aid other efforts to secure the Internet.
Let’s Encrypt is developing the Automated Certificate Management Environment or ACME protocol. The ACME protocol. will sit between Web servers and the CA. It includes support for new, stronger forms of domain validation.
Let’s Encrypt will serve as its own root CA. The nonprofit CA public benefit corporation, Internet Security Research Group (ISRG) will run the root CA. Josh Aas, the executive director of ISRG, explained securing the web is just not a simple thing to use Transport Layer Security (TLS), the successor to Secure Socket Layer (SSL). He explains that getting, paying for, and installing a certificate is too hard for many network administrators.
The anchor for any TLS-protected communication is a public-key certificate which demonstrates that the server you’re actually talking to is the server you intended to talk to. For many server operators, getting even a basic server certificate is just too much of a hassle. The application process can be confusing. It usually costs money. It’s tricky to install correctly. It’s a pain to update.
According to the statement, Let’s Encrypt’s certificates will be free. It will have an automated issuance and renewal protocol – an open standard. A step to reduce the need for input from the domain holder’s side. According to an EFF blog post, “switching a webserver from HTTP to HTTPS with this CA will be as easy as issuing one command, or clicking one button.”
Records of certificate issuance and revocation will be publicly available. The organizations behind Let’s Encrypt are stressing that the system won’t be under any one organization’s control.
The EFF has been working on helping users take advantage of HTTPS for a while. The EFF worked with the Tor Project, to create the HTTPS Everywhere extension for Firefox, Firefox for Android, Chrome, and Opera browsers.
The Let’s Encrypt project will use Internet-wide datasets of certificates to make higher-security decisions about when a certificate is safe to issue. The data will include the EFF’s Decentralized SSL Observatory, the University of Michigan’s scans.io, and Google‘s (GOOG) Certificate Transparency logs.
In addition to the Let’s Encrypt project, some of the paths to secure the web include:
The next version of the HTTP protocol will likely be encrypted by default.
Mozilla and Firefox are collaborating with the EFF to bring Microsoft, Google, Opera, and others to add Let’s Encrypt to their list of valid CAs.
Google will rank up sites that use SSL/TLS encryption.
The content delivery and security outfit Cloudflare is offering free SSL encryption for millions of its customers.
And now Let’s Encrypt aims to equip websites with free certificates – the proof they need to tell users’ browsers that their public encryption keys are genuine and the connection is properly secured.
rb-
Many websites currently use the HTTP protocol, a standard that exposes site owners to a number of threats including cyber espionage, keyword-based censorship, account hijacking, and a host of web application attacks such as SQLi and XSS. Let’s Encrypt helps reduce these risks which I think it is a good step in the right direction.
Larry Seltzer argues on Wired that Let’s Encrypt does not go far enough. We want the project to not only encrypt data but also authenticate users. IMHO that is a pipe dream. Authentication will step on the toes of Symantec, Oracle, and other hugely funded firms that will squash anybody doing the right thing that threatens their profits.
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.