What The HECK Is The Uppernet From Verizon?!

What the HECK is the Uppernet from Verizon?!

Been watching television lately? If so, the odds are more or less strong that you’ve come across yet another of Verizon’s slickly produced commercials, touting the grandeur of a superhero action movie, boldly hailing the company’s latest venture, the “Uppernet,” in all capital letters. Impressive, Grandiose, Important: the three words that immediately entered my head once the storm of a commercial subsided. But another descriptor — one that could potentially harm Verizon’s aims — surfaced as well: Confusing.

“Our cloud is not soft and fluffy,” says an authoritative baritone to open the ad. The camera runs down endless hallways of data servers, and presents angles of infrared cornea scans, showing how Verizon’s cloud is based on “combating the latest security threats.” “Scalable as far as the mind can see,” it is finally revealed that the Uppernet is “the cloud that the other clouds look up to.”

The idea of the “Uppernet” seems one meant to visually and conceptually transcend the idea of the Internet. It allows customers to scale above the World Wide Web and escape its limitations. Unfortunately, the commercial spends far too much time exampling the power of this cloud without relating what specifically it can offer to its presumable target audience: business professionals looking for a leg up over peers.

From my investigation, the “Uppernet” is overall an effective branding strategy for the cloud solution platform offered by Verizon Wireless. Some context on Verizon’s cloud history helps to correctly locate all things “Uppernet” in the IT conversation.

It was recently announced that the telecom juggernaut had partnered with two stalwarts in the cloud, EMC Corp. and Terremark. Verizon actually acquired the latter company back in April for $1.4 billion, attempting to position itself as the top brand name in cloud services and infrastructure management. Quietly yet strategically, Verizon has sought to shift shape into a major force in the cloud landscape, with the Uppernet as the ultimate fuel source in this rebranding push.

Exploring Verizon’s Uppernet webpage reveals a method to the slight madness in the advertising. The company is in truth targeting not only business-minded cloud pros, but also those in the industries of government, healthcare, and education. Verizon attempts to lure newbies into the cloud conversation with CloudSwitch, designed for a “seamless” integration into the computing programming. And right off the bat, visitors encounter an easy-to-follow article on securing data in the cloud.

The brawny, polished Uppernet’s intent is to bait viewers and pique their interest into Verizon’s cunning cloud blueprint. Verizon hasn’t yet saturated the market with this strategy, but I’ll look for this to change incrementally as the summer sizzles forward.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…