What The HECK Is The Uppernet From Verizon?!

What the HECK is the Uppernet from Verizon?!

Been watching television lately? If so, the odds are more or less strong that you’ve come across yet another of Verizon’s slickly produced commercials, touting the grandeur of a superhero action movie, boldly hailing the company’s latest venture, the “Uppernet,” in all capital letters. Impressive, Grandiose, Important: the three words that immediately entered my head once the storm of a commercial subsided. But another descriptor — one that could potentially harm Verizon’s aims — surfaced as well: Confusing.

“Our cloud is not soft and fluffy,” says an authoritative baritone to open the ad. The camera runs down endless hallways of data servers, and presents angles of infrared cornea scans, showing how Verizon’s cloud is based on “combating the latest security threats.” “Scalable as far as the mind can see,” it is finally revealed that the Uppernet is “the cloud that the other clouds look up to.”

The idea of the “Uppernet” seems one meant to visually and conceptually transcend the idea of the Internet. It allows customers to scale above the World Wide Web and escape its limitations. Unfortunately, the commercial spends far too much time exampling the power of this cloud without relating what specifically it can offer to its presumable target audience: business professionals looking for a leg up over peers.

From my investigation, the “Uppernet” is overall an effective branding strategy for the cloud solution platform offered by Verizon Wireless. Some context on Verizon’s cloud history helps to correctly locate all things “Uppernet” in the IT conversation.

It was recently announced that the telecom juggernaut had partnered with two stalwarts in the cloud, EMC Corp. and Terremark. Verizon actually acquired the latter company back in April for $1.4 billion, attempting to position itself as the top brand name in cloud services and infrastructure management. Quietly yet strategically, Verizon has sought to shift shape into a major force in the cloud landscape, with the Uppernet as the ultimate fuel source in this rebranding push.

Exploring Verizon’s Uppernet webpage reveals a method to the slight madness in the advertising. The company is in truth targeting not only business-minded cloud pros, but also those in the industries of government, healthcare, and education. Verizon attempts to lure newbies into the cloud conversation with CloudSwitch, designed for a “seamless” integration into the computing programming. And right off the bat, visitors encounter an easy-to-follow article on securing data in the cloud.

The brawny, polished Uppernet’s intent is to bait viewers and pique their interest into Verizon’s cunning cloud blueprint. Verizon hasn’t yet saturated the market with this strategy, but I’ll look for this to change incrementally as the summer sizzles forward.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Comics
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to these attacks with calls for tighter control and regulations, from the Society for Worldwide Interbank Financial Telecommunication (SWIFT) beefing up…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about three hours of service outage. The attack was orchestrated using a botnet of connected devices including a large number of webcams…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly darken your cloud. And as far as performance is concerned, it’s simply not ideal to be hosting large files such…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring revenue, here are four essentials to guide your way: All Revenue Will Become Recurring Revenue. Perhaps not this week or…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to being a mission-critical component, BODs are also becoming more interested in what their organizations are doing to plan their incident…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of your control. But in order to effectively provide quality services with the focus on the customer, providers need to ensure…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully select migration vendors to help you get there. All that remains is following the plan, right? Everything going well, your…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and identified 35 risk categories. This analysis is used by a number of players in the industry, including certain banking regulators.…

How Strategy – Not Technology – Is The Real Driver For Digital Transformation

How Strategy – Not Technology – Is The Real Driver For Digital Transformation

The Real Driver For Digital Transformation Business owners and executives today know the power of social media, mobile technology, cloud computing, and analytics. If you pay attention, however, you will notice that truly mature and successful digital businesses do not jump at every new technological tool or platform. While they do not sit and wait for months or years to create social media pages or to take advantage of new analytical services, they do approach…