 We'll hear back inside the queue. Continue in the conversation with David Merrill from IBM Chief Technology Security Office. Is that what you're, you're... I'm a strategist in our Chief Information Security Office. Right, so I own our mobile security direction, specifically for inside of IBM for all of our employees. IBM's a big company. Obviously everyone's heard of IBM, but I mean, you handle a huge base. Diverse networks, applications, and you've got to put the strategy together. What's your view of the current landscape right now? Relatives of mobility and security. I mean, here at Juniper, their slogan is defending your life, mobile life, your digital life, and more of it's all mobile. What's going on in the market? So there's this balance going on right now, right? There's obviously the desire for our employees to want their office in their pockets, right? Our data in their pockets all the time, at the same time that that's very scary for the enterprise, right? So it kind of says we need to focus on how are we controlling and securing the data on those smartphone devices? So that we end up with at least the right security controls on the given device for that kind of data that ends up there. So it's kind of this understanding of here's how we finally need to control that data. What role does this person play? I.e. what are the likely data types that will end up on their phone so that when you marry them to a smartphone, the right controls are in place to protect that data that you're putting on the device. Is data really a centric theme for the mobile worker now? I mean, honestly, I have an opinion there, but I mean, you guys deal with siloed enterprises, big enterprises, a lot of data, different applications tied to data. Are those silos breaking down and do things like virtualization enable more of a heavier, more compute and more storage centric back end? And does that free up more robust data access on the mobile device? Well, I think we're going to see two models, right? I think we're going to see, we're definitely going to see the virtual desktop approach as it applies to smartphones where a lot of the data stays in the enterprise, right? It never actually resides on the smartphone, but clearly as we look at some of the smartphone uses, the data is going to be there. It's going to tie back into the data center. I think that the real value, if you will, what excites employees is being able to actually do some of their enterprise computing functions on the smartphone. So of course, with that goes, if I'm going to have the data there, I have to be able to protect that data. You guys just had a really strong acquisition recently a company called StoreWise, which says real-time data compression, real-time data is a very valuable commodity out there in the market today. User data is very, very important for people's privacy, but also for enabling better application support in real-time. Where are we with that in terms of safety? What are some of the exploits? What are some of the security dangers that you're seeing? I mean, because everyone wants a mobile phone. I want to be at my kids' games and check my email, but not be fully checked in, but be asynchronously connected and respond to conference calls. We all do that now, but what are the risks? Well, I mean, people don't know those, explain them. So the value is really that marriage of work and personal, that work-life balance that we're all trying to get to as our work-life becomes bigger. For us in terms of the data, it really does tie back to the kinds of controls. So for given kinds of data, classifications of data, we have very specific controls. So what it says is, at the smartphone, it really says there are going to be different controls depending on what the data is, so that if we end up with, let's say, personal sensitive data, you're really federally regulated data, if you will. Well, that carries with it some very specific kinds of requirements on that endpoint. Every employee may not handle that kind of data in their role. I mean, they certainly still have their personal data, but in terms of what data is actually federally regulated that they have, that drags with it a bunch of extra controls that maybe the normal employee wouldn't have. So it's really this migration, too, of not one size fits all anymore, right? Each phone doesn't need to be secured the same exact way, but it does need to be secured commensurate with the data that's sitting on it. So Juniper was introducing this Junos Plus software with Mobile Security Suite, defending your mobile life as their slogan. What's IBM's role here? Talk about why you're here and some of the things you're talking about today. So Juniper has been a partner on my journey for a couple of years now. In fact, it goes back almost three years ago when I was accused of fixing a problem that didn't even exist. But it was pretty evident to me that as we looked at the threat landscape that if smartphones became a primary computing device, the threat landscape would follow. There's no doubt that that would be attacked. So obviously, I wanted to be ready, right? I didn't want to wait till that happened. That's scurry around for me. Oh, okay, oh my God, what do I do now? So we started that journey back then with S-Mobile, have since then acquired and become Junos Pulse. So we've actually been on this journey for a while. Interestingly, even as I boarded those first initial phones, we found malware. So it exists. This is not an urban legend. Okay, we're here. You can hear everything starting up here. We're on the pre-game show here at the Juniper Press Conference. We're here with David Merrill from IBM. IBM, big supporter of Juniper. Thanks for coming on inside the queue. Appreciate it. We'd love to have you back. Talk about security. We've been doing a lot of dark cloud stuff. So appreciate it. Thank you.