Wednesday, December 14, 2011

Microsoft, IBM deploy mobile apps for UC

Most overused LinkedIn profile words of 2011: creative, organizational, effective | Converging SAN traffic in the data center

Network World Convergence and VoIP

Forward this to a Friend >>>


Microsoft, IBM deploy mobile apps for UC
In two separate initiatives that advance mobile unified communications and collaboration, Microsoft has deployed mobile clients for Lync 2010 while IBM has launched new social networking and collaboration mobile apps designed to address enterprise-class requirements. Read More


WHITE PAPER: Akamai Technologies, Inc.

A Perspective from the Edge of the Cloud
Akamai Chief Scientist and co-Founder Tom Leighton explores the major forces and technology layers driving the cloud computing movement, the types of architectural approaches emerging and an assessment of the challenges that must be overcome for cloud computing to broadly succeed. Read now

RESOURCE COMPLIMENTS OF: WildPackets

Avoid 1 more call crippling VoIP system
Is your network crippling your VoIP system? Unlike normal network behavior where increased traffic progressively diminishes network performance, VoIP networks carry the risk of one call too many disrupting call quality for everybody. Know when one more call is "one too many." Learn how you can optimize your network for VoIP with this free kit. Click to continue

Most overused LinkedIn profile words of 2011: creative, organizational, effective
If you were really as "creative" as your resume claims, you'd use different terminology to showcase your skills, according to LinkedIn's 2011 list of most overused words and phrases. Read More


WHITE PAPER: Aerohive

The Ultralight Branch
Ultralight branches let the business drive the placement and lifespan of branches while minimizing real estate, infrastructure, operational, and service costs. Read now.

Converging SAN traffic in the data center
Most organizations today use dedicated storage networks in the data center, but the concept of leveraging converged network infrastructure to provide organizational storage services is gaining steam. Read More


WHITE PAPER: Riverbed

Map Critical Network Assets and Dependencies
Learn how Riverbed provided the International Herald Tribune with an end-to-end view of application delivery paths – from servers to desktops, and how advanced traffic analysis ensured faster problem resolution and more effective WAN management. Read now!

Startup founded by ex-Cisco execs pushes software-defined networking
Software-defined networking startup Embrane this week came out of stealth mode to unveil its product and strategy for virtualizing network services. Read More

20 Most Anticipated Tech Products of 2012
From Apple's iPhone 5 to next-gen thermostats to OLED TVs, here are 20 tech products we're looking forward to seeing in 2012. Read More

Googler's LAN-party house sparks awe and envy
Attention gamers: If Google software engineer Kenton Varda invites you to a LAN party, there is no need to bring your own computer. He's got you covered. Read More



SLIDESHOWS

8 Free Wi-Fi security tools
Here are several free programs you can use to do Wi-Fi stumbling and surveying on all the popular platforms - Windows, Mac OS X, and Linux. You'll be able see all the nearby wireless access points (APs) and their details, including channels, signal levels, and MAC address.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Lulzlover hacked coalition of law enforcement
  2. School shuns Apple servers for Windows
  3. Start-up founded by ex-Cisco execs pushes SDN
  4. 8 free Wi-Fi security tools
  5. Microsoft: 5 smart, 5 dumb moves the company made in 2011
  6. What's next with hypervisors?
  7. Microsoft releases first Office app for iPad
  8. No interference: Will the cloud take my job?
  9. 5 IT security breakthroughs promise to thwart threats
  10. Google pulls 22 more malicious android apps from Market

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_convergence_voip_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: