Wednesday, April 10, 2013

Interoperability issues hinder videoconferencing advancement

EMC teams with Avaya (not Cisco) on communication pods | Untangling Microsoft's Communication and Collaboration Strategy

Network World Convergence and VoIP

Forward this to a Friend >>>


Interoperability issues hinder videoconferencing advancement
We'll be focusing on video systems and services interoperability in a couple of pieces this month, and today we start with a Webtorials TechNote covering the topic recently written by Gary Audin. Audin begins by observing that while multiple video standards and proprietary solutions are available, most are not interoperable. He asserts that in the face of growing demand for videoconferencing, interoperability issues still need to be addressed. Read More


WHITE PAPER: Netscout Systems Inc.

Service-Oriented Performance Management Strategy
This white paper is to help IT organizations adopt a management methodology that enables them to improve the user experience by focusing on service delivery management. Learn More.

WHITE PAPER: McAfee

Low Hanging Fruit: Quick Wins with Data Loss Prevention
How to get immediate benefits from a DLP solution as detailed in this report by Rich Mogull from Securosis. Read Now

EMC teams with Avaya (not Cisco) on communication pods
Two stalwarts in the enterprise IT market joined forces today to release a unified communications stack that integrates hardware from EMC, virtualization technology from VMware and communications apps from Avaya. Perhaps most interesting about the news, though, is a company that was not involved: Cisco. Read More


WHITE PAPER: HP, Microsoft & Intel

HP reference configuration for Premium OLTP
This paper describes a hardware and software reference architecture for using HP hardware to deploy very large and highly transactional Microsoft® SQL Server 2008 R2 OLTP database systems in tier 1 enterprise application environments. Learn More!

Untangling Microsoft's Communication and Collaboration Strategy
Microsoft announced at its Lync Conference in February that Lync and Skype are connected for IM, presence and voice communication. Read More


WHITE PAPER: F5 Networks

A Model for Effective Persistent Threat Management
Persistent Threat Management is a new operational model that takes advantage of integration and automation capabilities between vulnerability scanning services and web application firewalls. This paper looks at the application of the model in protecting web applications against exploitation. Read Now

Bitcoin mining malware spreading on Skype, researcher says
Security researchers from Kaspersky Lab have identified a spam message campaign on Skype that spreads a piece of malware with Bitcoin mining capabilities. Read More

Techiest college commencement speakers of 2013
An Apple co-founder, a powerful tech philanthropist and a gaming visionary among tech business stars delivering commencement addresses this spring Read More



SLIDESHOWS

Top 10 cloud tools

New tools help IT execs cut cloud costs, optimize resources, integrate and manage cloud instances.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. EFF urges court to protect privacy of text messages

2. The worst data breaches (so far)

3. Skepticism follows Cisco-IBM led OpenDaylight SDN consortium

10. Novell president plots company's return

9. Father of SSH working on new version of crypto standard

6. Windows 8: How to solve the Start Button dilemma

5. EMC teams with Avaya (not Cisco) on communication pods

4. Former switching chief McCool leaves Cisco

7. Network heavy hitters to pool SDN efforts in OpenDaylight project

8. Security and vulnerability assessment: 4 common mistakes


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_convergence_voip_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment