Monday, August 04, 2014

Vidyo offers HD video solution for Citrix Virtual Desktop

How cellphone calling is going all Internet | Cisco revamps CCNP for IoT, other market transitions

Network World Convergence and VoIP

Forward this to a Friend >>>


Vidyo offers HD video solution for Citrix Virtual Desktop
VidyoDesktop™ Virtual Edition (VE) extends the Vidyo solution to Citrix® virtual desktop offerings including Citrix XenDesktop® and XenApp®. Read More


WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

WHITE PAPER: Computer Sciences Corporation (CSC)

An Evolution in Enterprise Cloud Security
Private cloud techniques extend the protection of corporate governance and policies to the elasticity of a cloud platform— but that doesn't automatically make it secure. Just because you adopted a cloud environment does not make you immune to targeted Cyber attacks. Learn more

How cellphone calling is going all Internet
Wireless carrier EE, in the UK, recently announced that it is about to let customers make regular mobile calls over Wi-Fi. Big deal, you may say: we’ve been making app-driven VoIP calls over mobiles for years, with Skype, and the like.Well what’s interesting is that EE’s solution will be seamless. For the first time in the UK, you won’t need an app. It’ll just happen — using the phone’s stock dialer.The idea is aimed at providing voice service in spotty coverage areas.In the U.S., T-Mobile already has a virtually seamless Wi-Fi calling option on some phones, like the Samsung Galaxy S5. The idea is that you can select defaulting options in a Wi-Fi Calling Settings menu to use Wi-Fi for calls if cellular connectivity is unavailable.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: OutSystems

Kick Start Your Mobile Strategy
It's time to kick start your mobile application strategy. • Why go mobile? • What are the three primary mobile application types? • What type of app should you build first? • How to get started, really fast! Read Now

Cisco revamps CCNP for IoT, other market transitions
There’s no company in technology that’s taken advantage of market transitions more often than Cisco. In almost every presentation that CEO John Chambers gives, he opines about how catching market transitions at the right time has been the primary vehicle for Cisco’s growth over the past few decades. In fact, one of my key research principals is that significant share gain can only be achieved during moments of market transition. For example, had Cisco tried to enter the legacy PBX market, I’m not sure they would have had any success. However, they hit the shift to VoIP at the right time and now they’re the market leader in telephony.Catching market transitions has more to do with products, though. It’s about creating an ecosystem of support around the products. Cisco’s certification program is the best in the industry and has created an army of engineers that understand how to build networks “the Cisco way.” One of the staple certifications is the Cisco Certified Network Professional (CCNP), which is a stepping stone towards the highly coveted Cisco Certified Internetworking Engineer (CCIE).To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Polycom

The Role of the User Experience in Video Conferencing
While video conferencing can offer significant, measurable benefits to companies and their employees, all video conferencing solutions are not alike. To ensure adoption, a successful deployment and implementation--and to maximize (ROI)--managers must choose their video conferencing tools wisely, matching the right technology to the right use cases. Learn more >>

Cisco patches traffic snooping flaw in operating systems used by its networking gear
Cisco Systems said attackers could disrupt or intercept traffic in many of its networking products unless a new security update is applied to the software they run.The issue affects the implementation of the Open Shortest Path First (OSPF) routing protocol and its Link State Advertisement (LSA) database in particular. This protocol is used for determining the shortest routing paths inside an Autonomous System (AS)—a collection of routing policies for IP (Internet Protocol) addresses controlled by ISPs and large organizations.The OSPF protocol is commonly used on large enterprise networks. It gathers link state information from available routers into a database in order to built a network topology map which is then used to determine the best route for IP traffic.To read this article in full or to leave a comment, please click here Read More

'Provider Sprawl' Complicates Government Move to Cloud
In spite of a nearly 4-year-old mandate to prioritize cloud computing technologies within the federal government, that transition has been slow to take shape, with officials continuing to express concerns about how to manage cloud deployments and uncertainty about navigating the maze of commercial providers.Gerald Chelak, director of the technical service division at the GSA's Office of Citizen Services and Innovative Technologies, says his agency is "100 percent committed to cloud" but admits that federal CIOs struggle to keep up with what he describes as "cloud service provider sprawl."MORE ON NETWORK WORLD: How to build a private cloud When asked in a recent panel discussion how IT workers can keep on top of an ever-expanding galaxy of service providers and products, Chelak quipped, "Spend weekends."To read this article in full or to leave a comment, please click here Read More

'Right to be forgotten' goes predictably wrong
Google says lots of Europeans are not telling the truth, the whole and or anything resembling the truth when they ask to have search results about themselves “forgotten.”Who could have predicted such an outcome? I mean who besides anyone with a modicum of common sense.From a story by our IDG New Service: In a letter to European data regulators, Google listed some of the challenges it faces in complying with the ruling, which allows people to compel search engines like Google and Bing to remove links to pages that mention their name, if the references are “inadequate,” “irrelevant” or “excessive.”To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Why TCP/IP is on the way out

2. Linux will not become a gaming platform, it already is one

3. 20 cool things you can do with a Raspberry Pi

4. Some are twisting the facts in requests to be forgotten, Google says

5. Top 20 colleges for computer science majors, based on earning potential

6. The best cities for landing top pay for your tech skills

7. Black Hat 2014: How to crack just about everything

8. Federal court system warns of new e-mail jury scam

9. 10 disturbing attacks at Black Hat USA 2014

10. Half of surveyed US businesses shun SDNs


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_convergence_voip_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: