Thursday, September 18, 2014

GENBAND launches Kandy, a real-time communications software development platform

PGP creator, other top cryptographers head 2014 National Cyber Security Hall of Fame class | How will iPhone 6's Wi-Fi calling, VoLTE affect enterprise networks?

Network World Convergence and VoIP

GENBAND launches Kandy, a real-time communications software development platform
GENBAND has launched Kandy, a real-time communications software development platform supporting enterprises, services providers, and developers. Kandy combines Web and mobile applications with real-time communications capabilities, initially supporting voice, video, SMS, conferencing, collaboration, and WebRTC .Kandy’s Platform-as-a-Service framework includes APIs, SDKs, and “quick starts” that are pre-built applications, such as video shopping assistance. The platform eliminates the need for end users to leave an application to start a conversation, providing integrated customer support, and collaboration. With the presence features, users can see who is available to resolve an issue, or Kandy can find the right person to address the problem.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Citrix Systems

Gartner Magic Quadrant for ADCs
Citrix is positioned in the Leaders Quadrant for Application Delivery Controllers for the seventh consecutive year: the Gartner Magic Quadrant Report focuses on vendor's ability to solve complex application deployment challenges. Don't miss this chance to learn from Gartner's independent research. Learn More

WEBCAST: Alcatel-Lucent Enterprise

Integrating Mobility with Unified Access
Meeting mobility demands of 4500 students, faculty and staff at a university is no small task. Join this Webcast to hear the Director of Enterprise Infrastructure explain the steps Abilene Christian University took to deliver a new level of student-faculty interaction. Learn More

PGP creator, other top cryptographers head 2014 National Cyber Security Hall of Fame class
Accomplished cryptographers, including Pretty Good Privacy creator Philip Zimmerman, are among the five inductees into this year's National Cyber Security Hall of Fame. They'll officially be enshrined on Oct. 30 in Baltimore. Zimmmerman Zimmerman, in addition to developing the widely used PGP email encryption software is founder of mobile privacy company Silent Circle and is known for his work in securing VoIP via protocols such as  ZRTP and Zfone.To read this article in full or to leave a comment, please click here Read More


WEBCAST: HP

Network Security & Threat Intelligence to Stop Malware
Cyber criminals have become more sophisticated and more determined than ever. Protecting your business from advanced malware requires new techniques tuned to these emerging threats. Now, HP TippingPoint Security Management System works with Lastline to provide an advanced layer of protection against the most sophisticated attacks. Learn More

How will iPhone 6's Wi-Fi calling, VoLTE affect enterprise networks?
While the cosmetic features like screen size and processing power of Apple’s new iPhone 6 and 6 Plus attracted the most attention, their use of Wi-Fi and Voice over LTE (VoLTE) for voice and video calling could eventually have a major impact on how phone calls are handled in the enterprise.On its website, Apple touts the iPhone's Wi-Fi voice and video calling feature as a good solution "when you don’t have a good cellular signal." As this helpful Gizmodo guide to Wi-Fi calling points out, Wi-Fi calling could help users save money by using an internet connection instead of a carrier's network, and unlike other services like Skype and Google Voice, users can make and receive calls with the same phone number they use for traditional phone calls. This makes it helpful for employees visiting clients' offices or attending large events, relying on the available Wi-Fi networks to make calls and send text messages without running up their wireless bills.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Netscout Systems Inc.

Network Monitoring Fabrics Are Key to Scaling IT
As IT continues to evolve at an accelerated pace, it is critical for organizations to have much better insight and visibility into the network. Deploying a monitoring fabric enables IT managers to understand who is on the network, what traffic is traversing it, where data is accessed from and how the overall environment is performing. Learn More

Wikileaks outs latest FinFisher 'government spyware' that anti-virus can't spot
Wikileaks has released what it claims are previously unknown fourth-generation versions of the controversial 'government' FinFisher spyware, lambasting the German Government for allowing it to be sold to "some of the most abusive regimes in the world."In a media announcement fronted with statements from Ecuadorian embassy refugee and editor in chief Julian Assange himself, Wikileaks offered the files for a number of the spyware's components, including Relay 4.3, Proxy 2.1, and Master 2.1, and zips containing 'weaponised' executables for the Windows FinSpy client used to monitor events such as a Skype conversation.To read this article in full or to leave a comment, please click here Read More

Clippy saw this one coming
The image above is making the rounds on Twitter this morning. And while it would seem to be commentary on the official announcement that Microsoft is buying the maker of Minecraft for $2.5 billion, it was actually published on a site called Dorkly two  years ago.Author unknown but prescient. To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

Sneak Peek: New features coming to Internet Explorer

Microsoft's new Developer Channel offers glimpse into upcoming features of IE.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Is SWAT raid on wrong house, based on open Wi-Fi IP address, unconstitutional?

2. Internet of Overwhelming Things

3. Cisco gains strength in next-gen firewalls via Sourcefire

4. In memoriam: Apple's iPod through the years

5. Leaks show Windows 9 is looking good

6. How Boston Children's Hospital Hit Back at Anonymous

7. What would you do if you lost access to your Gmail

8. Researchers' new app outs iPhone and Android phone energy hogs

9. Cisco acquires OpenStack cloud provider

10. Many Android devices vulnerable to session hijacking through the default browser


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_convergence_voip_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment