Monday, January 26, 2015

8x8 integrates cloud-based UC and contact center platform

  Broward County rolls out its own fiber ring, shifts to VoIP | The embedded IT worker: Would you fit in?

  Network World Convergence and VoIP  

8x8 integrates cloud-based UC and contact center platform
8x8, a cloud-based service provider, announced an integrated cloud communications solution that amalgamates telephony, unified communications (UC) and contact center users across the organization using a common underlying platform.The 8x8 Virtual Office/Virtual Contact Center integrated solution features: "Shared Presence" so agents can the status of anyone in the company to handle customer issues; corporate and contact center directories are integrated. Single Sign-On – enabling user to authorized tools including call center features, UC services for agent desktops, meetings, switchboards and mobile clients. Extension-to-Extension Dialing – providing click-to-call dialing and call processing between contact center users and other users in the organization Call Center Agent Hardware Endpoints – for agents who don't use a soft phone solution (e.g. a remote IP phone) can make their device part of the contact center call flows and reporting. Streamlined Administration - Combined communications tools designed to reduce the amount of time required to manage the service. Commenting is a statement of the latest 8x8 integrated solution, Keith Dawson, Practice Leader, Customer Engagement at Ovum said, "By integrating core business telephony and contact center functionality onto a single cloud-based platform with single sign on and shared presence, 8x8 has not only simplified the communications infrastructure that burdens so many businesses today, it has enhanced the value businesses derive from its solution set by providing a path to improved customer engagement.To read this article in full or to leave a comment, please click here Read More

: LogMeIn

Avoid the Sales/IT Collision Scenario
This InfoWorld research report, based on an IDG QuickPulse survey administered to IT professionals, will provide insight into the BYOA trend, identify pain points associated with traditional online meeting tools, and address business-driven IT requirements that benefit the overall organization. Read Now


Bridging the Gap Between Users and IT
The BYOA trend is accelerating, as more users are ditching their current solution and introducing their own collaboration apps into the workplace, often without consulting IT. Read this study to learn four ways IT pros can regain control of collaboration. Learn More

Broward County rolls out its own fiber ring, shifts to VoIP
"TOO SLOW!" "It takes me over 5 minutes just to log in!"In 2009 Broward County customer complaints regarding the slowness of accessing and using Broward County's services triggered the Enterprise Technology Services' (ETS) Communications group to review the County's network architecture and determine ways to advance it.The ultimate outcome? Broward County's ETS Communications Group implemented an underground fiber optic ring and associated equipment owned and maintained by Broward County which vastly improves performance, saves $780,000 per year and made it possible to embrace IP telephony, a move that saved an additional $28,000 per year.To read this article in full or to leave a comment, please click here Read More


IBM is a Leader in The Forrester Wave
"The Forrester Wave™ for Enterprise Social Platforms offers in depth vendor evaluation based on 65 criteria to help your organization choose an enterprise social platform. The full report evaluates 13 social software vendors, with specific information on their core functionality and strategy. Learn More


The embedded IT worker: Would you fit in?
The trend toward embedding IT workers within business units has been much heralded in theory, but slow to take off in practice. Those organizations that have made the move to an embedded IT workforce talk about the pros and cons. Read More



The SAP Security Survival Guide
The Onapsis Security Platform is SAP-certified and is the first solution that combines a preventative, behavioral-based and context-aware detective approach for identifying mitigating security risks, compliance gaps and cyber-attacks on business-critical applications. These applications include ERP, CRM, HCM, SCM, SRM and BI solutions. Learn More

8 key IT hiring trends to watch for in 2015
  IT has grown into an entity that touches all parts of the business and organizations must keep pace or get left behind. David Foote, chief analyst and research officer with Foote Partners, makes it his business to stay on top of the technology trends driving organizations. His firm works with more than 2,600 companies monitoring IT skills pay and demand for the IT workforce. talked to Foote to discuss the year ahead and what technology leaders need to be on the lookout for.ALSO ON NETWORK WORLD: How to lure tech talent with employee benefits, perks Editor's Note: The most recent data at the time of this article was from the third quarter of 2014, but some things have shifted in Q4, according to Foote, who provided some insight into how they should affect the 2015's outlook.To read this article in full or to leave a comment, please click here Read More

'Is radar breaking my WiFi?'
The question in the headline was posed yesterday by a reader of Reddit's section that is devoted to networking."This just seems so ... far-fetched," the questioner writes. "I wouldn't believe it if someone told me this story."Here's his story: "So, I'm still trying to wrap my head around what happened this morning. I have been chasing a problem with a few of our Aruba Ap105 access points for a few weeks now. They would intermittently lose network access (and generate Nagios alerts) only when school was in session, and only at one school...our highest wireless utilization point across the district. Cisco switches showed packet errors, so that's where I started.To read this article in full or to leave a comment, please click here Read More



2015's 25 geekiest 25th anniversaries

A look back at the most memorable tech-related happenings of 1990.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.


1. Conference calls a waste of time? In 1915, this one made history

2. 8 Wi-Fi mistakes to avoid

3. US intelligence group wants to reverse-engineer human brain algorithms

4. Sad state of U.S. broadband as cable industry balks at FCC's 25Mbps definition

5. Oracle is quietly becoming a cloud giant

6. 13 geeky SkyMall catalog treasures you can't live without!

7. Is the ASUS X205 Microsoft's Chromebook killer?

8. Why did Microsoft skip Windows 9 and jump to Windows 10?

9. Thousands of U.S. gas stations exposed to Internet attacks

10. Scared of 802.11AC Wave 2 Wi-Fi? Here comes Cisco Multigigabit to the rescue


Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_convergence_voip_alert as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **


No comments: