Wednesday, January 14, 2015

Lifesize enhances its video cloud service, introduces two new video endpoints

  Harrisburg University targets government data security | Attention iPhone Owners: Microsoft Wants YOU

 
  Network World Convergence and VoIP  

Lifesize enhances its video cloud service, introduces two new video endpoints
Lifesize, a division of Logitech, has announced new enhancements to its Lifesize Cloud video conferencing service, along with the introduction of two new video conferencing endpoints including the Lifesize Icon 400TM and Icon Flex.Enhancements to the Lifesize Cloud service include the ability for conference participants to connect using web browsers with WebRTC, with Microsoft Lync, and via Google Calendar and Microsoft Outlook. Web Browser connections are enabled using Firefox, Internet Explorer, Google Chrome or Safari, using a "one-click" connection directly from the web browser. In cases where the browser does not support native WebRTC, a plug-in is available to facilitate the connection.To read this article in full or to leave a comment, please click here Read More
 


: LogMeIn

Avoid the Sales/IT Collision Scenario
This InfoWorld research report, based on an IDG QuickPulse survey administered to IT professionals, will provide insight into the BYOA trend, identify pain points associated with traditional online meeting tools, and address business-driven IT requirements that benefit the overall organization. Read Now

WHITE PAPER: LogMeIn

Re-Evaluating the Role of "Traditional" Audio Conferencing
The audio conferencing market is changing and buyers are starting to move from traditional audio conference providers to integrated audio and web conferencing solutions. Learn More>>

Harrisburg University targets government data security
Harrisburg University of Science and Technology and its Government Technology Institute (GTI) have launched a center focused on protecting government data and systems from intruders.The Security Center of Excellence (SCoE) is led in part by Charlie Gerhards, the former CIO of Pennsylvania. MORE: Cisco funds university research into VoIP securityCisco, Deloitte Consulting, IBM, Symantec and Unisys are sponsoring the center and will provide experts to help establish best practices through the center. To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: IBM

IBM Value-based Archiving Solutions
This solution brief highlights IBM Value-based Archiving Solutions, which help enable organizations to apply specific archiving logic—including content-based analytics and classification, records declarations, and metadata processing—to address the requirements of archiving projects. View Now>>

Attention iPhone Owners: Microsoft Wants YOU
  Microsoft today pitched a preview of a new Skype client to iPhone and iPad owners, asking for volunteers to test the software. The call for testers may be part of Microsoft's decision to change the name of its corporate messaging platform -- Lync -- to Skype later this year as it blends aspects of both in the next generation of its enterprise software, which will be called Skype for Business. "We're looking for enthusiastic Skype users who are interested in providing feedback that will shape and enhance Skype for iOS to join our new pre-release program," wrote a Skype product marketing manager on her team's blog Wednesday.To read this article in full or to leave a comment, please click here Read More
 


WEBCAST: APC by Schneider Electric

Building Tomorrow's Data Center with Converged Technologies
A number of forces are converging: the cloud, converged infrastructure, big data and fabric architectures to name a few. And if those weren't enough, data center professionals must keep systems up 24 by 7, keep data secure, meet compliance obligations and keep costs and energy usage under control. It's a tall order. Learn More

UK prime minister suggests banning encrypted apps like WhatsApp, iMessage
The U.K. may ban online messaging services that offer encryption such as WhatsApp and Apple's iMessage, under surveillance plans laid out by Prime Minister David Cameron.Services that allow people to communicate without providing access to their messages pose a serious challenge to law enforcement efforts to combat terrorism and other crimes, Cameron said Monday.He didn't name specific apps, but suggested those with encryption would not jive with new surveillance legislation he's looking to enact if he gets reelected this year. Such apps include WhatsApp, iMessage, Google Hangouts, Microsoft's Skype, CryptoCat, and more.To read this article in full or to leave a comment, please click here Read More
 

Google Chases Microsoft with Beefed-up Translate Speech Tools
Microsoft spent the last half of 2014 getting everyone excited about Skype Translator,  a new technology that translates real-time conversations between two people speaking different languages over Skype. The new feature went into an invite-only preview in December. Not to be left behind, Google recently let slip to The New York Times that it intends to beef up the spoken translation chops of Google Translate for Android and (presumably) iOS.To read this article in full or to leave a comment, please click here Read More
 

Guided tour of a Google data center
Sure it's Google propaganda, but it's interesting Google propaganda.Joe Kava, VP of Google's data center operations, walks us through a company facility in Berkeley County, South Carolina (I've provided a few highlights under the video for those who can't or don't want to watch): Highlights: Only a small percentage of Google employees are authorized to even enter a data center campus. Yes, the building has a foosball table. Employees use scooters to traverse the massive building, at least when filming videos. "We just went past the 3-million man-hour mark for zero loss-time," says a Googler. "Three million man hours is a really long time and with the number of people we have on site that is an amazing accomplishment." "Protecting the security and the privacy of our users' information is our foremost design criteria," Kava says with a straight face. The facility's multi-layered security include badges, biometric iris scanners, and "under-floor intrusion detection via laser beams." The data center temperature is a toasty 80 degrees. "Google runs our data centers warmer than most," says Kava, "because it helps with the efficiency." Server racks are custom-designed and built. When drives fail "they are brought to an ultra-secure cage where they are erased and crushed if necessary." More info on the data center here. Pretty pictures here.To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

Best of CES 2015: In pictures

The best and most noteworthy products and technologies found at CES 2015.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Intuit gets greedy, nearly doubles price of TurboTax

2. Linux distros to watch in 2015

3. Guided tour of a Google data center

4. 26 of the craziest and scariest things the TSA has found on travelers

5. 3 ways to run 'normal' Linux on a Chromebook

6. January 2015 Patch Tuesday: Microsoft releases 1 critical, 7 important security fixes

7. Hackers dump over 30,000 confidential client emails after bank refuses to pay ransom

8. Can't wait for Apple iOS 9?

9. 15 ways to screw up a job interview

10. Is it time to move to beamforming 802.11ac?


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_convergence_voip_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


1 comment:

Michael Davis said...

In an age when event budgets are being cut and broadband Internet access is rising, webinars are becoming increasingly popular. Webinars are web-based seminars, that usually include over 30 participants and are used to conduct presentations, workshops, lectures and large-scale meetings. Since webinars are held online, they allow companies to save money on travel, catering and venues, all of which are costs commonly associated with face-to-face seminars. However, due to their large attendance, webinars need careful planning in order to be successful. This is why those planning on video conferencing need to take their time to ensure that they properly go through all the necessary steps which will ensure the webinar’s success.