Monday, February 23, 2015

Digium Launches “Respoke” Platform as a Service

The era of personal unified communications is here | How machine learning ate Microsoft

Network World Convergence and VoIP

Digium Launches "Respoke" Platform as a Service
Digium announced the official launch of “Respoke” on their blog today, offering a cloud platform designed to enable communications for web and mobile applications. Respoke provides an API so developers can add live voice, video, messaging, and data services as to other applications; the platform is intended to allow communications feature development in a matter of days. Respoke began as a virtual startup within Digium and is staffed with a mix of communications industry veterans and cloud computing experts. Hundreds of invited developers have been working the platform in the beta mode released last year.The Respoke platform allows their customers to add features such as individual and group chat messaging, WebRTC-based voice and/or video calling, screen sharing, and file sharing to web applications-- all without the need to install a plug-in. The WebRTC “Platform as a Service” pricing model is based on the number of connections and bandwidth used. A free tier is offered for evaluation and development using up to five connections.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: IBM

5 Ways to Increase Conversion and Adoption Rates
Read this whitepaper to discover five ways to increase conversion and adoption rates for today's e-Businesses. Learn More

WHITE PAPER: IBM

Understanding Your Customer's Lifecycle Journey
Read this white paper to discover how you can gain a better understanding of your customer's lifecycle journey. Learn More

The era of personal unified communications is here
How 'Personal UC' can help make unified communications useful for every user in an organization. Read More

How machine learning ate Microsoft
At the Strata big data conference yesterday, Microsoft let the world know its Azure Machine Learning offering was generally available to developers. This may come as a surprise. Microsoft? Isn't machine learning the province of Google or Facebook or innumerable hot startups?In truth, Microsoft has quietly built up its machine learning expertise over decades, transforming academic discoveries into product functionality along the way. Not many businesses can match Microsoft's deep bench of talent.[ See what hardware, software, development tools, and cloud services came out on top in the InfoWorld 2015 Technology of the Year Awards. | Download the entire list of winners in the handy Technology of the Year PDF. | Stay up on key Microsoft technologies with InfoWorld's Microsoft newsletter. ] Machine learning -- getting a system to teach itself from lots of data rather than simply following preset rules -- actually powers the Microsoft software you use everyday. Machine learning has infiltrated Microsoft products from Bing to Office to Windows 8 to Xbox games. Its flashiest vehicle may be the futuristic Skype Translator, which handles two-way voice conversations in different languages.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Nasuni

5 Ways Cloud-integrated Storage Reduces Costs
Many companies are considering using cloud storage to reduce costs and the IT burden of storing data in the enterprise. Learn More

The Top 5 Reasons Why Google Hangouts Never Works
Editor's note: To be fair to Google Hangouts, Skype has its problems, too. But it's Google Hangouts that PCWorld's editors have, for several years, tried and largely failed to use for staff meetings with remote users. Just when we think we've figured out all the kinks, something else goes awry. So we feel our readers' pain on this one, and that's why we asked videoconferencing expert Christopher Null how to cure five of its most notable headaches. Did we miss a Hangouts hangup that's making your life hellish? Let us know in the comments. To read this article in full or to leave a comment, please click here Read More

Twitter speaks up for FCC net neutrality plan
With the Federal Communications Commission set to vote in three days on reclassifying broadband as public regulated utility, Twitter made its support for stronger net-neutrality rules official Monday.In a blog post laying out its case, Twitter struck the theme of free speech, but also said that an Internet that supports Web businesses without barriers imposed by ISPs is critical for the economic competitiveness of the U.S.“We need clear, enforceable, legally sustainable rules to ensure that the Internet remains open and continues to give everyone the power to create and share ideas and information instantly, without barriers. This is the heart of Twitter,” the post said. Net neutrality rules would prevent ISP from determining what content, services and applications get used and shared on the Web, it said.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Nasuni

Shadow IT in the Enterprise
This report reveals insights from more than 1,000 corporate IT users about their usage of Dropbox and personal mobile devices for work. Read this paper to gain an understanding for where consumer solutions are being used and if IT policies are effective in addressing the challenges associated with Shadow IT. Learn More.

How Target can beat Amazon's free shipping
Some headlines practically require a click, such as this one from Mashable: “Target undercuts Amazon on free shipping.” How do you undercut free? Is Target going to pay me for the privilege of shipping a package to my house? No, silly, you do it like this: The retail chain announced Monday that customers can qualify for free shipping on all orders of $25 or more placed through Target's website "with virtually no exclusions," down from a $50 minimum previously.To read this article in full or to leave a comment, please click here Read More

INSIDER
You've been hacked. Now what?
What should a company do after it’s been hacked? It’s a question Target, Home Depot, Sony Pictures Entertainment and others have had to ask over the past year or so. And it’s likely that other organizations will be facing the same question over the coming months.To read this article in full or to leave a comment, please click here(Insider Story) Read More

INSIDER
New weapons offer hope against advanced cyber-attacks
One of the most frightening things about modern cyber-attacks is that a breach can remain undetected within networks for weeks, months or even years. This time gives hackers the luxury of lateral movement within a network, meaning they can acquire better credentials, compromise more systems and search for the most profitable and most damaging information.To read this article in full or to leave a comment, please click here(Insider Story) Read More

INSIDER
Learn R for beginners with our PDF
With so much emphasis on getting insight from data these days, it's no wonder that R is rapidly rising in popularity. R was designed from day one to handle statistics and data visualization, it's highly extensible with many new packages aimed at solving real-world problems and it's open source (read "free").To read this article in full or to leave a comment, please click here(Insider Story) Read More


SLIDESHOWS

Top 10 DNS attacks likely to infiltrate your network

DNS-based attacks are on the rise because many organizations don't realize DNS is a threat vector and therefore don't protect it.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Low tech 'visual hacking' successful nine times out of 10

2. 10 Reasons why the Raspberry Pi 2 Model B is a killer product

3. Apple, Linux, not Windows, most vulnerable operating systems in 2014

4. 8 most intriguing gadgets of 2015

5. Is the Samsung Galaxy S6 about to become the coolest Android phone ever?

6. CuBox-i4Pro: A whole lotta Linux or Android for not a whole lotta cash

7. Learn R for beginners with our PDF

8. Hummingboard: Giving Raspberry Pi a run for less money

9. You've been hacked. Now what?

10. With $15 in Radio Shack parts, 14-year-old hacks a car


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_convergence_voip_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment