Wednesday, June 03, 2015

Avaya acquires Esna, Mitel buys TigerTMS

Microsoft goofs, leaks new Wi-Fi service for consumers and Office 365 Enterprise subscribers | How to create a robust backup strategy with cloud services

Network World Convergence and VoIP

Avaya acquires Esna, Mitel buys TigerTMS
Avaya has acquired Esna Technologies in a move intended to facilitate easier user access to cloud-based, multi-vendor communications capabilities. To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Dell Inc.

What Makes a Private Cloud a Cloud
Private
clouds are
the means for IT to re-establish its value back to the business— enabling productivity, competitive advantage, and increased customer service. To attain true private cloud capabilities, you must also deploy a systems management framework, optimize application delivery, and drive visibility. Learn Now

WHITE PAPER: Dell Inc.

Old PCs put your business at risk
Read this paper to learn what your organization can do to overcome security challenges. View now

Microsoft goofs, leaks new Wi-Fi service for consumers and Office 365 Enterprise subscribers
Microsoft is preparing to rebrand and expand its almost-unknown Skype WiFi service to make it both a consumer service and a perk for enterprises already subscribing to Office 365, according to a briefly-available website. The draft site -- microsoftwifi.com -- was up for hours Tuesday, but was eventually pulled and a "coming soon" placeholder substituted. However, parts of the website still languished in various search engine caches as of early Wednesday. Microsoft touted the service as a "hassle-free" way to connect to the Internet with a single sign-on. Like Skype WiFi, the renamed Microsoft WiFi will let users connect to paid public wireless hotspots without having to grab a credit card and fill out online forms for each operator. Those hotspots are typically found in hotels, airports and restaurants, and in the U.S. often run by companies such as Boingo.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Dell Inc.

Old PCs put your business at risk
Read this paper to learn what your organization can do to overcome security challenges. View now

How to create a robust backup strategy with cloud services
Love it or hate it, cloud storage is here to stay. Yet the fact is that cloud storage providers, like all IT companies, can experience outages or even go out of business. Moreover, the ever-present threat of data-corrupting malware and ransomware means that synchronizing to the cloud no longer offers adequate protection against data loss.With this in mind, let’s look at how you can work with more than one cloud storage service to put together a cloud-based disaster recovery strategy to protect your files.Narrow down your cloud storage option Despite there being many cloud services out there that offer free storage space, it makes sense to narrow down your primary cloud provider to just one service before trying to create a backup strategy. This serves to reduce complexity, and also makes it easier to ensure that your files are accounted for and backed up correctly.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: F5 Networks

How to Protect Against Evolving DDoS Threats
CIOs want harmony. Security directors loathe point products. Networks operations won't buy into anything new. Stakeholders can get the harmony they need around DDoS mitigation by extending the F5 Application Delivery Controller into a hybrid solution: on-premises with a new cloud component. Learn more >>

4 strategies to negotiate a better salary
Salary negotiation is nerve-wracking, whether you've landed a new job or are angling for a raise at your current employer. Here are four strategies to help your next salary or raise negotiation end successfully.1. Don't be afraid to negotiate While salary negotiations can be stressful, don't let fear and anxiety get in the way of being paid what you're worth. After the 2008 financial crash and during the ensuing recession, many people were happy to have a job at all -- any job, at any salary, says Lydia Frank, senior director of editorial and marketing, at PayScale.com. As the economy improves, businesses have more flexibility in their budgets and are starting to loosen the purse strings.To read this article in full or to leave a comment, please click here Read More

Security startup finds stolen data on the 'Dark Web'
Finding stolen data on the Internet is often the first sign of a breach, and a Baltimore-based startup says it has developed a way to find that data faster and more securely.The company is called Terbium Labs, named after a malleable, silver-gray element. CEO Danny Rogers and CTO Michael Moore say they're taking a large scale, computational approach to finding pilfered data.Terbium's product, Matchlight, uses data fingerprinting techniques to create hashes of an organization's data in fragments as small as 14 bytes. Only those hashes -- which can't be transformed back into the original data -- are stored by Terbium.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

Windows 10: Which classic Microsoft default apps should be killed?

Based on what we've seen in Microsoft's Windows 10 preview editions, here's our take on which classic apps should be kept and which should be killed when the final version of Windows 10 ships.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco's two presidents resigning

2. Reserve your free Windows 10 upgrade, download available on July 29

3. Google kicks Google+ off its homepage

4. Ransomware creator apologizes for 'sleeper' attack, releases decryption keys

5. Ubuntu Community Council, Jonathan Riddell discuss their recent fallout

6. Thieves using a $17 power amplifier to break into cars with remote keyless systems

7. 11 pointless but awesome Linux terminal tricks

8. iPhone 7 rumor rollup: Getting chippy, Force Touch all around

9. VMware's vSphere 6.0: Faster, smarter, more resilient

10. New products of the week 06.01.2015


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_convergence_voip_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **