Search This Blog

Wednesday, January 22, 2014

TWCBC Adds SIP Trunking; Panterra Introduces File-Sharing With Built-In UC

Cisco fixes remote access vulnerabilities in Cisco Secure Access Control System | Hands-on with the ZTE Grand S II, a voice-activated phone

Network World Convergence and VoIP

Forward this to a Friend >>>


TWCBC Adds SIP Trunking; Panterra Introduces File-Sharing With Built-In UC
With over half a dozen UC-related announcements so far in the last few days, today we'll hit the highlights with three news items: Time Warner Cable Business Class (TWCBC) has added SIP (Session Initiated Protocol) Trunking to its portfolio, PanTerra has introduced a file-sharing service with built-in unified communications, and Fonality reported solid growth for its UC business in 2013. Read... Read More


WHITE PAPER: Dell

Understanding Enterprise Cloud Governance
This whitepaper covers how to deliver the agility of cloud computing address while still maintaining operational control, through the use of cloud management software, View Now

WHITE PAPER: Limelight Networks

Predictive Performance: Measuring the Digital Experience
As websites get more immersive and more complex, organizations need to rethink what, and how, digital experience performance is measured. Speed (or responsiveness) is only one of several factors to consider. Learn More

Cisco fixes remote access vulnerabilities in Cisco Secure Access Control System
Cisco Systems has released software updates for its Cisco Secure Access Control System (ACS) in order to patch three vulnerabilities that could give remote attackers administrative access to the platform and allow them to execute OS-level commands without authorization. Read More


WHITE PAPER: VCE

Rompetrol Case Study
After a successful acquisition and growth phase, Rompetrol turned its energy into improving global operations by consolidating IT operations and launching a series of IT initiatives including an SAP rollout and a move toward private cloud. Learn More

Hands-on with the ZTE Grand S II, a voice-activated phone
With all the smartphones on the market, Chinese company ZTE is hoping to set its phones apart by bringing voice-assistant technology to its newest flagship device, the Grand S II. Read More


WHITE PAPER: HootSuite Media, Inc.

5 Step Guide to Social Media Security
As businesses embrace social media, related security breaches are on the rise. Corporate Twitter hackings. Rogue employees on the company Facebook account. Executives sharing confidential info on their personal accounts. Learn More

Cloud Service Helps You Communicate Better by 'Reading Your Voice'
A startup company claims that its voice-analytics software -- which is based on 18 years of research by physicists and neuropsychologists -- can offer you instant feedback about the mood, attitude and emotion your spoken words convey. Read More

How Apple and Pepsi fumbled their 2004 Super Bowl ad play
Ten years ago, at the height of the music download legal wars, Apple and Pepsi marketers figured this was a can't-miss Super Bowl commercial: Take 16 teenagers whose parents had been strong-armed by the recording industry into paying thousands of dollars in legal settlements and have them announce to the world that Apple and Pepsi would be giving away 100 million iTunes songs for free. Read More

30 years of Apple's Mac computer
A visual history of the Mac. Read More


SLIDESHOWS

30 years of Apple's Mac computer

A visual history of the Mac..

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Better than TV! White spaces bring wireless bonanza to West Virginia

2. ATMs could be compromised when Windows XP support ends

3. 30 years of Apple's Mac computer

4. Top 25 most commonly used and worst passwords of 2013

5. 12 privacy-destroying technologies that should scare you

6. Target hackers may have stolen useless data

7. Brocade exits network adapter business

8. How Apple and Pepsi fumbled their 2004 Super Bowl ad play

9. Survey sheds light on mobile-manic young workers

10. Three-year, 27,000 drive study reveals the most reliable hard drive makers


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_convergence_voip_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: