Search This Blog

Monday, September 22, 2014

The Proliferation of Webinars

Ex-Cisco employee pleads guilty to second-degree murder in 'Google Maps case' | Is Conflict the Secret to a Successful Business?

Network World Convergence and VoIP

The Proliferation of Webinars
Has anyone else noticed an explosion of webinar offers lately? Back in the good old days, about 15 or 20 years ago, I used to jump on planes and literally circle the world for speaking tours and to conduct seminars. Group conference calls were an option back then in lieu of a face-to-face seminar, but much to the dismay of the airline industry, most of us have replaced the off-site, in-person seminar with webinars delivered to our desks.Companies now use webinars both to attract potential new customers with incentives for free educational opportunities and to retain or train existing customers — much like we used to do in person, but without the travel expense. Some of these webinars use a stand-alone platform or service specifically designed for large conferences, and some are being supported by features already integrated into a unified communications and collaboration (UC&C) system.To read this article in full or to leave a comment, please click here Read More


: Samsung

Is your smartphone secure enough?
Learn how Samsung KNOX's multi-layered approach to mobile security protects against malicious apps, prevents attacks from one domain spreading to another domain and more. Learn More

WEBCAST: Alcatel-Lucent Enterprise

Integrating Mobility with Unified Access
Meeting mobility demands of 4500 students, faculty and staff at a university is no small task. Join this Webcast to hear the Director of Enterprise Infrastructure explain the steps Abilene Christian University took to deliver a new level of student-faculty interaction. Learn More

Ex-Cisco employee pleads guilty to second-degree murder in 'Google Maps case'
Ex-Cisco engineer Brad Cooper, whose first-degree murder conviction for the 2008 strangulation slaying of his wife Nancy was overturned last year based on disputed Google Maps-related evidence, today pleaded guilty to second-degree murder.According to North Carolina media reports, Cooper will be sentenced to 12 to 15 years in prison and has agreed to allow the adoption of his two young daughters by Nancy Cooper’s sister. Whether the sentence includes time served was not clear.To read this article in full or to leave a comment, please click here Read More


RESOURCE COMPLIMENTS OF: PC Connection

Need to justify a storage refresh? Get SMART, get started.
Storage modernization unlocks the full potential of your data center. It increases storage capacity, boosts performance, and reduces costs per gigabyte. Click to continue

Is Conflict the Secret to a Successful Business?
Conflict in the workplace is inevitable, but, if handled correctly, it can actually lead to a more engaged and productive workforce. The key is to maintain professionalism at all times and remember to be empathetic, says Piera Palazzolo, senior vice president, Dale Carnegie Training."The most important thing to remember is that conflict isn't inherently negative," says Palazzolo. Conflict, while uncomfortable and disruptive, can actually be a great sign that your employees are motivated, engaged, passionate and invested fully in making your business and your company succeed, she says.ALSO ON NETWORK WORLD: How to lure tech talent with employee benefits, perks "Sure, you may believe that nothing's wrong if everything's going smoothly, but that's not always the case. Maybe people are just 'going along to get along,' and they're not as engaged or involved as they could be," Palazzolo says.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: CloudBees

Ten Factors Shaping the Future of Application Delivery
More and more organizations are realizing the impact of delivering applications in an accelerated manner. Download this research report conducted by Enterprise Management Associates (EMA) to learn how those that are seeking to do so are leveraging DevOps functions internally and moving towards Continuous Delivery. Learn More

DOJ wants to give the FBI permission to hack into PCs of Tor and VPN users
When people use anonymizing tech such as Tor or a VPN, then that should not imply they are trying to “hide” because they are up to no good. It does make it challenging for law enforcement to know the location of the person trying to protect his or her anonymity as well as to know what district has legal jurisdiction to issue a warrant. However the DOJ has proposed changes to Rule 41 that would allow US law enforcement to hack into computers of people using anonymizing services without needing to first know the location of those computers. According to law professor Ahmed Ghappour, the proposed amendment could result in “possibly the broadest expansion of extraterritorial surveillance power since the FBI’s inception.”To read this article in full or to leave a comment, please click here Read More

FTC shuts down $11M online diploma mill
The Federal Trade Commission on Friday pulled the plug on an online high school diploma mill that allegedly raked in $11 million since opening its virtual doors in 2006.The FTC says the mill generally charged between $200 and $300 for its “diplomas.” Let’s call it $250. That means 44,000 individuals had “graduated” from this “school” since 2006.From an FCC press release: The court imposed a temporary restraining order to halt the business operations of Diversified Educational Resources, LLC (DER), and Motivational Management & Development Services, Ltd. (MMDS), and freeze their assets. The FTC’s lawsuit seeks a permanent injunction to stop the deceptive practices and to return ill-gotten gains to consumers.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

The wild world of workplace wearables

Here are some examples of wearables coming to a variety of vertical industries.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Key Cisco defections in data center, OpenStack

2. Ancient Microsoft scam lives on

3. Internet of Overwhelming Things

4. Cisco, FireEye Announcements: A Microcosm of the Enterprise Cybersecurity Market

5. How Google is helping me live a cellphone-free life

6. HP leapfrogs Red Hat to become top contributor to OpenStack

7. Predicting crime with Big Data ... welcome to "Minority Report" for real

8. 7 killer open source monitoring tools

9. The 2014 Ig Nobel Prize winners

10. FTC shuts down $11M online diploma mill


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_convergence_voip_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: