Search This Blog

Wednesday, August 19, 2015

ADTRAN offers Virtual Network Function for CPE

Web Real Time Communication (WebRTC) applications emerge as the tech stabilizes | When video collaboration makes sense in the cloud

Network World Convergence and VoIP

ADTRAN offers Virtual Network Function for CPE
ADTRAN has launched its Virtual Network Function (VNF) solution suite, offering telecom and cable service providers a way to transition customer premises equipment (CPE) solutions to virtualized, software-based networks. To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: IBM

Following the Rules, Reducing the Risk
As part of normal business activity, organizations are challenged with providing information to internal and external clients on a global scale, while at the same time, protecting personal information and ensuring intellectual property remains secure. Access this short article by AIIM to learn more about compliance. Learn More

WHITE PAPER: Aerohive

5 Generations of Wireless LAN Architecture
This paper explores the evolution of Wi-Fi from a convenience access medium, to a critical part of the network infrastructure. View Now>>

Web Real Time Communication (WebRTC) applications emerge as the tech stabilizes
Perhaps the single-most significant standards based technological advancement in the field of unified communications over the past year has been the completion of Web Real Time Communication (WebRTC) standard and the appearance of several WebRTC based implementations.WebRTC 1.0 APIs are defined by the World Wide Web Consortium (W3C) and the IETF (Internet Engineering Taskforce) RTCWeb Working Group, and they make it possible for Web browsers to support voice calling, video chat, and peer-to-peer connections.There has been considerable stabilization of the WebRTC browser implementation over the past year or so, enabling much more robust WebRTC apps to be developed. On the other hand, there still remains considerable and substantial work to be done on the IETF protocols for WebRTC.  To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: IBM

Top tips for securing big data environments
Organizations don't have to feel overwhelmed when it comes to securing big data environments. The same security fundamentals for securing databases, data warehouses and file share systems can be applied to securing Hadoop implementations. Learn More

INSIDER
When video collaboration makes sense in the cloud
The T.H. Chan Harvard School of Public Health (HSPH) educates and trains physicians all over the world. Consequently, the school is set up for distance learning. It has conference rooms, classrooms and even a dedicated teaching studio decked out with high-end Cisco telepresence gear. Despite ThoughtWorks' widespread adoption of Fuze, Yates is still seeing 4,500 Google Hangouts on the company's networks each month. The convenience of Hangouts is undeniable, Yates says. Google certainly is eyeing the enterprise videoconferencing space, and last year released a new line of dedicated hardware called Chromebox for Business that re-creates the videoconferencing room experience on Hangouts.To read this article in full or to leave a comment, please click here(Insider Story) Read More


: PC Connection

HP Z Workstations Enable Small Companies To Do Big Things
Larson & Darby uses Autodesk AutoCAD with HP Z Workstations, enabling it to compete effectively with larger firms in the tech-heavy Architecture/Engineering/Construction (AEC) industry. Learn More

Internet company Web.com hit by credit card breach
Hackers breached the computer systems of Internet services provider Web.com Group and stole credit card information of 93,000 customers.According to a website set up by the company to share information about the incident, Web.com discovered the security breach on Aug. 13 as part of its ongoing security monitoring.Attackers compromised credit card information for around 93,000 accounts, as well as the names and addresses associated with them. No other customer information, like social security numbers was affected, the company said.MORE ON NETWORK WORLD: 26 crazy and scary things the TSA has found on travelers According to the company, the verification codes for the exposed credit cards were not leaked. However, there are websites on the Internet that don't require such codes for purchases.To read this article in full or to leave a comment, please click here Read More

Cisco: Flash exploits are soaring
Cisco is reporting that successful exploits of Flash vulnerabilities are soaring, partly because they are rapidly being incorporated in kits that take advantage of the flaws as well as because enterprises aren’t patching fast enough, which leaves them open to attack.For the first five months of 2015, the Common Vulnerabilities and Exposures project has reported 62 Adobe Flash Player vulnerabilities that resulted in code execution on user machines, Cisco says in its 2015 Midyear Security Report.To read this article in full or to leave a comment, please click here Read More

Tech-savvy students, their demands and how IT protects them
Video Read More


SLIDESHOWS

Top 10 techie vacation spots

Whether you want to unplug or plug-in, check out these getaways.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. How an obscure acro and an old Network World story helped link AT&T to NSA spying

2. Worried about battery issues in Samsung's Galaxy S6 Edge? Try the Nexus 6

3. Hey Samsung! 2007 called, and it wants its Blackberry-style keyboard back!

4. 10 more security startups to watch

5. 10 security technologies destined for the dustbin

6. iPhone 7 Rumor Rollup: Into another Galaxy; India up next?

7. 19 free cloud storage options

8. 9 Chrome extensions (and 1 Firefox extension) that should be ported to Microsoft Edge

9. Proposed solutions for fixing Reserve Windows 10 problems

10. Windows 10 is possibly the worst spyware ever made


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_convergence_voip_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: