- Transform IT security process into business action, CSOs advise
- In Pictures: The biggest Internet security challenges of 2013
- Disqus scrambles after leak fuels Swedish tabloid exposé
- Identity-theft vulnerability fixed in Microsoft Office 365, says security firm
- Microsoft Patch Tuesday reinforces the value of software upgrades
- Amazon drones are 'fantasy,' says eBay CEO
- On snooping disclosures, AT&T and Internet companies are like night and day
- In his own words: Tony Abbott on the NBN
- TPG buys AAPT
- US faces major Internet image problem, former gov't official says
voip in pictures
Siemens Enterprise Communications has changed its name to Unify and now hopes to take advantage of a growing interest in hosted unified communications.
Regardless of where you sit on the privacy vs. security spectrum regarding the controversy over the NSA collecting telephony metadata for millions of phone calls, the situation has made one thing clear: telephony metadata can be valuable. In fact, now is a good time to evaluate (or create) a system for internally gathering and making the most out of this important, but often overlooked information source.
While many enterprises have transitioned to SIP trunking as they adopt Voice over IP (VoIP), many are hesitant to migrate their contact centers away from the Public Switched Telephone Network (PSTN) due to concerns about quality and reliability. But SIP trunking has evolved, and new capabilities have emerged that offer value and options that are not possible with legacy PSTN connections.
The hacker group calling itself the Syrian Electronic Army (SEA) broke into the customer support website for Viber, an instant messaging and Voice-over-Internet-Protocol (VoIP) application available for both mobile and desktop operating systems.
Cisco Systems released a security patch for its Unified Communications Manager (Unified CM) enterprise telephony product in order to mitigate an attack that could allow hackers to take full control of the systems. The company also patched denial-of-service vulnerabilities in its Intrusion Prevention System software.
We're at an awkward stage as the age of network-streamed multimedia matures. Broadband and cell providers have only recently realized the public's enormous appetite for streaming video, VoIP, and the combination of both.
Given the importance of telephone systems, refreshing the technology can be daunting. However, for small and midsized businesses who consider upgrading from a PBX to VoIP, the benefits are clear and, with proper planning, the implementation is not very frightening. Consider these three steps:
LTE is simultaneously being pushed forward on several fronts, and the result for users will be faster networks, better coverage and the ability to access networks while travelling abroad.
Smartphone vendors will rely on upgrades such as full-HD screens and more powerful yet more frugal processors to entice customers to buy new phones in 2013.
It's a rare week indeed that doesn't see the emergence of some fresh news of Android's ascendance, but lately the evidence has been coming particularly fast and furious, suggesting that there really is no stopping the mobile platform--at least not anytime soon.
Information workers are increasingly demanding to use consumer-friendly Android and iOS devices on the job, so it stands to reason that IT administrators would value such flexibility too.
Intel has been on a buying binge lately. Just two weeks ago the world's largest chip maker agreed to acquire security vendor McAfee for $7.68 billion, and today it announced plans to buy Infineon Technologies' Wireless Solutions (WLS) division for $1.4 billion.
Whitepapers about voip
While corporations are issuing a growing array of wireless devices into the workplace, employees, partners and guests are also bringing in personal smartphones, tablets and laptops and expect to be able to connect them to the network seamlessly. Find out how your organisations can deliver high-performance applications, anywhere, on any device and over any access media.
Customers today are still grappling with subpar backup performance as systems outstrip the allotted backup window time. Strategies for data protection and recovery continue to be dictated by aggressive SLAs, rapid recovery, and ease of integration in existing environments. As a result, firms have started to embrace more disk-based data protection technologies, including purpose-built backup appliances (PBBAs) to protect and recover data and applications. This white paper explores the measurable benefits of PBBA systems for customers, with a focus on the increased use and adoption patterns of both integrated and targeted systems.
When you think Open Source software, you may think of half-baked programs too hard to use, or perhaps lacking power. Well, think again. This Open ...
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.