- Capitalizing On Big Data: Managed Services Help Financial Firms Accelerate Big Data Projects
- Empowering the Workforce in a Rich Media World
- Infographic SSD vs HDD
- Gartner Report: Selecting the Best Platform for Cloud Service Integration
- 5 Steps for Securing the Data Center: Why Traditional Security May Not Work
November 2008- Unified Communications can be used for many purposes: extend telecom, desktops, applications, and mobility. UC investments are driven by the applications. UniComm Consulting explores various facets of UC and the associated benefits in this presentation.
November 2008- UC investments are driven by the applications. UC can be installed in phases and layers; by workgroups, teams, and locations; and based on specific business process improvements. UniComm explores various UC applications and solutions in this presentation.
November 2008- UC solutions are quickly emerging as necessary tools for enterprises to enhance real-time communications efforts to remain competitive in an intensive market environment. The advantage of a seamless UC experience is to provide system subscribers the flexibility of selecting the best or most desirable communications device and/or embedded GUI screen during a communications process. This presentation by Allan Sulkin, president of TEQConsult Group, explores seamless UC interfaces.
November 2008- The integration and convergence of IP telephony systems and UC solutions is currently taking place. Presence management and social networking applications will play a greater role in real-time and non-real-time communications. We are approaching the era of FCS. Alan Sulkin, president of TEQConsult Group, looks at enterprise communications in this presentation.
November 2008- A tutorial presentation by David A. Bryan, CEO of SIPeerior Technologies, focuses on SIP. The discussion includes the background of VoIP, SIP components, SIP messages, locating users and establishing sessions, routing in SIP, media with SIP, and more.
November 2008- An emergency notification system is capable of notifying anyone in the enterprise that an emergency is in progress in real-time. It uses multiple methods of communication (voice, e-mail, SMS, pager) and is integrated with other enterprise voice and data networks. RedSky explores this system in this presentation.
November 2008- The majority of enterprises are deploying IP-Telephony/VoIP and companies will evolve from IPT to further enhance productivity. As organizations fully embrace UC, communications application performance management will be required from the start of deployments to avoid major problems. Psytechnics explores this subject in this presentation.
November 2008- Many IP telephony/UC projects that fail or underachieve reflect problems in the planning and design process. PlanNET Consulting presents a discussion on doing the necessary planning and organization for successful IP, Unified Communications and converged networks.
November 2008- Some vendors have introduced the concept of user licensing or user profile licensing to facilitate unified communications deployments. PlanNet Consulting features this presentation on IP telephony pricing and licensing.
November 2008- In this presentation on Unified Communications, Miercom focuses on the essence of UC; UC and the enterprise; UC vendor profies; and a look ahead. Miercom conducted lab testing and claims these are the results.
November 2008- Microsoft features this presentation on Unified Communications. Mobility isn’t just about mobile phones. Mobile users employ a combination of devices and tools. Consistent experience across PC, Web and mobile phone is important. Solutions need to work seamlessly regardless of where the user is--in the office or on the road.
November 2008- A telephone is no longer just a telephone. It is an integrated device that extends to anyone’s PC and enterprise servers as a means of communication among users in the enterprise. Those who don’t embrace an integrated VoIP and IP telephony technology plan today will be left behind, according to Leaden Associates in this presentation.
November 2008- The key to driving value in networks is to take advantage of key technologies and offerings/trends in the market, thereby directly effecting organizational IT costs and providing a network that is robust and highly competitive in the market. Leaden Associates takes a look at telecom trends and best practices.
November 2008- Keys to a successful VoIP deployment include an adaptive and scalable network infrastructure; automated configuration of VoIP components; network availability and performance monitoring; and network device inventory reporting. HP ProCurve features this presentation on IP telephony management.
November 2008- Delphi discusses the state of VoIP and IP telephony in this presentation. The discussion includes information on the advantages of VoIP networks and best practices.
November 2008- The trend in cellular spending is toward centralizing cellular costs. Communications Advantage provides its presentation of the hidden costs and benefits of cellular spending plans.
November 2008- Cisco provides this presentation on how SIP can enhance and protect communications systems. Privacy and security are increasing concerns for systems.
November 2008- Cisco explores the challenges and provides some solutions for a voice-ready WLAN.
November 2008- Focusing on network and voice service management, QoS, and VoIP implementation, CA provides a presentation on troubleshooting converged enterprise networks.
November 2008- Session Initiation Protocol (SIP) is an application-layer protocol for creating, modifying, and terminating sessions with one or more participants. Trunking is a communications concept around enabling many clients to share network access through a set of lines, frequencies, or bandwidth. AT&T explores SIP in this presentation.
May 2008- APC details energy use in data centers in this presentation. Best practices can be utilized to maintain current energy usage levels through 2011 but programs and incentives are needed as well as a “whole system” approach, according to the company.
May 2008- If we limit our vision of Unified Communications to only the user productivity opportunities, we will misunderstand the impact of where and how this market will develop. UniComm measures the savings, benefits, and opportunities provided by UC in this presentation.
April 2008- CA offers a discussion of voice management, QoS, and IT management in this presentation.
April 2008- This panel discussion traces the evolution of wireless mobile communications and weighs in on the architectural and design attributes of IP telephony platforms from Siemens, Cisco and Microsoft.
May 2008- Simple actions and smart methods for running IP telephones and Ethernet switches, repeated many times over, can make a big difference in going green.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services