Fixed mobile convergence (FMC) and unified communications (UC) have been talked about for years, but it is only recently with the advent of cloud-based technology options that the market for these has truly become viable, both for end users and service providers. Various surveys, reports and research studies exist providing evidence of market growth. According to industry analyst and research firm The Cavell Group, the total number of European cloud comms users will grow from 10 million...
Read More
More and more businesses today are looking to extract insight from the data they have access to in as near real-time as possible. They are looking to rapidly gain the insight and intelligence they need to drive optimum customer experiences; faster time to value and a competitive edge. By Jeff Fried, Director, Product Management - Data Platforms, InterSystems.
Read More
It’s now widely accepted that we live in an “always on” culture, with the average person spending five hours per day on some type of mobile device. For enterprises, there is an underlying expectation that employees are, at the very least, contactable wherever they are working – and at best, able to function as efficiently on-the-go as in the office. In fact, a recent survey of 500 senior IT and business leaders led by Oxford Economics showed that 80 percent of respondents believe their...
Read More
Greig Schofield, Technical Manager at Netmetix, explores how Wi-Fi could expose your business – and your employees – to ‘Man in the Middle’ cybercrime.
Read More
Software-Defined Wide Area Networking (SD-WAN) is an evolving technology, so characterising an SD-WAN architecture can be difficult. How SD-WAN was defined five years ago, or even two years ago, is not necessarily how it is defined today. In fact, trying to figure out where it’s going to be a year or two from now has become an interesting thought exercise for some technology leaders. By Donna Johnson, Vice President of Product and Solution Marketing at Cradlepoint.
Read More
Corporate networks have quickly become more and more complex. Change requests are regularly processed in the hundreds by IT security teams, which are then applied to company owned network devices. As a result, underlying network configuration processes increase in size and complexity, impacting the resources needed to manage the required changes. By Andrew Lintell, Regional Vice President at Tufin.
Read More