A unified communications deployment that doesn't take mobile into account isn't all that useful in the era of the always-on road warrior. With that in mind, CounterPath is rolling out a new version of both its desktop and mobile unified communications messaging application.
As we noted last week, the third release of OpenDaylight, the open source software-defined networking (SDN) project, apparently came together in a methodical and drama-free approach – something not always typical of a fairly new open source project. Dubbed Lithium, the latest version of OpenDaylight (now available for download) is a significant update, providing several new and updated features.
It's hard enough keeping the LAN and WAN functioning properly and providing end-users with the services they need to do their jobs. It's getting worse, though.
Even with the launch of the latest 802.11 wireless networking standard, Wi-Fi has a performance issue. The slowest device on an access point kills the fun for everyone else, bringing throughput down and impacting efficiency. But there are ways to combat the problem, even without waiting for 802.11ac Wave 2.
Upgrading wireless networks to 802.11ac--and then on to Wave 2 later this year--can be a tricky task even in the best situations. Enterprises are still moving to the latest wireless standard, but with a rapidly increasing number of devices supporting it and the overall benefit of faster transfer speeds, it's a justifiable network upgrade project.
The unified communications market has been growing steadily for some time now, but according to Frost & Sullivan, new technologies and trends are going to have an even greater impact on unified communications.
Unified communications has shifted into the cloud and onto mobile devices in a big way, but some of those applications--which may or may not be officially part of the enterprise's UC strategy--are creating cause for concern.
You may have read someplace that "shadow IT" is a significant threat to the enterprise--the notion that the latest wave of software presented as services is taking power away from on-premise IT departments.
If you give a group of C-suite executives a list of bad things to choose from and tell them to arrange them in order of bad-to-worse, like a tally of "Brady Bunch" episodes, does the one...
All data stored on a client system belongs to the owner of that system, mandates European Union law. This means security services cannot use that data without revealing themselves.