Hello, greetings, and welcome to Conversational Unified
Communications. I’m Brien Posey. For those of you who don’t
know me, I am a long time Conversational Geek author, and
17-time Microsoft MVP. My professional background is in both
IT and in commercial astronautics. It’s an odd combination for
sure. I sometimes find myself setting up virtual machines on
one day, and being strapped into a space capsule the next day
(seriously). Thankfully, Peter, Nick, and the rest of the folks at
Conversational Geek have embraced my unorthodox (dare I say
eccentric) career choices and have allowed me to author books
on subjects ranging from the cloud computing to real life
rocket science. I would like to personally invite you to go to
ConversationalGeek.com and check out some of these other
In this book, I want to talk about unified communications.
Those of you who follow my work may recall that back in 2009 I
wrote another book about unified communications called Brien
Posey’s Guide to Pract
Published By: Kustomer
Published Date: Aug 27, 2019
The modern-day customer expects their needs to be met immediately, no matter the channel. Drive meaningful customer relationships, increase revenue streams and improve operational performance, with omnichannel support.
The need for identity protection has never been stronger. Identity theft accounted for 74 percent of all data breaches in the first half of 2017, and costs associated with cybercrime are expected to reach $6 trillion annually by 2021. Any time an employee's username and password are compromised, your business is vulnerable. Eight-character passwords that changed every 90 days worked well a decade ago, but increasingly commonplace attack methods like password cracking, phishing, or screen scraping call for a new kind of protection.
Today, business is conducted in a fast-paced, on-demand, globally dispersed environment. Maintaining a competitive edge requires cohesive real-time collaboration. Mobile workers, partners, vendors, suppliers, and even customers expect to be able to work together seamlessly, both inside and outside the firewall. But delivering tools for high-quality collaboration is often challenging, due to the need for businesses of all sizes to support a wide range of personal and business devices. Mixing disparate devices with complex conferencing solutions often lead to frustrated employees, while businesses face a labor-intensive, costly endeavor without a high ROI. In addition, collaboration is evolving with businesses creating small "huddle" spaces and open workspaces that increase the demand for ubiquitous, effective conferencing.
The Intel Unite ' solution is a fast, simple, cost-efficient way to deliver a more secure, manageable, high-quality collaboration experience. Whether you select the
Need some help picking a learning management platform?
The right learning management platform can play a huge role in your institution’s success, including that of faculty and students. Therefore, you have some homework to do. Don’t worry, we’ve made it easy.
Read our Higher Education Guide to choosing a Learning Management Platform for insights on:
• Understanding how a true Learning Management Platform should work
• Identifying the unique needs and wants of your users
• Aligning a platform to your institution’s goals
• Planning for future scalability
• And more.
Get your guide today and study up on how to choose a great learning management platform for your institution!
Much has been written about the impact of technology on insurance, this most traditional of industries. Artificial intelligence (AI), connected cars, drones and the Internet of Things (IoT) are all becoming integral to the insurance and automotive industries. This becomes obvious when using your car’s navigation system – an everyday action that might well lead to a chain of events few would even think of today.
To find out more download this whitepaper today.
Key considerations when developing a strong and customer-friendly approach to intelligent authentication. Bank fraud is on the rise. In fact, according to a recent survey of 43 major banks around the world, it’s not just the number of fraud cases that is going up; so, too, is the value of fraud overall. In large part, this increase in fraud is the result of identity theft scams. Rather than attempting some sort of high-stakes virtual bank heist for all the gold in the vault, most online thieves seem content simply stealing money from every-day customer’s accounts when they aren’t looking.
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates.
They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹
While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work.
Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay.¹
As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed breach world.
Published By: Blackberry
Published Date: Jul 12, 2019
Technology is changing the way that businesses
across industries operate. Often referred to as
“digital transformation” or “digitization,” this change
is rapid, and it is relentless. It touches everything in the
legal profession from the completion of everyday tasks to
the way information is secured and shared
Published By: Corrigo
Published Date: Sep 12, 2019
We’re living in a new era defined by data, analytics, and intelligence. It can sound overwhelming, but once you understand how to make all this information work for you, it becomes really exciting.
The Intelligence Economy has already changed our day-to-day lives, and it’s revolutionizing the world of facilities management. The best FMs don’t just understand this change – they embrace it.
With a better handle on intelligence, you will see immediate results. From warranty enforcement to asset repair vs. replacement decisions, Corrigo’s collective intelligence can improve your bottom line and make you better at your job.
Read on to learn how Corrigo makes the Intelligence Economy work for you.
While NFV remains both technically and business relevant today, many communications service providers (CoSPs) have found implementation very complex. NFV implementation will require further evolution in order to fully address operational and business requirements. This white paper reviews factors currently driving the network virtualization evolution and examines the impact of adopting an innovative model based on software and hardware disaggregation.
: Are you among the two thirds of industrial companies who are currently, or planning to, implement industrial transformation? A new report by LNS Research finds that there is quite a wide gap in how the companies perceived as industrial transformation leaders develop their transformation project strategies compared with companies perceived as followers.
Don’t get left behind. Discover the recommendations from LNS Research on how to ensure the success of your digital transformation initiatives.
Published By: Nutanix
Published Date: Aug 22, 2019
Today, companies of all sizes face growing threats from shifting consumer habits, global competitors, and well-funded startups.
Digital transformation, cloud computing, and the dynamic nature of global business have changed business expectations, making
IT an essential driver of revenue and an ever more critical part of your business. Your IT team is looking for ways to accelerate
the adoption of digital technologies to increase customer engagement, streamline business processes, and gain a sustainable
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day.
The solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive.
Download this report to find out what else Ovum has discovered about security practices in Asia Pacific.
The Security Operations Center (SOC) is the first line of defense against cyber attacks. They are charged with defending the business against the many new and more virulent attacks that occur all day, every day. And the pressure on the SOC is increasing.
Their work is more important, as the cost of data breaches are now substantial. The Ponemon Institute’s “2017 Cost of Data Breach Study” says the average cost of an incursion is $3.62 million. The study also says larger breaches are occurring, with the average breach impacting more than 24,000 records. And with new regulations such as the EU’s General Data Protection Requirement (GDPR) putting stiff financial penalties on breaches of personal data, the cost of a breach can have material impact on the financial
results of the firm. This trend toward increasingly onerous statutory demands will continue, as the U.S. is now considering the Data Privacy Act, which will bring more scrutiny and accompanying penalties for breaches involving
Published By: Gigamon
Published Date: Sep 03, 2019
We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened.
On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption.
During this webinar, we’ll talk about:
-How TLS/SSL encryption has become a threat vector
-Why decryption is essential to security and how to effectively pe
Published By: Gigamon
Published Date: Sep 03, 2019
With new threats emerging every day, IT organizations need to
frequently upgrade or introduce new cybersecurity tools and
technologies. The problem is that it can be very difficult to set
up realistic tests that show how technologies will perform under
Published By: Gigamon
Published Date: Sep 03, 2019
Network operations teams can no longer ignore the application layer. Application experience can make or
break a digital enterprise, and today most enterprises are digital. To deliver optimal performance, network
operations tools must be application-aware. However, application-awareness in the network and security tool
layer is expensive and difficult to scale. Enterprises can mitigate these challenges with a network visibility
architecture that includes application-aware network packet brokers (NPBs).
EMA recommends that today’s network operations teams modernize their approach with full application
visibility. EMA research has found that network teams are increasingly focused on directly addressing security
risk reduction, service quality, end-user experience, and application performance. All of these new network
operations benchmarks will require deeper application-level visibility. For instance, a network team focused
on service quality will want to take a top-down approach to perfo
Published By: Rackspace
Published Date: Sep 04, 2019
In this hands-on guide, our AWS Amazing Minds share advice on how to navigate and optimise your cloud journey on AWS, tackling the 9 most common questions around upskilling on AWS, automation, DevSecOps, customised cloud and more.
Our customers were the catalyst for creating the Amazing Minds series. Independent research combined with insights from our day-to-day business interactions, told us unequivocally that they wanted to be part of the journey. We also know that a secure and high-performing cloud journey is at its best when it’s a shared experience.
Download the guide to see how you can achieve how performance outcomes on AWS, and save time and money whilst doing so.
This report is an attempt to understand what marketing leaders view as their top issues with regard to corporate websites and broader digital presences, and to identify their focus areas today and over the next 12 months. The results point to a desire for marketers to optimise the customer experience across every touchpoint. That aim is commendable but, as our research makes clear, there are serious obstacles along the way.
The following guide looks at 6 characteristics that define today’s most compelling commerce environments, and how the right mix of adaptive, intelligent solutions can optimize performance and ultimately be your most intelligent associate, 24 hours a day, 7 days a week, anywhere in the world.
Amp Up the Power of Commerce with AI and Analytics
Bring the Customer Journey Full Circle
Tap into Heightened Data Security and Privacy in the Cloud
"A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them.
Check out our infographic to see six common security pitfalls that put your users, their devices, and your data at risk. By avoiding these common security mistakes, you’ll be protecting your network against today’s threats and beyond.
"It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data.
With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape.
In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.
Credit Union Times is the nation's leading independent source for breaking news and analysis for credit union leaders. For more than 20 years, Credit Union Times has set the standard for editorial excellence and ethical, straight-forward reporting.