SIP trunking, which is the use of voice over IP technology for phone systems, is gradually replacing the use of old T1 leased line technology for business phone systems. SIP trunking allows an entire phone system to be run across a broadband or even DSL connection, giving it more flexibility, […]
Secure Telephony Identity Revisited (STIR)
Secure Telephony Identity Revisited is an innovative group which gathers information about spoof callers and calls. This group, also known as “STIR” attempts to solve various issues involving phone identifications and identifiers. There are many types of phone identification frauds that exist such as phishing and robot type calls. These […]
The Channel Rises to the Cloud Opportunity
The reality of the growing popularity of cloud computing creates an opportunity for IT solution providers to develop more integration between cloud and on-premise applications. But different types of customers are developing in their need for cloud integration on different timetables. Midsize and large enterprises have already invested in on-premise […]
Apple’s Successor to Objective-C Points to Future Cloud Deployment
At WWDC, Apple introduced Swift, a new, quick-to-learn programming language to replace its old faithful Objective-C. Development chief Craig Federighi called it Objective-C without the baggage of C. Al Hilwa of IDC notes that it combines many ideas from existing successful programming languages. Federighi discussed Swift as a functional language […]
Which VPN Is Right For You?
A VPN, or Virtual Private Network, is used to link all of your office locations and data centers so that your entire workforce can communicate as though they were on one network. An internet-based IP VPN works over the public internet and is relatively inexpensive. But it is do-it-yourself to […]
Telephony Denial of Service (TDoS) Listed as the #2 Cybercrime Trend for 2013
Webroot, the cyber-security threat blog has compiled a list of 2013’s most successful malware and security exploits, based on propagation, proliferation, professionalism and business strategy. Topping the list is Blackhole Web’s malware exploitation kit, which was a huge player until the author’s arrest. Coming in second were telephony denial of […]
Clouds Are Rising on Many Fronts
The channel is flooded with service providers leaping into the not so new world of cloud computing. Five Hundred developers are polled and share their thoughts on what cloud and database software is the most used and how they use it. But what happens when an open source solution ranks […]
Salesforce, Oracle Grapple For Retailer Cloud Space
Oracle and Salesforce, are focusing heavily on acquisition and assimilation of market tested companies offering sales, supply chain and consumer buying habits collection software. With these two behemoths integrating those platforms with their own marketing tools and data bases, the consumers wallet grows a back door by way of shoppers […]
Building a Loyal Channel
In regards to business solutions, including channel development, it is important to note that loyalty, transparency and good communication skills create a successful channel. It is also vital to note that other companies should be consulted and should not necessarily be thought of as competition in this market. Building a […]
New HP Apollo Supercomputers Amps Up IBM Rivalry
The rivalry between IBM and HP Apollo is worsened by the Apollo’s new supercomputers. Apollo’s number of servers and financial superiority edges IBM in shares. Apollo’s supercomputers are currently high in demand and many are trying to get their hands on these systems. IBM is trying to stay in the […]