XMPP is a communications protocol based on Extensible Markup Language (XML). Continued…
Quote of the Day
“When setting up a two-way communication channel, where there is structured data and devices are not memory constrained, use XMPP.” – Sushant Taneja
Better team messaging app security could boost enterprise adoption
Cisco recently unveiled security updates to its Spark service. Team messaging apps, in general, could see greater adoption with these enterprise controls.
GoToMeeting client adds business messaging to chase rivals
The GoToMeeting client is getting business messaging and automated transcription as LogMeIn chases web conferencing rivals Zoom and Cisco Webex.
Cisco eyes blockchain messaging for better security
Vendors, including Cisco, are hoping blockchain messaging can offer more security than the traditional encryption used for group communications.
Standardizing on unified communications standards
Enterprise adoption of unified communications (UC) standards—like SIP, XMPP, SIPconnect 1.1 and TIP—is fast becoming an imperative driven by increased user demand for extranet connectivity and access to UC apps beyond the firewall.
XMPP: IoT protocol winner, or second place to MQTT?
The open, community-based XMPP-IoT standard is entering the wild world of the internet of things, but it may not be the best choice for every IoT deployment.
No matter how important your message is, if you don’t choose the right delivery channel, the point is ____.
Unified communications as a service (UCaaS) is a cloud delivery model that offers a variety of communication and collaboration applications and services, including enterprise messaging, presence technology, online meetings, team collaboration, telephony and video conferencing. Continued…
Quote of the Day
“UCaaS offers faster turn-up times, easier access to emerging collaboration capabilities and the ability for customers to shift internal IT staff into more strategic roles.” – Irwin Lazar
Evaluating UCaaS providers: How to choose the right one
In this complex market, careful evaluation of UCaaS providers is essential. Learn how to understand market offerings and choose the best for your business.
Unified communications as a service: The next generation
Unified communications as a service offerings are becoming more customizable and are incorporating emerging technologies such as artificial intelligence. These next-generation products offer new opportunities for channel partners.
CPaaS vs. UCaaS platform: Which should you choose?
When deciding between CPaaS vs. UCaaS platforms, look at how the two technologies can be used together, rather than as separate communications products.
Should your unified communications strategy include UCaaS?
UC as a service should be considered in any unified communications strategy. Though, as UCaaS offerings expand, sorting out the market can get complex.
Midmarket enterprises push UCaaS platform adoption
Midmarket enterprises looking to improve collaboration are turning to UCaaS platform deployments, according to a recent Gartner report.
If the client ________ a meeting, we would have reserved a telepresence room.
b. had requested
Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks. Continued…
Quote of the Day
“Deciding between a centralized or distributed SIP service deployment depends largely on an organization’s UC architecture and infrastructure, as well as the layout of the business as a whole.” – Michael Brandenburg
H.323 vs. SIP: What’s the difference?
Look at the differences of H.323 vs. SIP in this comparison of two primary VoIP and multimedia IP standards.
Update session border controllers routinely for secure SIP trunking
Session border controllers play an important role to secure SIP trunking deployments, but they need constant updates to remain effective.
Avoid these four SIP deployment pitfalls
Learn the four pitfalls organizations must avoid for a successful SIP deployment, from hidden fees to improper firewall configuration.
Is the virtual SBC market poised for rapid growth?
Session border controllers offered as a service could cut costs for enterprises and provide additional deployment options. But is a virtual SBC right for you?
How do you choose your SIP service deployment model?
Choosing the right SIP service deployment model can be tough. Expert Michael Brandenburg explains how to choose between centralized and decentralized SIP.
There are a number of methods you can use to capture VoIP calls ___ a LAN.
b. off of
Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools, with the goal of enhancing business communication, collaboration and productivity. Continued…
Quote of the Day
“While UC’s value proposition may not be intuitive, the islands of communications that worked well in simpler times are not effective today.” – Jon Arnold
Team collaboration secondary in Workplace by Facebook app
Despite efforts to market the Workplace by Facebook app as a team collaboration tool similar to Slack, several organizations that have deployed Facebook’s business platform say they are using it primarily as an intranet.
Ribbon Communications boosts UCaaS portfolio with Edgewater buy
Ribbon Communications plans to acquire Edgewater Networks for $110 million and will fuse Edgewater’s SD-WAN and network orchestration capabilities with Ribbon’s UCaaS portfolio.
The evolution of unified communications technologies
Unified communications technologies have evolved from desk phones to messaging apps. Businesses need to be open-minded about other emerging tools.
Open UC platforms improve communication workflow, but carry risks
Open UC platforms are growing in popularity, as organizations look to embed communications within their workflows. While integrating communications with APIs and CPaaS has its advantages, security risks do lurk.
Unified communications vendors continue consolidation carousel
The consolidation trend among unified communications vendors continues, as Polycom, Star2Star and West announce mergers and acquisitions.
Management chose Slack to encourage communication ________ the company’s marketing team and its sales team.
A data scientist is a professional responsible for collecting, analyzing and interpreting large amounts of data to identify ways to help a business improve operations and gain a competitive edge over rivals. Continued…
Quote of the Day
“Beyond math skills, data scientists must be able to think creatively and develop context around the data in order to tell a story.” – Jason Cline
Building a data science team in today’s data-centric climate
It isn’t easy building a data science team in today’s data-centric world, in which machine learning and AI are hot. In a recent webinar, a Gartner analyst offered tips and recommendations on how to do it.
How a healthcare data scientist can aid in value-based care
The government wants providers to move from fee-for-service to value-based care. A healthcare data scientist can analyze patient data to improve outcomes.
Big data throws bias in machine learning data sets
Data bias in machine learning data sets is a big problem for AI, and correcting it is no small feat.
New data science platforms aim to be workflow, collaboration hubs
A group of rival workbench-style data science platforms offer users a centralized environment for managing advanced analytics projects involving teams of data scientists — and Oracle’s acquisition of startup DataScience.com brings another major IT vendor into the fold.
Two data scientists offer advice on breaking down siloed data
Two data scientists address the ever-present issue of siloed data and offer advice to IT leaders on how to deal with it.
The core components in the first iteration of this big data framework included MapReduce.
a. What is Hadoop?
b. What is Splunk?
A decision tree is a graph that uses a branching method to illustrate every possible outcome of a decision. Continued…
Quote of the Day
“As the business world continues to embrace analytics to sharpen decision-making, using intelligent business process management suites is becoming even more attractive.” – Christine Parizo
Ten steps to start using predictive analytics algorithms effectively
Here are 10 steps to help put a solid foundation in place for using predictive analytics algorithms that improve business processes and performance.
What sports can teach about data-driven decision-making process
Businesses have a lot to learn from sports teams when it comes to the data-driven decision-making process, says one MIT lecturer.
Choosing the right data discovery platform for the enterprise
Visualizations, IT management, data sources and compliance features are just some considerations for businesses in the market for data discovery tools. Ultimately, business goals determine the best data discovery platform, so it’s vital that the features deliver.
Becoming a data-driven enterprise requires art, science
A data-driven enterprise doesn’t have to turn all of its decisions over to algorithms. One business makes room for art, as well as science in its process.
Clearing the roadblocks to predictive business analytics adoption
Despite the benefits of predictive business analytics, adoption is still low due to people, processes and technology.
What do data scientists call data that cannot be understood and interpreted correctly by machines?
a. dense data
b. noisy data
Self-service business intelligence (SSBI) is an approach to data analytics that enables business users to access and work with corporate data even though they do not have a background in statistical analysis, business intelligence (BI) or data mining. Continued…
Quote of the Day
“The trend of self-service BI has opened up new opportunities for companies to gain value from data more quickly, because it takes IT out of the picture, which reduces delays.” – Bob Violino
Tableau acquisition of MIT AI startup aims at smarter BI software
The Tableau acquisition of Empirical Systems, an AI startup, is intended to provide Tableau users with more automated modeling of their data and enable broader use of the self-service BI and analytics software.
Understanding data discovery tools in the enterprise
Learn all about data discovery tools and the data discovery process, which pull insights from data and ultimately serve informed business decisions.
Self-service BI best practices: 5 dos and don’ts
In this SearchCIO video, Wayfair’s Nathan Kollett enumerates the dos and don’t’s that make up self-service BI best practices.
Evolving data integration strategies target new analytics needs
As companies expand their use of BI and analytics applications, well-planned data integration strategies become a more crucial component. Get advice on how to manage data integration efforts to support the analytics process more effectively.
Self-service BI software comparison: Tableau vs. Power BI, Qlik Sense
The self-service BI software market is crowded, but it’s sorting itself out. This chart can help you understand the differences between the leading players.
This describes a data source that’s not used on a regular basis.
1. What is desultory data?
2. What is alternative data?
Alternative data is information gathered from non-traditional information sources. Analysis of alternative data can provide insights beyond that which an industry’s regular data sources are capable of providing. Continued…
Quote of the Day
“Businesses looking to get real value out of big data, and avoid overwhelming their systems, need to be selective about what they analyze.” – Ed Burns
A look at the leading data discovery software and vendors
Data discovery software helps enterprises turn data into business insights. Through data visualizations, these tools reveal patterns and relevant items from both internal and external sources. In addition, these tools often function without explicit IT involvement through self-service BI features.
Exploring Hadoop distributions for managing big data
Hadoop distributions have created a new software market that’s transforming the big data information intelligence and analytics industry.
Big data challenges include what info to use — and what not to
For organizations faced with big data challenges, it helps to be selective about the info you analyze.
Capital One’s use cases for implementing microservices
At API World 2017, Capital One discusses its use case scenarios for implementing microservices and microservices architecture.
New cloud service uses big data sources to improve emergency response
A new cloud service from Swan Island Networks allows cities to tie information together from multiple big data sources to improve emergency response.
What type of statistical analysis uses a representative subset of data points to identify patterns and trends in a larger data set?
a. data sampling
b. data sipping
To slice and dice is to break a body of information down into smaller parts or to examine it from different viewpoints so that you can understand it better. Continued…
Quote of the Day
“PivotTables are extremely flexible and allow the user to slice and dice data in many, many useful ways.” – Craig Hatmaker
Airbnb, Univision highlight best practices in BI
Some of the best practices in BI were highlighted at the 2018 Real BI Conference by Theresa Johnson of Airbnb and Simone Knight of Univision Communications.
Improving population health goal of data analytics research
A Reno-based hospital and research institute are collaborating to study genetic, medical, environmental and demographic data. The expectation is that data analysis of these combined factors will identify trends that will lead to improving population health in Nevada.
‘Big data’ poses big challenges for traditional analytics approaches
Learn how technologies such as massively parallel processing (MPP) systems, in-database analytics, columnar databases and Hadoop are providing new ways to perform analytics on big data.
Communication skills a must for business intelligence professionals
Organizations are looking for business intelligence professionals who understand the business and have good communication skills, says careers expert Matt Mueller. Find out why.
HR analytics early adopters say meaningful metrics, narratives are key
At an HCI conference, HR leaders said identifying meaningful metrics and constructing data narratives were keys to success in HR analytics initiatives.
What do you call a BI process that’s designed to answer a single, specific business question?
a. ad hoc analysis
b. unitary analysis
A threat hunter, also called a cybersecurity threat analyst, is a security professional or managed service provider (MSP) that proactively uses manual or machine-assisted techniques to detect security incidents that may elude the grasp of automated systems. Continued…
Quote of the Day
“A threat hunter needs to be able to put his or her mind to the task of uncovering vulnerabilities that are specific to the organization, and may or may not be highly sophisticated.” – Johna Till Johnson
Threat hunting technology is on the rise, so are threats
More companies are adopting threat hunting tools and platforms, according to the Crowd Research Partners ‘2018 Threat Hunting Report.’ Detecting emerging and advanced threats remains the top challenge for security operations centers.
‘Threat hunting’ emerges as new enterprise security role
The threat hunter, an emerging category of IT security pros, aims to detect incidents that technology overlooks, bolstering security operations centers.
Threat hunting defined: What you need to know about this emerging area
Threat hunting, an emerging program within enterprise IT security groups, seeks to augment and improve automated security systems.
Is threat hunting the next step for modern SOCs?
The best threat hunters use threat intelligence, custom tools or threat hunting products to identify APTs and automate searches on an ongoing basis.
Report: Threat hunting is more SOC than intel
Early threat hunting is primarily SOC-driven. Despite the immaturity of some programs, 60% of those surveyed cited measurable security improvements.
Writing for Business
Most major security breaches ____________ human error.
a. can be attributed to
b. are due to