TechNotes at Webtorials  

Yabut On Net Neutrality

Wide Area Networking in an Era of Mobility and Cloud

Full Collaboration- One Step at a Time

The Necessity of SD-WANs for Skype for Business

SD-WAN for Real-time Service Quality for Skype for Business Enterprise Voice

Is Cloud UC the Best Option? Maybe Not.

Why SBCs are Essential with Skype for Business

Long Live IPv4

WebRTC: Off and Running

Diameter: Solving LTE Session Control

What the FCC's "Open Internet" Ruling REALLY Means for the Enterprise

Why Replacing the PSTN with VoIP Won't Be Easy

Security: SIP-Based Contact Centers

IoT: Access Technology Choices & Implications

Replacing PSTN with VoIP: Not If, But When

AT&T Expands Withdrawal of Service Matrix
AT&T to Withdraw Broadly Used Non-Ethernet Access, Non-Ethernet Private Line and Non-IP Toll-Free Service

Skype for Business? Risks for service providers

Present & Future: WebRTC

AT&T Issues Withdrawal of Service Matrix

Nitty-Gritty of Net Neutrality: IP Headers

Will Small Cells Meet the Needs of the Enterprise?

You Don't Want ASLAs - "Almost SLAs" - in your SIP Trunking Deal

Advantages and Disadvantages of Overlay-Based SDN Solutions

BYOD Security: How Much Complexity Do You Need?

What Does Alcatel-Lucent have to say about SDN and NFV?

How SDN Can Multiply VoIP Channel Capacity

SIP Trunk: Equipment Problems Continue

WAN: Wide Area Network or Wireless Access Network?

Advantages and Disadvantages of Overlay-Based SDN Solutions

NFV is More That Just Technology

The Nitty-Gritty of Net Neutrality: IP Headers

SIP Trunks: Provider Problems Continue

An Update on OpenDaylight

Choosing Between the Cloud and Owned Systems

You Don't Want ASLAs - "Almost SLAs" - in your SIP Trunking Deal

The Linkage Between SDN and NFV

Don't Blindly Buy SIP Trunking from your Incumbent Telco

Will Small Cells Meet the Needs of the Enterprise?

Is HP Racing to the Front of NFV Suppliers?

Three Things You Really, REALLY Need To Know Before You Tackle SIP Trunking

Another View of WebRTC's Future

WAN: Wide Area Network or Wireless Access Network?

Where Do We Stand with SDN's Northbound Interface?

VoIP, The PSTN Killer, Won't Kill Local Loops

Business Continuity with the Session Border Controller

Big Bang Discovery is Giant Boost to Big Data Nets

VMware's Mullaney Speaks His Mind about sdn

Why the Enterprise Should Care About Small Cells

Metzler on SDN and NFV

Enterprise Sourcing of SIP Trunking Services

Net Neutrality: Why Open Access Should Not Mean Free Access

Eleven Answers, WebRTC Explained

Barriers to UC Cloud Success, Part 2

Convergence Wreaks Havoc with TLA/FLA Alphabet Soup

Barriers to UC Cloud Success, Part 1

Micro USB - Unmitigated Stupid Blunder

The Humanitarian Case for 3-D Printing

SIP Trunk Equipment Issues, How to Avoid Them

CAPTCHA on its Last Legs for Authentication

The Unified Communications Implementation Decision: On Premises, Cloud or Hybrid?

How to Migrate Successfully to the Cloud

Home Hotspots: Risk or Opportunity?

Managing IP Video in the Enterprise

Abandoning the 2.4 GHz junk band - Moving Wi-Fi to 5 GHz

Eleven Answers, WebRTC Explained

Digital Copiers: A Massive Passive Security Threat

Delivering Video Interoperability

Joyn/RCS vs. webRTC: Solving Directory Services

Déjà vu All Over Again: Can We Please Put SDNs in Context?

Cloud Creep: Panacea or Pitfall?

Ten SIP Trunk Equipment License Issues That Can Ruin Your Day (or Month)

Mobile Voice Policies Are MIA!

Avoiding SIP Trunking Equipment Problems

Is IPv6 Good for VoIP?

Putting a lid on Apple iCloud

FCC and the Enterprise: Why Should You Care?

BYOD, Cloud Intensify Known Wi-Fi Authentication Risk
  • A TechNote on Wireless and Mobility
  • Joanie M. Wexler
  • Technology Analyst/Editor

  • Why Fax over IP Fails

    How to avoid SIP Trunk Implementation Problems

    Will Windows Phone 8 Launch Lync Mobility?

    Getting Ready for HD Voice

    WiFi Goes Gigabit-802.11ac

    An Epic Mac Attack

    Passwords: Trojan Zebras of a Different Color

    Wi-Fi Goes Short and Fast-802.11ad

    IaaS: The Importance of Network Services

    BYOD, Cloud Intensify Known Wi-Fi Authentication Risk

    WiFi Goes Gigabit-802.11ac

    The Drivers and Inhibitors of IaaS

    Second-tier carriers jockey for position with likely upcoming consolidation of facilities and go-to-market practices

    Making WIPS more affordable

    How to Best Manage Telecommunications Services Procurements

    The Growing Use of IaaS

    Why Fax over IP Fails

    Videoconferencing Security

    Getting Ready for HD Voice

    An Epic Mac Attack

    Internetworking Telepresence and Videoconferencing

    How to avoid SIP Trunk Implementation Problems

    The Cloud, Videoconferencing, and You

    Thank You, MAM: New Ways to Plug Mobile Data Leaks

    Will Windows Phone 8 Launch Lync Mobility?

    The Significance of Software Defined Data Centers

    Why is VMware Acquiring Nicira?

    The Great Debate
    • The Case for Building Your Own VNOC vs. The Case for Managed Services
    • Telepresence Options with Webtorials Publishing

    Is 'Remote Wipe' a Panacea for Protecting Missing Devices?

    Prediction: UC Morphs into Social and Disappears

    Videoconferencing Infrastructure: A Primer

    BYOD Throws Curve at In-Building Cellular Projects

    In UC&C, Picking the Right Partners Matters

    Software Defined Networking - The Cisco ONE Customer-Centric Strategy

    Software Defined Networking - Extreme Networks' Value Proposition

    Telstar Turns 50 - What's Next for Satellites?

    Troubleshooting the Mobile Experience (and Protecting Users' Sanity)

    Are We Stuck with 'Islands' of UC Interoperability?

    Today's Limitations of Standards-Based Solutions

    Tracking Hackers Down - Then Striking Back

    UC Cloud Security: Avoiding an Identity Crisis

    The Curse of the Mobile Hotspot

    How to be a Hero When You Roll Out UC

    Who Is the Typical U.S. Teleworker?

    Non-Technical Barriers to UC Implementation

    Emerging Technologies and their Chances for Success

    Android's Prospects in the Enterprise: Looking Up?

    Guard Your Identity

    DIY Mobile WAN Troubleshooting

    Tips for Improving Internet Call Quality

    IPv6 Transition: The Time is (Finally) Here

    Telecom Contracts: Dodging the Potholes

    Careful: 4G Could Fuel Data Overages

    Check out Cloud Providers' Business Models

    Which IT Services Do You Keep? Which Move to the Cloud?

    What We Can Learn from Google Street View

    Oh, the Power that Siri Wields

    Beware Social-Engineering Attacks, Part 2: Email

    Wi-Fi 'Voice-Enterprise' Cert: No Longer Stuck On Hold

    UC: Should You Choose a License, Subscription or Hybrid?

    WAN Optimization in a Virtualized Setting

    Don't Bid 'Adieu' to Apple Bonjour Just Yet

    Automating UC Service Fulfillment in the Enterprise

    A Roll-Up-Your-Sleeves Look at Mobile Policy

    7 Must-Haves in a UC Cloud Contract

    Implications of the Consumerization of IT

    Tricks for Avoiding Wireless Bill Shock

    Coping with Digital Distractions in a Collaborative World

    Beware Social-Engineering Attacks

    Serving More Clients with 802.11ac Multi-User MIMO

    Standards, Best Practices Coming for UC Cloud Interoperability

    Does Cloud Computing Make Regulatory Compliance Harder?

    Mobile Malware: Coming Soon to a Device Near You

    Integrating UC Into Your Mobile Strategy

    SaaS for Enterprises Approaches Tipping Point

    802.11ac and 802.11ad: Faster and Fatter Wi-Fi

    How Much SIP Bandwidth Should You Buy?

    Data Center LAN Redesign: Who's Doing it and Why?

    Data Throttling: Two Sides to Every Story

    How Presence Bolsters Productivity

    Boosting Cellular Signals Indoors

    Hack My Videoconference, Please!

    VARs Face Challenges in Supporting UC

    Branch-Office Internet Access: Local or Centralized?

    More Secure, User-Friendly Hotspots On the Way

    SIP Trunking: Making it Pay

    Table Stakes for MDM Jump a Notch

    Keeping UC App Data Secure

    Reasons to 'Flatten' Your Data Center LAN

    Virtual Desktops: A Killer App for Mobile Security?

    This is War

    Delivering UC to Teleworkers

    How Many Vendors Does it Take to Manage a Mobile Enterprise?

    Your SIP Trunking Implementation Checklist

    RIM CEO Shakeup: It's a Start

    What's Become of WAN Innovation?

    Does the Recent WPS Attack Affect You?

    Single- vs. Multi-Vendor Approaches to UC

    The Role of Data Center Bridging in LAN-SAN Convergence

    Android: Enterprise Friend or Foe?

    Deploying UC Apps: CPE or Cloud?

    Virtual App Delivery Appliances Emerge

    8 Pitfalls to Avoid When Managing Mobile Apps

    Desktop Video vs. Telepresence: Which, When and Why?

    OpenFlow and SDNs Raise Many Questions

    Does iOS 5 Land IT Back in the Driver's Seat?

    Making a Business Case for UC

    Cloud Computing Causes IT Culture Shock

    Why BYOD Won't Always Fly

    SIP Essentials: What You Need to Know

    Spanning Tree: On Borrowed Time?

    Who's Using the Cisco Cius Tablet?


    Social Media: What's the Enterprise Payback?

    Is There an Integrated LAN-SAN in Your Future?

    What's Lurking on Mobile Devices?

    Wi-Fi Companies Could Soon Run Your Access Network



    4G Ticker: Update on Services, Phones, Deals

    RIM Radar and Rumor Mill

    D'oh! How Do You Print in the Mobile Enterprise?

    Use Your WLAN to Automate BYOD Activation

    Do You Need an Enterprise App Store?

    iCloud to Test Wi-Fi Performance Mettle

    Search Webtorials

    Get E-News and Notices via Email


      

     



      

    I accept Webtorials' Terms and Conditions.

    Trending Discussions

    See more discussions...

    Featured Sponsor Microsites






















    Archives

    Notices

    Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

    Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2018, Distributed Networking Associates, Inc.