Lippis Report Issue 70: Developing Custom Communication Applications For Your Business

October 30th, 2006

Say good-bye to communication silos. The IT and communications industry are gearing up to change the way corporations use communications and write applications, linking them tightly together. Gone will be separate communications applications such as voice mail, instant messaging, e-mail, conferencing, call centers, et al., as separate and distinct applications. These applications will not go away, but access to them will change. Access will be increasingly more integrated and seamless to users while they become ?¢‚Ǩ?ìcallable" services for IT developers seeking to extract human and system delay from business process. Yes, Microsoft announced Unified Communications last June and its ICA relationship with Nortel in July, but this effort is focused on integrating access to communications with users. The real revolution and boom in communications is the common trend lines of IT and communication industries, toward a common service creation model of web services and SOA. In short the industry is serving up communications-enabled business process and all the major players are participating such as Citrix, Microsoft, BEA, Cisco, Avaya, Siemens, Alcatel, Nortel, IBM, Oracle/Siebel/PeopleSoft, Open Source and SAP. All of these players will be wooing IT developers to write their applications on their platform.

Read the rest of this entry »

Lippis Keynotes Wall Street Technology Association Conference on Hot Technologies

Listen to the Podcast

October 30th, 2006

View the Presentation

Nick LippisI was invited to deliver the keynote and moderate the Wall Street Technology Associations´ (WSTA) Hot Technologies conference in early October. I spoke on network security, IP telephony and hosted IP services offerings and provided an assessment on what’s hot and what’s not. You can download my presentation and listen to the keynote here. Enjoy, Nick

Wireless Communication Integration with your Contact Center Environment

Get the White Paper

October 30th, 2006

By InteractCRM

There are an estimated 2 billion people worldwide who communicate wirelessly today. For contact centers, extending their operation to support the SMS channel means a faster, simpler and cost-effective way of servicing their customers. Is your contact center ready to handle this changing customer expectation? Do you have the capability to seamlessly extend your current contact center applications to include the SMS channel, while applying the same rules, SLA´s and workflows for inbound / outbound wireless contacts? To find out how download this white paper.

Pharmaceutical Company Streamlines Password Reset Process

Get the White Paper

October 30th, 2006

By Unimax

With Avaya Mailbox Manager and Unimax 2nd Nature

Passwords are one of the most annoying realities in securing IT resources. They are a necessary evil. Most organizations force users to change their passwords to multiple systems creating password fatigue. But this pharmaceutical company needed to streamline the password reset process and support a company goal of employee empowerment. So they deployed Avaya Mailbox Manager and Unimax´s 2nd Nature. The result? Reduced cost and time for resetting passwords. Find out how by downloading this white paper.

Voice-Activated PIN Reset Solution

Get the White Paper

October 30th, 2006

By SOFTEL

Costs associated with password resets are significant. In most cases, password resets involve the IT Help Desk who are skilled live agents taking inbound password reset calls from users. Password resets represent valuable time lost from users who need to regain access and IT Help Desk who restore access. Typically, the IT Help Desk will first verify user identity, implement the reset and finally wrap up the event. Password reset consumes 30% of IT Help Desk call volume (Gartner Group) and with a rate of nearly 2 incidents per user per month (Meta Group). This time spent consumes help desk productivity which takes agent time away from addressing more significant technical issues which are less easily automated. These more pressing issues tend to stay in queue longer while Help Desk agents tend to password reset tasks. A speech-enabled solution provides an efficient, cost-effective means to decrease operational costs and boost productivity, with a rapidly realized Return-On-Investment. Find out how by downloading this white paper.

Cook County Hospitals and Departments Increase Services without New Cost

Get the White Paper

October 30th, 2006

by Accuvoice

Cook County was in a jam. It needed to increase three operations: 1) the level of customer service to its citizens; 2) its system capacity for employees of County departments and hospitals; and 3) its ability to handle after-hours inquiries. It needed to all this without hiring additional personnel. So how did it do it? For starters it deployed an Avaya IPT Contact Center over a private network, layered with Avaya and Accuvoice Self Service applications to give callers 24/7 access to County information and databases. To facilitate higher levels of productivity and flexibility among County employees, Cook County deployed an Avaya Mobility Solutions. To find out how Cook County stayed on budget and increased services download this paper.

The Path to Intelligent Communications
Service Oriented Communications and SIP in the Contact Center and across the Enterprise

Get the White Paper

October 30th, 2006

By Avaya

This paper provides a roadmap to break down the communication silos that dominate the industry and push it toward a new service-oriented communications architecture approach. The paper defines service oriented architecture or SOA and its new role in creating communications-enabled business process. The paper addresses Session Initiation Protocol or SIP as the new industry standard linking multiple end-point devices and how SIP fits into a new framework of service-oriented communications. The paper does a great job at using sports metaphors to communicate key ideas and concepts. This is one of the best papers on SIP and SOA, download it now using the link above.

WAN Optimization Bridges IT and Corporate Initiatives

Listen to the Podcast

October 23rd, 2006

WAN optimization vendor Ipanema Technologies (yes you can pronounce Ipanema, just think of the song the Girl from Ipanema) joins me to discuss business network optimization. Ipanemas technology is integrated into many managed service providers offerings delivering guarantee performance so service level agreements are met. Vargha Moayed joins the Lippis Report podcast to discuss how WAN optimization impacts application performance and corporate productivity. For todays far flug corporate operations, WAN optimization is a must to assure guaranteed application performance. Enjoy, Nick

Lippis Report Issue 69: 2007 Is The Year of Network Access Control

October 16th, 2006

Data points are building into trend lines that suggest 2007 will be the year of Network Access Control or NAC deployments. The data points are many. First and perhaps most important is that network and IT executives have turned the corner in their thinking from general interest to budgeted NAC projects as there are approximately 1500 companies who have deployed a commercial NAC solution today. There are non-commercial NAC implementations too, such as NESSUS scans which, if counted would drive the 1500 deployments up significantly. The number of NAC customers should well surpass 5000 in 2007 and there´s nothing to slow it down. With Microsoft´s Network Access Protection or NAP being dependent upon its Network Policy Server (NPS) in Longhorn, NAP will not be relevant until well into 2008. The real discussion in IT conference rooms will focus around spending budget on NAC appliance and/or infrastructure approaches. Enterprise buyers have become very pragmatic in solving their network access control problems. These problems are quickly turning into funded projects. Here are the reasons why 2007 will be the year of NAC.
Read the rest of this entry »

ProCurve ProActive Defense: A video session with Paul Congdon, Chief Technology Officer and HP Fellow, ProCurve Networking by HP

Watch the Video

October 16th, 2006

Attention: the above file is 17.8Mb and may take some time to download over slower connections.

Paul CongdonProCurve Networking by HP has an infrastructure-based NAC approach that is far simpler to configure, administer and acquire than other solutions in the industry. ProCurve leverages 802.1x clients and identity management to provide identity driven access control. They have development hooks into NAP/NPS which will provide integration with Microsoft in the late 2007/2008 time frame. To explain ProCurve´s ProActive Defense strategy, we offer a video of Paul Congdon, Chief Technology Officer and HP Fellow from ProCurve Networking by HP.

ProActive Defense: A comprehensive Network Security Strategy

Get the White Paper

October 16th, 2006

By ProCurve Networking by HP

Traditional core-centric network architectures are not up to the task for today´s more frequent and potentially destructive assaults and challenges. These networks lack the scalability and dynamic capabilities required to handle current network security needs or meet rapidly changing business and technological requirements. This paper describes a better alternative for network security: a comprehensive security vision and strategy that arises directly from the revolutionary ProCurve Adaptive EDGE Architecture® (AEA), which embraces distributed intelligence at the network edge and takes a holistic approach to networking. The new security vision, called ProCurve ProActive Defense, is the first approach that combines proactive security offense techniques with steadfast traditional defense security techniques, simultaneously, at the edge of the network where users connect. As such, ProCurve ProActive Defense is expected to dramatically change how network security is deployed from now on. To find out how, download this paper.

Delivering Intelligent Network Access through Identity Driven Management

Get the White Paper

October 16th, 2006

By ProCurve Networking by HP

In establishing their information technology (IT) networks, companies have traditionally focused on the connection between user devices and the corporate infrastructure, ignoring the unique needs of individuals and groups using the network. Not only does this emphasis hinder workforce productivity, it also creates problems for network security, management and performance.

A new strategy is to implement identity driven management (IDM) functionality that is able to automatically configure the network edge through security and performance policies defined on a centrally administered management server. These IDM solutions facilitate business-driven networks that behave uniquely and appropriately for every user. This paper describes traditional network access management strategies and defines ProCurve Networking by ProCurve´s approach to a new, identity driven methodology. It also highlights the benefits that can be attained by deploying ProCurve IDM solutions.

The IPO Market Is Back for Networking Companies

Listen to the Podcast

October 16th, 2006

Zeus KerravalaZeus Kerravala of the Yankee Group joins me to discuss Riverbed´s successful IPO, the rumors that Juniper is up for sale, the dismal performance of Interop in NY and the future of conferences in our industry. Riverbed is valued at 3 to 4 times that of Packeteer; Force 10 and Mitel are scheduled to IPO in early ´07, is the IPO market back for networking companies? You bet, listen in to find out which networking companies will have a successful IPO in ´07, who may buy Juniper and how the IT competitive landscape is changing.

Containing Security Incidents Before They Wreak Havoc

Listen to the Podcast

October 16th, 2006

Brendan HanniganBrendan Hannigan, Chief Operating Officer of Q1 Labs joins the podcast to discuss the state of the network security industry. Access control, compliance, internal data theft and integrating security data from point products are security projects being funded by most enterprises. Brendan and I review these projects and put forward a network security strategy for rapidly containing security incidents thanks to analytics which can process tens of thousands of alarms per second while searching for anomalous behavior, delivering remediation options to security ops. If you´re looking to bring order and greater control to your security ops by integrating management and monitoring of multiple point security products, then listen in and learn.