February 23, 2018
News roundup: Hackers once again used SWIFT-based attacks to steal millions from Russian and Indian banks. Plus, hackers used an L.A. Times website for cryptojacking, and more.
January 05, 2018
Several unified communications vendors rang in the new year with mergers and acquisitions, as Star2Star merges with Blueface and Polycom picks up Obihai Technology.
November 21, 2017
Pusher is a developer tools company that specialises in providing what it calls 'hosted building blocks' for programmers. The company has this month released Pusher Chatkit. This is a 'specialised' ...
October 30, 2017
Software integration, analytics and management company TIBCO is loving, embraces and heart-ing open source this month with its newly available Project Mashling. Branded as an open source ...
Messaging Get Started
Bring yourself up to speed with our introductory content
MQTT (MQ Telemetry Transport) is a lightweight messaging protocol that provides resource-constrained network clients with a simple way to distribute telemetry information. Continue Reading
Exchange Server virtualization is a common practice for many enterprises, but deployment slip-ups can cripple the messaging platform. Follow these tips to avert a service disruption. Continue Reading
In this excerpt from chapter four of The Basics of Cyber Safety, authors John Sammons and Michael Cross discuss basic email security. Continue Reading
Evaluate Messaging Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Apple, Facebook and Google are rolling out messaging apps that connect businesses and consumers. As a result, contact centers should consider an omnichannel messaging strategy. Continue Reading
Tools for enterprise collaboration are most effective when users work on the same platform. Consider these best practices to consolidate overlapping features. Continue Reading
DevOps professionals are highly detached from the big iron that drives their cloud-based data centers. Will this lack of hardware knowledge lead to a DevOps doomsday? Continue Reading
Learn to apply best practices and optimize your operations.
Everyone wants a smooth patching process, but things can fall apart despite everyone's best efforts. Develop a solid recovery plan and test it before trouble strikes. Continue Reading
With a port swapping attack, hackers can bypass two-factor authentication and control a victim's mobile device. Judith Myerson explains how the attacks work and how to stop them. Continue Reading
Administrators can configure a remote domain to perform particular tasks, such as converting certain email formats and stopping users from forwarding messages to another domain. Continue Reading
Problem Solve Messaging Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
PTC's CTO of industrial automation and former Kepware CEO Tony Paine explains why messaging technology is crucial for gathering data from connected devices. Continue Reading
Flaws in WhatsApp and Telegram, popular messaging services, enable attackers to break encryption and take over accounts. Expert Michael Cobb explains how the attacks work. Continue Reading
Protecting a user's digital privacy across different technologies requires a plethora of tools. Expert Matthew Pascucci explores the different ways to protect sensitive data. Continue Reading