Unified Comms

The unified communications puzzle has come together via video conferencing and various messaging technologies.

  • White Papers // Jun 2010

    Empirical Tests of Anonymous Voice Over IP

    Voice over IP (VoIP) is an important service on the Internet, and privacy for VoIP calls will be increasingly important for many people. Providing this privacy, however, is challenging, as anonymity services can be slow and unpredictable. This paper proposes a method for extending onion-routing style anonymity protocols for supporting...

    Provided By Reed Elsevier

  • White Papers // Jan 2009

    Getting Started on Unified Communications and Collaboration

    Unified Communications and Collaboration (UCC) is an industry term that has come to mean different things to different people. It is not a repackaging or renaming of existing technologies - even though existing technologies play into it. Rather, UCC is a new way of thinking about combining existing technologies to...

    Provided By BT Group

  • White Papers // Nov 2008

    Emerging Technology: Telepresence Solutions

    Telepresence offers a completely new way to collaborate. This new technology enables connections across companies and locations, so that one can meet with customers, suppliers and business partners around the globe as if one is in the same room, transforming how business gets done. One will be able to redefine...

    Provided By AT&T Intellectual Property

  • White Papers // Mar 2010

    Enterprise Communications: The Next Decade

    Enterprise communications will continue to undergo significant changes during the next decade, as multimodal cloud services invade traditional communication products and services. Today's Infrastructure and Operations (I&O) leaders need to understand 10 emerging trends that will influence enterprise communications. These include technology innovation for multimodal communications and collaboration, business imperatives...

    Provided By Forrester Research

  • White Papers // Oct 2008

    Exploiting Opportunistic Scheduling in Cellular Data Networks

    Third Generation (3G) cellular networks utilize time varying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to efficiently utilize spectrum under fairness or QoS constraints. Opportunistic scheduling algorithms rely on collaboration among all mobile users to achieve their design objectives. However, the authors demonstrate that rogue...

    Provided By University of California

  • White Papers // Dec 2010

    Security Analysis of Session Initiation Protocol - A Methodology Based on Coloured Petri Nets

    In recent years Voice over Internet Protocol (VoIP) has become a popular multimedia application over the Internet. At the same time critical security issues in VoIP have started to emerge. The Session Initiation Protocol (SIP) is a predominant signaling protocol for VoIP. It is used to establish, maintain and terminate...

    Provided By University of South Australia

  • White Papers // Dec 2011

    Evaluation of Users' Perspective on VoIP's Security Vulnerabilities

    Voice over Internet Protocol (VoIP) represents a major newish trend in telecommunications and an alternative to traditional phone systems. VoIP uses IP networks and therefore inherits their vulnerabilities. Adding voice traffic to IP networks complicates security issues and introduces a range of vulnerabilities. A VoIP system may face either an...

    Provided By University of South Australia

  • Webcasts // May 2009

    Tapping Into the Power of Unified Communications Securely

    Unified Communications has become a powerful mainstream business resource, permitting rapid and cost-effective communication between internal and external staff alike. But, along with improved productivity, the use of Unified Communications software such as Microsoft Office Communications Server (OCS) has brought with it a new range of security threats that few...

    Provided By Reed Elsevier

  • White Papers // Feb 2009

    Implementing VoIP?: Cover the Bases

    Convergence of voice and data networks, in the first instance by implementing a VoIP telephony system, is gaining huge momentum in the marketplace. For example, the telecoms research company, Analysis, believe that mobile and VoIP will account for more than 60 per cent of residential voice spend in Western Europe...

    Provided By MorganDoyle

  • Webcasts // Aug 2009

    Business-to-Business Data Integration: Why B2B Data Exchange Needs DI Tools and Techniques

    Many companies who were partnering for a while have been exchanging the data which has been associated with the supply chains of the industrial process as well as the financial routing network, and with the recent development of the online network, and online trade exchange, e-commerce applications, and various business...

    Provided By 1105 Media

  • White Papers // Mar 2011

    Touring DNS Open Houses for Trends and Configurations

    DNS is a critical component of the Internet. It maps domain names to IP addresses and serves as a distributed database for various other applications, including mail, Web, and spam filtering. This paper examines DNS zones in the Internet for diversity, adoption rates of new technologies, and prevalence of configuration...

    Provided By Indiana University

  • Case Studies // Jul 2009

    Ministry Of Defence Takes Delivery Of New Online Travel Booking Tool

    With budgets under pressure, the Ministry Of Defence (MOD) sought greater control over its travel management processes and costs. It needed a solution to replace a diverse range of systems used by different units. Capgemini has been supporting collaboration across the MOD through DECS (Defence Electronic Commerce Service), a secure...

    Provided By Capgemini

  • Webcasts // Apr 2010

    Enterprise ETL Capabilities on a Mid-Market Budget

    Companies irrespective of the size derive competitive advantage from technology systems, which in turn support various business applications. There are different types of software applications like, Customer Relationship Management (CRM), Sales Force Automation (SFA), enterprise resource planning (ERP), Supply Chain Management (SCM), etc., and its very difficult to choose as...

    Provided By Attunity

  • White Papers // Aug 2012

    Best Practice Tips on Building a Unified Communications Business Case

    Today's IT investments require bottom-line, quantifiable truths. Unified communications (UC) is no exception. Moving to UC means not only determining which solution best fits your organizations needs - but means creating a solid business case that demonstrates a strong return on investment (ROI) and a low total cost of ownership...

    Provided By ShoreTel

  • White Papers // Oct 2012

    Demystifying Unified Communications

    To achieve UC and other next-generation benefits, companies must build the right foundation. Enterprises have committed to IP telephony, and completing the conversion to VoIP is just a matter of time and money. VoIP equipment sales surpassed TDM in 2003, and Infonetics projects that 89% of worldwide enterprise voice...

    Provided By ShoreTel

  • White Papers // Oct 2012

    Secrets Revealed: Brilliant Simplicity and Lower TCO

    This white paper discusses the benefits of researching the total cost of ownership for a UC system and how businesses can lower their total cost of ownership (TCO) by selecting a simple yet sophisticated solution. Applying the simplicity principle to selecting a Unified Communications system can result in significant...

    Provided By ShoreTel

  • White Papers // Oct 2012

    SIP Trunks - Benefits and Best Practices

    Back in the days of wireline telephony, when all phone calls went over the Public Switched Telephony Network (PSTN), businesses would purchase "trunks" -dedicated lines or a bundle of circuits - from their service provider. Back in the days of wireline telephony, when all phone calls went over the...

    Provided By ShoreTel

  • White Papers // Aug 2013

    5 Tips to Choosing the Right Business Phone System

    IP phone and unified communications solutions have evolved to allow businesses to leverage powerful applications and technologies in an effort to improve productivity and boost success. Organizations large and small have a wide array of phone systems to choose from, and business-decision makers need to consider numerous factors when...

    Provided By ShoreTel

  • Webcasts // Sep 2013

    How to Evaluate Total Cost of Ownership for IP Telephony Deployments

    In this Webinar, we will evaluate key UC deployment models for SMBs – On-Premise, Cloud and Hybrid solutions. Each model will be evaluated for pros and cons, and ideal deployment scenarios will be outlined. Companies can achieve significant savings when selecting an IP Telephony and Unified Communications solution by...

    Provided By ShoreTel

  • White Papers // Oct 2013

    Reliability The ShoreTel Way.

    Learn more about how ShoreTel Unified Communications delivers industry-leading reliability with the flexibility to let organizations deploy as they need by using: Distributed or centralized architecture The appropriate level of redundancy and cost The applications needed and the level of availability The level and type of disaster recovery needed

    Provided By ShoreTel

  • White Papers // Oct 2013

    The Total Cost of Ownership Benchmarking Study for Unified Communications from the Aberdeen Group

    Total cost of ownership is a key metric for assessing costs, benefits and risks of implementing Unified Communications - enabling organizations to properly evaluate competing solutions. Learn more about how organizations can align their decision making process with business needs, while understanding the effects of future requirements and functionality.

    Provided By ShoreTel

  • White Papers // Oct 2013

    IT - and IP Telephony. Don't just manage complexity; it's time to beat it from IDG

    Your IT environment is complex enough. Although your experience with technology vendors may lead to believe this is inevitable, it doesn't have to be that way. This whitepaper from IDG explains how IT leaders don't have to accept complexity in their IT infrastructure. Find out the truth about IT and...

    Provided By ShoreTel

  • White Papers // Oct 2013

    Seamless Unified Communications for the Everywhere Enterprise from ShoreTel

    This white paper examines the considerations an IT manager faces when seeking to implement Unified Communications (UC) seamlessly (and successfully) throughout the Everywhere Enterprise. The simplicity and quality of the user experience are what should be considered the hallmark of a successful implementation of seamless UC.

    Provided By ShoreTel

  • White Papers // Mar 2014

    SIP Trunks – Keeping your UC Systems Secure

    The appeal of Session Initiation Protocol (SIP) trunks as a means of connecting UC systems to the outside world is growing in popularity. SIP trunks offer lower operating costs, more flexibility in ordering service and capacities and advanced features, such as virtual phone numbers in different geographies, which let companies...

    Provided By ShoreTel

  • White Papers // May 2011

    Unified Communications Buyer's Guide

    Asking the right questions early in the vetting process is essential for selecting the solution that can best meet your business goals and IT requirements. The Unified Communications Buyer's Guide offers complete information to help you compare your options, including guidance to help you evaluate a solution's: level of...

    Provided By ShoreTel

  • White Papers // May 2011

    Best Practice Tips on Building a Unified Communications Business Case.

    Today's IT investments require bottom-line, quantifiable truths. Unified communications (UC) is no exception. Moving to UC means not only determining which solution best fits your organizations needs - but means creating a solid business case that demonstrates a strong return on investment (ROI) and a low total cost of ownership...

    Provided By ShoreTel

  • White Papers // Sep 2011

    Comparison of Cisco and ShoreTel Unified Communication Solutions

    In a side-by-side comparison of these two solutions, this white paper demonstrates that organizations in need of comprehensive UC solutions can avoid Cisco product shortfalls. The flagship Cisco Unified Communications Manager (UCM) solution was assembled with technologies accumulated from several corporate acquisitions. The result is a complex solution that...

    Provided By ShoreTel

  • White Papers // Sep 2011

    Comparison of Avaya and ShoreTel Unified Communication Solutions

    Unlike ShoreTel's all-in-one, all-IP solution, the Avaya platforms have been adapted from legacy technology and assembled piecemeal. The result is a complex solution that can require extensive time and resources to manage. By contrast, the ShoreTel Unified Communications system was designed from the ground up expressly for IP to provide...

    Provided By ShoreTel

  • White Papers // Sep 2011

    Nemertes Research PilotHouse Awards: IP Telephony

    For the past eight years, independent research firm, Nemertes Research, has surveyed IT professionals for its annual benchmark on IP telephony using notable evaluation criteria. Each year, ShoreTel has received the highest ratings and been awarded Best Overall IP Telephony Provider. The results are based 100% on the views...

    Provided By ShoreTel

  • Case Studies // Feb 2012

    TCO Benchmarking Study

    Unified Communications (UC) represents the evolution of telephony, during which companies have augmented the traditional desk phone with other communications technologies. Buyers may have previously bought a landline solution based solely on capital expenditure, but this approach is now outdated. This white paper examines the total cost of ownership (TCO)...

    Provided By ShoreTel

  • White Papers // Feb 2009

    Evidences Behind Skype Outage

    Skype is one of the most successful VoIP application in the current Internet spectrum. One of the most peculiar characteristics of Skype is that it relies on a P2P infrastructure for the exchange of signaling information amongst active peers. During August 2007, an unexpected outage hit the Skype overlay, yielding...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Efficient Control Channel Resource Allocation for VoIP in OFDMA-Based Packet Radio Networks

    The authors propose an efficient control channel resource allocation approach to enhance the performance of Voice-over-IP (VoIP) in Orthogonal Frequency Division Multiple Access- (OFDMA-) based next generation mobile communication systems. As the Long-Term Evolution (LTE) of Universal Terrestrial Radio Access Network (UTRAN), Evolved UTRAN (E-UTRAN) is the first OFDMA-based packet...

    Provided By Tampere University of Technology

  • White Papers // May 2009

    Towards Secure SIP Signalling Service for VoIP Applications

    Current Voice over IP (VoIP) services are regarded less secure than the traditional Public Switched Telephone Network (PSTN). This is due to the fact that VoIP services are frequently deployed in an relatively open environment, so that VoIP infrastructures can be easily accessed by potential attackers. Furthermore, current VoIP services...

    Provided By Karlstad University

  • Related Offers // Jul 2009

    Live Event Series: Top 10 Wireless LAN Vulnerabilities

    Join AirMagnet for a 4-city live event series to discuss the 10 most significant WLAN vulnerabilities and strategies for protecting your organization. The event will feature live demonstrations of security vulnerability exploits and expert advice on how to prevent or contain unauthorized connections to your corporate network. Attendees will walk...

    Provided By AirMagnet

  • Case Studies // Jan 2010

    M+NetMail and M+Guardian Are a Perfect Fit for Jefferson-Lewis Board of Cooperative Educational Services

    Acting as a central facility to provide services to its 18 component schools, BOCES's mission is to provide these services while keeping costs down. BOCES's services fall into three main groups. The Career/Technical Education programs let master craftsmen prepare students for a range of trades by exposing them to settings...

    Provided By Messaging Architects

  • Case Studies // Jan 2010

    South Antonio Independent School District Uses M+Guardian and M+Archive to Secure and Manage Their Email Archives

    The South San Antonio Independent School District encompasses 21 square miles in the south and southwest portion of San Antonio. The relationship between South San Antonio ISD and Messaging Architects began about 4 years ago when the school district deployed M+Guardian into their messaging system. Overnight, the nightmare of managing...

    Provided By Messaging Architects

  • White Papers // Sep 2008

    Predicting Feature Interactions by Using Inconsistency Models

    Internet applications, such as Email, VoIP and WWW have been enhanced with many features. However, the introduction and modification of features may result in undesired behaviours, and this effect is known as feature interaction-FI. In this paper, the authors propose a proactive approach for FI detection. Supported by sets of...

    Provided By Reed Elsevier

  • White Papers // Nov 2008

    Non-Intrusive Speech Quality Prediction in VoIP Networks Using a Neural Network Approach

    Measuring speech quality in Voice over Internet Protocol (VoIP) networks is an increasingly important application for legal, commercial and technical reasons. Any proposed solution for measuring the quality should be applicable in monitoring live-traffic non-intrusively. The E-Model proposed by the International Telecommunication Union-Telecommunication Standardisation Sector (ITU-T) achieves this, but it...

    Provided By Reed Elsevier

  • White Papers // Dec 2010

    Traffic Analysis Attacks on Skype VoIP Calls

    Skype is one of the most popular Voice-over-IP (VoIP) service providers. One of the main reasons for the popularity of Skype VoIP services is its unique set of features to protect privacy of VoIP calls such as strong encryption, proprietary protocols, unknown codecs, dynamic path selection, and the constant packet...

    Provided By Reed Elsevier

  • White Papers // Feb 2010

    Radio Resource Management in Emerging Heterogeneous Wireless Networks

    Deployment of heterogeneous wireless networks is spreading throughout the world as users want to be connected anytime, anywhere, and anyhow. Meanwhile, these users are increasingly interested in multimedia applications such as video streaming and Voice over IP (VoIP), which require strict Quality of Service (QoS) support. Provisioning network resources with...

    Provided By Reed Elsevier