Unified Comms

The unified communications puzzle has come together via video conferencing and various messaging technologies.

  • White Papers // Jul 2008

    VoIP Or The Phone To Call

    Basically Voice over Internet Protocol (VoIP) means that you have the ability to hold conversations over the Internet or any other IP- based network. VoIP is as easy to use as a normal phone. When you make a call via VoIP it will normally cost less than other traditional phone...

    Provided By VoipArticle.com

  • White Papers // Aug 2008

    VoIP Solutions

    This paper provides useful, detailed information about VoIP Solutions. In a traditional PSTN, the quality of service of the calls and continuous connection are very dependable; so, in order for people to switch to IP telephony, the same quality considerations must be maintained or excelled. With IP telephony consisting of...

    Provided By VoipArticle.com

  • White Papers // Sep 2008

    Security Issues With VoIP

    With major telecommunication carriers, in the process of preparing to launch VoIP applications it is heading towards a prime time. However a new sense of urgency is developing with the risk of wide spread security violation as VoIP technology is gaining popularity. Until now VoIP security was not a volatile...

    Provided By VoipArticle.com

  • White Papers // Dec 2008

    Why VoIP

    Voice Over Internet Protocol delivers the service of converting the analog line into a digital signal so that voice could be transferred through the internet and this proves to be a lot cheaper than the PSTN (public switched telephone network). VoIP is the best for making long distance calls in,...

    Provided By VoipArticle.com

  • White Papers // Feb 2009

    The Challenges of Accurate Mobility Prediction for Ultra Mobile Users

    Realistic modeling of user mobility is one of the most critical research areas in wireless networks. Currently, several mobility models are proposed based on the analysis of real WLAN traces. However, the large collection of WLAN usage traces, seem to capture little mobility from the users. This paper focuses on...

    Provided By University Of Florida, Gainesville

  • White Papers // Apr 2009

    Spam Detection in Voice-Over-IP Calls Through Semi-Supervised Clustering

    In this paper, the authors present an approach for detection of spam calls over IP telephony called SPIT in Voice-over-IP (VoIP) systems. SPIT detection is different from spam detection in email in that the process has to be soft real-time, fewer features are available for examination due to the difficulty...

    Provided By Purdue University

  • White Papers // Feb 2012

    Deliver a Secure Cisco Cloud Experience

    Securely connect your network to the world of many clouds. With a Cisco Cloud Intelligent Network, you can provide an ideal experience, irrespective of user location or the number of cloud platforms involved, in service delivery. Read Whitepaper

    Provided By Cisco Systems, Inc

  • White Papers // Nov 2012

    Video Collaboration: Consider User Experience and Operational Efficiency

    Video Collaboration projects are highly visible and, if well planned, can showcase the strategic value of IT to the organization. This paper, intended for IT leaders and personnel, explains considerations in planning and designing a medianet (media-optimized network) for an excellent user experience and operational efficiency: Different capabilities...

    Provided By Cisco Systems, Inc

  • White Papers // May 2009

    Creating a Collaborative Enterprise

    For organizations considering a collaboration technology investment, this executive-level guide provides clear direction and recommendations for taking full advantage of technologies such as virtual work-spaces, social networking tools, web conferencing applications, and more.

    Provided By Cisco Systems, Inc

  • Research // Jun 2013

    Top Considerations for a Unified Communications Purchase

    A report from ZK Research provides relevant decision criteria to help organizations make the best Unified communications (UC) decision possible. Unified communications has been a continually evolving market for the past decade. UC was initially centered on voice over IP (VoIP) and unified messaging, but has expanded significantly over the...

    Provided By Cisco Systems, Inc

  • Downloads // Dec 2013

    Cisco-Webex - Now Meet with Up to Three for FREE!

    IT Professionals! Get on board with Cisco WebEx online meetings. Conduct unlimited online meetings with up to three people for free - for life (or at least as long as you care to keep your free Basic Account)! Meet via whatever you want - your notebook, your iPhone, your...

    Provided By Cisco Systems, Inc

  • Downloads // Dec 2013

    Cisco-WebEx – Now Meet with Up to Three for FREE!

    Online collaboration tools have made it possible for organizations to collaborate with colleagues across organizations and halfway across the planet. These tools contribute to increased productivity, and prolonged connections between disparate teams and partners. If you’re looking to interact with colleagues, clients or prospects via your notebook, your iPhone,...

    Provided By Cisco Systems, Inc

  • White Papers // Jan 2010

    Maintaining a Local Data Integration System in Support of Weather Forecast Operations

    Since 2000, both the National Weather Service in Melbourne, FL (NWS MLB) and the Spaceflight Meteorology Group (SMG) at Johnson Space Center in Houston, TX have used a local data integration system (LDIS) as part of their forecast and warning operations. The original LDIS was developed by NASA's Applied Meteorology...

    Provided By Applied Meteorology Unit

  • White Papers // Mar 2009

    Dipper: A Data Integration with Privacy Protection Environment

    This paper develops Dipper, data integration with privacy protection environment, aiming to tackle the following challenges. Firstly, records can be matched albeit typographical differences between their attribute values. Secondly, they can be matched albeit some attribute values being suppressed to protect the privacy of an individual. Dipper enables data providers...

    Provided By Mahidol University

  • White Papers // Oct 2009

    The PLIB Ontology-Based Approach to Data Integration

    The semantic heterogeneity has been identified as the most challenging issue of data integration since it requires understanding the relationship between data and real world objects to be able to map various conceptualizations often based on various point of views. In the traditional data integration approach, domain semantics is encoded...

    Provided By ENSMA

  • White Papers // Oct 2009

    VoIP LAN/MAN Traffic Analysis for NGN QoS Management

    Strict requirement is emphasized regarding QoS guarantees of the NGN (Next Generation Network) networks today. DiffServ mechanism is applied mostly for classification of protocol data units of real time and conventional information streams in LAN/MAN environment. The dependence of VoIP traffic characteristics of the delay and the jitter sensitive IP...

    Provided By University of Debrecen

  • White Papers // Mar 2009

    Five Steps to Ensuring a Successful VoIP Migration

    Voice over IP (VoIP) has arrived and is here to stay. Many contact centers are realizing the increased flexibility and cost advantages of placing voice traffic on existing data networks. This migration allows increased efficiencies by managing only a single data network instead of separate voice and data networks. At...

    Provided By inContact

  • White Papers // Mar 2009

    7 Questions to Ask Before Choosing a Video Conferencing Solution

    While some vendors claim compatibility between their video communications solutions and Microsoft Office Communications Server 2007, in reality, these vendors cannot support H.323 and Session Initiation Protocol (SIP) calls at the same time - that's a crucial oversight that can have huge implications in the performance of the system. H.323...

    Provided By Tandberg

  • White Papers // Jan 2010

    Scalable Video Conferencing Using Subband Transform Coding and Layered Multicast Transmission

    This paper proposes an approach to designing a scalable multiresolution video conferencing system using a hierarchical video-coding algorithm based on the wavelet transform and an associated receiver-driven layered multicast transmission architecture. The design of a prototype implementation is presented and its performance is analyzed in respect to complexity, coding efficiency...

    Provided By Alkit Communications

  • Case Studies // Jan 2010

    Zultys - VoIP Call Centre Deployment

    Isuzu-General Motors Australia truck division (Isuzu Trucks) import, distribute, and support a wide range of state of the art commercial vehicles, ranging from 4 tones through to 68 tones. Isuzu Trucks existing legacy PABX was already configured to its maximum capacity, and had no provision for the required contact centre...

    Provided By Globalnet Solutions Australia

  • White Papers // Sep 2009

    We Have the Videoconference Equipment Installed, Now What?

    As K-12 schools acquire equipment for videoconferencing, they often experience limited usage of the equipment. The purpose of this study was to identify specific concerns of educators currently involved in videoconferencing. The primary data for the study was 400 discussion posts from 34 educators in an online class about videoconferencing....

    Provided By Andrews University

  • White Papers // Mar 2010

    Characteristic Analysis of VOIP Traffic for Wireless Network

    A traditional Voice over Internet Protocol (VoIP) technique is based on client/server architecture. In this paper, the authors present VoIP architecture for Ad-hoc network based on H.323 Standard that provides users to communicate with each other. Their work is divided into two parts: one to demonstrate a simple VOIP scenario...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Jun 2012

    Impact of the Primary Resource Occupancy Information on the Performance of Cognitive Radio Networks With VoIP Traffic

    In this paper, the relevance of considering the primary network resource occupancy information on the admission criterion of new secondary VoIP sessions in Cognitive Radio Networks (CRNs) is investigated. In particular, the performance of two different Call Admission Control (CAC) strategies whose admission criterion is based either on the total...

    Provided By ICST

  • White Papers // Aug 2010

    Replacing Conventional Telephones by VoIP: Their Major Constraints & Solutions

    With the telecommunication traffic increasing each year, there is a need for developing a communication system which is more cost efficient. In this paper the authors have compared conventional telephone systems to VoIP communication and explored the possibility of replacing all conventional telephones using VoIP, the constraints faced by the...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2009

    ED-138 Network Requirements and Performances for Voice Over Internet Protocol (VoIP) Air Traffic Management (ATM) Systems

    For the purpose of supporting Voice over IP applications with performances similar to the classic telephony, the IP infrastructure must ensure smooth delivery of the voice and signaling packets to the VoIP elements. Although network failures are rare, planning for them is essential. Failover strategies are desirable for cases when...

    Provided By EUROCAE Communication sarl

  • White Papers // Nov 2012

    Proposed Secure SIP Authentication Scheme Based on Elliptic Curve Cryptography

    Session Initiation Protocol (SIP) is a powerful signaling protocol that increasingly used for administrating Voice over IP (VoIP) phone calls. In recent years, Session Initiation Protocol (SIP) is more and more popular. However, there are many security problems in the Session Initiation Protocol. SIP authentication mechanism is based on HTTP...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2011

    A Study of Adaptive Replication Technique in Routing Time-Constrained Messages (VoIP) in MANET

    Imposing the constraint of timely delivery on usual messages is referred as time-constrained messages. The utility of such messages depends upon the time at which they arrive at their destination. Due to contention among randomly arriving messages at each node/link and multi-hops between the source and destination that a message...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Comparative Study of VoIP Over WiMax and WiFi

    Recently wireless technology has grown immensely in popularity and usage becoming a medium of choice for networks. The wireless communication revolution is bringing fundamental changes to data networking, telecommunication, and is making integrated networks a reality. By freeing the user from the cord, personal communications networks, wireless LAN's, mobile radio...

    Provided By University of Karachi

  • Webcasts // Jan 2012

    ATA System for VoIP

    In this Webcast the presenter describes about what is an ATA VoIP system? Who can one call using the ATA VoIP system? How does an ATA VoIP system work? The presenter also describes about ATA which is an analog telephone adapter. Basically it's a box that has two ports -...

    Provided By Videojug

  • Webcasts // Jan 2012

    How to Get Cheap or Free Long Distance

    With traditional long distance phone lines, one have to pay a toll to all the companies their phone call goes through. But VoIP technology allows one to use the internet to go around these long distance phone companies and get directly to the person they want to talk to. In...

    Provided By Videojug

  • Webcasts // Jan 2012

    How To Improve Your VOIP Reliability

    In this Webcast the presenter describes about improving VoIP line reliability. One is, the user can run a battery back-up on their voice over IP system, whether it is an ATA, an IP phone, or their computer. So that if there is a power outage, or if there's a brownout,...

    Provided By Videojug

  • Webcasts // Jan 2012

    PC-to-PC VoIP

    In this Webcast, the presenter explains about PC-To-PC VoIP. PC-to-PC Voice over IP is the ability to make a call from their computer to another computer using a microphone and a speaker. The way the user do it is to install some free software the user may download from the...

    Provided By Videojug

  • Webcasts // Jan 2012

    Getting to Know VoIP

    In this Webcast, the presenter getting the listener to know about the VoIP. Voice over IP is the ability to make phone calls over the internet using an IP type phone. Basically, how it works is the user pick up the handset, they make a phone call. That phone call...

    Provided By Videojug

  • Webcasts // Jan 2012

    How to Keep Your VOIP Line Secure

    In this Webcast the presenter describes about VOIP: Voice Over Internet Protocol. The presenter will given an instructional tips and tricks about how to keep the VoIP line secure and ways prevent from threats.

    Provided By Videojug

  • Webcasts // Jan 2012

    VoIP Tips and Tricks

    In this Webcast the presenter describes about VoIP tips and tricks. The presenter also explains about how do the user improve their VoIP sound quality, line reliability and VoIP's line secure.

    Provided By Videojug

  • Webcasts // Jan 2012

    How to Improve Your VOIP Sound Quality

    In this Webcast the presenter describes about how to improve their VOIP sound quality. One can get a QoS device installed on their network. One of them is offered by D-link, it's called a DI101. And some firewalls or routers have it incorporated into their device as well so one...

    Provided By Videojug

  • Webcasts // Jan 2012

    Internet Phones for VoIP

    In this Webcast the presenter describes about the importance of Internet phones for VoIP. The Presenter also explains about What is an 'Internet phone' system and the advantages of using an Internet phone instead of an ATA system.

    Provided By Videojug

  • Webcasts // Jan 2012

    Security for VoIP

    In this webcast, the presenter describes about security for VoIP. The presenter also explains about VoIP clipping, VoIP DoS attack, VoIP-related SPIT, caller ID spoofing, VoIP pharming and how viruses used to affect VoIP calls, etc.

    Provided By Videojug

  • Webcasts // Jan 2012

    Concerns About VoIP

    In this Webcast the presenter describes concerns about VoIP. The Presenter also explains about use of VoIP with the phone and other advantages about working VoIP if the Internet is down, 'Latency' and how does it effect VoIP, etc.

    Provided By Videojug

  • Webcasts // Jan 2012

    VoIP Bonus Features

    In this Webcast the presenter describes about VoIP bonus features. The Presenter also explains about does VoIP offer the same bonus features as regular phone service? Voice mail better using VoIP and do 'Alternate area codes' work in VoIP.

    Provided By Videojug