dcsimg
 

IT Downloads Results for Topic : Voip And Telephony - Page 2

All
All
 
 
Showing 11-20 of 24 Results    
 
 
How Telecom Expense Management Can Work for IT

How Telecom Expense Management Can Work for IT

  ITDownload  
  |   RESEARCH   |   Dec 21, 2009
 

Find out how Telecom Expense Management can significantly reduce costs by helping IT managers discover and remedy some common billing errors....  More >>

 
The Power of IP Video Excerpt

The Power of IP Video Excerpt

  ITDownload  
  |   BOOK EXCERPTS   |   Dec 18, 2009
 

This book chapter discusses how the quad-play technologies of voice, video, web and mobility are transforming the traditional work environment....  More >>

 
Voice over IP Security Excerpt

Voice over IP Security Excerpt

  ITDownload  
  |   BOOK EXCERPTS   |   Dec 17, 2009
 

This book chapter walks you through some key concerns and solution with the IP telephony solution....  More >>

 
Microsoft Voice and Unified Communications Excerpt

Microsoft Voice and Unified Communications Excerpt

  ITDownload  
  |   BOOK EXCERPTS   |   Dec 16, 2009
 

'Microsoft Voice and Unified Communications' is a book that provides insight into Microsoft's Voice and Unified Communications portfolio of products and services....  More >>

 
Unified Communications Checklist

Unified Communications Checklist

  ITDownload  
  |   CHECKLISTS   |   Nov 11, 2009
 

This checklist covers the high-level areas of concern you should explore when choosing a vendor....  More >>

 
VoIP for Dummies Excerpt

VoIP for Dummies Excerpt

  ITDownload  
  |   BOOK EXCERPTS   |   Aug 31, 2009
 

In addition to hardware and software, you will need to anticipate specific support costs for your VoIP implementation....  More >>

 
Understanding Voice over Internet Protocol (VoIP)

Understanding Voice over Internet Protocol (VoIP)

  ITDownload  
  |   TUTORIALS   |   Aug 20, 2009
 

Implementing VoIP require you to evaluate numerous issues, including security and infrastructure....  More >>

 
Malware Tunneling in IPv6

Malware Tunneling in IPv6

  ITDownload  
  |   RESEARCH   |   Aug 11, 2009
 

IPv6 can be misused to deliver malware in a way that eludes detection by firewalls or intrusion detection systems (IDS) not configured to recognize IPv6 traffic....  More >>

 
Security Considerations for Voice Over IP Systems

Security Considerations for Voice Over IP Systems

  ITDownload  
  |   RESEARCH   |   Aug 10, 2009
 

VoIP creates a whole new class of networking latency concerns....  More >>

 
Telecom Expense Management Calculator

Telecom Expense Management Calculator

  ITDownload  
  |   CALCULATORS   |   Jul 01, 2009
 

Customers with un-audited telecomm systems routinely overpay their bills by at least 10 percent....  More >>

 
 
 
Pages:   « Prev1 | 2 3Next » 
 
 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.


×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.