March 2008- What level of market share and acceptance has open source PBX software attained? What is expected? Which products use open source PBX software? Digium reviews the challenges, choices and outlook for open source.
March 2008- here are lots of different ways to do fixed/mobile convergence. Each solution addresses a different set of perceived problems and provides a different set of capabilities. It is important that you understand what you are getting, the costs involved, and to be able to discuss these various solutions and their benefits with your users. dBrn explores FMC in this presentation.
March 2008- At manufacturer Caterpillar Inc., unified communications has delivered productivity gains in key areas and promises to drive business transformation in multiple ways.
March 2008- Unified voice system management can propel enterprises toward greater visibility, lower costs, better customer service, and increased security.
March 2008- This presentation shows how IP telephony can deliver business value and demonstrates how a Web site can be voice-enabled in minutes.
March 2008- The evolution to intelligent communications has created a new vendor ecosystem for ISVs and application developers.
March 2008- Open-source PBX software has growing appeal among smaller implementations. Now the big challenge for PBX vendors is how to drive interest at the enterprise level.
August 2008- This white paper outlines the evolution of iPBX technology as videoconferencing, video mail, IVR and mobile services are integrated into the system. Multimedia iPBX systems leverage IP capabilities to enhance productivity. The result is improved communications at a low cost.
Private branch exchange (PBX) systems have traditionally connected private enterprises to the public switched telephone network (PSTN) using circuit-switched communications. iPBX (or IP-PBX) systems, which use the Internet Protocol (IP) to carry calls over packet-switched networks, have become increasingly popular in recent years. Indeed, iPBXs account for a significant majority of current annual PBX installations, and are projected to further dominate the market in the coming years.
While the move toward iPBX systems ...
January 2008- Computer Telephony Integration (CTI) refers to the use of computer-based applications to control telephony systems, most commonly in an enterprise environment. Generally, the applications for CTI are categorized as Interactive Voice Response (IVR) sessions in which the system interacts with the caller to both collect information and provide information. This paper published by CTI explores the concepts and techniques used in creating CTI applications in a Speech Application Language Tags (SALT) environment.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services