ip telephony - News, Features, and Slideshows
Telstra has reduced the time of its order-to-activation process for its Telstra IP telephony service by 70 per cent after implementing business process management (BPM) software by Pegasystems, a Telstra official told the Gartner BPM Summit yesterday in Sydney.
By Adam Bender | 14 May, 2013 12:21
Bethsalem Care suffered years of poor WiFi and IP telecommunications before learning that faulty configuration was to blame.
By Adam Bender | 10 January, 2013 12:44
The National Health and Medical Research Council (NHMRC) wants to replace an “ageing” phone system with IP telephony, according to a request for tender posted Tuesday.
By Adam Bender | 28 November, 2012 09:39
A transition from analog to IP telephony in mid-2011 enhanced the Hobsons Bay City Council’s ability to communicate with constituents. Customer service manager, Suzanne Paterson, said the council plans to add Web chat to open a further channel for customer interaction.
By Adam Bender | 05 November, 2012 11:36
In addition to the well-known Asterisk, there is a vibrant community of open source software PBX systems that can be used for internal and service provider IP telephony. Here are five exciting open source VoIP and UC projects to keep an eye on.
By Rodney Gedda | 21 October, 2009 10:53
Whitepapers about ip telephony
In 2012, Aberdeen surveyed 485 users of IP Telephony and legacy TMD telephony. The study assessed aspects of TCO, planned vs unplanned downtime, and which products they used. 74% of respondents were categorised in the SME sector; this report focuses on this group’s TCO experience.
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
- FT.Net Solution ArchitectNSW
- FTSenior SQL DBANSW
- FTBusiness Management - Account Director - Leading Entertainment ClientNSW
- CCDBA (Oracle/SQL)NSW
- CCMobile Designer / Developer - IOSNSW
- CCFront End Web Developer (Drupal)NSW
- CCMobile Designer / Developer - IOSNSW
- FTJunior Media Buyer - Sales CoordinatorNSW
- CCSenior Systems EngineerNSW
- CCMobile iOS DeveloperNSW
- CC.Net Solution ArchitectNSW
- CCSenior Release EngineerNSW
- FTApplication Support SpecialistNSW
More and more government agencies are turning to a BYOD strategy. While this can make more transactions mobile and potentially decrease IT costs, they may also make the agency vulnerable to security breaches. •One of the biggest threats is social engineering, a process by which an adversary tricks the user into offering up information or access rights. •While there are several types of social engineering to be on the lookout for, there are three dominant attacks to watch •As agencies debate expanded device and data management policies, creating a divide between personal and professional content is essential
- Bitcoin in China still chugging along, a year after clampdown
- The Upload: Your tech news briefing for Monday, March 30
- Google Dart upgrade homes in on asynchronous programming
- British Airways notifies frequent flyers of possible breach of their accounts
- APIs: From developer tool to business model driver
- India backs open source software for e-governance projects
- Vodafone cuts complaints
- GitHub recovering from massive DDoS attacks
- In Pictures: How 20 (mostly) tech companies' logos have evolved over the years
- In Pictures: Worst data breaches of 2014
- In Pictures: 9 security gadgets for mobile devices
- 'Largest DDoS attack' in GitHub's history targets anticensorship projects
- FCC will vote next month on plan to share valuable 3.5GHz spectrum
- Intel could strengthen its server product stack with Altera
- Kleiner Perkins cleared of sex discrimination against Ellen Pao