This article explores the options available for high availability in network switches at the device level, operating system software level, Quality of Service and configuration changes, notification level. Gone are...
This article looks at the main types of Denial Of Service attacks like Previously known DoS attacks (Juno etc.), Unknown DoS flooding attacks, SYN floods, connection limit attacks etc. in...
This post gives an introduction to the two types of Antennas used in Wireless Networks – Directional Antennas and Omni-directional Antennas. We also have a look at in-built antennas and...
This article looks at the basic components of a contact center, defines a blended contact center, introduces an IP based blended contact center and lists down its advantages and explores...
This article describes what is POE – Power Over Ethernet, how it helps transmit power along with data, what are POE Injectors, what are the types of POE Injectors, what...
This article attempts to communicate the differences between a normal fax and an IP fax. It tells you why an IP fax server is required, what are the options of...
Have you seen the ‘Get email updates when new articles are published’ box in the right hand sidebar of this website? What exactly happens when you submit your email in...
This article gives an introduction to ACD – Automatic Call Distribution, explains what is Skills based Routing, the factors in the In-coming calls that affect the parameters of skills based...
This article gives a short introduction to the various features supported by business projectors, and what are their advantages/ dis-advantages, if any. We discuss features in three categories: vital features,...
This article gives an introduction to the software applications that manage multi-vendor access points, controllers and other Wi-Fi devices on a huge disparate network. We look at the user, device...
This article lists the advantages of IP based Video Surveillance over DVR Surveillance. We discuss advantages like Scalability, cost efficiency, single network for multiple needs, reliability and redundancy, extended applications,...
This article provides an introduction to what is URL Filtering, why it is needed and how it is done at enterprise level. We also have a look at the various...
This article discusses what is speech recognition, what you should know about the types of speech recognition, what are the applications of speech recognition in enterprise level, what are the...
This article gives an introduction to DNS and DHCP – what they are and why you need them. There is also a small explanation on what is an IP Address...