This article explores the ways in which the guests can be given access to wireless networks, whether they could be authenticated, whether their access can be restricted to certain services...
This article introduces the High Definition or HD Video Conferencing, the standards used in HD video conferencing with reference to definition(pixels) and presentation of motion(frames per second), advantages of HD...
This article attempts to see if bulk enterprise security policies can be applied to portable devices like USB pen drives, mp3 players, cellphones connecting through USB, CD/DVD media, Digital Cameras...
This article explores the PC based software applications that allow sending of interactive scheduled SMS automatically. We explore some of the features of such applications and also some situations where...
This article gives an introduction to an Fixed Cellular Terminal(FCT), the interfaces are supported by an FCT, how an FCT allows the enterprise PBX to make calls over GSM/CDMA, some...
This article gives a small introduction to a Multi-Conference Unit in Video Conferencing systems, the necessity to have a separate hardware based multi-conferencing unit, the features and functionalities supported by...
This article explains what is a IP Soft Switch, what are the structural differences between an IP PBX/ Mixed Type PBX and Soft Switches for VOIP Communications and the advantages...
This article introduces the QoS mechanisms followed by a wireless network like WMM(Wireless Multi-Media) and WMM-SA(Wireless Multi-Media Scheduled Access) which are both standards based and help wireless networks to reliably...
This article explains what are Phishing attacks, why it is a network security threat, how emails are used to gain confidential information, what else the phishers can do other than...
This article provides an overview of IP KVM Switches. We see what is an IP KVM Switch, what are the general capabilities of an IP KVM Switch, the security features...
This article discusses the recording, streaming and playing back of the video conference sessions. We discuss the ways of recording single and multi-point calls, if streaming is possible in real-time...
This article presents a small introduction to LDAP – Lightweight Directory Access Protocol – explaining what it is and why you need to implement LDAP directory in an enterprise/organization. It...
This article provides an insight to Video walls – What are video walls, the technology used in a video wall, what are video wall controllers, video wall management software and...
This article gives and introduction to MOH – Music On Hold and IVR – Interactive Voice Response features of an IP PBX. We look at what is possible and what...