Search Results | Voice over IP (VoIP)
PREV 1   2   3   4   5   6   7 NEXT
Sort by:  Most Relevant  |  Date
IP Traffic Set To Quadruple By 2014

Blog  Today Cisco announced the results of the annual VNI (Visual Network Index) forecast covering 2009 to 2014. The report projects that global Internet traffic will increase more than fourfold to 767 exabytes, or more than 3/4 of a Zettabyte, by 2014. This amount is 100 exabytes higher than the pr...

Last updated: Jun 3, 2010   5:22 PM GMT  |  Blog: Packet Blog   |      3DTV, Broadband, File Sharing
Can VoIP use both IP and ATM?

Answer  Can voice be routed both over IP (VoIP) and ATM (asynchronous transfer mode)? If so, how?

Last updated: Sep 2, 2008   7:17 PM GMT   |    ATM, DSL, VoIP

Answer  Hello I want to implement the Voice over Ip. i.e Ip Telephony But I have no idea about it. Can your update me about VoIP means what is advantage of VoIP, which hardware & cisco routers i have to use which will support VoIP. Waiting for a prompt reply Thanks & regards Prafulla

Last updated: Jan 31, 2005   4:01 AM GMT   |    Cisco, DHCP, DNS
VoIP (voice over IP)

Blog  VoIP (voice over IP) is the transmission of voice and multimedia content over Internet Protocol (IP) networks. VoIP historically referred to using IP to connect private branch exchanges (PBXs), but the term is now used interchangeably with IP telephony. Continued Quote of the Day "To ensure prop...

Last updated: Jan 10, 2018   2:54 AM GMT  |  Blog: Word of the Day: Tech Definitions from
VoIP security threats

Blog  VoIP expert Patrick Park, author of "Voice over IP Security," explains the latest VoIP threats and ways companies can protect their systems from eavesdropping and DDoS attacks. Also a review of Microsoft's latest round of patches with Paul Henry, security and forensics analyst at patching vendor Lum...

Last updated: Nov 12, 2008   7:37 PM GMT  |  Blog: Security Wire Weekly
Virtualizing VoIP

Blog  Two of the hottest technologies over the past few years have been virtualization, and VoIP (three technologies if you throw in unified communications). Companies have been racing to jump on the bandwagon of virtualizing servers to save reduce hardware, power, and cooling expenses, and embracing VoIP...

Last updated: Feb 28, 2010   1:35 PM GMT  |  Blog: Unified Communications: Click to talk
UC Provides New Attack Vectors

Blog  As companies made / make the move from traditional POTS or analog phone services to VoIP (voice over IP) communications, they introduce new risks that may lead to sensitive communications being compromised. There are plenty of books available detailing various VoIP threats and potential attacks. Uni...

Last updated: Sep 8, 2008   8:41 PM GMT  |  Blog: Unified Communications: Click to talk
VoIP in the Cloud

Blog  Voice over IP (VoIP) has been hot for a while now. Companies have sold and implemented VoIP hardware and software for customers. VoIP then evolved into being offered as a hosted service- but still with a dedicated infrastructure per customer. The next step is to simply offer VoIP from the cloud as a...

Last updated: Apr 28, 2009   2:42 AM GMT  |  Blog: Unified Communications: Click to talk
Protecting VoIP Against Three Common Threats

Blog  There are a number of way, theoretically, that a VoIP communications system could pose a security risk to an enterprise. Let's face it, while the network administrators have been in the trenches fighting unauthorized access, malware infections, data compromise, and more on a daily basis for the last...

Last updated: Dec 29, 2008   3:03 PM GMT  |  Blog: Unified Communications: Click to talk
The Value of VoIP

Blog  For new companies or old companies building new facilities, the value of VoIP is easier to define and the return on investment can be realized much quicker. Deploying only one infrastructure- the network infrastructure- for voice and data, rather than an IP network for data and separate wiring and i...

Last updated: Aug 23, 2008   1:06 PM GMT  |  Blog: Unified Communications: Click to talk
VoIP Vulnerabilities

Blog  I know I am a broken record, or kicking a dead horse, or some other analogy about stating the same obvious thing over and over, but as the world adopts VoIP for voice communications they need to be aware of the security risks and take the appropriate steps to protect their communications and their n...

Last updated: Dec 28, 2007   8:27 PM GMT  |  Blog: Unified Communications: Click to talk
‘Hot Type’: Voice over IP Security

Blog   In the latest edition of "Hot Type: Security Books in Audio," author Patrick Park reveals two of the biggest VoIP security myths around. And don't forget to read an excerpt from Patrick Park's book: Voice over IP Security.

Last updated: Dec 10, 2008   3:15 PM GMT  |  Blog: Security Wire Weekly
IBM System i making splash with Infor, Siemens

Blog  IBM continues to make partnerships that strengthen the System i platform, Lee Kroon writes in an article about IBM, Infor and Siemens. Kroon references two recent conferences, Inforum and VoiceCon. At Inforum, Infor and IBM announced a partnership to target smaller businesses with Infor's ERP softwa...

Last updated: Sep 25, 2007   10:45 PM GMT  |  Blog: The iSeries Blog
Doing VoIP right, and keeping data in transit safe

Blog  Voice over IP is one of the biggest drivers for new network channel business today, and it isnt slowing down yet. VoIP services are expected to generate over $6 billion in revenue in North America this year, and are projected to grow to $13.3 billion by 2009, according to data from Infonetics Res...

Last updated: Mar 15, 2007   5:55 PM GMT  |  Blog: Channel Marker
Top ten IT strategies for SMEs, number four: Voice over IP

Blog  In the fourth part of our blog series on how small businesses can use technology to save money, we look at voice over IP as an effective tool to slash the cost of telephone bills. Voice over IP delivers voice communications via the internet in place of a landline. Caroline Whittock, director at se...

Last updated: Nov 1, 2010   11:04 AM GMT  |  Blog: Small Matters   |      Uncategorized
iSociety fireside chat on VoIP tomorrow

Blog  The iSociety, that MySpace-like Web site for System i devotees, will be holding another of its "fireside" chats tomorrow, this time on the topic of Voice over IP, or VoIP. IBM, as you know, has been trying to sell the System i as a perfect integrated platform for all your VoIP needs. Last year, IBM...

Last updated: Aug 29, 2007   1:09 PM GMT  |  Blog: The iSeries Blog
Reported Vonage flaw a reminder of VoIP dangers

Blog  We've written quite a bit in the past about how many enterprises are ignoring the dangers of voice over IP (VoIP). While we doubt many enterprises are in the practice of using Vonage, as yet another example that VoIP and its protocols are easy to attack, it's worth noting a Reuters report today that...

Last updated: Oct 24, 2007   7:13 PM GMT  |  Blog: Security Bytes
VoIP is Low-Hanging Fruit for Attackers

Blog  VoIP (voice over IP) infrastructures are generally not as secure as the networks they ride on, and they provide attackers with a weakest link in the chain to exploit asa back door to the rest of the network. An article on the Web cites a report that states "McAfee found that the number of known V...

Last updated: Dec 31, 2009   2:45 PM GMT  |  Blog: Unified Communications: Click to talk
Overheard - VoIPSA

Blog   "Some computer viruses have a crude but scary ability to spy on people by logging every keystroke they type. Now hackers and potentially law enforcement have another weapon: a virus that can eavesdrop on voice conversations that go over computers instead of a regular phone line." Jordan Rober...

Last updated: Sep 28, 2009   2:56 PM GMT  |  Blog: Overheard: Word of the Day
Voice over LTE models challenge vendors/operators

Blog  The impending LTE rollout is creating questions about how voice will be handled, and the answer may have a big impact on the fortunes of vendors. There are three basic approaches being proposed by some operators: IMS/VoIP, using the 2/3G network for voice and 4G for data only (multimodal handsets),...

Last updated: May 27, 2009   10:16 PM GMT  |  Blog: Uncommon Wisdom
PREV 1   2   3   4   5   6   7 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: