Software Control

August 2007
Business Communications Review;Aug2007, Vol. 37 Issue 8, p51
Trade Publication
This article presents information, provided by vendors of Voice over Internet Protocol telephony, about analyzing the total cost of ownership for computer software, in light of changes to this software. Points to consider when making this analysis include, the frequency of major and minor software upgrades, the cost of licensing a major or minor upgrade, and the number of server that would require these upgrades. Other points to consider include the cost of hiring a technician to make the upgrade and whether a change to software is mandatory.


Related Articles

  • Model-Driven Analysis towards Interoperability of Assessments in LMS. Bizonova, Zuzana; Pilatova, Katarina // Journal of Information & Organizational Sciences;2010, Vol. 34 Issue 1, p27 

    In this article we are focusing on interoperability of two aspects of LMS systems - test question types and assessments as such. The proposed strategy is based on MDA, especially on the Platform Independent Models (PIM). On the higher level of abstraction (PIM) it is possible to find...

  • Canadian firms seek to stem rising cost of benefits. Gonzalez, Gloria // Business Insurance;3/22/2004, Vol. 38 Issue 12, p3 

    Double-digit increases in employee benefit costs are forcing Canadian employers to reevaluate their benefit packages and develop plans to curtail costs. Many Canadian employers have responded to these cost increases by either reducing the level of benefits they offer or shifting some of these...

  • Eyeing the 'Any Content' World. Compton, Kip // Multichannel News;11/27/2006, Vol. 27 Issue 47, p33 

    An interview with Cisco Systems Inc. director of video and Internet protocol television (IPTV) development Kip Compton is presented. When ask about Cisco's focus on the development of video delivery, he states that they concentrate on voice on demand (VOD) to obtain product flexibility. Compton...

  • A software trustworthiness evaluation model using objective weight based evidential reasoning approach. Ding, Shuai; Ma, Xi-Jun; Yang, Shan-Lin // Knowledge & Information Systems;Oct2012, Vol. 33 Issue 1, p171 

    Evaluation of software trustworthiness is an extensively investigated topic. A lot of software trustworthiness evaluation (STE) models and systems have been proposed in the literature. While scholars have concentrated their efforts on the design and development of trustworthiness metrics, other...

  • IEC 61499 as an Enabler of Distributed and Intelligent Automation: A State-of-the-Art Review--A Different View. Thramboulidis, Kleanthis // Journal of Engineering (2314-4912);2013, p1 

    The industrial and research activities around the IEC 61499 architecture for distributed automation systems are discussed by Vyatkin, (2011). Research results related to the design of this kind of systems as well as to the execution of IEC 61449 on embedded devices are reviewed. It is claimed...

  • SIF 3.0. Waters, John K. // T H E Journal;Aug2009, Vol. 36 Issue 7, p27 

    The article discusses use of the Schools Interoperability Framework (SIF), a specification for data sharing among educational software applications. It serves as a blueprint describing how information can be exchanged among K-12 educational applications. A school district committed to adding...

  • FEATURE STORY. Yoswick, John // Memphis Automotive Report;Aug2010, Vol. 21 Issue 11, p4 

    The article presents the strategies used by business owners to reduce costs and boost sales in the U.S. in 2010. Consider if voice over Internet protocol (VoIp) could help reduce phone costs. A number of organizations have an online that can aid in approximating the carbon footprint of the shop,...

  • Network upgrade saves thousands. Coleman, Jeff // Health Management Technology;May2012, Vol. 33 Issue 5, p27 

    The article reviews the Ethernet network upgrade from Comcast.

  • How to Manage IP Addressing. Engebretson, David // SDM: Security Distributing & Marketing;Apr2005, Vol. 35 Issue 4, p74 

    Provides tips on how to manage Internet protocol addressing (IP) in electronic security systems. Requirement for technicians to check the IP address of a computer or device, change the address if needed and diagnose the address problems; Tools provided by command line functions for checking the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics