Management May Be The Most - Important VOIP App Of All

Kerravala, Zeus
September 2007
Business Communications Review;Sep2007, Vol. 37 Issue 9, p16
Trade Publication
This article discusses Voice Over Internet Protocol (VOIP) and the importance of management in its application. Upon investigation, it has been discovered that 80 percent of enterprises have deployed VOIP, but only 6 percent have done so throughout the corporation.The VOIP solutions on the market from Cisco, Acaya, and others have been available for several years and have been built on solid code and reliable architectures. The author suggests that network managers need to believe that the quality and reliability will be sustained in other applications.


Related Articles

  • Primer: Here's the lowdown on IMS. Lawson, Stephen // Network World;9/26/2005, Vol. 22 Issue 38, p41 

    This article describes the latest buzzword in telecommunication, referring to the Internet protocol (IP) Multimedia Subsystem (IMS). IMS is an architecture that defines how IP networks should handle voice calls and data sessions. It essentially takes the place of the control infrastructure in...

  • Cisco talking IP-radio nets. Hochmuth, Phil // Network World;10/24/2005, Vol. 22 Issue 42, p1 

    This article reports that Cisco Systems Inc. (CS) is expected to announce new technology and a business unit focused on integrating two-way radio, cellular phones, voice over Internet protocol (IP), and other communications methods into an IP backbone. The IP Interoperability and Collaboration...

  • As The IP World Converges, Signaling Protocols Continue To Diverge. Zvulun, Nir // Business Communications Review;Feb2006, Vol. 36 Issue 2, p58 

    The article examines the problem of interoperatibility of voice over Internet protocol networks. Interoperatibility problem occurs on networks because signaling protocols programmed into it are immature and divergent. In addition, Internet Protocol infrastructure is also one factor of the said...

  • Microsoft, Cisco face off at VoiceCon. Galli, Peter; Musich, Paula // eWeek;3/12/2007, Vol. 24 Issue 9, p20 

    The article reports on the increased competition developed between Microsoft Corp. and Cisco Systems Inc. with their introduction of voice-over- internet protocol applications (VOIP) at the VoiceCon show held on March 5-8 in Orlando, Florida. Jeff Raikes, president of Business Division at...

  • CLARIFYING IMS. Meyers, Jason // Telephony;10/17/2005, Vol. 246 Issue 20, p19 

    Focuses on Internet protocol multimedia subsystem (IMS). Interoperability, adaptability and revenue potential of the IMS architecture; IMS architecture theory.

  • IMS no panacea for service creation. Wilson, Carol // Telephony;10/17/2005, Vol. 246 Issue 20, p24 

    Focuses on the benefits from the use of Internet protocol multimedia subsystem architecture. Creation of extracted services layer; Delivery of common services over multiple systems; Effects of wireless services on core revenues of traditional voice operators.

  • Migración de redes de voz IPv4 a IPv6. Salcedo, Octavio; López, Danilo; Quiroga, Fausto Alexánder Gamboa // Tecnura;2012, Vol. 16 Issue 31, p76 

    This article discusses the current state of voice networks and IP networks running on version 6, and the different architectures that can be implemented. The results analyze the benefits of voice over IP networks with version 6 over version 4 and its influence on the quality of service, from...

  • VoIP gets social. Karpinski, Rich // Telephony;10/8/2007, Vol. 248 Issue 16, p8 

    The article reports on the growing trend of applications embedding voice over Internet protocol (VoIP) in the U.S. Such trend is evident particularly in social networks, as Jaxtr users have doubled from 1 million to 2 million in September 2007. Voice-enabled Internet applications are believed to...

  • Challenges in video-over-IP resilience.  // Broadcast Engineering;Jun2008, Vol. 50 Issue 6, p111 

    The article focuses on the challenges in video-over-Internet Protocol (IP) resilience. Most video-over IP traffic assumes that network and devices are lossless and unprotected, one-way traffic become the standard. It notes that recovery rests on the network perimeter. It was found out that large...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics