Flylib.com
Taking Charge of Your VoIP Project
Taking Charge of Your VoIP Project
ISBN: 1587200929
EAN: 2147483647
Year: 2004
Pages: 90
Authors:
Hillary J. Michaud
,
Jeffrey T. Hicks
BUY ON AMAZON
Main Page
Table of Contents
Copyright
About the Authors
About the Technical Reviewers
Acknowledgments
Why We Wrote This Book
Who Should Read this Book
How This Book Is Organized
Chapter 1. VoIP Basics
In the Telephony Community
In the Data-Networking Community
Chapter Summary
End Notes
Chapter 2. Building a Business Case for VoIP
A VoIP Business Case
VoIP Benefits and Obstacles
Analyzing VoIP ROI
Getting a Good ROI
Chapter Summary
End Notes
Chapter 3. Planning for VoIP
Planning Analysis and Assessment
Evaluation and Purchase
Deployment Tuning and Testing
Chapter Summary
End Notes
Chapter 4. Do It Yourself or Outsource?
Why Outsource?
Some Options for Outsourcing
Whether to Outsource?And to Whom?
A Methodology for Approaching Outsourcing
Chapter Summary
End Notes
Chapter 5. Quality of Service and Tuning
Sharing a Network
QoS What and Why
Network QoS Techniques
Tuning Choices
Configuration and Testing
QoS and Tuning Recommendations
Chapter Summary
End Notes
Chapter 6. Ongoing VoIP Management
Understanding VoIP Management
Managing Operations
Maintaining High Availability
Maintaining Call Quality
Accounting and Billing
Chapter Summary
End Notes
Chapter 7. Establishing VoIP SLAs
Determining What to Measure in a VoIP SLA
Implementing VoIP SLAs
Chapter Summary
End Notes
Chapter 8. VoIP Security
Network Security Is Tough
Three Stages in Managing Security
Problem Areas for VoIP Security
VoIP Security Recommendations
Chapter Summary
Conclusion
End Notes
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
Taking Charge of Your VoIP Project
ISBN: 1587200929
EAN: 2147483647
Year: 2004
Pages: 90
Authors:
Hillary J. Michaud
,
Jeffrey T. Hicks
BUY ON AMAZON
Adobe After Effects 7.0 Studio Techniques
Track Mattes
Conclusion
Linking Animation Data
Film, HDR, and 32 Bit Compositing
Learning to See
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Making Sure a Header File Gets Included Only Once
Doing a Case-Insensitive String Search
Implementing Fixed-Point Numbers
Manipulating an XML Document
Using Pointers to Class Members
PMP Practice Questions Exam Cram 2
Project Initiation
Answers and Explanations
Exam Prep Questions
Answers and Explanations
Appendix A. CD Contents and Installation Instructions
File System Forensic Analysis
Digital Investigation Foundations
Data Organization
Introduction
NTFS Concepts
UFS2 Inodes
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Success Story #3 Fort Wayne, Indiana From 0 to 60 in nothing flat
Success Story #4 Stanford Hospital and Clinics At the forefront of the quality revolution
Phase 4 Performance and Control
Service Process Challenges
Designing World-Class Services (Design for Lean Six Sigma)
Understanding Digital Signal Processing (2nd Edition)
CONVOLUTION IN FIR FILTERS
REMEZ EXCHANGE FIR FILTER DESIGN METHOD
COMPUTING THE INVERSE FFT USING THE FORWARD FFT
GENERATING NORMALLY DISTRIBUTED RANDOM DATA
IMPROVING TRADITIONAL CIC FILTERS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies