Taking Charge of Your VoIP Project

Prev don't be afraid of buying books Next

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

access management

access points

     security vulnerabilities

accounting

     CDRs 2nd

adding new features to VoIP deployment

advanced call routing

analog telephones

analyzing

     ROI 2nd

analyzing ROI

     benefits of VoIP

         convergence 2nd

         cost savings 2nd 3rd 4th 5th 6th 7th

         hard benefits

         new features 2nd 3rd 4th 5th

         productivity savings 2nd

         soft benefits

     obstacles to VoIP deployment 2nd 3rd

         business risks 2nd

Andress, Mandy

annoyances 2nd

application integration

application management

applications

     transaction-oriented

assembling VoIP deployment test plan 2nd 3rd

assessing reliability 2nd 3rd

     of hardware 2nd

     of IT processes 2nd

     of link and carrier

     of network design 2nd

     of software

assessing VoIP readiness

ATM

     QoS 2nd

attack signatures

attacks

     annoyances 2nd

     call hijacking

     detecting 2nd

     DoS 2nd

     preventing 2nd

     reacting to 2nd

authentication

authorization

AV (antivirus) detection tools

availability [See also reliability]

     downtime costs 2nd

     fault management 2nd 3rd

     five nines

     high availability, maintaining 2nd

         application management

         monitoring servers 2nd 3rd 4th

     SLA metric 2nd

Amazon

Категории