Top 10 VoIP tips

Here are the top 10 VoIP tips YTD -- based on how often you've viewed them.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Top 10 VoIP tips Sign up and have VoIP tips delivered...

directly to your inbox.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



Networking Decisions Conference 2004: Voice over IP presentations
Our most-viewed tip of the year is a collection of presentations from our 2004 Networking Decisions conference focusing on our Voice over IP sessions.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
System components of VoIP
Next on the list is the second tip in a series excerpted from a report by Ohio State University. The report analyzes issues and challenges in the evolving VoIP world.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Introduction to Internet telephony
Third on the list is the first tip in a series excerpted from a report by Ohio State University that analyzes issues and challenges in the evolving VoIP world.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Best practices for securing IP telephony
Our fourth most-viewed tip from Irwin Lazar, Practice Manager, Burton Group, explores the risk factors in IP telephony and provides best practices and strategies for risk mitigation.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Seven steps to successful VoIP
The next most popular tip provides some steps for building a successful VoIP business, whether you are handling the VoIP implementation or are outsourcing.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
IP telephony cuts both ways
Holding steady at number six, this tip predicts the future of VoIP. A bumpy road for VoIP paves way to enterprise outsourcing?

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
NIST publishes paper on VoIP security considerations
Tip number seven provides a few recommendations for VoIP security from NIST.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
What is DHCP?
Eighth on the list is a protocol, that among other things, allows network administrators to supervise and distribute IP addresses from a central point.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Employ fuzzing to test VoIP security
Number nine takes a quick look at the vulnerabilities of VoIP protocols and a method of testing SIP and H.323.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
The trouble with 911 and VoIP
Last, but not least, this tip presents the issues involved in the VoIP/911 dilemma.



** MORE IMPORTANT INFORMATION ON THIS TOPIC **

==================================
MORE INFORMATION ON THIS TOPIC
==================================

Browse through our library of Voice over IP Tips

Ask the Experts yourself: Our VoIP experts are waiting to answer your questions.


This was last published in May 2005

Dig Deeper on VoIP Migration and Implementation

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchMobileComputing

SearchNetworking

SearchTelecom

SearchITChannel

SearchEnterpriseWAN

SearchExchange

Close