Top 10 VoIP tips

Here are the top 10 VoIP tips YTD -- based on how often you've viewed them.

This Content Component encountered an error

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Top 10 VoIP tips
Sign up and have VoIP tips delivered directly to your inbox.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



Networking Decisions Conference 2004: Voice over IP presentations
Our most-viewed tip of the year is a collection of presentations from our 2004 Networking Decisions conference focusing on our Voice over IP sessions.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
System components of VoIP
Next on the list is the second tip in a series excerpted from a report by Ohio State University. The report analyzes issues and challenges in the evolving VoIP world.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Introduction to Internet telephony
Third on the list is the first tip in a series excerpted from a report by Ohio State University that analyzes issues and challenges in the evolving VoIP world.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Best practices for securing IP telephony
Our fourth most-viewed tip from Irwin Lazar, Practice Manager, Burton Group, explores the risk factors in IP telephony and provides best practices and strategies for risk mitigation.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Seven steps to successful VoIP
The next most popular tip provides some steps for building a successful VoIP business, whether you are handling the VoIP implementation or are outsourcing.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
IP telephony cuts both ways
Holding steady at number six, this tip predicts the future of VoIP. A bumpy road for VoIP paves way to enterprise outsourcing?

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
NIST publishes paper on VoIP security considerations
Tip number seven provides a few recommendations for VoIP security from NIST.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
What is DHCP?
Eighth on the list is a protocol, that among other things, allows network administrators to supervise and distribute IP addresses from a central point.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Employ fuzzing to test VoIP security
Number nine takes a quick look at the vulnerabilities of VoIP protocols and a method of testing SIP and H.323.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
The trouble with 911 and VoIP
Last, but not least, this tip presents the issues involved in the VoIP/911 dilemma.



** MORE IMPORTANT INFORMATION ON THIS TOPIC **

==================================
MORE INFORMATION ON THIS TOPIC
==================================

Browse through our library of Voice over IP Tips

Ask the Experts yourself: Our VoIP experts are waiting to answer your questions.


This was first published in May 2005

Dig deeper on VoIP Migration and Implementation

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchMobileComputing

SearchNetworking

SearchTelecom

SearchITChannel

SearchEnterpriseWAN

SearchExchange

Close