Voice Over IP Assessing The Term Paper

PAGES
2
WORDS
530
Cite

Bibliography

Bal Athwal, Fotios C. Harmantzis, & Venkata Praveen Tanguturi. (2010). Valuing Hosted VoIP services in the enterprise market: case application using real options. International Journal of Technology Management, 49(1-3), 250-271.

Basaglia, S., Caporarello, L., Magni, M., & Pennarola, F.. (2009). Environmental and organizational drivers influencing the adoption of VoIP. Information Systems and eBusiness Management, 7(1), 103-118.

Bayer, N., Xu, B., Rakocevic, V., & Habermann, J.. (2010). Application-aware scheduling for VoIP in Wireless Mesh Networks. Computer Networks,

54(2), 257.

Blefari-Melazzi, N., Daigle, J., & Femminella, M.. (2009). Efficient and stateless deployment of VoIP services. Computer Networks, 53(5), 706.

Reu-Ching Chen, & Chen-Sung Chang. (2007). Optimum latency guarantee by using weighting methods in real time VOIP. Journal of Information & Optimization Sciences, 28(4), 641-651.

de Bijl, P., & Peitz, M.. (2009). Access regulation and the adoption...

...

Journal of Regulatory Economics, 35(2), 111-134.
Diffie, W., & Landau, S.. (2009). Communications Surveillance: Privacy and Security at Risk. Association for Computing Machinery. Communications of the ACM, 52(11), 42.

Karapantazis, S., & Pavlidou, F.. (2009). VolP: A comprehensive survey on a promising technology. Computer Networks, 53(12), 2050.

Michael Marsanu. (2006). VoIP: carrying the most sensitive data? Network Security, 2006(9), 19.

Nunn, L., McGuire, B., & Crowe, B.. (2010). Voice-Over-Internet Protocol (VOIP) Cost Efficiencies and the Decision to Implement. The Review of Business Information Systems, 14(1), 1-11.

Theodore Tryfonas, Iain Sutherland, & Ioannis Pompogiatzis. (2007). Employing penetration testing as an audit methodology for the security review of VoIP: Tests and examples. Internet Research, 17(1), 61.

Wang, C., & Wei, H.. (2009). IEEE 802.11n MAC Enhancement and Performance Evaluation. Mobile Networks and Applications, 14(6), 760-771.

Patrick…

Sources Used in Documents:

Theodore Tryfonas, Iain Sutherland, & Ioannis Pompogiatzis. (2007). Employing penetration testing as an audit methodology for the security review of VoIP: Tests and examples. Internet Research, 17(1), 61.

Wang, C., & Wei, H.. (2009). IEEE 802.11n MAC Enhancement and Performance Evaluation. Mobile Networks and Applications, 14(6), 760-771.

Patrick Xavier. (2008). From universal service to universal network access? Info: the Journal of Policy, Regulation and Strategy for Telecommunications, Information and Media, 10(5/6), 20-32.


Cite this Document:

"Voice Over IP Assessing The" (2010, March 15) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/voice-over-ip-assessing-the-74568

"Voice Over IP Assessing The" 15 March 2010. Web.19 April. 2024. <
https://www.paperdue.com/essay/voice-over-ip-assessing-the-74568>

"Voice Over IP Assessing The", 15 March 2010, Accessed.19 April. 2024,
https://www.paperdue.com/essay/voice-over-ip-assessing-the-74568

Related Documents

Fourth, as fiber optic lacks conductivity it does not heat up, expand, contract or lose any of its conductivity properties over time. Fiber optic cable therefore has a lower Total Cost of Ownership (TCO) as a result of not having to contend with the continual wear and tear on the metallurgical values of the wire (Ferelli, 23, 24). The Specific Advantages of Fiber Cabling over Copper: Taking a Closer Look It's been

Web conferencing systems have been faced with resistance to change by those responsible for knowledge transfer and knowledge management, as these systems are seen as a threat to the more costly and time-consuming approaches to sharing knowledge. It has been seen that employees will resist using Web Ex-systems as they are afraid it makes the transfer of their knowledge too easy, and therefore is a risk to their status

66). Furthermore, social software will only increase in importance in helping organizations maintain and manage their domains of knowledge and information. When networks are enabled and flourish, their value to all users and to the organization increases as well. That increase in value is typically nonlinear, where some additions yield more than proportionate values to the organization (McCluskey and Korobow, 2009). Some of the key characteristics of social software applications

The other members of the value chain, particularly the service providers and device manufacturers, vie strongly against one another for differentiating content. Through the use of the access in order to top content as currency, content or brand owners and publishers will extend their control of the value chain by buying or merely controlling and by way of content distribution points. (Future Mobile Entertainment Scenarios: MEF White Paper) Possible opportunities

Interface Evaluation
PAGES 10 WORDS 3189

Interface Evaluation: Smart Watches and Smart Phones Assessment of Samsung Galaxy Allion Labs Inc. Comparison of Smart Watch Integration Advances in Smart Watch Technology Integration INTERFACE EVALUATION: SMART WATCHES AND SMART PHONES The focus of this study is the evaluation of the interface between Smart Watches and Smart Phones. This study will conduct this evaluation through a review of the literature published in this area of inquiry. Samsung Galaxy Assessment The Smart Watch is reported in the

Cox Communications Strategic Management Cox Communications based multiservice broad-band communications organization named Cox Communications is headquartered in New York with approximately 20000 employees and more than 6m consumers. It's a subsidiary of Cox Enterprises. The company has a very capable, reliable and high quality network of broadband delivery due to which the customer service of Cox is unmatchable in the whole industry. To maintain this reputation in cable industry, the administrative system