Feeds

A journey through VoIP

Audio direction for the masses

  • alert
  • submit to reddit

The essential guide to IT transformation

Regcast Last week James Hone of Thus joined Freeform Dynamics’ Josie Sephton in the Reg studio to discuss how you get from your current set-up to a VoIP solution in a few easy steps - from concepts through to requirements definition and implementation.

For those of you considering VoIP as a solution for your business, this should be the perfect primer for any decisions. This 30 minute conversation recorded exclusively for El Reg can be downloaded along with its accompanying slide deck free of charge from our library.

If you are thinking about implementing VoIP in your organisation or are after a couple of tips to tweak your current setup, this could be just the thing. James and Josie bring their industry knowledge and anecdotes to the floor as they tackle a variety of talking points, including an overview of VoIP, how to best define individual organisational requirements and guidance on managing the transition to VoIP.

Tune into the conversation here. Feedback via the tab on the media player is welcome, as always. ®

The essential guide to IT transformation

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.