Feeds

RIM ties in corporate drones with VoIP over Wi-Fi

No escape from Mobile Voice System 5

Secure remote control for conventional and virtual desktops

Along with a new handset, RIM yesterday announced Mobile Voice System 5, which brings VoIP calling over Wi-Fi for enterprise users, with number mapping courtesy of Cisco.

The new Mobile Voice System integrates with Cisco’s Unified Communications Manager and can map a Wi-Fi-connected Blackberry to a desktop phone number. Thus you can make and receive calls as though you were sitting at a desk, without paying the network operator a penny.

Blackberry users won’t be limited to the office either. Any Wi-Fi point will do, so staff won’t be able to escape from their desktop phones as long as they’re near a hotspot with decent internet connectivity.

Calls are routed over the internet to the company’s PBX, so users can transfer calls and connect to internal extensions. The system also offers the opportunity to record calls, apply calling restrictions, and all the other things a PBX can do these days.

Mobile Voice System 5 will be available "later this year". ®

Choosing a cloud hosting partner with confidence

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.