382 research outputs found

    Converged voice access to data (CVAD)

    Get PDF
    The rapid growth of the Internet and widespread use of mobile computing and telephony has resulted in a broad range of ways to communicate and access information. Data and telecommunications convergence promises a wide range of possible solutions that will increase productivity, reduce costs, and provide new opportunities and revenues for enterprises. However, such converged telecommunications and data services have been largely isolated to static environments where fixed Personal Computers (PC) and an Internet connection are used in conjunction with various software tools to simulate a pseudo converged session. Generally, data presented on the internet and in enterprise applications is not available on voice networks and vice-versa. Due to the versatile nature of today's enterprise, a feature-rich, flexible, adaptive and widely accessible convergence solution is required. This paper presents an Interactive Voice Response (IVR) driven approach that uses Converged Voice Access to Data (CVAD) services. The CVAD solution offers enhanced service effectiveness, flexibility and convenience for professionals on the move

    Quality of Service challenges for Voice over Internet Protocol (VoIP) within the wireless environment

    Get PDF

    Conception and prototypical implementation of a CTI application exemplified on Zarafa Groupware and SIPFoundry's SipXecs

    Get PDF
    This project is about Computer Telephony Integration (CTI). The main objective of this project is to integrate a groupware into Voice-IP PBX system and make a “click to dial plugin” for the Zarafa Collaboration Platform (ZCP) which is on open source collaborative software. We have one mail client (Zarafa Webaccess) and we have to be able to call our contacts with one click. I will use one SipXecs server, which is an open source voice over IP telephony server, it works like PBX and it is responsible for IP phones ringing. Every user has one IP-phone and all this has to run for a local network and is useful for connecting multiple users on a local network for free, such as several offices within a business.Este proyecto consiste en la integración de la telefonía en los ordenadores, conocido con las siglas CTI. El objetivo principal es integrar un groupware con un sistema PBX Voice-IP y desarrollar una aplicación “click to dial” para Zarafa Collaboration Platform (ZCP), que es un software colaborativo de código abierto. Tendré un cliente de correo (Zarafa Webaccess) y que crearé un plugin para hacer posible las llamadas entre contactos con un sólo click. Usaré un servidor SipXecs, que es un servidor de telefonía IP de código abierto, el cual funciona como centralita (PBX) y es el responsable de gestionar las llamadas entre los usuarios. Cada usuario contará con un telefono IP y todo esto se probará en una red local. De esta manera podré conectar múltiples usuarios en una red de manera gratuita, como por ejemplo conectar varias oficinas con centralitas y telefonos IP dentro de una misma compañía.Ingeniería Técnica en Sistemas de Comunicació

    Improving Contact Center Demonstrations at Cisco Systems

    Get PDF
    This project involved the design, construction, and implementation of a system to improve Cisco\u27s Contact Center demonstrations to potential customers. The system aimed to provide customized demonstration resources by industry vertical and geographic sales theater and streamline the demonstration creation process by Cisco sales representatives. By collaborating with Cisco sales representatives directly, the final deliverable is a set of demo resources that is likely to be used and ultimately increase Cisco\u27s Contact Center sales

    Parsing and Analyzing Log Files

    Get PDF
    In many large-scale software and hardware systems, log files provide a crucial source of information to aid in debugging. However, when the system is complex these log files may be difficult to read. Often, entries are irrelevant,and combining and correlating different logs is difficult. In this project, we develop a tool to make a class of logs more useful to Cisco Systems. The tool filters log events based on specified information, as well as displays logs together for correlation

    "A model-driven approach for designing multi-platform user interface dialogues": dialogues specification

    Get PDF
    Human-computer interaction becomes sophisticated, multimodal and multi device and needs to be well-designed with the aim of facilitating application correction (i.e. to correcting errors/bugs in the application) or extension (i.e. adding new functionalities or modifying existing tasks). This thesis is focused on building a methodology of designing and specifying User Interface (UI) behaviour. The Unified Modelling Language (UML) is used to describe in detail the conceptual model and to define all its objects. The methodology flux diagram is provided with the specification of the consistency and the completeness properties of the transformation model. To support the methodology, we implement a graphic Dialog Editor in which Models are organized in three levels (abstract, concrete and final) according to Cameleon Reference Framework (CFR) and, whose process respects the Model Driven Engineering (MDE) approach. Furthermore, the use of Dialog Editor is illustrated through a simple exam...Les interfaces Homme-Machine deviennent de plus en plus complexes. Leur conception nécessite des nouveaux outils et/ou méthodes. En exploitant l'aproche orienté-modèle, cette thèse repond à ce besoin en proposant une méthodologie de conception des dialogues multi-plateform

    Proceedings of the 2nd EICS Workshop on Engineering Interactive Computer Systems with SCXML

    Get PDF

    Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation

    Get PDF
    The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project’s methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics
    corecore