Telecommunications

Telecommunication occurs when the exchange of information between two or more entities (communication) includes the use of technology. Communication technology uses channels to transmit information (as electrical signals), either over a physical medium (such as signal cables), or in the form of electromagnetic waves. The word is often used in its plural form, telecommunications, because it involves many different technologies.

Share tech news, updates, or what's on your mind.

Sign up to Post

VoIP ISP
Why do some people recommend buying business VoIP from an ISP? What are the benefits to my company? What are the costs?
0
New feature and membership benefit!
LVL 9
New feature and membership benefit!

New feature! Upgrade and increase expert visibility of your issues with Priority Questions.

Helping a friend
Not everyone has adapted to a rapid advancement in technology; there are people who are reluctant or afraid to delve into this brave new world of IT. If you have a friend or a family member who suffers from the so-called technophobia, here is how you can help them.
2
 
LVL 12

Expert Comment

by:Andrew Leniart
Comment Utility
An excellent article indeed. Thank you for sharing.
0
Success Team
Messaging apps are amazing tools with the power to do a lot of good, but the truth is the process of collaborating with coworkers requires relationships established through meaningful communication - the kind of communication that only happens face-to-face.
3
Legacy Video Conferencing
What do we know about Legacy Video Conferencing?
- Full IT support needed!
- Complicated systems at outrageous prices!
- Intense training required!

Highfive believes we need to embrace a new alternative.
3
Screen Sharing
In our personal lives, we have well-designed consumer apps to delight us and make even the most complex transactions simple. Many enterprise applications, however, are a bit behind the times. For an enterprise app to be successful in today's tech world, they need to be consumer-grade. Here's why.
4
 
LVL 2

Expert Comment

by:Roayn Braun
Comment Utility
Hi,

Yes, customer applications offer a lot of information and key for a company because of the simple reason that it allows them to understand the consumer's demand. After all,  clients are the ones who can make or break a business. They can also enact the role of brand advocates when satisfied.

It is absolutely necessary for a business to use client engagement tools in their day to day affairs so that they are destined for success. In this regard, the use of knowledge base tool such as Zendesk, Help Scout, Help desk and ProProfs knowledge management tool has gone up due to its ability to boost client engagement considerably.

A knowledge management software can curtail the customer tickets, impart knowledge, boost the employee productivity and more. It is a great way to strengthen the business efficiency without compromising on the quality of service.

Hence, it is important for companies to boost the use of knowledge base as it is multi-faceted and proven to improve client satisfaction considerably.
0
Let’s list some of the technologies that enable smooth teleworking. 
0
Cyber or not!
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
3

I'm Dumb-phoned(ed)

Last week, I noticed this message when adding events to my Google Calendar:
SMS-article-3.pngOn June 27th (2015), Google is removing SMS as a notification option for Google Calendar events.  Their assumption is that enough people have smart phones and that they can use an app for notification.  Unfortunately, I have chosen a simpler life and still use a "dumb phone."  It has a real keyboard to make texting easier and has served my needs quite well for many years.

My Options


  • Upgrade to a new (smart) phone
  • Write some Python code that integrates Google Calendar with Google Voice
  • Configure my Google+ settings
  • Take advantage of Gmail
I will postpone the first option as long as possible.  I don't care what Google, or the tech industry in general, wants me to do.

I will hold off coding up a solution until I've explored all other work-arounds.

I tried to change the Google+ settings to use my cell phone as the notification target, but I needed the ability to send email from my phone in order to verify the address.  My cell phone account is simple enough that I don't have email - not a bad decision for a dumb phone, but one that prevents me from implementing this work-around.

Although Gmail isn't my primary email, I do use it.  After three tests, I have a work-around to my calendar SMS notification problem.

The Work-Around


1. Change your Google Calendar settings

SMS-article-1.pngOn the Settings page, click on the Calendars link
SMS-article-2.pngAnd then click the Edit notifications link.
SMS-article-4.png
2
This is a step by step guide on creating single number reach (mobility) for Cisco Call Manager.  After configuring this when someone calls your deskphone after 3-4 rings your cell phone will start to ring.  If you do not answer the call will go to your system (Unity) voicemail box.  

You can also switch a call from your deskphone to your mobile and back.  In order switch calls back and forth the call must first ring your desk/office phone.  If the call come directly into your cell phone you will not be able to switch them back and forth.


1. Create a user.  User Management / End User

a.      Click add New
b.      Enter User ID
c.      Password (password)
d.      Pin (12345)
e.      Last Name
f.      First Name click save

 
2. Scroll down to Controlled Devices on users page and click on Device Association

a.      On the drop down menu select Directory Number and enter the number click on search
b.      Click the check box on the left hand side and click on Save Selected/Changes
c.      In the upper right hand corner click on the Go Button next to Back to User


3. Scroll down to Primary Extension and select from the drop down menu the correct extension

a.      Scroll down to Permissions Information click on add to user group another screen will appear check Standard CTI Enabled and any other user groups you would like to add then click on add selected.  
b.      Under Mobility Information Click on both mobility boxes.  Enable mobility and Enable Mobile Voice Access. Click save

 
0
 
LVL 10

Author Comment

by:voipman
Comment Utility
It looks good I think the ? are from the screen shots that I tried to add.  I tried to come up with a better title but thats all i could come up with!
0
 
LVL 16

Expert Comment

by:krakatoa
Comment Utility
Hi - interesting to run into you. I am working on a Java VoIP programme (not for PSTN though at this point, only WAN LAN). Developing P2P version presently.
0
During 2009, many companies have been victims of telephone hacking that exploits known features in the Meridian voicemail system. Through this article I hope to point out a few things that can be done to stop this hacking. Some of the items mentioned are secific to Nortel systems, but included some information about IP phones as well. In addition, most of the features mention also exist and are exploitable on other brands of telephone systems.

First the specifics that will stop the most common avenues of exploit so far:

- Make sure every mailbox has a password of at least seven or eight digits. The hackers are using automatic systems that use a "brute force" method to guess voicemail passwords.
- Delete unused mailboxes.
- When you create a mailbox, don't leave it at the default password.
- Disable the call-out/forwarding feature in all voicemail boxes.
- Set your voicemail system to lock out a mailbox after a set number of wrong password attempts.
- Set filters on your phone system to prevent calls to 1-900, 1-976 and 10-10 numbers. On phones in unsecured areas, block all long distance calls (i.e. block everything starting with a "1").

Office telephone systems (PBXs) which support VoIP pose a special risk for unauthorized calling. The threat can take a number of forms:

- if unauthorized persons can reach your IP PBX from the external Internet then there is the potential to place unauthorized calls;
- if your IP PBX accesses IP trunks to place calls, …
2

Telecommunications

Telecommunication occurs when the exchange of information between two or more entities (communication) includes the use of technology. Communication technology uses channels to transmit information (as electrical signals), either over a physical medium (such as signal cables), or in the form of electromagnetic waves. The word is often used in its plural form, telecommunications, because it involves many different technologies.