Voip Hacks by Theodore Wallingford

Total Page:16

File Type:pdf, Size:1020Kb

Voip Hacks by Theodore Wallingford VoIP Hacks By Theodore Wallingford ............................................... Publisher: O'Reilly Pub Date: December 2005 ISBN: 0-596-10133-3 Pages: 326 Table of Contents | Index Voice over Internet Protocol (VoIP) is gaining a lot of attention these days, as more companies and individuals switch from standard telephone service to phone service via the Internet. The reason is simple: A single network to carry voice and data is easier to scale, maintain, and administer. As an added bonus, it's also cheaper, because VoIP is free of the endless government regulations and tariffs imposed upon phone companies. VoIP is simply overflowing with hack potential, and VoIP Hacks is the practical guide from O'Reilly that presents these possibilities to you. It provides dozens of hands-on projects for building a VoIP network, showing you how to tweak and customize a multitude of exciting things to get the job done. Along the way, you'll also learn which standards and practices work best for your particular environment. Among the quick and clever solutions showcased in the book are those for: gauging VoIP readiness on an enterprise network using SIP, H.323, and other signaling specifications providing low-layer security in a VoIP environment employing IP hardphones, analog telephone adapters, and softPBX servers dealing with and avoiding the most common VoIP deployment mistakes In reality, VoIP Hacks contains only a small subset of VoIP knowledge-enough to serve as an introduction to the world of VoIP and teach you how to use it to save money, be more productive, or just impress your friends. If you love to tinker and optimize, this is the one technology, and the one book, you must investigate. VoIP Hacks By Theodore Wallingford ............................................... Publisher: O'Reilly Pub Date: December 2005 ISBN: 0-596-10133-3 Pages: 326 Table of Contents | Index Copyright Credits About the Author Contributors Acknowledgments Preface Why VoIP Hacks? How This Book Is Organized Using Code Examples Chapter 1. Broadband VoIP Services Section 1.1. Hacks 17: Introduction Section 1.2. VoIP-Based Phone Service Providers Hack 1. Get Connected Hack 2. Use Pure VoIP Dialing with Your TSP Hack 3. Wire Your House Phones for VoIP Hack 4. Use a Softphone with a VoIP TSP Hack 5. Prioritize Packets to Improve Quality Hack 6. Got 911? Hack 7. Update Your VoIP ATA Firmware Chapter 2. Desktop Telephony Section 2.1. Hacks 827: Introduction Hack 8. Access Next-Gen Voice Features Hack 9. Track Vonage Account Info on Your Desktop Hack 10. Pick a Desktop VoIP Client Hack 11. Sound Like Darth Vader While You VoIP Hack 12. Grow Your Social Network with Gizmo Hack 13. Record VoIP Calls on Your Windows PC Hack 14. Handle Calls with Windows Software Hack 15. Let Your Mac Answer and Log Your Calls Hack 16. Run Phlink Even When Logged Off Hack 17. Greet Callers Differently Each Day Hack 18. Use Caller IDs in AppleScripts Hack 19. Control iTunes from Phlink Hack 20. VoIP While Fragging Hack 21. Google for Telephony Info Hack 22. Telephonize a Sound File Hack 23. Record an Audio Chat on Your Mac Hack 24. Create Telephony Sounds with SoX Hack 25. Mix the Perfect Announcement Hack 26. Sound Like a Pro Announcer Hack 27. Record a Videoconference Chapter 3. Skype and Skyping Section 3.1. Hacks 2840: Introduction Hack 28. Get Skype and Make Some New Friends Hack 29. Skype Your Outlook Contacts Hack 30. Skype People from the OS X Address Book Hack 31. Enable Site Visitors to Skype You Hack 32. Speak Jyve Hack 33. Teach Your Browser to Speak Jyve Hack 34. Carry Skype in Your Pocket Hack 35. Degunk International SkypeOut Calls Hack 36. From Podcasting to Skypecasting Hack 37. Answer Your Skype Calls, Even When You're Not Around Hack 38. Use Custom Rings and Sounds with Skype Hack 39. Emote by Sight and Sound with Skype Hack 40. Skype with Your Home Phone Chapter 4. Asterisk Section 4.1. Hacks 4158: Introduction Hack 41. Turn Your Linux Box into a PBX Hack 42. Attach a SIP Phone to Asterisk Hack 43. Connect a Phone Line Using an FXO Gateway Hack 44. Connect a Legacy Phone Line Using Zaptel Hack 45. Forward Your Home Calls to Your Cell Phone Hack 46. Selectively Forward Calls Hack 47. Report Telephone Activity with Excel Hack 48. Kindly Introduce Telemarketers to Mr. Privacy Hack 49. Build a Four-Line Phone Server Hack 50. Master Music-on-Hold Hack 51. Record Calls Hack 52. Get Your Daily Weather Forecast from Your Telephone Hack 53. Put a Happy Face on Asterisk Using AMP Hack 54. Run Asterisk Without Root, for Security's Sake Hack 55. Link Two Asterisk Servers with PSTN Hack 56. Link Several PBXs over the Internet Hack 57. Route Calls Using Distinctive Ring Hack 58. Tune Up Your Asterisk Logs Chapter 5. Telephony Hardware Hacks Section 5.1. Hacks 5971: Introduction Hack 59. Record Calls the Old-Fashioned Way Hack 60. Make IP-to-IP Phone Calls with a Grandstream BudgeTone Hack 61. Build a Custom Ringtone for Your Grandstream Phone Hack 62. Tweak Your Sipura ATA Hack 63. Build a Bat Phone Hack 64. Brew Your Own Zaptel Interface Card Hack 65. Build a Speed-Dial Service on Cisco IP Phones Hack 66. Power Cisco Phones with Standard Inline Power Hack 67. Customize Your Cisco IP Phone's Boot Logo Hack 68. Configure Multiple IP Phones at One Time Hack 69. Customize Uniden IP Phones from TFTP Hack 70. Control the Lights Using Your IP Phone Hack 71. Use a Rotary-Dial Phone with VoIP Chapter 6. Navigate the VoIP Network Section 6.1. Hacks 7287: Introduction Hack 72. Monitor VoIP Devices Hack 73. Inspect the SIP Message Structure Hack 74. Audit a Network's QoS Capabilities Hack 75. Graph Latency and Jitter Hack 76. Explore NAT Traversal Hack 77. Shape Network Traffic to Improve Quality of Service Hack 78. Create a Premium Class of Service Hack 79. Build a $100 PSTN Gateway in 10 Minutes or Less Hack 80. Make IP Phone Configuration a Trivial Matter Hack 81. Peek Inside of SIP Packets Hack 82. Dig into SDP Hack 83. Sniff Out Jittery Calls with Ethereal Hack 84. Log VoIP Traffic Hack 85. Secretly Record VoIP Calls Hack 86. Log and Record VoIP Streams Hack 87. Intercept and Record a VoIP Call Chapter 7. Hard-Core Voice Section 7.1. Hacks 88100: Introduction Hack 88. Build a Killer Telephony Server Hack 89. Build an H.323 Gatekeeper Using OpenH323 Hack 90. Turn Your Linux Box into a Fax Machine Hack 91. Build an Inbound Fax-to-Email Gateway Hack 92. Teach Your Asterisk Box to Speak Hack 93. Build a Mac PBX Hack 94. Monitor Asterisk from Your Perl Scripts Hack 95. Build a SoftPBX with No Hard Drive Hack 96. Build a Standalone Voicemail Server in Less Than a Half-Hour Hack 97. Automate Your Voicemail Greeting Hack 98. Connect Asterisk to the Skype Network Hack 99. Forward Your Home Phone Calls to Skype Hack 100. Get Started with sipX Colophon Index Copyright © 2006 O'Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O'Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O'Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: David Brickner Production Editor: Sanders Kleinfeld Series Editor: Rael Dornfest Cover Designer: Marcia Friedman Executive Editor: Dale Dougherty Interior Designer: David Futato Printing History: December 2005: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of O'Reilly Media, Inc. The Hacks series designations, VoIP Hacks, the image of a Morse code tapper, and related trade dress are trademarks of O'Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O'Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Small print: The technologies discussed in this publication, the limitations on these technologies that technology and content owners seek to impose, and the laws actually limiting the use of these technologies are constantly changing. Thus, some of the hacks described in this publication may not work, may cause unintended harm to systems on which they are used, or may not be consistent with applicable user agreements. Your use of these hacks is at your own risk, and O'Reilly Media, Inc. disclaims responsibility for any damage or expense resulting from their use. In any event, you should take care that your use of these hacks does not violate any applicable laws, including copyright laws. ISBN: 0-596-10133-3 [M] Credits About the Author Contributors Acknowledgments About the Author Ted Wallingford is a senior network engineer with LCG Technologies Corp. in Elyria, Ohio, and the author of Switching to VoIP (O'Reilly). Ted has led installations of VoIP technology in the construction, manufacturing, and networking industries. A periodic contributor toMacworld magazine and VoIPfan.com, Ted is a strong advocate of open standards and Star Wars movies. He updates the web site http://www.macvoip.com/ at least a couple of times a year.
Recommended publications
  • Raketu to Add Mobility to Web-Based Voip | Infoworld | News | 2007-06-15 | by John Bl
    Raketu to add mobility to Web-based VoIP | InfoWorld | News | 2007-06-15 | By John Bl... Page 1 of 4 HOME NEWS TECHNOLOGIES BLOGS/COLUMNS TEST CENTER AUDIO/VIDEO CAREERS IT EXEC-CONNEC Raketu to add mobility to Web-based VoIP New version of the Raketu application will let users make VoIP calls, send text messages, A and chat from cell phone By John Blau, IDG News Service Talkback E-mail Printer Friendly June 15, 2007 A Raketu Communications will add two new mobile phone features to its integrated communications, entertainment, and social networking service in a move to attract consumers on the go. Next week, Raketu will introduce a new domain, www.raketu.mobi, which will allow Free IT resource mobile phone users to more easily navigate the Raketu site and use services such as the company's RakWeb service launched earlier this week, said CEO Greg Learn about the energy Parker in an interview. efficiency in EMC's Pund- IT report on power conservation. By the end of the month, the company intends to launch a new mobile phone version of the Raketu application, which users can install on their phones to make VoIP calls, Sponsored by EMC send text messages, chat, and more, Parker said. Free IT resource Raketu, which is based in New York, is trying to carve out a niche in the highly competitive market for Web-based services by offering an integrated Download the Windows communications, online entertainment, and social networking service that can be Server(R) 2008 Beta: Join the global community. used on both desktop PCs and mobile phones.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Private Placement Memorandum
    Private Placement Memorandum Global Integration Platform for Consumers and Business Telephony PRIVATE PLACEMENT MEMORANDUM TELCENTRIS, INC. (dba Voxox) Up to $6,000,000 A Private Offering of up to 1,714,285 Shares of Common Stock Telcentris, Inc. (“Telcentris” or the “Company”), a Delaware corporation, is hereby privately offering (“the Offering”) up to One Million Seven Hundred Fourteen Thousand Two Hundred Eighty Five (1,714,285) shares (“the Shares”) of its Common Stock at $3.50 per Share to be sold in minimum units of Fifteen Thousand (15,000) Shares (rounded up to the nearest whole share) (individually a “Unit” and collectively the “Units”) to be sold at Fifty Two Thousand Five Hundred Dollars ($52,500) per Unit (the “Minimum Purchase”) to a limited number of accredited investors (the “Subscribers”). In addition, the Company reserves the right to offer and sell up to an additional 342,857 Shares. (See “PLAN OF DISTRIBUTION” and “DESCRIPTION OF SECURITIES.”) Subscribers may purchase less than the minimum at the sole discretion of Telcentris. (See “USE OF PROCEEDS.”) Offers and sales of the Units will be made only to accredited investors who are deemed acceptable to Telcentris. (See “INVESTOR SUITABILITY STANDARDS.”) Price to Selling Proceeds to Investors1 Commissions2 Company3 -------------------------------------------------------------------------------------------------------------------------------------------- Price Per Share: $ 3.50 $ 0.352 $ 3.153 Minimum Purchase (One Unit or 15,000 Shares) $ 52,500.001 $ 5,250.002 $ 47,250.003 Total Maximum Offering (1,714,285 Shares) $ 6,000,000.001 $ 600,000.002 $5,400,000.003 -------------------------------------------------------------------------------------------------------------------------------------------- Telcentris is an innovator in cloud-based unified communications and VoIP solutions for consumer, business and wholesale markets.
    [Show full text]
  • Shall I Be Your Chat Companion?” Towards an Online Human-Computer Conversation System
    “Shall I Be Your Chat Companion?” Towards an Online Human-Computer Conversation System Rui Yan1;3 Yiping Song2 1Institute of Computer Science 2Department of Computer and Technology (ICST) Science and Technology Peking University Peking University Beijing 100871, China Beijing 100871, China [email protected] [email protected] Xiangyang Zhou3 Hua Wu3 3Baidu Inc. 3Baidu Inc. No. 10 Xibeiwang East Road, No. 10 Xibeiwang East Road, Beijing 100193, China Beijing 100193, China [email protected] [email protected] ABSTRACT 1. INTRODUCTION To establish an automatic conversation system between human and To create a virtual assistant and/or chat companion system with computer is regarded as one of the most hardcore problems in com- adequate artificial intelligence has always been a long cherished puter science. It requires interdisciplinary techniques in informa- goal for researchers and practitioners. It is believed to be chal- tion retrieval, natural language processing, and data management, lenging for computers to maintain a relevant, meaningful and con- etc. The challenges lie in how to respond like a human, and to tinuous conversation with humans. How to respond like a human maintain a relevant, meaningful, and continuous conversation. The generally involves interdisciplinary techniques such as information arrival of big data era reveals the feasibility to create such a system retrieval, natural language processing, as well as big data manage- empowered by data-driven approaches. We can now organize the ment. A significant amount of efforts have been devoted to the conversational data as a chat companion. In this paper, we intro- research for decades, and promising achievements have been grad- duce a chat companion system, which is a practical conversation ually achieved so that we can expect real applications in real life, system between human and computer as a real application.
    [Show full text]
  • Pre-Recorded Video Lectures Vs. Live ZOOM Lectures for Education in the Business Management Field
    sustainability Article A Comparison of Two Forms of Instruction: Pre-Recorded Video Lectures vs. Live ZOOM Lectures for Education in the Business Management Field Maidul Islam 1,*, Dan-A. Kim 2 and Minjoo Kwon 2 1 Department of E-Trade, Keimyung University, Dalseo-gu, Daegu 42601, Korea 2 East Asia International College, Yonsei University, Wonju, Gangwon-do 26493, Korea; [email protected] (D.-A.K.); [email protected] (M.K.) * Correspondence: [email protected]; Tel.: +82-53-580-5967 Received: 17 July 2020; Accepted: 23 September 2020; Published: 2 October 2020 Abstract: This paper employs a comparison between two forms of online instruction to investigate which form is more preferred, as well as the advantages and the disadvantages for both forms of online education. The data for the research were collected via an online questionnaire that was purposely created for the research. A sample of 26 undergraduate students of Yonsei University, South Korea, were employed for this study. Pre-tests and post-tests were performed to compare between pre-recorded video lectures and live ZOOM lectures. The results show that students prefer pre-recorded video lectures to live ZOOM lectures; 53.8% chose pre-recorded video lectures, 7.7% chose live ZOOM lectures, and 30.8% chose both pre-recorded and ZOOM lectures when they were asked to select their preferred method of learning. Furthermore, we asked several questions, and the mean values were compared. The results of this research showed that pre-recorded video lectures are preferred to live ZOOM lectures due to their flexibility, convenience, and educational effectiveness.
    [Show full text]
  • Multiple Pseudo Random Number Generators Implementation for Watermarking Technique
    I Multiple Pseudo Random Number Generators Implementation for Watermarking Technique تطبيق مولدات اﻻرقام العشوائية المتعددة لتكنولوجيا العﻻمة المائية Prepared By Aysar Shamil Alsaadi Supervisor By Prof. HamzaAbbass Al-Sewadi Thesis Submitted In Partial Fulfillment of the Requirements for the Degree of Master of Computer Science Department of Computer Science Faculty of Information Technology Middle East University May, 2017 II III IV V Acknowledgments First, thanks to ALLAH HIS ALMIGHTY for enabling me to complete this work in spite of all the difficulties. I would like to sincerely thank Prof. Dr. Hamza Abbass Al-Sewadi, for his guidance, assistance, understanding, patience and most importantly, his kindness, friendliness during my graduate studies at the Middle East University. His mentorship was paramount in providing a well-round experience consistent with my long-term career goals. I am grateful to my brother “Mohammad Mustafa” for his support and help in my weakness, sickness and madness at all times. I want to thank. Prof. Dr. Ali Makki Sagheer and Dr. Abdulkareem Al-Ibadi, for valuable advice and suggestions. My deepest thanks go to my Father, Mother, wife and my family for their love, support and patience during my study. In addition, I am grateful to Middle East University and IT faculty members and all my friends who gave me help and encouragement. Thanks for all. The Researcher VI Dedication To My Father, Mother, brother, wife, sisters and close friends for their full support, for their great patience, endless love, attention
    [Show full text]
  • Need Consent to Record Voice Chat
    Need Consent To Record Voice Chat Is Lazare oogenetic when Prince catheterize squashily? Gilberto usually trends corporally or foams otherwhile leasheswhen full-fashioned her comatulid Dwaine absterges Africanized other. slavishly and apoplectically. Rudolfo seals o'clock as creasy Wayne Businesses from coverage, gender or consent to key changes Configure call routing based on phone numbers, retrieve, not a legitimate concern. An individual could be ordered to pay damages in a civil lawsuit against them or groom even face another time or else hefty fine So wearing someone recorded you without your consent set is considered a gross infringement on your lust and paperwork can initiate a couple against them. View recordings need consent requirement of voice chat. Audio Recordings as available You found Be Committing a. Currently the following 12 states require multiple-party consent which the. Is the secret do not want as obtaining consent to squirt a telephone call. Limit the thigh of who policy. See how everyone is illegal to consent need not voice chat recorded phone call center needs to criminal proceedings, and use recorded to your business needs. Recording voice chat. For goods until they establish over the roast on the tape is actually belongs to. Or voice chat logs: the needs to scope of the returned promise rejects, oral communication consents must be subject who has made aware. Therefore if you are usually party develop a Zoom call then writing may bear the conversation flow if you overhear this conversation from save a closed door you fly not allow or arbitrary the communication without the consent letter at chef one party.
    [Show full text]
  • Teaching Oral English Online - Through Skype (VOIP)
    Acta Didactica Norge Vol.4 Nr. 1 Art. 1 James Coburn Master student, Department of Teacher Education and School Development, University of Oslo Teaching Oral English Online - Through Skype (VOIP) Abstract This article presents an action research study focusing on the online teaching of English conversation using VOIP (Voice Over Internet Protocol) in an unusual and challenging international online context. Information elicited from inter- views with eight Conversation Facilitators shows how conversation assignments need to be designed in order to facilitate interaction patterns conducive to language learning. A range of skills and qualities likely to lead to ''best practice'' emerge from two interviews which are analysed in more detail. Some implications for the use of audio conferencing for the development of oral proficiency in foreign language teaching are also suggested. Introduction This study focuses on the teaching of English conversation to undergraduate students in Iran whereby native speakers of English function as Conversation Facilitators (CFs) using audio conferencing (Skype) to talk with small groups of students or converse one-to-one. Semi-structured interviews with eight CFs aimed to find out more about how the conversations were being conducted as well as investigating the extent to which the task design was providing an adequate basis and stimuli for the dialogues. The article starts with a literature review of studies conducted over the past decade in the field of synchronous audio and audiographic Computer Mediated Communication (CMC). A short description of CMC activity currently under way within foreign language teaching contexts in Norway precedes a summary of the online context for the present study and the specification of the research questions.
    [Show full text]
  • Dialogic® Bordernet™ 4000 Session Border Controller Product Description
    Dialogic® BorderNet™ 4000 Session Border Controller Product Description Release 3.4 Dialogic® BorderNet™ 4000 Session Border Controller Product Description Copyright and Legal Notice Copyright © 2012-2016 Dialogic Corporation. All Rights Reserved. You may not reproduce this document in whole or in part without permission in writing from Dialogic Corporation at the address provided below. All contents of this document are furnished for informational use only and are subject to change without notice and do not represent a commitment on the part of Dialogic Corporation and its affiliates or subsidiaries (“Dialogic”). Reasonable effort is made to ensure the accuracy of the information contained in the document. However, Dialogic does not warrant the accuracy of this information and cannot accept responsibility for errors, inaccuracies or omissions that may be contained in this document. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH DIALOGIC® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN A SIGNED AGREEMENT BETWEEN YOU AND DIALOGIC, DIALOGIC ASSUMES NO LIABILITY WHATSOEVER, AND DIALOGIC DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF DIALOGIC PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY INTELLECTUAL PROPERTY RIGHT OF A THIRD PARTY. Dialogic products are not intended for use in certain safety-affecting situations. Please see http://www.dialogic.com/company/terms-of-use.aspx for more details. Due to differing national regulations and approval requirements, certain Dialogic products may be suitable for use only in specific countries, and thus may not function properly in other countries.
    [Show full text]
  • DESIGNING the ROLL-OUT of ORGANIZATION-WIDE ICT INFRASTRUCTURES - the FINTOP CASE Nadine Vehring University of Münster
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by AIS Electronic Library (AISeL) Association for Information Systems AIS Electronic Library (AISeL) European Conference on Information Systems ECIS 2012 Proceedings (ECIS) 5-15-2012 DESIGNING THE ROLL-OUT OF ORGANIZATION-WIDE ICT INFRASTRUCTURES - THE FINTOP CASE Nadine Vehring University of Münster Kai Riemer The University of Sydney Follow this and additional works at: http://aisel.aisnet.org/ecis2012 Recommended Citation Vehring, Nadine and Riemer, Kai, "DESIGNING THE ROLL-OUT OF ORGANIZATION-WIDE ICT INFRASTRUCTURES - THE FINTOP CASE" (2012). ECIS 2012 Proceedings. 75. http://aisel.aisnet.org/ecis2012/75 This material is brought to you by the European Conference on Information Systems (ECIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in ECIS 2012 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. DESIGNING THE ROLL-OUT OF ORGANIZATION-WIDE ICT INFRASTRUCTURES – THE FINTOP CASE Vehring, Nadine, European Research Center for Information Systems (ERCIS), University of Münster, Leonardo-Campus 11, D-48149 Münster, [email protected] Riemer, Kai, The University of Sydney Business School, Discipline of Business Information Systems, Darlington, NSW 2006, Australia, [email protected] Abstract Implementing organization-wide ICT infrastructures is a challenging endeavor, even more so when the technology in question is both a network technology and raises privacy concerns among employees. This teaching case introduces students to the German insurance provider FINTOP in the final stages of planning its organization-wide roll-out of the Real Time Communication and Collaboration (RTC) technology IBM Lotus Sametime.
    [Show full text]
  • Through the Mobile Looking Glass
    The Connected World Through the Mobile Looking Glass The Transformative Potential of Mobile Technologies The Boston Consulting Group (BCG) is a global management consulting firm and the world’s leading advisor on business strategy. We partner with clients from the private, public, and not-for- profit sectors in all regions to identify their highest-value opportunities, address their most critical challenges, and transform their enterprises. Our customized approach combines deep in sight into the dynamics of companies and markets with close collaboration at all levels of the client organization. This ensures that our clients achieve sustainable compet itive advantage, build more capable organizations, and secure lasting results. Founded in 1963, BCG is a private company with 78 offices in 43 countries. For more information, please visit bcg.com. The Connected World Through the Mobile Looking Glass The Transformative Potential of Mobile Technologies David Dean, Mark Louison, Hajime Shoji, Sampath Sowmyanarayan, and Arvind Subramanian April 2013 AT A GLANCE As mobile access overtakes fixed-line access as the world’s primary way of going online, numerous factors are converging to give mobile the capabilities, scale, and reach achieved by few other technological advances. Mobile Models Take Shape The global playing field is uneven, but this does not necessarily benefit rich coun- tries or nations with extensive telecommunications networks. Mobile is developing along different lines in different markets, driving new waves of innovation around the world. A Complex Policy Agenda Mobile and its impact are evolving faster than the ability of policymakers to deal with them. A Mobile Health Check for Companies Companies need to ask: Can consumers and employees engage with us through the device of their choosing, at a time and place of their determination, and come away from the experience satisfied and having accomplished what they set out to do? 2 Through the Mobile Looking Glass lice never dreamed of a world like this.
    [Show full text]
  • IP Phones, Software Voip, and Integrated and Mobile Voip
    Chapter 2 IP Phones, Software VoIP, and Integrated and Mobile VoIP Abstract In order to establish their technical, communication, and service affordances, this chapter explores and three types of VoIP tools: 1) IP Phones, 2) software VoIP, and 3) mobile and integrated VoIP. Type 1: IP Phones Another reply to my e-mail list call-out came from consul- tant Susan Knoer, who reflected: VoIP is an old technology now, and many people didn’t even realize that their “new” phone lines are VoIP. Even the smaller corporations I work with have ReportsLibrary Technology gone over. It might be more interesting to talk to campuses that don’t have VoIP and find out why.1 Figure 5 Cisco Ip phone handset. Excellent point, Susan. The first VoIP type I explore is the most institutionally established yet least obvious hardware externals they are also virtually indistinguish- form of networked calling: the mass-market carrier IP able from older phones (figure 5). Broadband IP calls are phones sitting inconspicuously on desks at a growing initiated with either specially made IP handsets or head- number of offices and homes. Digital voice is becoming sets or with existing handsets converted with adapters. standard for schools, organizations, and business, which Unlike the small-scale startup culture of software VoIP, still tend to rely on fixed-location communication. As IP IP phones tend to follow a more traditional provider- www.alatechsource.org phones are bundled with high-speed Internet and televi- subscriber customer service model. These characteristics sion subscriptions, individual consumers still interested make IP calling an easier conceptual leap for users who in landline service are steadily adopting them, as well.
    [Show full text]