Protecting devices connected to the UC system
Devices connected to the UC system, such as SIP user terminals (VoIP phones and FXS Media Gateways) and SIP trunk media gateways, must also be
Devices connected to the UC system, such as SIP user terminals (VoIP phones and FXS Media Gateways) and SIP trunk media gateways, must also be
I am about to tell you a story about something that happened to me a few days ago. Steve Osler and I had a few
Any UC solution must use state-of-the-art cryptographic tools to make sure that information exchanged remains secret. For TCP connections, the de facto standard is Transport
There is a common uneasiness among “classic” system integrators: “We are unable to grow” Regardless of the daily effort, abilities and experience, year after year
A contribution to the health sector and the Wildix solution become a fundamental part in a nursing home Establishing a quality nursing home on all