Implementing Secure Intranets and Extranets: Reference List, Acronyms and Glossary, Index, K.M. Phaltankar (Ed.); 401 pages, ISBN 0-89006-447-4, US$ 65
✍ Scribed by Wang Zhengying; Lu Wei
- Book ID
- 104273692
- Publisher
- Elsevier Science
- Year
- 2001
- Tongue
- English
- Weight
- 39 KB
- Volume
- 24
- Category
- Article
- ISSN
- 0140-3664
No coin nor oath required. For personal study only.
✦ Synopsis
Microsoft and Mitel, are also reviewed in this chapter. Chapter 6 begins with a general view of the CTI application and a more detailed look at the generic functions. This chapter categorizes the applications into a general set and examines some of the applications.
Also presented in chapter are a number of case studies that span a whole decade of CTI implementation in call centers around the world. The market of CTI, including market drivers, market inhibitors, market quanti®cation and the bene®ts of CTI, are analysed in Chapter 7. The performance constraint (e.g. delay and throughput), management issues (link management and database management), regulatory environment in North America and Europe, and standard activities in ANSI, EMCA and ITU are overviewed in Chapter 8. The history of CTI, especially the major milestones that have driven the CTI industry on since the late 1960s, can be found in Chapter 9. The book concludes by peering into the future in Chapter 10.
Although, as stated in the preface, ªthe people who really need to know about computer and telephony integration are not computer or telecommunication expertsº, I, as a telecommunication expert, found the book very enjoyable. The author knows how to explain the abstract and tedious concepts by using daily-life examples, comic-like dialogues and even a song in the tune of ªOn Top of Old Smokeyº. Hope you enjoy it.