𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Implementing Secure Intranets and Extranets: Reference List, Acronyms and Glossary, Index, K.M. Phaltankar (Ed.); 401 pages, ISBN 0-89006-447-4, US$ 65

✍ Scribed by Wang Zhengying; Lu Wei


Book ID
104273692
Publisher
Elsevier Science
Year
2001
Tongue
English
Weight
39 KB
Volume
24
Category
Article
ISSN
0140-3664

No coin nor oath required. For personal study only.

✦ Synopsis


Microsoft and Mitel, are also reviewed in this chapter. Chapter 6 begins with a general view of the CTI application and a more detailed look at the generic functions. This chapter categorizes the applications into a general set and examines some of the applications.

Also presented in chapter are a number of case studies that span a whole decade of CTI implementation in call centers around the world. The market of CTI, including market drivers, market inhibitors, market quanti®cation and the bene®ts of CTI, are analysed in Chapter 7. The performance constraint (e.g. delay and throughput), management issues (link management and database management), regulatory environment in North America and Europe, and standard activities in ANSI, EMCA and ITU are overviewed in Chapter 8. The history of CTI, especially the major milestones that have driven the CTI industry on since the late 1960s, can be found in Chapter 9. The book concludes by peering into the future in Chapter 10.

Although, as stated in the preface, ªthe people who really need to know about computer and telephony integration are not computer or telecommunication expertsº, I, as a telecommunication expert, found the book very enjoyable. The author knows how to explain the abstract and tedious concepts by using daily-life examples, comic-like dialogues and even a song in the tune of ªOn Top of Old Smokeyº. Hope you enjoy it.