As a cellular standard evolves, there are many variables that must be optimized. A few of these variables are directly related to higher throughput, increased user capacity, and in general improved system performance. The optimization techniques have involved higherorder modulation, improved multiple access (in both time and frequency), more...
To have a successful career as a Cisco Certified Network Associate (CCNA), it is imperative that you understand the terminology used by individuals in the field of networking. To communicate effectively with peers and staff, you need to have a firm grasp on concepts and jargon you will be exposed to as a CCNA. Understanding basic terms and...
The practice of IP address management (IPAM) entails the application of network management disciplines to Internet Protocol (IP) address space and associated network services, namely Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS). The linkages among an IP address plan and configurations of DHCP and DNS servers are...
One of the consequences of the information revolution is the ever-growing amount of
information we are surrounded with and the need to process this information
efficiently and extract meaningful knowledge. This phenomenon was termed “digital
obesity” or “information obesity” by Toshiba Ltd. One...
This book, Cisco Unity Connection, by Dave Schulz, hits the bull’s-eye of its intended
topic: Cisco Unity Connection. This book zeroes in on the target with clarity and depth.
Anyone that uses or considers using the Cisco Unity Connection product needs a copy
of this book to read when planning a deployment, administering the...
Welcome to Twitter, the Social Networking site that was called “utterly
devoid of any sort of merit” by New Zealand Herald’s Canvas Magazine,
(June 6, 2009) in the same week it appeared on the cover of TIME
Magazine as “a powerful form of communication” and “the future of
American innovation.”...
On March 10, 1876, Alexander Graham Bell made the first successful telephone call. As
with many things, the test was purely accidental. Graham spilled acid on his leg, and
Watson, his assistant, heard his call for help through the telephone. So, what has changed
over the last 129 years? It would be easier to discuss what hasn’t...
Iwhat has happened in that time. We have seen the transformation of the Web from
a small experiment to a World Wide phenomenon. We have seen the emergence
of voice over IP and peer-to-peer content sharing. We have seen technology speed up
a hundred-fold, the emergence of broadband to the home, and the rise of botnets and
other horrid...
Peer-to-peer (P2P) has proven as a most successful way to produce large
scale, reliable, and cost-effective applications, as illustrated for file sharing or
VoIP. P2P storage is an emerging field of application which allows peers to
collectively leverage their resources towards ensuring the reliability and
availability of user...
Audio can affect the human brain in the most powerful and profound ways. Using Apple’s Core Audio, you can leverage all that power in your own Mac and iOS software, implementing features ranging from audio capture to real-time effects, MP3 playback to virtual instruments, web radio to VoIP support. The most sophisticated audio...
Everybody’s talking about cloud services today. It’s one of the hot new buzzwords, but
most of the conversation is about how to develop custom applications in the cloud.
While that is a really important topic, it ignores another very useful attribute of a distributed
cloud: as a great place to build and...
Many books have been written about IMS, so why do we think another is needed? Most of
the existing books are written from the perspective of those who implement the technology,
either network vendors or operators. There is no such focus for developers. The standards
that form the basis of IMS are complex – as they are...