O documento fornece uma atualização sobre o cliente Jabber, incluindo novas versões para Windows, Mac e dispositivos móveis. As principais atualizações incluem melhorias no bate-papo em grupo no Jabber 9.6 para Windows, suporte nativo para acessórios de áudio e vídeo e recursos de acessibilidade aprimorados. O Jabber 9.7 para Windows introduz bate-papos persistentes e contatos personalizados.
O documento apresenta os produtos e serviços da empresa Aastra, incluindo:
1) Sistemas de telefonia IP como o MX-ONE e Aastra 400 que oferecem soluções completas para pequenas e médias empresas;
2) Serviços de mobilidade como extensões móveis e clientes para smartphones;
3) Soluções de contact center como o Solidus eCare para atendimento multimídia em múltiplos canais.
Desenvolvendo apps e gerando renda ainda na UniversisidadeAwdren Fontão
1) O documento discute oportunidades para desenvolvedores universitários gerarem renda com aplicativos para dispositivos móveis usando a plataforma Java ME da Nokia.
2) É apresentado o modelo de negócios "freemium" e formas de monetização como compras dentro do aplicativo e propagandas, além dos benefícios para desenvolvedores universitários da Nokia.
3) O documento convida os desenvolvedores universitários a se juntarem à Nokia para criação de produtos, aplicativos e serviços.
Lee Clark is an experienced sales professional with over 15 years in the IT industry. He has a proven track record of exceeding sales targets at companies such as Veritas and Symantec. Some of his accomplishments include being named Channel Manager of the Year for EMEA and growing the Nordics territory from $4M to $12M in sales. Currently, he is seeking a new sales role where he can continue leveraging his strong relationship building, account management, and business development skills.
El documento describe las especificaciones y capacidades del terminal satelital JabaSat Explorer 710. Ofrece hasta 650 kbps de ancho de banda para transmisión en vivo de video. Es pequeño, portátil y robusto, ideal para periodistas en el campo. Incluye WiFi, Ethernet, USB y más interfaces para múltiples usuarios de forma simultánea.
Crave InfoTech is an Independent Software Solutions Vendor that has been providing SAP solutions and services since 2007. It has developed an Integrated Hospital Management Solution (IHMS) mobile app that automates and integrates key hospital processes from patient registration to billing. IHMS supports over 30 specialized services and includes features such as electronic medical records, diet management, ambulance tracking, and revenue cycle management to improve patient care and optimize costs and processes. Crave has offices in the US, India, and globally to serve clients across various sectors.
O documento apresenta os produtos e serviços da empresa Aastra, incluindo:
1) Sistemas de telefonia IP como o MX-ONE e Aastra 400 que oferecem soluções completas para pequenas e médias empresas;
2) Serviços de mobilidade como extensões móveis e clientes para smartphones;
3) Soluções de contact center como o Solidus eCare para atendimento multimídia em múltiplos canais.
Desenvolvendo apps e gerando renda ainda na UniversisidadeAwdren Fontão
1) O documento discute oportunidades para desenvolvedores universitários gerarem renda com aplicativos para dispositivos móveis usando a plataforma Java ME da Nokia.
2) É apresentado o modelo de negócios "freemium" e formas de monetização como compras dentro do aplicativo e propagandas, além dos benefícios para desenvolvedores universitários da Nokia.
3) O documento convida os desenvolvedores universitários a se juntarem à Nokia para criação de produtos, aplicativos e serviços.
Lee Clark is an experienced sales professional with over 15 years in the IT industry. He has a proven track record of exceeding sales targets at companies such as Veritas and Symantec. Some of his accomplishments include being named Channel Manager of the Year for EMEA and growing the Nordics territory from $4M to $12M in sales. Currently, he is seeking a new sales role where he can continue leveraging his strong relationship building, account management, and business development skills.
El documento describe las especificaciones y capacidades del terminal satelital JabaSat Explorer 710. Ofrece hasta 650 kbps de ancho de banda para transmisión en vivo de video. Es pequeño, portátil y robusto, ideal para periodistas en el campo. Incluye WiFi, Ethernet, USB y más interfaces para múltiples usuarios de forma simultánea.
Crave InfoTech is an Independent Software Solutions Vendor that has been providing SAP solutions and services since 2007. It has developed an Integrated Hospital Management Solution (IHMS) mobile app that automates and integrates key hospital processes from patient registration to billing. IHMS supports over 30 specialized services and includes features such as electronic medical records, diet management, ambulance tracking, and revenue cycle management to improve patient care and optimize costs and processes. Crave has offices in the US, India, and globally to serve clients across various sectors.
O documento descreve as sardinhadas realizadas entre 2009 e 2015 pelo autor Jorge Martins e sua organização Cerberus. São listados os anos de 2009, 2010, 2012, 2013, 2014 e 2015, sugerindo que eventos anuais de sardinhada foram realizados nesses anos.
The document outlines a study plan and timeline for passing the CIH exam while maintaining a busy schedule. It recommends taking a prep class in September and dedicating 1-2 hours daily to studying from September through February, increasing to 1-2 hours on weekdays and 4+ hours on weekends in March. The plan suggests clearing the mind from work and using micro study periods, theme weeks, and macro study periods to maximize learning. It also provides tips for the day before and the exam day itself.
Presentation from one of the remarkable IT Security events in the Baltic States organized by “Data Security Solutions” (www.dss.lv ) Event took place in Riga, on 7th of November, 2013 and was visited by more than 400 participants at event place and more than 300 via online live streaming.
The document describes methods to separate and sequence isomeric oligonucleotide adducts using ion-pair reversed-phase liquid chromatography electrospray ionization tandem mass spectrometry (IP-RP-LC-ESI-MS/MS). A model 17-mer oligonucleotide adducted with N-acetoxy-2-acetylaminoflourene was used. Various ion pairing reagents and mobile phase conditions were evaluated to optimize the separation and structural identification of the adducted oligonucleotide isomers by MS/MS. The methodology aims to develop an analytical platform for characterizing DNA adducts to enable cancer risk assessment.
This document summarizes a presentation given at the IAU Sao Paulo Conference in 2004 on the diversity of higher education in Europe. It discusses the limits of available information in accurately mapping the diversity between and within higher education systems. While there are formal differences between countries in terms of institution types, degree levels, and program lengths, there are also informal differences in reputation, quality, and curricular profiles that are more difficult to capture. The Bologna Process aims to increase transparency and mobility through more convergent structures, but preserving diversity may conflict with these goals. Ultimately, an authoritative map is unlikely due to disagreement on evaluation criteria and institutions' interest in some ambiguity.
This document provides an overview of the Linux development environment and its components. It discusses how Linux benefits programmers through open source collaboration and access to code. Embedded systems are highlighted as a major application area for Linux due to its customizability and low memory usage. The key components of a Linux development platform are outlined, including editors, compilers, linkers, debuggers, version control systems, and documentation tools.
1) The document summarizes key concepts from Lecture 13 of an electronics course, including the cascode amplifier configuration, frequency response, Miller's theorem, and the small-signal model of a CE amplifier stage.
2) Miller's theorem allows a floating capacitance in an amplifier to be modeled as two grounded capacitances, with the input capacitance increased by the square of the voltage gain. This models the effect of feedback in increasing the input impedance seen by a capacitance.
3) Applying Miller's theorem and developing the small-signal model, the CE amplifier stage has poles at the input and output related to various resistances and capacitances, with the output pole frequency higher than the input
This document summarizes debit and credit card fraud, including its history, how it works, and how to protect yourself. It notes that fraud has been an issue since criminals realized it was easier than robbery. Fraudsters gain card information using skimmers, readers, hacking, and spam. They create fake cards and make online or in-person purchases. Debit fraud requires obtaining the PIN, often using hidden cameras. The methods and tools used can be easily purchased online. While banks invest in prevention, fraud remains profitable with low punishment. The document stresses being careful with card use and accounts to avoid becoming a victim.
KDE and GNOME are the two major Linux desktop environments. KDE was developed in 1996 and provides integrated applications, tools for file/window management, and drag-and-drop functionality. GNOME is the default environment for many Linux distributions like Fedora and Ubuntu. It includes components like the Metacity window manager, Nautilus file manager, and panels for launching applications. Common open source office applications include OpenOffice.org/LibreOffice with Writer, Calc, Impress, Draw and Math as well as alternative suites like KOffice.
This document provides an overview of organized cybercrime, discussing the various players and weapons involved. The players section outlines groups like former Soviet military, Russian mafia, professional hackers, spammers, and basic cybercrime organizations. The Russian mafia is particularly notable, operating divisions for cybercrime and compelling hackers to work for them. Professional hackers are often highly paid to develop exploits and malware. Spammers earn millions annually selling direct mail services. The weapons section briefly mentions botnets, phishing, and common internet attack tools used by organized cybercriminal groups.
IT Security and Wire Fraud Awareness Slide DeckDon Gulling
A presentation on IT security, wire fraud and trends in information technology. The information is focused on making the audience aware of the new threats, how to protect against them, and what measures you can take to keep your critical information secure.
This slides shares some tips on how to identify credit card fraud - brought to you by FraudLabs Pro.com
Read the full article at https://www.fraudlabspro.com/resources/tutorials/how-to-identify-credit-card-fraud/#slideshare
This document discusses cybercrime and provides definitions and examples. It defines cybercrime as unlawful acts where a computer is used as a tool or target. It describes different types of cyber attackers like black hats and grey hats. Common types of cybercrimes discussed include malware, phishing, hacking tools, and spam. Examples are given of hacked websites. The document also outlines cybercrime laws and penalties in India and provides tips on how to help prevent cybercrimes.
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...Aditya K Sood
The document summarizes research analyzing the BlackHole browser exploit pack (BEP), one of the most widely used BEPs. The researchers collected samples of the BlackHole BEP over 3 months and analyzed its source code to understand exploitation techniques. Their analysis found the BlackHole BEP uses an AJAX-based framework to track infected machines and supports custom widgets. It also exploits browser vulnerabilities through techniques like heap spraying and uses obfuscation to avoid detection.
Implementando, Administrando e Gerenciando o Microsoft Office Communications ...brunoestrozi
1. O documento discute a implementação, administração e gerenciamento do Microsoft Office Communications Server 2007 R2, incluindo sua nova arquitetura, requisitos e integração com telefonia.
2. Apresenta os principais componentes, pré-requisitos, topologias e ferramentas para planejamento de implementação do servidor.
3. Discutem migração de versões anteriores, virtualização, acesso externo, segurança, suporte a NAT e recursos de voz como conferência.
Visão Geral do windows Server 2008 R2 e Windows 7 SP1Fabio Hara
O documento apresenta as principais novidades do Windows Server 2008 R2 SP1 e Windows 7 SP1, incluindo: (1) Memória Dinâmica, que permite a alocação flexível de memória para máquinas virtuais; (2) RemoteFX, que fornece gráficos avançados e suporte a conteúdo 3D para usuários remotos; (3) outras melhorias como escalabilidade, alta disponibilidade e segurança. O documento também inclui demonstrações das funcionalidades de Memória Dinâmica e RemoteFX.
O documento descreve as sardinhadas realizadas entre 2009 e 2015 pelo autor Jorge Martins e sua organização Cerberus. São listados os anos de 2009, 2010, 2012, 2013, 2014 e 2015, sugerindo que eventos anuais de sardinhada foram realizados nesses anos.
The document outlines a study plan and timeline for passing the CIH exam while maintaining a busy schedule. It recommends taking a prep class in September and dedicating 1-2 hours daily to studying from September through February, increasing to 1-2 hours on weekdays and 4+ hours on weekends in March. The plan suggests clearing the mind from work and using micro study periods, theme weeks, and macro study periods to maximize learning. It also provides tips for the day before and the exam day itself.
Presentation from one of the remarkable IT Security events in the Baltic States organized by “Data Security Solutions” (www.dss.lv ) Event took place in Riga, on 7th of November, 2013 and was visited by more than 400 participants at event place and more than 300 via online live streaming.
The document describes methods to separate and sequence isomeric oligonucleotide adducts using ion-pair reversed-phase liquid chromatography electrospray ionization tandem mass spectrometry (IP-RP-LC-ESI-MS/MS). A model 17-mer oligonucleotide adducted with N-acetoxy-2-acetylaminoflourene was used. Various ion pairing reagents and mobile phase conditions were evaluated to optimize the separation and structural identification of the adducted oligonucleotide isomers by MS/MS. The methodology aims to develop an analytical platform for characterizing DNA adducts to enable cancer risk assessment.
This document summarizes a presentation given at the IAU Sao Paulo Conference in 2004 on the diversity of higher education in Europe. It discusses the limits of available information in accurately mapping the diversity between and within higher education systems. While there are formal differences between countries in terms of institution types, degree levels, and program lengths, there are also informal differences in reputation, quality, and curricular profiles that are more difficult to capture. The Bologna Process aims to increase transparency and mobility through more convergent structures, but preserving diversity may conflict with these goals. Ultimately, an authoritative map is unlikely due to disagreement on evaluation criteria and institutions' interest in some ambiguity.
This document provides an overview of the Linux development environment and its components. It discusses how Linux benefits programmers through open source collaboration and access to code. Embedded systems are highlighted as a major application area for Linux due to its customizability and low memory usage. The key components of a Linux development platform are outlined, including editors, compilers, linkers, debuggers, version control systems, and documentation tools.
1) The document summarizes key concepts from Lecture 13 of an electronics course, including the cascode amplifier configuration, frequency response, Miller's theorem, and the small-signal model of a CE amplifier stage.
2) Miller's theorem allows a floating capacitance in an amplifier to be modeled as two grounded capacitances, with the input capacitance increased by the square of the voltage gain. This models the effect of feedback in increasing the input impedance seen by a capacitance.
3) Applying Miller's theorem and developing the small-signal model, the CE amplifier stage has poles at the input and output related to various resistances and capacitances, with the output pole frequency higher than the input
This document summarizes debit and credit card fraud, including its history, how it works, and how to protect yourself. It notes that fraud has been an issue since criminals realized it was easier than robbery. Fraudsters gain card information using skimmers, readers, hacking, and spam. They create fake cards and make online or in-person purchases. Debit fraud requires obtaining the PIN, often using hidden cameras. The methods and tools used can be easily purchased online. While banks invest in prevention, fraud remains profitable with low punishment. The document stresses being careful with card use and accounts to avoid becoming a victim.
KDE and GNOME are the two major Linux desktop environments. KDE was developed in 1996 and provides integrated applications, tools for file/window management, and drag-and-drop functionality. GNOME is the default environment for many Linux distributions like Fedora and Ubuntu. It includes components like the Metacity window manager, Nautilus file manager, and panels for launching applications. Common open source office applications include OpenOffice.org/LibreOffice with Writer, Calc, Impress, Draw and Math as well as alternative suites like KOffice.
This document provides an overview of organized cybercrime, discussing the various players and weapons involved. The players section outlines groups like former Soviet military, Russian mafia, professional hackers, spammers, and basic cybercrime organizations. The Russian mafia is particularly notable, operating divisions for cybercrime and compelling hackers to work for them. Professional hackers are often highly paid to develop exploits and malware. Spammers earn millions annually selling direct mail services. The weapons section briefly mentions botnets, phishing, and common internet attack tools used by organized cybercriminal groups.
IT Security and Wire Fraud Awareness Slide DeckDon Gulling
A presentation on IT security, wire fraud and trends in information technology. The information is focused on making the audience aware of the new threats, how to protect against them, and what measures you can take to keep your critical information secure.
This slides shares some tips on how to identify credit card fraud - brought to you by FraudLabs Pro.com
Read the full article at https://www.fraudlabspro.com/resources/tutorials/how-to-identify-credit-card-fraud/#slideshare
This document discusses cybercrime and provides definitions and examples. It defines cybercrime as unlawful acts where a computer is used as a tool or target. It describes different types of cyber attackers like black hats and grey hats. Common types of cybercrimes discussed include malware, phishing, hacking tools, and spam. Examples are given of hacked websites. The document also outlines cybercrime laws and penalties in India and provides tips on how to help prevent cybercrimes.
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...Aditya K Sood
The document summarizes research analyzing the BlackHole browser exploit pack (BEP), one of the most widely used BEPs. The researchers collected samples of the BlackHole BEP over 3 months and analyzed its source code to understand exploitation techniques. Their analysis found the BlackHole BEP uses an AJAX-based framework to track infected machines and supports custom widgets. It also exploits browser vulnerabilities through techniques like heap spraying and uses obfuscation to avoid detection.
Implementando, Administrando e Gerenciando o Microsoft Office Communications ...brunoestrozi
1. O documento discute a implementação, administração e gerenciamento do Microsoft Office Communications Server 2007 R2, incluindo sua nova arquitetura, requisitos e integração com telefonia.
2. Apresenta os principais componentes, pré-requisitos, topologias e ferramentas para planejamento de implementação do servidor.
3. Discutem migração de versões anteriores, virtualização, acesso externo, segurança, suporte a NAT e recursos de voz como conferência.
Visão Geral do windows Server 2008 R2 e Windows 7 SP1Fabio Hara
O documento apresenta as principais novidades do Windows Server 2008 R2 SP1 e Windows 7 SP1, incluindo: (1) Memória Dinâmica, que permite a alocação flexível de memória para máquinas virtuais; (2) RemoteFX, que fornece gráficos avançados e suporte a conteúdo 3D para usuários remotos; (3) outras melhorias como escalabilidade, alta disponibilidade e segurança. O documento também inclui demonstrações das funcionalidades de Memória Dinâmica e RemoteFX.
Palestra Teched Brasil 2010 - Sessão SRV301 - Visão Geral do WS2008 R2 e W7 SP1GBanin
Este documento fornece uma visão geral do Windows Server 2008 R2 e Windows 7 Service Pack 1, incluindo novas funcionalidades como RemoteFX e memória dinâmica. A apresentação também discute melhorias de desempenho, segurança e disponibilidade trazidas pelo SP1.
O documento apresenta o .NET Framework da Microsoft, definindo-o como uma máquina virtual que fornece recursos para desenvolvimento e execução de aplicações de forma integrada e segura. Apresenta também o Visual Studio como ambiente de desenvolvimento simplificado e o .NET Framework SDK como conjunto de ferramentas.
O documento apresenta uma sessão técnica sobre a nova arquitetura do Microsoft Communications Server 2014. A sessão cobrirá as principais atualizações na arquitetura, incluindo topologias simplificadas, melhorias no gerenciamento com ferramentas como o Communications Server Control Panel e PowerShell, suporte para virtualização, balanceamento de carga DNS e melhorias na autenticação.
O documento descreve as principais características e edições do Windows Server 2008 R2. Apresenta as diferenças entre as edições Standard, Enterprise, Datacenter e Web Server, assim como os novos recursos de virtualização e gerenciamento introduzidos nesta versão.
O documento apresenta as principais novidades do IBM Notes/Domino e Sametime 2013, incluindo:
1) O IBM Notes 9.0 Social Edition com novas funcionalidades para produtividade, integração social e experiência do usuário;
2) Atualizações para o IBM Notes Traveler em diversas plataformas móveis;
3) A nova estratégia do Sametime focada em comunicações sociais e unificadas.
O documento descreve as diferentes edições do Windows 7, incluindo Starter, Home Basic, Home Premium, Professional, Enterprise e Ultimate. Cada edição possui recursos e limitações específicas destinadas a diferentes tipos de usuários e usos, como doméstico ou corporativo.
Be Aware Webinar Symantec - O que há de novo? Data Loss Prevention 14.5Symantec Brasil
1. O documento fornece instruções sobre como participar de uma apresentação online sobre Data Loss Prevention 14.5.
2. Os participantes podem colocar perguntas, baixar arquivos, avaliar a apresentação e rever a gravação posteriormente.
3. A apresentação irá cobrir novas funcionalidades do DLP 14.5 como form matching, suporte aprimorado para cloud storage e melhorias na interface do usuário.
O documento apresenta Nuno Luz, consultor Windows Mobile e fundador da comunidade online PocketPT.net. Descreve as vantagens da plataforma Windows Mobile para produtividade e comunicações móveis e como o Exchange Server 2007 pode ser usado para gerir dispositivos móveis de forma segura e eficiente.
O documento apresenta alternativas open source para ferramentas de webconferência, incluindo DimDim, Big Blue Button e OpenMeetings. O documento também descreve uma apresentação sobre o assunto realizada no evento LinuxCon, com sorteios de prêmios para os participantes.
O documento resume as principais características do software de Business Intelligence gratuito SpagoBI. O SpagoBI possui interface gráfica flexível, suporte a múltiplos bancos de dados e idiomas, e módulos como reporting, OLAP e dashboards. Ele também oferece customização, escalabilidade e suporte técnico gratuito, porém tem limitações como pouca documentação em português e demora na criação de cubos.
O documento discute softwares que implementam PABX IP e softfones. Apresenta o Asterisk como um framework de código aberto popular para PABX IP e destaca suas vantagens como flexibilidade e custo zero. Também descreve softfones como X-Lite e Ekiga, comparando seus recursos e plataformas de suporte.
AGORA Telecom - Soluções de Telefonia IP e Comunicação UnificadaAGORA Telecom
O documento fornece um resumo das soluções de comunicação unificada e colaboração da Agora Telecom, incluindo aplicativos de telefonia IP, videoconferência, mobilidade e soluções de contact center. A empresa oferece essas soluções para diferentes setores e cenários, com foco em integração e flexibilidade topológica.
ALM Open Source Ponta a Ponta - Minicurso Globalcode MC-122Bruno Souza
Slides do Minicurso ministrado pela ToolsCloud na Globalcode. Para se inscrever nas proximas turmas, acesse:
http://www.globalcode.com.br/gratuitos/minicursos/minicurso-introducao-a-alm-open-source
Para experimentar as ferramentas apresentadas no minicurso, você pode utilizar o ambiente de demonstração da ToolsCloud:
https://demo.toolscloud.net
User: toolscloud
Password: toolscloud
ToolsCloud -- As ferramentas que os desenvolvedores adoram, na nuvem!
Solução complete de ALM, open source e sem stress. Começe a usar no seu projeto hoje!
http://www.toolscloud.com
O documento fornece uma introdução abrangente ao software de monitoramento de rede Zabbix, discutindo suas funcionalidades, como funciona, como estendê-lo e a comunidade ao seu redor. É descrito como o Zabbix pode monitorar infraestrutura, serviços e aplicações de forma flexível e escalonável.
DevDays2009 - Construir Soluções de Internet VideoJoao Canais
O documento discute as soluções da Microsoft para a criação e distribuição de conteúdo multimédia na Internet através do Silverlight, incluindo ferramentas como o Expression Encoder e o IIS Media Pack. Apresenta também recursos como o Smooth Streaming para transmitir vídeos de forma fluida adaptando-se à largura de banda disponível.
Este documento fornece instruções para instalar um cluster IBM Domino 9 com três nós em Linux. Ele descreve os requisitos, arquitetura, e 17 passos para instalar e configurar o software nos servidores, incluindo a criação do cluster e configuração do servidor de viagem.
Semelhante a Cisco Jabber updates (Comstor dPVT 2014) (20)
4. O que é Jabber
• Uma solução que:
• Provê comunicação!
– Por Texto, Audio, Vídeo, etc;
• Multiplataforma
– Smartphones (iOS,Android)
– PC
– Mac
• Entregue de várias formas
4
5. Funcionalidades de Comunicação
• Serviços que incluem:
Presença;
Mensagens Instantaneas;
Conversas em grupo;
Clique para chamar (Click to call);
Softphone;
Histórico de chamadas;
Correio de voz integrado;
Compartilhamento de tela
5
7. Multiplataforma
• Disponível em diferentes plataformas*
*Os serviços disponíveis por plataforma podem variar
iOS 6.1 e 7 2.3.3+ 4.6+
X lion 10.7+ XP+
7
8. Modelos de Deployments
Pode ser:
1. Local
• Em um CUCM virtualizado
2. Nuvem
• Serviço contratado,
integrado ao WebEx Messenger
8
9. IM only (incluso na oferta “Jabber for everyone)
Phone mode
Full UC
Modos de operação do Jabber
9
28. Keyboard Shortcuts
Chamadas Ativas
• Tab through call controls
• Space bar to open
secondary control items
• Arrow keys to adjust
settings
• Esc to exit secondary
control items
Lista de Contatos
• Tab to contact list
• Up/Down arrows to
navigate contacts
• Left arrow to collapse a
Group
• Right arrow to expand a
group
Janela de Menu
• F10 to focus on file
menu
• Arrow keys to navigate
file
menu
29
29. Janela de Chat Minimizada para
Screenshot
Segurar SHIFT ao pressionar o botão de screenshot aciona esta função
30
30. Desabilitar opção “Salvar histórico da
conversa”
Agora o Administrador pode desabilitar essa opção!
Por padrão esta função é Habilitada
31
31. Portal de “Self Care”
• CUCM Self Care address is obtained
from TFTP file during service discovery
• Self Care portal hostname can be
specified in CUCM Enterprise
Parameters
• Opens in default system browser ☺
• Self care portal allows Jabber users
To:
Set Call forward
SNR
Extend & Connect
etc….
32
34. Jabber 9.7 para Windows
• Release Date : Mid December 2013
• Persistent Chat
• Custom Contacts
• Supported OS’s
Windows 7
Windows 8
35
35. Jabber Persistent Chat
• Jabber for Windows 9.7
• Discover and join chat rooms
• Group chats with breakouts to personal chats & calls
• Manage room notifciations, filters and priority
messagingProvides for
• Topic or project based workspace
• Efficent, interactive team collaboration
• Full integration to existing Jabber features
• Jabber 10
Base offering extended to Mac & mobile
Windows Admin, Attachments & Search
On Premise only at this time, with CUCM IM/P 10.0
36
36. Contatos Customizados
Enables Jabber users to add non-directory contacts
to the Jabber Contact list
Enables Jabber users to add non-directory information to
corporate directory contacts
Enables Jabber users to add non-directory information to
federated contacts
Only supported in on-premise deployments
Messenger support will be added in a future release
Targeting Messenger 7.8 and aligned Jabber release in
CY14 for cloud support
No currently committed release plans for phone only mode
support
Requires CUCM changes that are currently not committed
37
38. Jabber 9.2 para Mac
Feature Highlights
Jabber portfolio architecture alignment
Escalation to 720p HD video conferencing
Standards-based (H.264)
Secure Voice and Video: SRTP encryption
Meetings Integration
Supports the use of any plugin headset
Also supports the use of any Bluetooth headset that uses a dongle
Customer Benefits
Enhance productivity for Mac users
More consistent Collaboration experience across devices
Já Disponível!
39
39. Jabber 9.2 – Video 720p
Cisco Jabber Video Engine is a
H.264 AVC standard based
media engine using in Cisco
Jabber clients.
The Engine provides full HD
interoperability between Jabber
desktop clients and TelePresence
solutions.
Provides Video rate adaption
and support for Cisco ClearPath
Media Resilience Mechanisms.
40
40. Jabber 9.2 – Considerações da Nova
arquitetura
Jabber for Mac 9.2 has been
reengineered to align to portfolio
architecture
Feature Regression (from Jabber
for MAC 8.6 but not available in
9.2)
Select CTI Line to Control
Transfer
Group chat history
Custom Contact (Pizza Guy)
Multiple search bases
Support for Directory configuration
from Profile
41