About us | Advertising | SecurityWatch
Home   Articles   Blog   Reviews   Press Releases   Security Tools   Sponsored Solutions
Press Releases
Eicon Networks Launches The Diva Server V-Series Family
Thursday, 18 March 2004 16:35 EST

New adapters enable powerful solutions for voice, speech and conferencing.

MONTREAL, March 18, 2004 — Eicon Networks Corporation (“Eicon”), a global leader in providing reliable communication products for networked business applications, today announced the launch of the Diva Server V-Series family of adapters for voice, speech and conferencing applications. The new family is a dedicated range of intelligent adapters for real-time voice processing that integrates with applications to deliver high performance, rich functionality and cost savings.

The Diva Server V-Series adapters are fully scalable with versions for E1, T1 and ISDN Primary Rate along with multiple and single ISDN Basic Rate allowing a mix of 4 adapters to be combined in a single server delivering up to 120 communication channels for continuous voice and speech processing. With industry standard PCI-X and PCI 2.2 compatibility through 3.3V and 66MHz bus speeds, users can install the most up to date servers to get the full value from their applications.

The family provides a full set of voice processing functions including tone detection and generation, voice activity detection and echo cancellation. Handling voice either in PSTN standard coding or in compressed coding allows adaptation to any kind of telephony system. Onboard powerful Digital Signaling Processors (DSPs), one dedicated to each communication channel, perform these complex operations in real-time enhancing overall system performance and lowering implementation cost.

The Diva Server V-Series supports Generic Tone Detection and Generation capabilities to give greater flexibility in adapting to global call signaling standards. With the Automatic Gain Control (AGC) feature, voice quality and maximum size of conferences is substantially improved, allowing for up to sixty parties in a single conference. Furthermore, to enable PBX integration also includes ETSI DSS-1 and Q-SIG signaling parameters.

Also announced today, the Diva Server Software Suite 7.0 enables support for the new Diva Server V-Series adapters. Diva Server Software Suite 7.0 supports all of the most recent Microsoft Server systems, including Windows Server 2003, Windows 2000 and Windows XP, as well as Windows NT. The Microsoft Windows 2000/XP/2003 driver included in the Diva™ Server Software Suite 7.0 is signed and certified by Microsoft's Windows Hardware Quality Lab (WHQL), easing hardware installation.

The Diva Server V-Series can be ordered now using the part codes below:
306-214 Diva Server V-PRI/E1-30
306-213 Diva Server V-PRI/T1-24
306-218 Diva Server V-4BRI
306-219 Diva Server V-BRI

About Eicon Networks Corporation

Eicon Networks is a world-leading provider of reliable communication products for networked business applications, secure remote access and virtual private networks. The company’s portfolio includes a full range of products for applications in branch office and PC secure connectivity, voice, speech and conferencing, voice over IP, POS and financial clearing networks, unified messaging and fax serving.

Eicon distributes, markets and supports its products in more than 80 countries through a network of channel partners, telecommunication companies (telcos), Internet Service Providers (ISPs), and original equipment manufacturers (OEMs). Information about Eicon Networks is available at www.eicon.com.

Eicon, Eicon Networks, Diva and Diva Server are either registered trademarks or trademarks of Eicon Networks Corporation. The names of actual companies and products mentioned herein are the trademarks of their respective owners. Eicon encourages all users of its products to procure all necessary intellectual property licenses required to implement their concepts or applications, which licenses may vary from country to country.

Contacts:
John Porter
Director of Marketing
Eicon Networks
Tel: +44 (0)




Featured Articles

In this paper I will try to explain the philosophy behind the Security Enhanced Linux (SE Linux). I will however try to explain the concept with an example but to keep the length readable I will restrain myself to go into much of implementation details for e.g. commands and similar stuff.

VoIP Telephony: Benefits for Businesses
Voice-over-Internet Protocol, or VoIP service, has been talked about for a number of years but is now being adopted by mainstream businesses in order to save money as well as deploy powerful new capabilities for end-users.

Review: SmartLine DeviceLock
Businesses have spent millions protecting their corporate email and gateway servers from a vast range of security threats such as, malware and identity theft and data loss. But with USB memory, portable storage and media devices, IT professionals take no steps to monitor the usage of these devices, therefore ignoring the threat of internal security breaches at the network end-points.

Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

SpyDefense
SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.


Proactive Security Auditor
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.


File Securer
File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.




What's up, IT? Blog

Top 7 PHP Security Blunders
The human factor and information security
Why I Love Vulnerability Analysis In 2005
IT security fear factor: Tape backups
Uncovering Cyber Flaws
State of the security mart
When the hardware gets smart
Security for SMBs
Four Security Resolutions For The New Year
Symantec Readies Urgent Patch

Copyright © IT-Observer.com 2000 - 2005    Privacy Policy | RSS Feeds
Site Meter