Our Services

VOICE

UNIFIED COMMUNICATIONS
Unified communications (UC) refers to the integration of communication tools that help people exchange ideas and do their jobs more effectively.
Some communication tools, like IP telephony, presence technology and instant messaging, facilitate synchronous communication. Synchronous communication occurs in real-time and is sometimes referred to as “same time/different place” communication. Other communication tools, like email or Twitter, facilitate asynchronous communication. Asynchronous communication facilitates communication that takes place at a person’s convenience and is sometimes referred to as “different time/different place” communication. The goal of unified communications is to integrate the software that supports synchronous and asynchronous communication so the end user has easy access to all tools from whatever computing device he is using.
UC can help employees in a variety of contexts, including:
• Traditional office environments, with users on computers and using desk phones or softphones and individual webcams.
• Enterprise conference rooms equipped with speaker phones, a shared display system, and a shared camera system (which might be traditional conferencing systems or high-end telepresence systems).
• Remote employees working from mobile devices including tablets and smart phones, using the audio and video native to the device.
Ideally, a unified communications environment is integrated with the back-end systems that provide services as well as the front-end clients that provide access. For example, the Web conferencing system would make use of the audio conferencing system, which in turn would be built on the core IP telephony platform, and a unified messaging email client would allow click-to-talk (CTC), click-to-chat, or click-to-video functionality.
Unified communications tools and collaboration tool overlap significantly; collaboration tools such as those providing service desk automation or project management systems often incorporate UC features, like team chat, or integrate with external UC systems for those functions. UC also overlaps with contact center technologies — for example, in the form of automated call distribution (ACD) and interactive voice response (IVR) systems.

VOIP
If you’ve never heard of VoIP, get ready to change the way you think about long-distance phone calls. VoIP, or Voice over Internet Protocol, is a method for taking analog audio signals, like the kind you hear when you talk on the phone, and turning them into digital data that can be transmitted over the Internet.
How is this useful? VoIP can turn a standard Internet connection into a way to place free phone calls. The practical upshot of this is that by using some of the free VoIP software that is available to make Internet phone calls, you’re bypassing the phone company (and its charges) entirely.
VoIP is a revolutionary technology that has the potential to completely rework the world’s phone systems. VoIP providers have already been around for a while and are growing steadily. Major carriers are already setting up VoIP calling plans in several markets around the United States, and the FCC is looking seriously at the potential ramifications of VoIP service.
Above all else, VoIP is basically a clever “reinvention of the wheel.” In this article, we’ll explore the principles behind VoIP, its applications and the potential of this emerging technology, which will more than likely one day replace the traditional phone system entirely.
The interesting thing about VoIP is that there is not just one way to place a call. There are three different “flavors” of VoIP service in common use today:
• ATA — The simplest and most common way is through the use of a device called an ATA (analog telephone adaptor). The ATA allows you to connect a standard phone to your computer or your Internet connection for use with VoIP. The ATA is an analog-to-digital converter. It takes the analog signal from your traditional phone and converts it into digital data for transmission over the Internet. Providers Call Vantage are bundling ATAs free with their service. You simply crack the ATA out of the box, plug the cable from your phone that would normally go in the wall socket into the ATA, and you’re ready to make VoIP calls. Some ATAs may ship with additional software that is loaded onto the host computer to configure it; but in any case, it’s a very straightforward setup.
• IP Phones — These specialized phones look just like normal phones with a handset, cradle and buttons. But instead of having the standard RJ-11 phone connectors, IP phones have an RJ-45 Ethernet connector. IP phones connect directly to your router and have all the hardware and software necessary right onboard to handle the IP call. Wi-Fi phones allow subscribing callers to make VoIP calls from any Wi-Fi hot spot.
• Computer-to-computer — This is certainly the easiest way to use VoIP. You don’t even have to pay for long-distance calls. There are several companies offering free or very low-cost software that you can use for this type of VoIP. All you need is the software, a microphone, speakers, a sound card and an Internet connection, preferably a fast one like you would get through a cable or DSL modem. Except for your normal monthly ISP fee, there is usually no charge for computer-to-computer calls, no matter the distanc

SIP TRUNKING
A SIP trunk is a direct connection between your organization and an Internet telephony service provider (ITSP). It enables you to extend voice over IP (VoIP) telephony beyond your organization’s firewall without the need for an IP-PSTN gateway. This simpler configuration is easier and less expensive to design, operate, maintain, and upgrade.

In addition to VoIP calls, SIP trunks can also carry instant messages, multimedia conferences, user presence information, Enhanced 9-1-1 (E9-1-1) emergency calls, and other SIP-based, real-time communications services. Microsoft Office Communications Server 2007 R2 users can place local and long distance calls with caller ID and call hold over SIP trunks. As SIP-based communication technologies advance and SIP trunking becomes commonplace, additional services are likely to become available.

With all of the benefits that SIP trunking provides (especially the substantial cost savings), it’s no wonder that SIP trunking is a hot topic in unified communications.

Benefits:

* Save money on long distance service

* Long distance service typically costs significantly less with a SIP trunk connection.

* Eliminate IP-PSTN gateways (or even your entire PBX)

* Because SIP trunks connect directly to your ITSP without traversing the publicly switched telephone network, you can get rid  of IP-PSTN gateways and their attendant cost and complexity.

* Eliminate a redundant network

Deploying SIP trunking is a logical step towards the goal of having a single, IP-based network, rather than redundant telephone and data networks.

Eliminate BRI and PRI subscription fees

With a SIP trunk connected directly to an Internet telephony service provider, you can dispense with costly BRIs and PRIs, replacing them with service that can cost significantly less. Furthermore, with SIP trunking you don’t need to buy lines in blocks of 24 or 32. Instead, you can buy the bandwidth you need, in smaller increments, and at better prices.

Extend the capabilities of Office Communications Server with new services from ITSPs

With a SIP trunk in place, you can extend existing capabilities with additional services, such as E9-1-1 emergency calling. In the future, we expect ITSPs will to new services, such as greater integration with mobile phones and presence information on devices that are not running Office Communicator.

CALL CONTACT CENTERS
A contact center is similar to a call center, but with more features.

A call center uses either the public switched telephone network or VoIP for calls. A call center communicates only by voice.

A contact center still uses voice communication, most likely VoIP. In addition to phone calls, contact centers use email, text chat, and web interfaces to communicate with clients or customers.

If a contact center primarily uses a call button online, it is a web-enabled call center.

Call centers can have divided labor between inbound and outbound agents or blended agents that handle both types of calling. Contact centers feature agents that can handle all its forms of communication.

Like a call center, a contact center can be a department within a company or it can be outsourced to a different company.
Call Center Features
• PSTN or VoIP telephony
• inbound, outbound, or blended agents

Contact Center Features
• VoIP telephony
• email
• text chat
• fax
• web call button or interface
• blended agents capable of all of the above communication

Because of technological trends, businesses are turning to contact centers as their mode of customer interaction. While call centers are still a viable form of communication, contact centers offer additional pathways of interaction that customers may find convenient.

VIDEO, WEB, AUDIO CONFERENCING
Videoconferencing (or video conference) means to conduct a conference between two or more participants at different sites by using computer networks to transmit audio and video data. For example, a point-to-point (two-person) video conferencing system works much like a video telephone. Each participant has a video camera, microphone, and speakers mounted on his or her computer. As the two participants speak to one another, their voices are carried over the network and delivered to the other’s speakers, and whatever images appear in front of the video camera appear in a window on the other participant’s monitor.
Multipoint videoconferencing allows three or more participants to sit in a virtual conference room and communicate as if they were sitting right next to each other. Until the mid 90s, the hardware costs made videoconferencing prohibitively expensive for most organizations, but that situation is changing rapidly. Many analysts believe that videoconferencing will be one of the fastest-growing segments of the computer industry in the latter half of the decade.
The business world is constantly evolving; workforces are more distributed and people are more mobile. How do you connect with colleagues, partners and clients no matter their location? You need a virtual meeting space to bring everyone together.
But joining a web conference with other services is often a hassle: a hefty download, confusing controls, the wrong software version, or an unsupported platform or browser can frustrate hosts and participants.
You can now host online meetings, HD video conferences and audio conferences for up to 100 people from virtually any device. Meeting organizers and participants can use any phone, any PC or Apple Macintosh computer, or even an iPhone®, iPad® or Android™ device to host or join a meeting.
Hosts and participants can use their computer’s microphone and speaker to connect, or dial in from any telephone. Dynamic voice detection within the application highlights the person talking.
Connect instantly by letting others know your personal meeting room number, or schedule meetings using Outlook and Google Calendar integrations – either way, inviting participants takes just a few seconds or clicks.

DATA & INTERNET

MPLS
Multiprotocol Label Switching (MPLS) is a type of data-carrying technique for high-performance telecommunications networks that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table. The labels identify virtual links (paths) between distant nodes rather than endpoints. MPLS can encapsulate packets of various network protocols, hence its name “multiprotocol”. MPLS supports a range of access technologies, including T1/E1, ATM, Frame Relay, and DSL.
MPLS allows most packets to be forwarded at Layer 2 (the switching level) rather than having to be passed up to Layer 3 (the routing level). Each packet gets labeled on entry into the service provider’s network by the ingress router. All the subsequent routing switches perform packet forwarding based only on those labels—they never look as far as the IP header. Finally, the egress router removes the label(s) and forwards the original IP packet toward its final destination.
Service providers can use MPLS to improve quality of service (QoS) by defining LSPs that can meet specific service level agreements (SLAs) on traffic latency, jitter, packet loss and downtime. For example, a network might have three service levels — one level for voice, one level for time-sensitive traffic and one level for “best effort” traffic. MPLS also supports traffic separation and the creation of virtual private networks (VPNs) virtual private LAN services (VPLS) and virtual leased lines (VLLs).

ETHERNET FIBER
Ethernet Over Fiber is a connection providing high speed ethernet bandwidth of 1Mbps to 10Gbps delivered as Ethernet over fiber optic lines. Ethernet services are used by businesses to provide reliable, dedicated Ethernet connection for internet access as well as other applications including email, file sharing, web hosting, data backup, video, or VPN access. Ethernet access is superior to cable or DSL Internet access because it offers higher Ethernet bandwidth speeds, lower equipment costs (Ethernet line handoff), and a Service Level Agreement with guarantees on Ethernet service, performance, uptime, and repair. An Ethernet Internet connection is available in 10Mbps Ethernet, 100Mbps Fast Ethernet, 1Gbps Gigabit Ethernet, or 10Gbps Gigabit Ethernet handoffs. Ethernet Internet access is also known as an Ethernet Circuit, Ethernet Line, or Ethernet Access.

The bandwidth advantages, the improved isolation of devices from each other, the ability to easily mix different speeds of devices and the elimination of the chaining limits inherent in non-switched Ethernet have made switched Ethernet the dominant network technology.

SATELITE WIRELESS
Getting high speed internet through satellite is called as satellite internet. Satellite internet is much faster than DSL or cable internet. Satellite internet can be accessed even in remote corners of the country. They are easy to install and operate. The internet speed is higher than DSL or cable internet. Satellite internet is also called as lightning fast internet connection. You can download heavy files in quick time and even listen to online radio uninterrupted. The internet speed is constant and does not fluctuate.

The differences between Satellite Internet and DSL:

You can stay connected to the internet always with the help of satellite internet. The satellite internet service provides two way internet access, which provides internet speed without fluctuations in bandwidth. While in DSL internet, the internet speed is not constant.

· Satellite internet does not require huge cabling or telephone connection to access the internet. The speed of the internet is also constant as satellite internet uses two way high speed internet. In DSL internet the internet speed depends on the telephone wires and in case there is some cabling fault then your DSL internet would come to a stand still. The better the quality of your telephone cable the better your internet speed.

· Satellite internet service can be accessed anywhere and at any time. You can use satellite internet even in remote places. DSL internet can be accessed where there are telephone lines.
The best Internet solution: With technology improving day by day, the demand for internet with faster bandwidth and downloading speeds has increased and this in turn has led to satellite internet. With satellite internet there are no cables and no hassles for internet connection and installation. Satellite internet connection is more reliable than a DSL or dial up internet connection. If you feel that there is a need for changing your internet connection, then opting for a satellite internet connection would be the ideal solution.

POINT TO POINT
A point-to-point connection refers to a communications connection between two nodes or endpoints. An example is a telephone call, in which one telephone is connected with one other, and what is said by one caller can only be heard by the other. This is contrasted with a point-to-multipoint or broadcast communication topology, in which many nodes can receive information transmitted by one node. Other examples of point-to-point communications links are leased lines, microwave relay links, and two way radio. Examples of point-to-multipoint communications systems are radio and television broadcasting.
The Point-to-Point Protocol (PPP) is used for establishing direct connectivity between two network nodes. It authenticates the connections, compresses, transmits after encryption thereby providing privacy. PPP is primarily designed for linking two networks and transporting IP packets between the two. The links are capable of providing simultaneous bi-directional functions, delivering data packets in a specific order. This protocol is a common solution to easily connect diverse types of hosts, bridges, and routers.
As with many technologies, there are few setbacks in using point-to-point links too. The main reason is that point-to-point links intensify the existing issues with network protocols. Assigning and managing IP addresses is complex when performed over circuit-switched point-to-point links such as dial-up-modem servers. However, these problems are handled by NCPs particular to requirements of the respective network-layer protocols.
Optimized technology solutions that increase WAN performance are the current necessity. Proven technology vendors such as FatPipe Networks (www.fatpipe.com) offer WAN optimization solutions and products that provide highest levels of reliability, security, and bandwidth management. FatPipe technology allows varied connections to ISPs, taking disparate connections and performing dynamic load balancing and failover functions. FatPipe devices do not need BGP programming. FatPipe’s patented WARP technology combines multiple WAN connections of varied types over multiple backbones and ISPs, or same ISPs that have different POPs in order to provide reliability and redundancy for inbound and outbound IP traffic. FatPipe products increase WAN efficiency with its array of advanced product features including automatic line failover, dynamic load balancing of IP traffic, site-to-site and unit failover capabilities. Technology users constantly seek improved technology products to have continuity in business operations. FatPipe helps users to get closer to achieving the same.

WAN OPTIMIZATION
Wide-area network (WAN) optimization is a collection of technologies and techniques used to amplify efficiency of data-transfer across the WAN. WAN optimization is an important part of network management, because it allows you to prioritize traffic and guarantee a certain amount of available bandwidth for the most critical applications.Some of the specific technologies used in WAN optimization include:

Traffic shaping, in which traffic is prioritized and bandwidth is allocated accordingly.
Elimination of redundant data, also known as data deduplication, which reduces the data that must be sent across a WAN by sending referencesinstead of the actual data.
Data compression, which contracts the size of data to limit bandwidth usage.
Data caching, which is where repeatedly used data is hosted locally or on alocal server for faster access.
Streamlining data protocols, which bundles multiple requests from chattyapplications into one.
Manage bandwidth or quality of service, put limits on how much bandwidthcertain kinds of resource-hogging applications can monopolize.

As the WAN develops, with advances in applications, cloud computing, and other technologies, WAN optimization has become even more essential. These major trends are driving more and more traffic over the WAN which will have a major impact specifically on the performance of business-critical applications that cross the WAN. The WAN’s inherent latency issues and the cost of network bandwidth are major issues for businesses right now. The two ways to address this need for greater bandwidth are to purchase more or use what you already have more effectively through WAN optimization. For many companies, WAN optimization can bring significant improvements to business operations.

VITUAL PRIVATE LAN SERVICE
Virtual private LAN service (VPLS) is a telecom carrier-provided service that makes it possible for customers to create a logical local area network (LAN) structure between geographically separate sites. All services in a VPLS appear to be on the same LAN, regardless of location.

Unlike traditional wide-area network (WAN) connectivity or IP-based virtual private networks, a VPLS can be used to transport non-IP traffic without any need for conversion or encapsulation. A VPLS has a mesh network topology, which means it can provide point-to-point, multipoint services and any-to-any capabilities. In effect, VPLS creates a virtualized Ethernet switch at the service provider’s edge, linking multiple remote sites as if they were on the same physical switch.

Unlike traditional wide-area network (WAN) connectivity or IP-based virtual private networks, a VPLS can be used to transport non-IP traffic without any need for conversion or encapsulation. A VPLS has a mesh network topology, which means it can provide point-to-point, multipoint services and any-to-any capabilities. In effect, VPLS creates a virtualized Ethernet switch at the service provider’s edge, linking multiple remote sites as if they were on the same physical switch.

A VPLS uses multiprotocol label switching (MPLS) to create the appearance of a virtual private network (VPN) at each subscriber location. Ethernet packets are tunneled by pseudo-wire through the provider network, independent of traffic from other Internet users. Frames are forwarded according to layer 2 switching standards and fault-tolerance ensures that each packet arrives intact at its intended destination. Configuration and management of the VPLS can fall either to the service provider or to the in-house networking team, based on the needs of the individual customer.

SOFTWARE DEFINED NETWORKING
Software-defined networking (SDN) is an umbrella term encompassing several kinds of network technology aimed at making the network as agile and flexible as the virtualized server and storage infrastructure of the modern data center. The goal of SDN is to allow network engineers and administrators to respond quickly to changing business requirements. In a software-defined network, a network administrator can shape traffic from a centralized control console without having to touch individual switches, and can deliver services to wherever they are needed in the network, without regard to what specific devices a server or other device is connected to. The key technologies are functional separation, network virtualization and automation through programmability.
Originally, SDN focused solely on separation of the control plane of the network, which makes decisions about how packets should flow through the network from the data plane of the network, which actually moves packets from place to place. When a packet arrives at a switch in network, rules built into the switch’s proprietary firmware tell the switch where to forward the packet. The switch sends every packet going to the same destination along the same path, and treats all the packets the exact same way. In a classic SDN scenario, rules for packet handling are sent to the switch from a controller, an application running on a server somewhere, and switches (aka data plane devices) query the controller for guidance as needed, and provide it with information about traffic they are handling. Controllers and switches communicate via a controller’s “south bound” interface, usually OpenFlow, although other protocols exist.

NETWORK FUNCTION VIRTUALIZATION
network function virtualization (NFV) is a network architecture concept that uses the technologies of IT virtualization to virtualize entire classes of network node functions into building blocks that may connect, or chain together, to create communication services.
NFV relies upon, but differs from, traditional server-virtualization techniques, such as those used in enterprise IT. A virtualized network function, or VNF, may consist of one or more virtual machines running different software and processes, on top of standard high-volume servers, switches and storage, or even cloud computing infrastructure, instead of having custom hardware appliances for each network function.
For example, a virtual session border controller could be deployed to protect a network without the typical cost and complexity of obtaining and installing physical units. Other examples of NFV include virtualized load balancers, firewalls, intrusion detection devices and WAN accelerators.[1]
Values of NFV
Some of the values to the NFV concept are speed, agility, and cost reduction. By centralizing designs around commodity server hardware, network operators can:
• Do a single PoP/Site design based on commodity compute hardware;
o Avoiding designs involving one-off installs of appliances that have different power, cooling and space needs simplifies planning.
• Utilize resources more effectively;
o Virtualization allows providers to allocate only the necessary resources needed by each feature/function.
• Deploy network functions without having to send engineers to each site;
o “Truck Rolls” are costly both from a time and money standpoint.
• Achieve Reductions in OpEX and CapEX; and,
• Achieve Reduction of system complexity.

CLOUD

MANAGED CLOUD
Cloud computing increases flexibility, reduces the total cost of ownership, helps avoid disasters, increases productivity and ensures the safety and security of business data.

Managed cloud hosting is a process in which organizations share and access resources, including databases, hardware and software tools, across a remote network via multiple servers in another location.

In managed cloud hosting, servers are purchased in slices or as a virtual server. However, before considering costs, the key focus of managed cloud hosting is on security and consistent availability. In contrast to servers that are acquired on an hourly basis, managed cloud hosting is delivered in the form of monthly (or longer) contracts for businesses, which run enterprise-critical apps over long periods.

Managed cloud hosting is also known as managed cloud computing.

Advantages of managed cloud hosting are as follows:

Consistent availability: Designed on a high availability and private-cloud structure, it uses effective redundancy via its various servers, storage area network (SAN) and storage protection for reliable failover protection.
Automated resource balancing and failover: If a host stops working, cloud servers are at an advantages due to their consistently available infrastructure. Failover and resource balancing between hardware hosts is automatically managed at the virtualization level, and it has the capability to manage and update software and hardware.
Network security: Virtual local area networks (VLAN), protected firewalls and Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) may be used in cloud servers to deliver a highly protected environment.
Creates a hybrid of virtual and physical servers: Applications and database engines can share a dedicated network with cloud servers, resulting in the creation of virtual and physical servers on the same system.
Affordable: The costs of a managed cloud are as effective as most public clouds. The resources and also the services are billed per usage.

Managed cloud computing offers organizations the same security and provisions of a dedicated private cloud with a better and more cost-effective package. Organizations that use managed cloud computing can focus on business operations, rather than addressing server glitches and downtime.

HYBRID CLOUD
Hybrid cloud is a cloud computing environment which uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms. By allowing workloads to move between private and public clouds as computing needs and costs change, hybrid cloud gives businesses greater flexibility and more data deployment options.
For example, an enterprise can deploy an on-premises private cloud to host sensitive or critical workloads, but use a third-party public cloud provider, such as Google Compute Engine, to host less-critical resources, such as test and development workloads. To hold customer-facing archival and backup data, a hybrid cloud could also use Amazon Simple Storage Service (Amazon S3). A software layer, such as Eucalyptus, can facilitate private cloud connections to public clouds, such as Amazon Web Services (AWS).
Hybrid cloud is particularly valuable for dynamic or highly changeable workloads. For example, a transactional order entry system that experiences significant demand spikes around the holiday season is a good hybrid cloud candidate. The application could run in private cloud, but use cloud bursting to access additional computing resources from a public cloud when computing demands spike. To connect private and public cloud resources, this model requires a hybrid cloud environment.
Another hybrid cloud use case is big data processing. A company, for example, could use hybrid cloud storage to retain its accumulated business, sales, test and other data, and then run analytical queries in the public cloud, which can scale to support demanding distributed computing tasks.
Public cloud’s flexibility and scalability eliminates the need for a company to make massive capital expenditures to accommodate short-term spikes in demand. The public cloud provider supplies compute resources, and the company only pays for the resources it consumes.
Despite its benefits, hybrid cloud can present technical, business and management challenges. Private cloud workloads must access and interact with public cloud providers, so hybrid cloud requires API compatibility and solid network connectivity.
For the public cloud piece of hybrid cloud, there are potential connectivity issues, SLA breaches and other possible public cloud service disruptions. To mitigate these risks, organizations can architect hybrid workloads that interoperate with multiple public cloud providers. However, this can complicate workload design and testing. In some cases, workloads slated for hybrid cloud must be redesigned to address the specific providers’ APIs.

MANAGED SECURITY
Today’s Internet security threats range from curious prowlers to savvy intruders, simple
mischief to espionage. Without a plan to help protect your entire network and its connection
points, your defense is only as strong as its weakest link. Managed Security Services adds a powerful protective layer, helping you to maintain the security of your organizations network as you access the Internet. This helps you take full advantage of the Internet as a means of enhancing your existing business relationships with your customers and suppliers.
Managed security services (MSS) is a systematic approach to managing an organization’s security needs. The services may be conducted in house or outsourced to a service provider that oversees other companies’ network and information system security. Functions of a managed security service include round-the-clock monitoring and management of intrusion detection systems and firewalls, overseeing patch management and upgrades, performing security assessments and security audits, and responding to emergencies. There are products available from a number of vendors to help organize and guide the procedures involved. This diverts the burden of performing the chores manually, which can be considerable, away from administrators.

MICROSOFT 365
Microsoft Office 365 (often called Microsoft 365 or Office 365) is a Web-based version of Microsoft’s Office suite of enterprise-grade productivity applications. Office 365 is delivered to users through the cloud and includes Exchange Online for email, Word, SharePoint Online for collaboration, Lync Online for unified communications, and a suite of Office Web Apps, Web-based versions of the traditional Microsoft Office suite of applications. However, choosing between Office 2013 desktop software and the new Office 365 is a dramatically different decision than in the past.
There is a clear distinction between the two options. Office 2013 describes only the desktop applications. By contrast, Office 365 is a Web-based platform that pairs the Office applications with cloud storage. In the past, though, the Office 365 versions of the software had limited features and capabilities compared to the full desktop versions, and if you didn’t have an Internet connection you didn’t have Office.
The beauty of Office 365 is that you get more than just Office 2013 for your money—it also comes with benefits that Office 2013 lacks. It comes with an additional 20GB of SkyDrive storage and 60 minutes per month of international Skype calls. Office 365 also has a new feature called Office On Demand that enables you to stream virtualized versions of the full desktop software to any Windows 7 or Windows 8 PC.

GOOGLE DOCS
oogle Docs is a free Web-based application in which documents and spreadsheets can be created, edited and stored online. Files can be accessed from any computer with an Internet connection and a full-featured Web browser. Google Docs is a part of a comprehensive package of online applications offered by and associated with Google.
Users of Google Docs can import, create, edit and update documents and spreadsheets in various fonts and file formats, combining text with formulas, lists, tables and images. Google Docs is compatible with most presentation software and word processor applications. Work can be published as a Web page or as a print-ready manuscript. Users can control who sees their work. Google Docs is ideal for publishing within an enterprise, maintaining blogs or composing work for viewing by the general public.
Google Docs lends itself to collaborative projects in which multiple authors work together in real time from geographically diverse locations. All participants can see who made specific document changes and when those alterations were done. Because documents are stored online and can also be stored on users’ computers, there is no risk of total data loss as a result of a localized catastrophe.
Multiple people can view and edit a Google Docs file simultaneously. More importantly, they don’t have to worry about creating duplicate copies of the same file. With Google Docs, everyone working on a project makes changes to the same master document. As users make edits, Google Docs tracks all the changes and tags each edit with the responsible Google account holder’s name. That way, the owner of the document can scan changes and see who is responsible for each edit.
Google designed Google Docs to autosave almost constantly, preserving each edit shortly after a user makes it. Other users see the updated changes instantly. While working with documents or presentations, users can see who else is in the file. And with spreadsheets, users can click on a tab labeled “discuss” to chat in real time about the project.