
|
- If the number of participants in the meeting and only the host to
speak at the meeting, the moderator can press * 4 on the phone keys, for
all participants to mute.
- People attended the meeting in the same room, some machine itself,
because a lot of quality problems which may cause the handset, the handset
cable, telephone lines, and generate analog noise, passing in the hall.
Please make use of professional conference telephones POLYCOM, and not
near the phone to speaker.
- In the meeting, in order to protect the quality of the conference,
participants recommended pres *6 to self-mute if he will not speak, your
speech will not be heard by other participants. If you need to speak to
press * 6 again to cancel mute.
- Avoid the use of hands-free by general telephone, if you must use,
press the *6 key to self-mute.
- Please inform all participants in the meeting cause any questions, can
be obtained assistant, by press button * 0 for help.
|
How can ensure the meeting held on time?
- Meeting time when there are important people yet to
come, the host can press * 8 on the phone call out to
participant, or * 0 to conference assistant to call the
participant to join the meeting.
- For emergency meetings, you can through your own
business conference services gateway, through the "Group
Call" feature, all the participants quickly summoned to the
meeting.
- For emergency meetings, you can own your business
conference services gateway, through the "Group Call"
feature, all the participants quickly summoned to the
meeting.
|
How to improve the security of the meeting?
- All participants in attendance, by pressing * 7 key
lock, then even if the meeting was informed of the password,
it will no longer be added to the meeting.
- Landing the network side, real-time online master who
will be involved in the state, or by fast mouse click on the
control of telephone participants, the non-invited people
will be forcibly expelled.
- Choose Meetingtel a higher level of human services,
through the calling number, etc. The only way to determine
the identity, in order to increase its information security.
|
|