Hoot and Holler

Hoot and holler networks provide “always on” multiuser conferences without requiring that users dial into the conference. These networks came into being more than 40 years ago when local concentrations of small specialized businesses with common, time-critical informational interests. Junkyards for example, began to install their own phone wires, speakers (called squawk boxes), and microphones between their businesses to ask each other about parts customers needed. These networks functioned as crude, do-it-yourself, business-to-business intercom systems. Hoot and holler broadcast audio network systems have since evolved into the specialized leased-line networks used by financial and brokerage firms to trade stocks and currency futures and the accompanying time-critical information such as market updates and morning reports. Hoot and holler is used in various industries as a way to provide a one-to-many or many-to-many conferencing service for voice communications. * [Source: Cisco Hoot & Holler Over IP]

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Top Articles

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

What are the Five Generations of Computers? (1st to 5th)

Reviewed by Web Webster Each generation of computer has brought significant advances in speed and power to computing tasks. Learn about each of the...

Hotmail [Outlook] Email Accounts

Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...

SHA-256

SHA-256 is an algorithm used for hash functions and is a vital component...

Document Management System

A document management system is an automated software solution businesses and organizations use...

Conti Ransomware

Conti ransomware first emerged in 2020. It uses a ransomware as a service...