Telephony User Interface (TUI) (Windows CE 5.0)
The Telephony User Interface (TUI) is a fully functional and customizable application that offers standard and advanced IP phone functionality.
TUI uses the VoIP Application Interface Layer (VAIL), Real-time Communications (RTC) Client API, Exchange Client, and PC Authentication Catalog items, among others.
For more information about building an IP phone using Windows CE, including links to other VoIP-related catalog items, see Developing an IP Phone.
In This Section
- TUI OS Design Development
Presents information that is helpful when designing and developing a Windows CE OS design that uses the TUI. This includes dependencies of the TUI, the modules and components that implement the TUI, and the TUI SYSGEN variables. - TUI Application Development
Explains how to write code that uses the TUI. - TUI Registry Settings
Provides information about the configurable registry settings used by the TUI. - TUI How-to Topics
Provides a list of how-to topics that involve the TUI. - TUI Security
Provides security best practice information relevant to the TUI. - TUI Migration
Presents information that is useful if you are migrating from an OS design that includes the TUI and is based on a previous version of Windows CE. - TUI Samples
Describes sample code that uses or relates to the TUI. - TUI Reference
Provides reference information for the API provided by the TUI.
Related Sections
- Developing an IP Phone
Provides overview information about building an IP phone using Windows CE. - VoIP Application Interface Layer (VAIL)
Explains the VAIL middleware layer, which provides the TUI with much of its phone functionality. - Real-time Communications (RTC) Client API
Describes low-level functionality that provides Voice over IP (VoIP), messaging, and presence support. - Exchange Client
Provides information about the functionality the TUI uses to retrieve contact, global address list, and free/busy information. - PC Authentication
Describes the functionality the TUI uses to help protect unauthorized access to sensitive information.
Send Feedback on this topic to the authors