IT Infrastructure

Server Solutions

Corner Stars Computers LLC offers a number of Server Computing solutions including Microsoft Server Solutions, SQL, Exchange, Clustering, Terminal Server and Small Business Servers.In today's times, organizations require solutions that save time, aid in getting organized and reduce costs. IT infrastructure necessitates server solutions that reduce IT complexity, improve security, and lower operational costs. Centralised storage and data management improves employee productivity with remote access to data and advanced communication and collaboration capabilities.

Ip Telephony Solutions

Corner Stars offers the latest and most advanced IP Telephony solutions. IP Telephony solutions use a single network infrastructure for the transmission of data, voice, and video traffic, delivering the business benefits of a converged network (increased productivity, greater business flexibility, and reduced operational costs) to enterprise-level organizations


  • ADSI On-Screen Menu System
  • Alarm Receiver
  • Append Message
  • Authentication
  • Automated Attendant
  • Blacklists
  • Blind Transfer
  • Call Detail Records
  • Call Forward on Busy
  • Call Forward on No Answer
  • Call Forward Variable
  • Call Monitoring
  • Call Parking
  • Call Queuing
  • Call Recording, Retrieval
  • Call Routing (DID & ANI)
  • Call Snooping
  • Call Transfer
  • Call Waiting
  • Caller ID
  • Caller ID Blocking
  • Caller ID on Call Waiting
  • Calling Cards
  • Conference Bridging
  • Database Store / Retrieve
  • Database Integration
  • Dial by Name
  • Direct Inward System Access
  • Distinctive Ring
  • Distributed Universal Number Discovery
  • Do Not Disturb
  • E911
  • ENUM
  • Fax Transmit and Receive
  • Flexible Extension Logic
  • Interactive Directory Listing
  • Interactive Voice Response (IVR)
  • Local and Remote Call Agents
  • Macros
  • Music on Hold
  • Predictive Dialer
  • Privacy
  • Open Settlement Protocol (OSP)
  • Overhead Paging
  • Protocol Conversion
  • Remote Call Pickup
  • Remote Office Support
  • Roaming Extensions
  • Route by Caller ID
  • SMS Messaging
  • Spell / Say
  • Streaming Media Access
  • Supervised Transfer
  • Talk Detection
  • Text-to-Speech (via Festival)
  • Three-way Calling
  • Time and Date
  • Transcoding
  • Trunking
  • VoIP Gateways
  • Voicemail:
  • Visual Indicator for Message Waiting
  • Stutter Dialtone for Message Waiting
  • Voicemail to email
  • Voicemail Groups
  • Web Voicemail Interface
  • Zapateller

Security Solutions

Security has been one of the fastest growing areas in technology over the last ten years. As Technology has become mainstream at all levels of business, the opportunity to take advantage of technology have also increased exponentially. Common threats include unauthorized access attempts from the Internet, exploit or viral code launched via e-mail and or spam, poor password security, and unauthorized access attempts to capture information. These threats have created an entire sector of the IT industry creating new solutions to combat and fight of these threats

Firewalls :

The Firewall / IPSec VPN security devices are purpose-built to perform essential security functions. These integrated devices combine firewall with deep inspection technology for application-level protection enterprises of all sizes


Secure, reliable communications are critical to the success of service providers and enterprises alike. VPN technologies make secure communications easy. There are several different implementation of VPN, for different applications. These can vary from hardware devise point to point, to Client software based VPN's, to SSL clientless VPN's.


Using anti-virus software is a necessity. Not only must anti-virus software be installed on all servers and workstations but virus definition files must be constantly updated. If your environment is large, purchasing anti-virus software that has a management component that allows automatic updates and virus scans over the network. It also provides central administration features offers significant administration savings.

Secure Authentication :

Passwords are one of the weakest elements in every network, and can be easily hacked, stolen, or guessed. Three factor authentication products eliminate these password risks for thousands of organizations worldwide every day. Three factor authentication tokens generate new pass codes with every user login, ensuring that only trusted users are accessing your networks.