Ask the SIP Trunk Expert
Technical Considerations for SIP Trunking
Before implementing SIP trunking, it is critical to evaluate your local area network to determine what may be needed ahead of time to ensure a successful VoIP deployment. Ask yourself the following questions to ensure that the deployment goes smoothly, takes minimal time and, of utmost importance, maintains the security of your network.
The Ghosts of Tech Past and Future
Almost overnight the concept of wearable technology has wiped out potentially tens of billions of dollars of extra spending to touch-and-display-enable our world. Wow. Talk about a disruptive technology - smart glass getting disrupted by smart glasses.
Top of Mind
What's Driving Software Telco?
Definitions of SDN vary, but most agree that it involves the use of the OpenFlow protocol and features an architecture consisting of an application layer, a physical network layer, and an SDN controller, which removes the control plane from the network hardare and runs it as software.
The Business Case for NFV-based Network Intelligence
Not only does this directly translate to significant network cost savings, it also accelerates time-to-market for new policy-based services. Intelligent policy enforcement capabilities that may be offered as part of a DPI/policy platform can be readily provisioned in markets where it is needed to either conduct trials or deploy region-specific services. The market for broadband network services is constantly changing and support for more flexible deployment of DPI and policy resources can be a huge benefit to service providers. It is not a question of whether or not virtualized DPI/policy functions will benefit service providers; it is a question of how quickly can the vendor community meet the demand.
VoLTE - Delivering Reliable and Secure Mobile VoIP
As one can see with the discussed issues, it is easy to understand why the CSPs are taking their time to migrate to VoLTE. Eventually, all LTE networks will utilize VoLTE services because it makes sense. Circuit switching equipment can be eliminated. The entire mobile network will be packet-based IP. This means there will be a common unified architecture for CSPs to manage and maintain. The promise of LTE is an intelligent subscriber-aware and policy-aware network that delivers services in a consistent manner. VoLTE is the enablement of that vision for voice services.
Talk of Telecom Rewrite Could Mean Deja Vu All Over Again
On Dec. 2, the U.S. House of Representatives, under the leadership of House Energy and Commerce Committee Chairman Fred Upton (R-MI) and Rep. Greg Walden (R-OR), the chairman of the subcommittee on Communications and Technology, announced their intent to begin re-writing the Communications Act.
Ask the SIP Trunk Expert
What is SIP Trunking?
The voice quality, even over an un-managed public Internet connection, can be excellent. Digital packetization of voice has proven to be better than analog. This is because digital packets do not suffer from audio distortions, loss levels, and other weaknesses. The quality of voice is directly related to the quality of the network, with the "weak link" of VoIP being latency in a slow network. A SIP-capable E-SBC with QoS solves this problem.
Amazon Mayday - What it Means for Your Contact Center
While most businesses lack Amazon's scale and efficiencies for managing a gigantic customer base from the cloud, these underlying principles can still apply. You may not need to deliver service in 15 seconds, and with a little bit of research, you can easily determine the optimal waiting time that applies to your customers. Once you know that, the trick is figuring out how to deliver the right service once contact has been made.
The More Things Change the More They Stay the Same
Another constant - profits still need to be made the old-fashioned way by earning them. Sales teams must be closely managed, and that takes time. A good cloud sales management or CRM solution makes the job much easier, but you need to implement it first. Meticulously review the leads and results to determine which of your marketing investments are generating the best ROI and re-allocate your resources accordingly.
There is, of course, one place where unified communications makes a lot of sense: in the call center, where all modes of communication should flow to the same pool of agents, and into the same customer timeline in the CRM database. But there seems to be no demand for this from call center operators, whose main motivation seems to be to discourage calls rather than to help the caller (cf, the 30-second exhortation to use the website that you must endure before you get routed to an agent).
Customer Service Isn't Such a Sleigh Ride during the Holiday Season
Many of the people we queried are planning on moving to different channels if they do contact brands during the season. While nearly half say phone is the best channel to contact customer service during the year, only 33 percent say the same of the holidays. This drop is due to more consumers saying chat, e-mail, text, social and in-person are the best channels during the holidays (67 percent) compared to year-round (52 percent).
Real Reality TV
The mobile revolution has created what can only be called an age of instant gratification. We have come to expect access to information and content instantly, whenever and wherever we want it. That evolution of mobility and communication has given rise to a entire new ecosystems of activity, in the process spawning new industries. Perhaps most notable is the mobile application market.
Looking Ahead to 2014
Generally the December and January DPCF columns focus on the need for having a good plan in place for the upcoming year. We deviated a little in 2011 with a column titled "Eating Your Own Dog Food" to illustrate how TMC managed to cope with Hurricane Irene. October and November of 2012 brought more devastation but, again, TMC remained in full operation. The reason was simple. TMC had a robust and up-to-date BC/DR plan in place. This is a major reason for listening to our advice. We adhered to it, and it worked.
Video - Which Way Now?
I haven't written about video here for some time, and there is a lot to catch up on. To whatever extent you're currently using video in your business, I'm sure you've noticed an increasing number of options over the course of 2013.
Innovation's Infrastructure Investment
The "Innovation and the Economy" Financial Times Special Report from Clive Cookson published on Oct. 17 reads: "Policy makers need to embrace a broader vision of innovation, and shape infrastructure and regulation accordingly."
Google and Microsoft: Delivering Global Unlicensed Super Wi-Fi
Google and Microsoft are priming the pump for using super Wi-Fi to deliver wireless broadband outside U.S., the birthplace white spaces. Africa is the key focus. Even Facebook through Internet.org is talking about creative ways to deliver Internet to the unconnected in Africa.
ZipWhip: What if Every Phone Number Could Text?
Back in 2005, yes, 2005 I wondered when Wi-Fi phones would allow text messaging - I suggested there was an opportunity for companies to take advantage of the merging of the VoIP and consumer electronics spaces.
Life Cycle Management Considerations for Enterprise IT (Part 1)
Today's IT organizations face aging infrastructure and shrinking budgets. This leaves little room to invest in new technologies that would otherwise help grow the business.
Opportunities Abroad - EU Considers Single Market Telecom Package
On Sept. 11, 2013, the European Commission released a proposed telecommunications framework aimed at further harmonizing the broadband market across the EU. If adopted, it would implement network neutrality rules and eliminate EU roaming costs. It must be approved by the European Parliament and by the EU Council before it becomes law.
The Ultra HD Rush
Ultra-high definition TV is the next generation of high definition TVs. Just like the industry push for commercializing the current HDTV standard that began 15 years ago, consumer expectations are high. The one primary difference between then and now is that streaming video services are available and mainstreamed so to speak.
Top of Mind
Planes, Drones, Automobiles and The New Normal
When I think about the year in review a few things really stick out for me. On a personal level, I think about all the good times I've had with my wonderful husband and child, all the successes and great experiences said child has had, and how I myself made it to the finish line in my first organized bike event. From a professional standpoint, I think about all the mergers and acquisitions we've seen recently (see related story), some of the hot trends like SDN and WebRTC (see other related story), and as well as the Jetsons-type concepts that are actually becoming reality during my lifetime.
Traveling the Uncanny Valley
As robots become more and more humanlike, researchers have observed that there is a sudden dip in appeal, a feeling of revulsion, close to the most human-like end of the spectrum. They call this the uncanny valley, since a near perfect simulation can transition out the other side.
From Business Protection to Business Growth
Getting urgent requests from internal users is nothing new for revenue assurance and fraud management teams in communications and digital service providers. But the nature of these requests is changing and in a fundamental way. These teams are now receiving many new requests related to growing the business, not just protecting revenue streams. For example, marketers might want to correlate margins and revenues for specific customer segments with demographic information derived from the customer relationship management system. Finance executives might want to make a similar correlation, but in reverse, so they can include segment information about customers when making decisions about margins and risk prioritization.
LTE: The Mobile Darling's Secret Sauce
Users are snapping up features via the mobile network du jour, LTE, quicker than hotcakes. Global deployments of commercial LTE networks are ramping up - there are more than 200 right now - and subscribers are signing on in huge numbers. Rapid growth always carries consequences, but some of the most significant repercussions are those that users barely notice, even though they are directly affected by them. Because of its speed, LTE delivers an attractive mobile on-ramp to the Internet, which is changing the way smartphone and tablet owners use their devices.
Monetizing Content Intelligence
Another significant monetization opportunity for content intelligence is through the use of content analytics. By analyzing content usage of their network subscribers, service providers can identify usage trends at a macro level, helping them to determine how to spend on network enhancements and expansion. Content analytics also contributes to profiling content usage so that service providers can create and offer services that address emerging customer needs. When supported by a DPI platform, content intelligence can clearly be monetized as part of cost saving programs or brand-new, value-based subscriber services.
The Dog and Pony Show Is Still Critical
The Internet and websites make step one a lot easier. A prospect can simply call and say: I looked at your site, and you have the solution I need, how much is it? This appears straightforward but only if the solution is quite simple. Many prospects do not fully understand the technologies involved, for example, in a converged messaging solution, nor should they. That is the job of the sales professional. Therefore, you cannot skip or rush through steps two and three. You must fully qualify the opportunity. You have to drill down on the questions and make sure the prospect really understands the solutions being offered. The alternative could result in a sale but with a very unhappy customer and a lot of support calls.
Is Mobile Security in Your Control?
It is important to take measures to protect the components within the mobile network infrastructure that one has control over.
Ask the SIP Trunk Expert
SIP Trunking Benefits: Minimize Business Interruption
Disaster recovery, or more properly avoidance of business interruption, has become a key element of network planning. Enterprises require always on services - there's no room for downtime when you have customers, or employees, depending on the network. This is especially true with voice applications that are mission-critical to any business.
What Millennials Can Teach Us about Collaboration
I realize this analysis will not hold up in the mainstream, but I do believe it reflects how the workforce is evolving. If you have a lot of millennials in your midst, there may well be a disconnect between your expectations of UC and the results from your end users. In that event, you probably have a thing or two to learn from millennials about what collaboration means to them, and once you have that, you'll probably want to have a chat with your UC vendor.
How Verizon’s Buyout of Vodafone Relates to FirstNet
How Verizon's Buyout of Vodafone Relates to FirstNet
So, what is the value of Verizon Wireless if the government is going to fund its capital expenditures on a nationwide network rollout? The exact answer is presently unknown, but certainly it is a much higher valuation than $289 billion if capital expenditures for new infrastructure were baked in to that number as being funded by the company.
Why the FCC's 5gHz Rule Making is So Important
A neutral database can be used to coordinate power levels between the radios without requiring spectrum sensing in the devices. The databases can tell radios within tightly defined geographies to turn on or off, or to change channels based on the database information of other radios operating in the same geographies and same channels. The databases would operate to give priority to higher power (1W) radios over lower power (50mW) radios but at the same time allow lower power radios to occupy the bandwidth that is unused in a local geography by a higher power radio.
GENBAND Buys Fring to Make Carriers Sexy
The idea may not work as well as intended, but there are a lot of reasons why this move could be very successful.
Top of Mind
Update from OpenWorld
I understand that concepts usually aren't as simple as they may at first seem. For example, we heard a lot about the public cloud and its many benefits. And all that's true. But recently we're starting to hear more about private and hybrid clouds as well, which just goes to show that not every solution meets every need, and that new technologies often morph and are redefined as they move forward.
Technology: The Modern Swimming Lesson
Modern technology - from consumer devices to enterprise software and cloud computing - it's changing our world, for the better, most would argue. Indeed, every business is constantly on the lookout for methods of improving workflows and processes to create more efficient operations. In many cases, automation plays a significant role in creating more efficient businesses.
Gaining Momentum in the Channel: Hosted VoIP Provider's Valued Partner Program Off to a Strong Start
Hosted VoIP is supposed to be easy to deliver, but the plug-and-pray method of installation doesn't always work so great for customers, or the agents that sell them such solutions. The true path to hosted VoIP success is to take the time to visit the customer location, do a site survey, handle the installation rather than just ship the customer phones, and offer ongoing support and quality monitoring throughout the life of the customer and channel partner relationship.
Eliminating Disconnects Through Omnichannel Communications
In the business world, we hear the word integration all the time - integration of processes, of technology, of people. But when thinking about the word integration, what does it really mean? Is it just a buzzword, or is there something behind it?
Listen Up Already
The October 2012 Disaster Preparedness column titled "How the Cow Ate the Cabbage" referenced a frequently used Texas folk saying included by former Texas Gov. Ann Richards in her speech at the 1988 Democratic convention. The generally accepted meaning is to tell someone a truth they do not want to hear. Hopefully TMC readers in the Northeast listened and acted quickly as disaster was just around the corner.
It's Prime Time to Monetize OTT Video
For mobile operators, all of these factors combine to create challenges to overcome along with revenue opportunities to seize when looking to encourage OTT video usage. But this has to be achieved without operators breaking their networks, depleting the consumer's bank account, providing a poor quality experience, or worse yet modifying the consumer's behavior to only watch streamed video content on Wi-Fi access networks. The time for mobile operators to capitalize on mobile OTT video usage is now and so is the technology needed to make it happen.
FCC E-Rate Overhaul Could Affect VoIP Eligibility
As part of its planned overhaul of the program, the FCC has requested comment on whether to phase out support for certain "outdated" services (i.e., paging, directory assistance, custom calling features, inside wiring maintenance, call blocking, text messaging), as well as other types of services such as e-mail, web hosting, basic maintenance of internal connections (BMIC), cellular data plans and air cards, and possibly all basic phone service.
Kontron MS2900 No Ordinary Server
A new product recently released by Kontron called the SymKloud MS2900 is not just another ordinary server, but instead is targeted at solving the critical challenges of cloud-based applications. The product is certainly feature rich, but the four features that clearly distinguish the new MS2900 are its switching, load balancing, modularity, and reliability. This new platform takes the modularity and switching strengths from the ATCA standard and combines them with the lower profile and price of a standard 2U rack mount server.
NFV: Virtualization Leads to Dynamic Services
NFV is a working group within the European Telecommunications Standards Institute to determine how the drive for software and virtualization can benefit CSPs. NFV is designed to virtualize services in the next-generation networks such as 4G LTE's evolved packet core. This means that services such as VoIP and rich communications services could migrate from proprietary platforms to COTS hardware as virtualized software running on industry standardized platforms. Services within the CSP network such as the SBC or SIP proxy are primary targets for virtualization and the NFV committee.
Ask the SIP Trunk Expert
Q&A: What is an E-SBC?
At Ingate's SIP Trunking Academy at ITEXPO we held several sessions on the role of E-SBCs and SIP trunking. We talked the nuts and bolts of session border controllers, security, interoperability, WebRTC…you name it. I wanted to share some of the Q&As.
The Upside of Personalization
By its nature, collaboration requires interaction among parties, and for that reason I've been exploring what this means to different stakeholders. Some people collaborate more effectively than others, and that can mean many things. On one level, there are good team players, while others just want to be left alone to do their thing. Then you have group dynamics where certain functions or departments interact easily with peers doing similar types of work, but not so well will those who work in completely unrelated areas.
US Patent Law is Broken, Here's How to Fix It
In 2012, Apple successfully sued Samsung for creating a screen that can distinguish between one or two fingers touching it. Apple also sued Samsung for copying the iPhone shapes, white and black colors, and rounded icons, among other things.
And today, Google Maps might get shut down in Germany for violating Microsoft's patent on a "computer system for identifying local resources and method therefor."
The US Fiber Gap
To be clear, not all fiber is, or was, created equal here in this country. Much of the fiber outside of a few major metros and fewer lower-tier cities is carrier-owned and therefore not readily available for lease, or IRU on any terms let alone reasonable ones. This is just a matter of course for carriers that do not wish to enable their competitors with the same benefit of control of fiber from their own inventory. Therein lies a conundrum.
What the Het?
Hetnet has become the most commonly used word in mobile infrastructure world. It was created from a rarely used term in the computer world: heterogeneous networks. That was coined to describe connecting different computers using different protocols on different diverse networks. Heterogeneous networks was applied first in 2009 to describe the integration of various mobile RAN network assets including macrocells, microcells, picocells, femtocells, distributed antenna system, and Wi-Fi access points. Because heterogeneous was such a mouthful, it was shortened in 2010 to hetnet. IEEE made a call for papers on hetnet in 2010 and held the first IEEE HetNet workshop in 2011.
Microsoft Buys Nokia Device and Services Business
Under the terms of the agreement, Microsoft will pay EUR 3.79 billion to purchase substantially all of Nokia's Devices & Services business, and EUR 1.65 billion to license Nokia's patents, for a total transaction price of EUR 5.44 billion in cash. Microsoft will draw upon its overseas cash resources to fund the transaction. The transaction is expected to close in the first quarter of 2014, subject to approval by Nokia's shareholders, regulatory approvals and other closing conditions.
Top of Mind
ITEXPO Panel Sees M2M, WebRTC, Wearable Tech as Game Changers
That was the gist of the opening panel on innovation at ITEXPO Vegas in August. The session featured James Brehm of Compass Intelligence; Phil Edholm of PKE Consulting; Carl Ford of Crossfire Media; Larry Lisser of Embrase Business Consulting; and
App Economy Means Software Telcos
There's no denying the pace of technology change has increased to a point where it has become a daily expectation. We don't always know what the next change will be, but we can be fairly certain the rising of the sun tomorrow will bring with it a new application, service, device, architecture, delivery method, or something else. That's the world in which we live - nothing is constant but change.
The Stars Are Aligning for WebRTC
WebRTC Conference & Expo this summer had its share of superstars, from "The Human Highlight Film" Dominique Wilkins to All-star third baseman Chipper Jones, and of course a global representation during the 1996 Summer Olympic Games.
SDN vs. NFV: What's the difference?
Hype is rising around software defined networking and network functions virtualization. But along with hype, there is also a lot of confusion.
Does Big Data Equal Big Answers?
The amount of data getting generated by businesses of all types has been exploding, and analyzing this information will be key to maintaining a competitive stance in the market.
Leverage - Use It
The lever is a simple device using a bar (long stick) and a pivot. It is one of the first tools used by man due to its simplicity. A bar 10 feet long can move a 200 pound rock if the pivot point is set 2.5 feet from the rock. The mechanical advantage would be 4:1 so the person only encounters the equivalent of 50 pounds of peak resistance.
Mobile device platforms and form factors are proliferating like weeds. IT departments have conceded BYOD to their users, so now they are faced with supporting a rapidly evolving array of client devices.
Content Routing - The Evolution and Virtualization of the Network
Technologies to move traffic back and forth on the Internet have evolved rapidly. How networks direct and steer traffic continues to change as technologies and solutions converge to manage content instead of packets.
Ask the SIP Trunk Expert
Call Center Dials-Up SIP Trunking
The high-volume, high-availability, fast pace of the large call center is ideal for SIP trunking. SIP trunks can be nimble enough for extremely fast deployments, so call centers can expand rapidly when needed.
The Downside of Personalization
This month I'm continuing the theme from my last column where I explored how end users see collaboration. The virtues of collaboration have been taken as gospel lately by senior management, and since most UC vendors are banking their future on it, this is the current almost everyone is swimming with.
Guest Room with Peter Bernstein
The State of Voice Services
Don't look now but deregulation of voice services is coming to a state near you. Multiple states have passed, are considering, or plan to consider requests by VoIP service providers that their services be considered as information services and thus exempt from traditional common carrier regulation.
FirstNet - Where Are We Now?
It has been a while since the last update on FirstNet, the independent authority within the NTIA, to provide emergency responders with the first high-speed, nationwide network dedicated to public safety. So, what has happened in the past six months?
What's Needed to Make FirstNet a Success
The 2012, U.S. Congress created the First Responder Network Authority, or FirstNet. It is the second time at the plate to try to create a dedicated nationwide, interoperable, highly reliable LTE network for the nation's 2.5 million public safety workers.
Americans Don't Know They Want Wearable Tech - Yet
Recently a headline stating that most Americans don't want wearable tech caught my eye and reminded me of many past of articles regarding consumer choices that were just plain wrong.
Top of Mind
E-Discovery & Chicago Revisited
When people use Google to search for something on the web, they're typically happy to get a few relevant results, which they check and then move on with their lives.
Inspecting the PRISM
It took less than a day for the imbroglio in the U.S. over the National Security Agency compelling Verizon (via until June 5 a secret court order) to turn over phone records to explode. As predicted, this became the top news item for days to come, which meant it was only a matter of time before there would be more information, either purposely leaked or uncovered by a now totally engaged investigative news community, about NSA best/worst practices.
Continuity Planning 101 - A Continuing Educational Series : Why Should You Listen to Our Advice?
The idea for this column began with a conversation between the two of us at ITEXPO West 2005 in Los Angeles. 2005 was the most active hurricane season in recorded history, and the devastation caused by Katrina was on everyone's mind. 2005 was also a turning point for IP telephony as, for the first time, more IP telephony systems were shipped than TDM phone systems.
The Benefits of Software-Based Session Border Controllers
In a typical scenario, SBC hardware sits on the border of two IP networks, with IP connections on both sides of the box and a physical connection to an IP network.
Is All DPI Created Equal?
DPI platforms analyze network traffic in different ways, much like a fingerprint or DNA database where patterns of classification are pre-established. This information is referenced against a criminal suspect to determine if there's a match. If you think of a data traffic session as a lineup of suspects, a fingerprint-like mechanism called signatures is used to help identify and classify traffic in real time by examining Layer 7 packet information. Just as with fingerprint/DNA classification schemes, signatures need to be updated constantly to improve classification success rates. Just-in-time signature database updates improve accuracy, thereby increasing cost savings or revenue capture for subscriber-based network services.
SDN - Don't Believe The Hype
Wikipedia says software-defined networking "is an approach to building data networking equipment and software that separates and abstracts elements of these systems. SDN allows network administrators to have programmable central control of network traffic without requiring physical access to the network's hardware devices… SDN decouples the system that makes decisions about where traffic is sent (the control plane) from the underlying system that forwards traffic to the selected destination (the data plane)."
The Ivy Bridge Impact on New Server Appliances
The Ivy Bridge CPU micro-architecture is a die shrink of today's Sandy Bridge CPU. The faster Xeon E5 and E7 chips, which are based on Ivy Bridge, will be made using the 22-nanometer process. This new Xeon chipset will certainly bring performance, but will also showcase improved power efficiency and security.
Now You Want Me to Collaborate? Leave Me Alone!
I have often noted that IT may be the economic buyer for UC, but employees are ultimately the end users and need to be co-opted along the way. The amorphous nature of UC makes the value proposition difficult to understand for IT, and the use case a bit tricky for end users to grasp. Nobody consulted end users about what an ideal UC solution should look like or even if they wanted it in the first place.
Applications, users, devices, and data are constantly in flux; even IP addresses, once solid points of light in an otherwise dark data center, are on the move. Security policies, whether focused on network or application access, user or application-generated data, must be dynamic and flexible enough to keep up to the constant myriad of changes. To not do so risks havoc and frustration when users can't access applications or check e-mail, or find their mobile device suddenly devoid of all data due to an unintentional policy violation.
Ask the SIP Trunk Expert
A Hype or Disruptive - Will WebRTC Have an Impact on the PBX and SIP Trunking?
WebRTC is Google's initiative to bring multimedia or real-time person-to-person communication - RTC - directly into the web browser. Although it may be a year before the IETF and W3C standards are in place, WebRTC is already available in Google's Chrome and Mozilla's Firefox browsers and applications are emerging.
Big Data, Big Opportunity for the Contact Center
According to an Aspect survey, 77 percent of Americans think companies that offer multiple channels as part of their customer service are easier to do business with, and 74 percent say they provide better service. Each time a customer interacts with a company, whether it's a Tweet, Facebook post, phone call or discussion board comment, valuable information is shared. Consumers have the expectation that the information from those exchanges are recorded and shared from channel to channel so they don't have to repeat to a live agent what they shared earlier in the week on an IM. Many companies trail the consumer when it comes to managing this information.
How Product Developers Can Improve Time to Market
These are the findings of a recent study of 280 globally-based product development executives who conveyed their top pain points, business risks, software impacts, and process improvements through the lens of resource management and capacity planning.
Key Players Converge in Boston to Share Views on Spectrum Sharing
From April 23-24, 2013, the White House's Networking and Information Technology Research and Development WSRD (Wireless Spectrum Research & Development, or Wizard) group met at MIT to discuss spectrum utilization. Meeting days after the Boston Marathon Bombing and in the MIT Stata Center, the sight of the killing of MIT Officer Sean Collier, one of the panels included Brookline Police Department's Scott Wilder, director of technology and communications, and Don Denning, CIO for public safety for the City of Boston. Both police officers participated in the crisis.
Clearwater is the Latest Development in Telcos' Software Transformation
Communications service providers are at war with OTT providers and need to ensure they are able to battle on as level a playing field as possible. There are significant costs associated with running a major telco, and hardware infrastructure certainly ranks high among them. Sure, OTT providers like Skype and WhatsApp have infrastructure costs as well, but they often leverage standard servers and software to achieve their goals. Contrast this to a telecom operator that typically buys proprietary equipment from a number of specialized manufacturers. The difference in costs between these approaches is quite steep.
Top of Mind
Stolen Smartphones, Tech M&A, and More on SDN Precon
The reason why is because, on the one hand, cellular service providers including AT&T, Sprint and Verizon (among others) have aligned with the to FCC to create a stolen phone database - which will allow operators to identify and block service to stolen devices. Some of these same carriers also have their own stolen phone databases. But, on the other hand, reports now indicate that wireless service providers and handset makers are not particularly gung-ho about preventing smartphone theft.
Beyond the Boom
The activity level has been dramatic. Vendors, consultants and IT professionals have had the best bull market in their history. Virtually every health care provider across the country is automating and integrating. IT-related capital spending has garnered a disproportionate share for many years. IT operating expense has increased dramatically while internal governance struggles to identify and realize tangible offsets in overall operating costs. Given strict deadlines imposed by the ACA, most of these systems are being installed rather than implemented. As a result, most providers have deferred difficult workflow and operational decisions until the optimization phase currently anticipated to begin in 2014-2015.
How Thirsty Are Service Providers?
The debate over the future of the traditional service provider market has never been louder, as pundits debate whether the behemoth network operators have it in their DNA to adapt quickly to meet the needs of customers. At ITEXPO Miami earlier this year, led by TMC's Peter Bernstein, a panel of industry insiders discussed the precarious position in which carriers find themselves today. The panel's collective resolution was skepticism over carriers' ability to effectively leverage their golden egg - their networks - to become true full service providers to their communities of users.
Want to Become a Rainmaker - Seed the Baby Boomer Clouds
Today's global economy is creating information and new technologies at an ever-increasing rate and pushing us to our limits. However, we have always adapted and survived. The current adaption process is encouraging specialization and convincing companies to migrate to the cloud.
Android devices are not vulnerable to such passive attacks. To get infected you must explicitly agree to install the malware. The two main ways you are tricked into victimhood are fake installs of legitimate software, and fake updates to legitimate software or to Android itself. Android has a line of defense against fake installs, in that by default you can only download applications from the Google Play store, which supposedly no longer hosts any malware-infected apps.
Does SDN Need to Get More Intelligent?
The promise of SDN is to separate out all network control functions in the control plane from data plane forwarding functions in network switches and routers. These network control functions can then be managed as a configurable resource running on off-the-shelf servers. A key component of the SDN architecture is the OpenFlow protocol that enables the network control functions to communicate with data plane network devices throughout the network. The Open Networking Foundation is an industry consortium that publishes the OpenFlow protocol as a standard to foster interoperability among vendors providing network technology in this new environment.
Internet Access Begins With an I - For Infrastructure
There seems to be some competition brewing in the great state of Texas. In April, Google announced that it would be bringing Google Fiber to Austin. Its intention is to provide a very similar level of service and pricing to that of its Kansas City offering.
The Rise of the Machine
Cisco calls it the Internet of things. Traditionalists are more likely to refer to it as machine-to-machine or M2M. Whatever you'd like to call it, the reality of inter-machine (or device, if you prefer) communication is here to stay. From the data center to your living room and into your car, the ways in which machines have begun to communicate with one another is exploding.
Ask the SIP Trunk Expert
Considerations When Selecting a SIP Trunking Provider: Business Continuity and Add-On Features
SIP trunks can offer significant cost savings for businesses, eliminating the need for local PSTN gateways, costly ISDN BRIs or PRIs. SIP trunking combines voice and data over a single broadband circuit, eliminating the need for a traditional phone service and saving customers up to 70 percent off their phone bills.
Unified Communications in 2013 - Is it Time to Change the Channel?
In my last column, I provided a state-of-the-market update on UC, and touched on some of the challenges that are holding back adoption. There's a lot of rethinking opportunity with UC, but the line is very fine between it being a loose collection of applications and an integrated platform to enable transformative change. The line may be fine, but the gap is large - perhaps more so than with other technologies.
Customers are Asking for Multichannel Customer Service - Are Companies Answering the Call?
Advancements in telecommunications and the rise of social media have enabled consumers to be vocal in ways that brands are still trying to understand. The relationship between customers and companies, for better or worse, is forever changed. Now, the customer has more control, and more power in choosing when, where and how they interact with brands.
3.5GHz Spectrum Sharing: Playing Together in the Sandbox
The FCC OET Chief Julius Knapp and FCC Chairman Julius Genachowski have been evangelical in their promotion of innovative spectrum sharing and encouraging sharing technology innovation. The FCC's White Spaces 2008 and 2010 orders laid the groundwork for spectrum sharing, creating a new spectrum access system to help everyone play fairly with unlicensed spectrum.
With Tablets and Smartphones Eating the PC, What Can Microsoft Do?
According to IDC, PC sales are in a tailspin with 76.3 million units sold in the first quarter of 2013. This number represents a decline of 13.9 percent compared to the forecast decline of 7.7 percent. These are the worst numbers since IDC started tracking in 1994, and it is the fourth quarter of year-on-year shipment declines.
Top of Mind
What's New in Networking & Last Year's Model
That said, first I'd like to again talk about the subject of software-defined networking, or SDN. If you're a regular reader of this magazine, or a close follower of the networking space, as I know you all are, you know that SDN is an area I've been covering closely in recent month and a topic that has received a good amount of attention in the industry overall. SDN is a disruptive new architecture that turns traditional thinking about networking on its head, approaching things from an application-first standpoint.
WebRTC: It's a SIP World After All
Unified communications - the ideal of anywhere, anytime, any medium, any device, any network access to communications resource - carries with it one major flaw. Specifically, despite the unprecedented advances in UC, which enable communications and collaboration in a variety of environments and situations, UC remains tied to specific applications and services, delivering true geographic transparency only within the confines of proprietary systems, despite the notion of standardization. The idea of a truly agnostic communications platform - being able to leverage UC capabilities, independent of application, device, or network - remains elusive.
LTE (and thus Diameter) Interworking Moves Center Stage
Since LTE uses Diameter as a signaling protocol, operators have a need for Diameter interworking with the signaling technologies used in other networks. This has given rise to the Diameter Interworking Gateway function, which moved onto the center stage at Mobile World Congress this year. It's a critical element to enable the successful rollout of LTE and a seamless user experience across different networks.
Continuity Planning 101 - A Continuing Educational Series: Hot Markets for Resellers - Regulatory Compliance and the Cloud
Recently government regulators have added some changes to the Health Insurance Portability and Accountability Act. The move has been interpreted by some as an attempt to slow down the migration to the cloud due to security concerns. The real question is whether any identified security breaches are due to the inherent architecture of the cloud or selecting the incorrect mix of products and services. This is a critical aspect as HIPAA also mandates that business continuity/disaster recovery be included in any deployment and cloud solutions provide the simplest and least expensive BC/DR solutions.
VoIP Regulation Debate Heats Up in Kansas
Two weeks after the KCC's order, legislation was introduced in the Kansas House of Representatives to deregulate VoIP and other IP-enabled services in the state. If passed, VoIP would remain subject to state Universal Service Fund and 911 obligations, but would not be otherwise subject to regulation by the KCC. The legislation was passed by the Kansas House of Representatives on February 28, and was sent to the Senate for consideration.
Life of DPI
Acronyms are everywhere in high tech, and this is yet another example of the confusion they can create regarding which technology they are referring to. Dots per inch is a lowercase acronym, and deep packet inspection is an uppercase one, so this should help to eliminate any confusion. In this monthly column I will attempt to demystify DPI and show by example how useful this technology is for both private network owners and public network operators.
FirstNet - Follow The Money
During the first week of March 2013, FirstNet Chairman Sam Ginn gave a presentation to the all important Governors of the States within the United States at the National Governors Association meeting in Washington D.C. Chairman Ginn's comments were very telling about the inner workings of FirstNet and what its intended course and potentially largest obstacle may be.
First, existing network isolation protocols such as VLAN and VRF cannot support large cloud deployments because of limitations on the number of network segments available. Second, the mobility of applications via virtual machine migration is hindered by an inability to cross layer 3 boundaries. This can ultimately limit scalability of applications by reducing the total pool of resources available within a layer 3 network silo.
Ask the SIP Trunk Expert
It's Time for a Change: Slow Innovation and Stagnation in the UC industry
Not much has happened in terms of product or business model innovation in the PBX and UC industry over the last decade.
Unified Communications in 2013 - Reality Check
Vendors have struggled with this dilemma for some time, and things aren't getting any easier in 2013. Businesses are still trying to extend the life of their legacy systems to manage shrinking budgets, and without a tangible cost reduction story, they're still hesitant to move ahead with UC. Some definitely understand the productivity angle, but others remain skeptical, leaving most of the buyers in the realm of early adopters.
Collaboration is at the Heart of the Telecommuting Debate
The merits and minuses of telecommuting have certainly been part of a lively business discussion in the aftermath of Marissa Mayer's announcement of the cancellation of telecommuting at Yahoo. Are people less productive when they work from home? Is accountability more difficult see? Further, when employees aren't physically in the office, does collective creativity, collaboration and productivity in the workplace as a whole suffer?
Wiretapping's Real Threat: Non-Compliance
CALEA is the federal law requiring CSPs to provide technical assistance to law enforcement agents engaged in lawful electronic surveillance of criminal suspects. The technical nature of the law makes it one of telecom's least understood and, for carriers, hard to implement mandates.
Deciphering Apple’s Success Involves a Simple Equation
A recent blog by Charlie Stross of Charlie’s Diary explains why he thinks Apple is blocking Flash from many of its newer devices. In a nutshell, Flash allows cross-platform development, and Apple of course doesn’t want to see this being done. There are other cross-platform tools available for the iPhone, but let’s not go there at this moment.
ARIN’s Guide to IPv6 Preparedness
Every device directly connected to the Internet needs an IP address. There are two versions: IP version 4, better known as IPv4, and IP version 6, aka IPv6. IPv4, the current version, holds 4,294,967,296 addresses, and about 92 percent of them have already been distributed. IPv6, the newer version, holds 340,282,366,920,938,463,463,374,607,431,768,211,456 addresses.
Next Wave Redux
Enterprise Social Networking, Beyond the Enterprise
There’s a classic study, “How Bell Labs Creates Star Performers” by Robert Kelley and Janet Caplan, that was published in the Harvard Business Review in 1993. In their studies, everyone they dealt with was smart. The first difference between star and middle performers was initiative, but No. 2 was work strategies for networking and self-management.
The FCC’s National Broadband Plan and Its Affect on VoIP
On March 16, 2010, after a 13-month study, the FCC released “Connecting America: The National Broadband Plan,” containing policy recommendations for achieving national goals identified by Congress. The plan recommends six long-term goals, many of which will undoubtedly affect VoIP providers, their markets, and the regulation of their services.
A Simple, Affordable Business Continuity Strategy
Today’s SMBs are faced with many challenges. Business continuity applications are crucial to a company’s survival. However, the start-up costs and the need for specialized IT staff sometimes prevent or delay a timely BC deployment until it is too late. Fortunately, today’s subscription-based service industry makes it easy and affordable to deploy a BC plan quickly. These solutions are generally referred to as SaaS or cloud computing. Some service providers support reseller channels to make it even easier for SMBs to acquire these technologies.
Developing a ‘Smart Appliance’ Strategy
As ISVs and OEMs rush to plan their cloud computing strategies, IT enterprises are looking to solve real business problems in the near term. Cloud computing is considered a disruptive technology as companies try to maximize their IT-related spending. Analysts report that more than 20 percent of enterprises are either piloting or implementing some cloud/utility computing solutions today and do not plan to own any IT assets after 2012.
VMware: Watching Microsoft and Citrix Partner Up
In a previous virtualization column I discussed how the popularity of virtualization has a good bit to do with provisioning, orchestration, and management. Once a dynamic infrastructure supporting the virtual platform is in place it becomes much easier to provision and turn up new virtual machines and resources than it does to turn up physical resources because the infrastructure is still made up of physical resources: physical machines with real CPUs and RAM, physical networks with real cabling and ports, and physical appliances that are better suited to running on hardware. However, in the current data center model where virtualization is king, physical resources and virtual resources need to work together as one unit. Despite the explosive growth of virtualization over the past few years, this integrated management and provisioning component has been missing.
Top of Mind
Tell Me What You Want, What You Really, Really Want
The need for more wireless spectrum to support the boom in mobile devices and bandwidth has been discussed at great length and, I thought, was an idea on which most in the industry agreed. But recently this supposition, as well as how wireless spectrum is made available for this purpose, has been thrown into question.
Ask the SIP Trunk Expert
SIP Trunking with Microsoft OCS
SIP trunking with Microsoft Office Communications Server presents a unique challenge, one that’s being faced by many enterprises today. It’s a problem with a simple solution, but one that needs to be addressed in order for SIP trunking to be possible.
Thinking IT Through
Choosing Between UC ROI and TCO Tools
SMBs are approaching UC deployment in a deliberate manner befitting the financial struggles many are experiencing. They see UC as a pathway for addressing several key business pain points.
CENX - Carrier Ethernet Interconnections with a Voice Exchange
A new entrant to the Ethernet exchange world has arrived – CENX. Carrier Ethernet Neutral Exchange is the proper name and what really defines this business model is the service of facilitating interconnections between Ethernet transport networks. This is done through a common Layer 2 Ethernet switch as VLANs between the carrier participants. Logically, each must be an operator of an Ethernet transport network, or at least have an Ethernet interface, in order to participate.
Viewpoint: Voice of the Customer
Five Things You Can Do to Improve Your Customer Experience
As a customer advocate, I’m happy to hear so many companies talk about the importance of customer experience. But how many are really taking steps to improve it across all channels?
Building Support for E911 — It Takes a Village
Building support inside your organization to implement E911 is an important task. There are multiple stakeholders within your organization that will be affected in some way by the implementation of E911, and it is important to explain the project to them, identify how E911 will affect them and gain their support. Not only does this approach ensure success in the implementation phase of the project, but it is often the most important success factor in obtaining executive and financial approval to move forward with an E911 project.
INTERNET TELEPHONY Newsletter
Sign up for our free weekly INTERNET TELEPHONY Newsletter!
Get the latest expert news, reviews & resources. Tailored specifically for VoIP and IP Communications.