Traveling the Uncanny Valley
As robots become more and more humanlike, researchers have observed that there is a sudden dip in appeal, a feeling of revulsion, close to the most human-like end of the spectrum. They call this the uncanny valley, since a near perfect simulation can transition out the other side.
From Business Protection to Business Growth
Getting urgent requests from internal users is nothing new for revenue assurance and fraud management teams in communications and digital service providers. But the nature of these requests is changing and in a fundamental way. These teams are now receiving many new requests related to growing the business, not just protecting revenue streams. For example, marketers might want to correlate margins and revenues for specific customer segments with demographic information derived from the customer relationship management system. Finance executives might want to make a similar correlation, but in reverse, so they can include segment information about customers when making decisions about margins and risk prioritization.
LTE: The Mobile Darling's Secret Sauce
Users are snapping up features via the mobile network du jour, LTE, quicker than hotcakes. Global deployments of commercial LTE networks are ramping up - there are more than 200 right now - and subscribers are signing on in huge numbers. Rapid growth always carries consequences, but some of the most significant repercussions are those that users barely notice, even though they are directly affected by them. Because of its speed, LTE delivers an attractive mobile on-ramp to the Internet, which is changing the way smartphone and tablet owners use their devices.
Monetizing Content Intelligence
Another significant monetization opportunity for content intelligence is through the use of content analytics. By analyzing content usage of their network subscribers, service providers can identify usage trends at a macro level, helping them to determine how to spend on network enhancements and expansion. Content analytics also contributes to profiling content usage so that service providers can create and offer services that address emerging customer needs. When supported by a DPI platform, content intelligence can clearly be monetized as part of cost saving programs or brand-new, value-based subscriber services.
The Dog and Pony Show Is Still Critical
The Internet and websites make step one a lot easier. A prospect can simply call and say: I looked at your site, and you have the solution I need, how much is it? This appears straightforward but only if the solution is quite simple. Many prospects do not fully understand the technologies involved, for example, in a converged messaging solution, nor should they. That is the job of the sales professional. Therefore, you cannot skip or rush through steps two and three. You must fully qualify the opportunity. You have to drill down on the questions and make sure the prospect really understands the solutions being offered. The alternative could result in a sale but with a very unhappy customer and a lot of support calls.
Is Mobile Security in Your Control?
It is important to take measures to protect the components within the mobile network infrastructure that one has control over.
Ask the SIP Trunk Expert
SIP Trunking Benefits: Minimize Business Interruption
Disaster recovery, or more properly avoidance of business interruption, has become a key element of network planning. Enterprises require always on services - there's no room for downtime when you have customers, or employees, depending on the network. This is especially true with voice applications that are mission-critical to any business.
What Millennials Can Teach Us about Collaboration
I realize this analysis will not hold up in the mainstream, but I do believe it reflects how the workforce is evolving. If you have a lot of millennials in your midst, there may well be a disconnect between your expectations of UC and the results from your end users. In that event, you probably have a thing or two to learn from millennials about what collaboration means to them, and once you have that, you'll probably want to have a chat with your UC vendor.
How Verizon’s Buyout of Vodafone Relates to FirstNet
How Verizon's Buyout of Vodafone Relates to FirstNet
So, what is the value of Verizon Wireless if the government is going to fund its capital expenditures on a nationwide network rollout? The exact answer is presently unknown, but certainly it is a much higher valuation than $289 billion if capital expenditures for new infrastructure were baked in to that number as being funded by the company.
Why the FCC's 5gHz Rule Making is So Important
A neutral database can be used to coordinate power levels between the radios without requiring spectrum sensing in the devices. The databases can tell radios within tightly defined geographies to turn on or off, or to change channels based on the database information of other radios operating in the same geographies and same channels. The databases would operate to give priority to higher power (1W) radios over lower power (50mW) radios but at the same time allow lower power radios to occupy the bandwidth that is unused in a local geography by a higher power radio.
GENBAND Buys Fring to Make Carriers Sexy
The idea may not work as well as intended, but there are a lot of reasons why this move could be very successful.
Top of Mind
Update from OpenWorld
I understand that concepts usually aren't as simple as they may at first seem. For example, we heard a lot about the public cloud and its many benefits. And all that's true. But recently we're starting to hear more about private and hybrid clouds as well, which just goes to show that not every solution meets every need, and that new technologies often morph and are redefined as they move forward.
Technology: The Modern Swimming Lesson
Modern technology - from consumer devices to enterprise software and cloud computing - it's changing our world, for the better, most would argue. Indeed, every business is constantly on the lookout for methods of improving workflows and processes to create more efficient operations. In many cases, automation plays a significant role in creating more efficient businesses.
Gaining Momentum in the Channel: Hosted VoIP Provider's Valued Partner Program Off to a Strong Start
Hosted VoIP is supposed to be easy to deliver, but the plug-and-pray method of installation doesn't always work so great for customers, or the agents that sell them such solutions. The true path to hosted VoIP success is to take the time to visit the customer location, do a site survey, handle the installation rather than just ship the customer phones, and offer ongoing support and quality monitoring throughout the life of the customer and channel partner relationship.
Eliminating Disconnects Through Omnichannel Communications
In the business world, we hear the word integration all the time - integration of processes, of technology, of people. But when thinking about the word integration, what does it really mean? Is it just a buzzword, or is there something behind it?
Listen Up Already
The October 2012 Disaster Preparedness column titled "How the Cow Ate the Cabbage" referenced a frequently used Texas folk saying included by former Texas Gov. Ann Richards in her speech at the 1988 Democratic convention. The generally accepted meaning is to tell someone a truth they do not want to hear. Hopefully TMC readers in the Northeast listened and acted quickly as disaster was just around the corner.
It's Prime Time to Monetize OTT Video
For mobile operators, all of these factors combine to create challenges to overcome along with revenue opportunities to seize when looking to encourage OTT video usage. But this has to be achieved without operators breaking their networks, depleting the consumer's bank account, providing a poor quality experience, or worse yet modifying the consumer's behavior to only watch streamed video content on Wi-Fi access networks. The time for mobile operators to capitalize on mobile OTT video usage is now and so is the technology needed to make it happen.
FCC E-Rate Overhaul Could Affect VoIP Eligibility
As part of its planned overhaul of the program, the FCC has requested comment on whether to phase out support for certain "outdated" services (i.e., paging, directory assistance, custom calling features, inside wiring maintenance, call blocking, text messaging), as well as other types of services such as e-mail, web hosting, basic maintenance of internal connections (BMIC), cellular data plans and air cards, and possibly all basic phone service.
Kontron MS2900 No Ordinary Server
A new product recently released by Kontron called the SymKloud MS2900 is not just another ordinary server, but instead is targeted at solving the critical challenges of cloud-based applications. The product is certainly feature rich, but the four features that clearly distinguish the new MS2900 are its switching, load balancing, modularity, and reliability. This new platform takes the modularity and switching strengths from the ATCA standard and combines them with the lower profile and price of a standard 2U rack mount server.
NFV: Virtualization Leads to Dynamic Services
NFV is a working group within the European Telecommunications Standards Institute to determine how the drive for software and virtualization can benefit CSPs. NFV is designed to virtualize services in the next-generation networks such as 4G LTE's evolved packet core. This means that services such as VoIP and rich communications services could migrate from proprietary platforms to COTS hardware as virtualized software running on industry standardized platforms. Services within the CSP network such as the SBC or SIP proxy are primary targets for virtualization and the NFV committee.
Ask the SIP Trunk Expert
Q&A: What is an E-SBC?
At Ingate's SIP Trunking Academy at ITEXPO we held several sessions on the role of E-SBCs and SIP trunking. We talked the nuts and bolts of session border controllers, security, interoperability, WebRTC…you name it. I wanted to share some of the Q&As.
The Upside of Personalization
By its nature, collaboration requires interaction among parties, and for that reason I've been exploring what this means to different stakeholders. Some people collaborate more effectively than others, and that can mean many things. On one level, there are good team players, while others just want to be left alone to do their thing. Then you have group dynamics where certain functions or departments interact easily with peers doing similar types of work, but not so well will those who work in completely unrelated areas.
US Patent Law is Broken, Here's How to Fix It
In 2012, Apple successfully sued Samsung for creating a screen that can distinguish between one or two fingers touching it. Apple also sued Samsung for copying the iPhone shapes, white and black colors, and rounded icons, among other things.
And today, Google Maps might get shut down in Germany for violating Microsoft's patent on a "computer system for identifying local resources and method therefor."
The US Fiber Gap
To be clear, not all fiber is, or was, created equal here in this country. Much of the fiber outside of a few major metros and fewer lower-tier cities is carrier-owned and therefore not readily available for lease, or IRU on any terms let alone reasonable ones. This is just a matter of course for carriers that do not wish to enable their competitors with the same benefit of control of fiber from their own inventory. Therein lies a conundrum.
What the Het?
Hetnet has become the most commonly used word in mobile infrastructure world. It was created from a rarely used term in the computer world: heterogeneous networks. That was coined to describe connecting different computers using different protocols on different diverse networks. Heterogeneous networks was applied first in 2009 to describe the integration of various mobile RAN network assets including macrocells, microcells, picocells, femtocells, distributed antenna system, and Wi-Fi access points. Because heterogeneous was such a mouthful, it was shortened in 2010 to hetnet. IEEE made a call for papers on hetnet in 2010 and held the first IEEE HetNet workshop in 2011.
Microsoft Buys Nokia Device and Services Business
Under the terms of the agreement, Microsoft will pay EUR 3.79 billion to purchase substantially all of Nokia's Devices & Services business, and EUR 1.65 billion to license Nokia's patents, for a total transaction price of EUR 5.44 billion in cash. Microsoft will draw upon its overseas cash resources to fund the transaction. The transaction is expected to close in the first quarter of 2014, subject to approval by Nokia's shareholders, regulatory approvals and other closing conditions.
Top of Mind
ITEXPO Panel Sees M2M, WebRTC, Wearable Tech as Game Changers
That was the gist of the opening panel on innovation at ITEXPO Vegas in August. The session featured James Brehm of Compass Intelligence; Phil Edholm of PKE Consulting; Carl Ford of Crossfire Media; Larry Lisser of Embrase Business Consulting; and
App Economy Means Software Telcos
There's no denying the pace of technology change has increased to a point where it has become a daily expectation. We don't always know what the next change will be, but we can be fairly certain the rising of the sun tomorrow will bring with it a new application, service, device, architecture, delivery method, or something else. That's the world in which we live - nothing is constant but change.
The Stars Are Aligning for WebRTC
WebRTC Conference & Expo this summer had its share of superstars, from "The Human Highlight Film" Dominique Wilkins to All-star third baseman Chipper Jones, and of course a global representation during the 1996 Summer Olympic Games.
SDN vs. NFV: What's the difference?
Hype is rising around software defined networking and network functions virtualization. But along with hype, there is also a lot of confusion.
Does Big Data Equal Big Answers?
The amount of data getting generated by businesses of all types has been exploding, and analyzing this information will be key to maintaining a competitive stance in the market.
Leverage - Use It
The lever is a simple device using a bar (long stick) and a pivot. It is one of the first tools used by man due to its simplicity. A bar 10 feet long can move a 200 pound rock if the pivot point is set 2.5 feet from the rock. The mechanical advantage would be 4:1 so the person only encounters the equivalent of 50 pounds of peak resistance.
Mobile device platforms and form factors are proliferating like weeds. IT departments have conceded BYOD to their users, so now they are faced with supporting a rapidly evolving array of client devices.
Content Routing - The Evolution and Virtualization of the Network
Technologies to move traffic back and forth on the Internet have evolved rapidly. How networks direct and steer traffic continues to change as technologies and solutions converge to manage content instead of packets.
Ask the SIP Trunk Expert
Call Center Dials-Up SIP Trunking
The high-volume, high-availability, fast pace of the large call center is ideal for SIP trunking. SIP trunks can be nimble enough for extremely fast deployments, so call centers can expand rapidly when needed.
The Downside of Personalization
This month I'm continuing the theme from my last column where I explored how end users see collaboration. The virtues of collaboration have been taken as gospel lately by senior management, and since most UC vendors are banking their future on it, this is the current almost everyone is swimming with.
Guest Room with Peter Bernstein
The State of Voice Services
Don't look now but deregulation of voice services is coming to a state near you. Multiple states have passed, are considering, or plan to consider requests by VoIP service providers that their services be considered as information services and thus exempt from traditional common carrier regulation.
FirstNet - Where Are We Now?
It has been a while since the last update on FirstNet, the independent authority within the NTIA, to provide emergency responders with the first high-speed, nationwide network dedicated to public safety. So, what has happened in the past six months?
What's Needed to Make FirstNet a Success
The 2012, U.S. Congress created the First Responder Network Authority, or FirstNet. It is the second time at the plate to try to create a dedicated nationwide, interoperable, highly reliable LTE network for the nation's 2.5 million public safety workers.
Americans Don't Know They Want Wearable Tech - Yet
Recently a headline stating that most Americans don't want wearable tech caught my eye and reminded me of many past of articles regarding consumer choices that were just plain wrong.
Top of Mind
E-Discovery & Chicago Revisited
When people use Google to search for something on the web, they're typically happy to get a few relevant results, which they check and then move on with their lives.
Inspecting the PRISM
It took less than a day for the imbroglio in the U.S. over the National Security Agency compelling Verizon (via until June 5 a secret court order) to turn over phone records to explode. As predicted, this became the top news item for days to come, which meant it was only a matter of time before there would be more information, either purposely leaked or uncovered by a now totally engaged investigative news community, about NSA best/worst practices.
Continuity Planning 101 - A Continuing Educational Series : Why Should You Listen to Our Advice?
The idea for this column began with a conversation between the two of us at ITEXPO West 2005 in Los Angeles. 2005 was the most active hurricane season in recorded history, and the devastation caused by Katrina was on everyone's mind. 2005 was also a turning point for IP telephony as, for the first time, more IP telephony systems were shipped than TDM phone systems.
The Benefits of Software-Based Session Border Controllers
In a typical scenario, SBC hardware sits on the border of two IP networks, with IP connections on both sides of the box and a physical connection to an IP network.
Is All DPI Created Equal?
DPI platforms analyze network traffic in different ways, much like a fingerprint or DNA database where patterns of classification are pre-established. This information is referenced against a criminal suspect to determine if there's a match. If you think of a data traffic session as a lineup of suspects, a fingerprint-like mechanism called signatures is used to help identify and classify traffic in real time by examining Layer 7 packet information. Just as with fingerprint/DNA classification schemes, signatures need to be updated constantly to improve classification success rates. Just-in-time signature database updates improve accuracy, thereby increasing cost savings or revenue capture for subscriber-based network services.
SDN - Don't Believe The Hype
Wikipedia says software-defined networking "is an approach to building data networking equipment and software that separates and abstracts elements of these systems. SDN allows network administrators to have programmable central control of network traffic without requiring physical access to the network's hardware devices… SDN decouples the system that makes decisions about where traffic is sent (the control plane) from the underlying system that forwards traffic to the selected destination (the data plane)."
The Ivy Bridge Impact on New Server Appliances
The Ivy Bridge CPU micro-architecture is a die shrink of today's Sandy Bridge CPU. The faster Xeon E5 and E7 chips, which are based on Ivy Bridge, will be made using the 22-nanometer process. This new Xeon chipset will certainly bring performance, but will also showcase improved power efficiency and security.
Now You Want Me to Collaborate? Leave Me Alone!
I have often noted that IT may be the economic buyer for UC, but employees are ultimately the end users and need to be co-opted along the way. The amorphous nature of UC makes the value proposition difficult to understand for IT, and the use case a bit tricky for end users to grasp. Nobody consulted end users about what an ideal UC solution should look like or even if they wanted it in the first place.
Applications, users, devices, and data are constantly in flux; even IP addresses, once solid points of light in an otherwise dark data center, are on the move. Security policies, whether focused on network or application access, user or application-generated data, must be dynamic and flexible enough to keep up to the constant myriad of changes. To not do so risks havoc and frustration when users can't access applications or check e-mail, or find their mobile device suddenly devoid of all data due to an unintentional policy violation.
Ask the SIP Trunk Expert
A Hype or Disruptive - Will WebRTC Have an Impact on the PBX and SIP Trunking?
WebRTC is Google's initiative to bring multimedia or real-time person-to-person communication - RTC - directly into the web browser. Although it may be a year before the IETF and W3C standards are in place, WebRTC is already available in Google's Chrome and Mozilla's Firefox browsers and applications are emerging.
Big Data, Big Opportunity for the Contact Center
According to an Aspect survey, 77 percent of Americans think companies that offer multiple channels as part of their customer service are easier to do business with, and 74 percent say they provide better service. Each time a customer interacts with a company, whether it's a Tweet, Facebook post, phone call or discussion board comment, valuable information is shared. Consumers have the expectation that the information from those exchanges are recorded and shared from channel to channel so they don't have to repeat to a live agent what they shared earlier in the week on an IM. Many companies trail the consumer when it comes to managing this information.
How Product Developers Can Improve Time to Market
These are the findings of a recent study of 280 globally-based product development executives who conveyed their top pain points, business risks, software impacts, and process improvements through the lens of resource management and capacity planning.
Key Players Converge in Boston to Share Views on Spectrum Sharing
From April 23-24, 2013, the White House's Networking and Information Technology Research and Development WSRD (Wireless Spectrum Research & Development, or Wizard) group met at MIT to discuss spectrum utilization. Meeting days after the Boston Marathon Bombing and in the MIT Stata Center, the sight of the killing of MIT Officer Sean Collier, one of the panels included Brookline Police Department's Scott Wilder, director of technology and communications, and Don Denning, CIO for public safety for the City of Boston. Both police officers participated in the crisis.
Clearwater is the Latest Development in Telcos' Software Transformation
Communications service providers are at war with OTT providers and need to ensure they are able to battle on as level a playing field as possible. There are significant costs associated with running a major telco, and hardware infrastructure certainly ranks high among them. Sure, OTT providers like Skype and WhatsApp have infrastructure costs as well, but they often leverage standard servers and software to achieve their goals. Contrast this to a telecom operator that typically buys proprietary equipment from a number of specialized manufacturers. The difference in costs between these approaches is quite steep.
Top of Mind
Stolen Smartphones, Tech M&A, and More on SDN Precon
The reason why is because, on the one hand, cellular service providers including AT&T, Sprint and Verizon (among others) have aligned with the to FCC to create a stolen phone database - which will allow operators to identify and block service to stolen devices. Some of these same carriers also have their own stolen phone databases. But, on the other hand, reports now indicate that wireless service providers and handset makers are not particularly gung-ho about preventing smartphone theft.
Beyond the Boom
The activity level has been dramatic. Vendors, consultants and IT professionals have had the best bull market in their history. Virtually every health care provider across the country is automating and integrating. IT-related capital spending has garnered a disproportionate share for many years. IT operating expense has increased dramatically while internal governance struggles to identify and realize tangible offsets in overall operating costs. Given strict deadlines imposed by the ACA, most of these systems are being installed rather than implemented. As a result, most providers have deferred difficult workflow and operational decisions until the optimization phase currently anticipated to begin in 2014-2015.
How Thirsty Are Service Providers?
The debate over the future of the traditional service provider market has never been louder, as pundits debate whether the behemoth network operators have it in their DNA to adapt quickly to meet the needs of customers. At ITEXPO Miami earlier this year, led by TMC's Peter Bernstein, a panel of industry insiders discussed the precarious position in which carriers find themselves today. The panel's collective resolution was skepticism over carriers' ability to effectively leverage their golden egg - their networks - to become true full service providers to their communities of users.
Want to Become a Rainmaker - Seed the Baby Boomer Clouds
Today's global economy is creating information and new technologies at an ever-increasing rate and pushing us to our limits. However, we have always adapted and survived. The current adaption process is encouraging specialization and convincing companies to migrate to the cloud.
Android devices are not vulnerable to such passive attacks. To get infected you must explicitly agree to install the malware. The two main ways you are tricked into victimhood are fake installs of legitimate software, and fake updates to legitimate software or to Android itself. Android has a line of defense against fake installs, in that by default you can only download applications from the Google Play store, which supposedly no longer hosts any malware-infected apps.
Does SDN Need to Get More Intelligent?
The promise of SDN is to separate out all network control functions in the control plane from data plane forwarding functions in network switches and routers. These network control functions can then be managed as a configurable resource running on off-the-shelf servers. A key component of the SDN architecture is the OpenFlow protocol that enables the network control functions to communicate with data plane network devices throughout the network. The Open Networking Foundation is an industry consortium that publishes the OpenFlow protocol as a standard to foster interoperability among vendors providing network technology in this new environment.
Internet Access Begins With an I - For Infrastructure
There seems to be some competition brewing in the great state of Texas. In April, Google announced that it would be bringing Google Fiber to Austin. Its intention is to provide a very similar level of service and pricing to that of its Kansas City offering.
The Rise of the Machine
Cisco calls it the Internet of things. Traditionalists are more likely to refer to it as machine-to-machine or M2M. Whatever you'd like to call it, the reality of inter-machine (or device, if you prefer) communication is here to stay. From the data center to your living room and into your car, the ways in which machines have begun to communicate with one another is exploding.
Ask the SIP Trunk Expert
Considerations When Selecting a SIP Trunking Provider: Business Continuity and Add-On Features
SIP trunks can offer significant cost savings for businesses, eliminating the need for local PSTN gateways, costly ISDN BRIs or PRIs. SIP trunking combines voice and data over a single broadband circuit, eliminating the need for a traditional phone service and saving customers up to 70 percent off their phone bills.
Unified Communications in 2013 - Is it Time to Change the Channel?
In my last column, I provided a state-of-the-market update on UC, and touched on some of the challenges that are holding back adoption. There's a lot of rethinking opportunity with UC, but the line is very fine between it being a loose collection of applications and an integrated platform to enable transformative change. The line may be fine, but the gap is large - perhaps more so than with other technologies.
Customers are Asking for Multichannel Customer Service - Are Companies Answering the Call?
Advancements in telecommunications and the rise of social media have enabled consumers to be vocal in ways that brands are still trying to understand. The relationship between customers and companies, for better or worse, is forever changed. Now, the customer has more control, and more power in choosing when, where and how they interact with brands.
3.5GHz Spectrum Sharing: Playing Together in the Sandbox
The FCC OET Chief Julius Knapp and FCC Chairman Julius Genachowski have been evangelical in their promotion of innovative spectrum sharing and encouraging sharing technology innovation. The FCC's White Spaces 2008 and 2010 orders laid the groundwork for spectrum sharing, creating a new spectrum access system to help everyone play fairly with unlicensed spectrum.
With Tablets and Smartphones Eating the PC, What Can Microsoft Do?
According to IDC, PC sales are in a tailspin with 76.3 million units sold in the first quarter of 2013. This number represents a decline of 13.9 percent compared to the forecast decline of 7.7 percent. These are the worst numbers since IDC started tracking in 1994, and it is the fourth quarter of year-on-year shipment declines.
Top of Mind
What's New in Networking & Last Year's Model
That said, first I'd like to again talk about the subject of software-defined networking, or SDN. If you're a regular reader of this magazine, or a close follower of the networking space, as I know you all are, you know that SDN is an area I've been covering closely in recent month and a topic that has received a good amount of attention in the industry overall. SDN is a disruptive new architecture that turns traditional thinking about networking on its head, approaching things from an application-first standpoint.
WebRTC: It's a SIP World After All
Unified communications - the ideal of anywhere, anytime, any medium, any device, any network access to communications resource - carries with it one major flaw. Specifically, despite the unprecedented advances in UC, which enable communications and collaboration in a variety of environments and situations, UC remains tied to specific applications and services, delivering true geographic transparency only within the confines of proprietary systems, despite the notion of standardization. The idea of a truly agnostic communications platform - being able to leverage UC capabilities, independent of application, device, or network - remains elusive.
LTE (and thus Diameter) Interworking Moves Center Stage
Since LTE uses Diameter as a signaling protocol, operators have a need for Diameter interworking with the signaling technologies used in other networks. This has given rise to the Diameter Interworking Gateway function, which moved onto the center stage at Mobile World Congress this year. It's a critical element to enable the successful rollout of LTE and a seamless user experience across different networks.
Continuity Planning 101 - A Continuing Educational Series: Hot Markets for Resellers - Regulatory Compliance and the Cloud
Recently government regulators have added some changes to the Health Insurance Portability and Accountability Act. The move has been interpreted by some as an attempt to slow down the migration to the cloud due to security concerns. The real question is whether any identified security breaches are due to the inherent architecture of the cloud or selecting the incorrect mix of products and services. This is a critical aspect as HIPAA also mandates that business continuity/disaster recovery be included in any deployment and cloud solutions provide the simplest and least expensive BC/DR solutions.
VoIP Regulation Debate Heats Up in Kansas
Two weeks after the KCC's order, legislation was introduced in the Kansas House of Representatives to deregulate VoIP and other IP-enabled services in the state. If passed, VoIP would remain subject to state Universal Service Fund and 911 obligations, but would not be otherwise subject to regulation by the KCC. The legislation was passed by the Kansas House of Representatives on February 28, and was sent to the Senate for consideration.
Life of DPI
Acronyms are everywhere in high tech, and this is yet another example of the confusion they can create regarding which technology they are referring to. Dots per inch is a lowercase acronym, and deep packet inspection is an uppercase one, so this should help to eliminate any confusion. In this monthly column I will attempt to demystify DPI and show by example how useful this technology is for both private network owners and public network operators.
FirstNet - Follow The Money
During the first week of March 2013, FirstNet Chairman Sam Ginn gave a presentation to the all important Governors of the States within the United States at the National Governors Association meeting in Washington D.C. Chairman Ginn's comments were very telling about the inner workings of FirstNet and what its intended course and potentially largest obstacle may be.
First, existing network isolation protocols such as VLAN and VRF cannot support large cloud deployments because of limitations on the number of network segments available. Second, the mobility of applications via virtual machine migration is hindered by an inability to cross layer 3 boundaries. This can ultimately limit scalability of applications by reducing the total pool of resources available within a layer 3 network silo.
Ask the SIP Trunk Expert
It's Time for a Change: Slow Innovation and Stagnation in the UC industry
Not much has happened in terms of product or business model innovation in the PBX and UC industry over the last decade.
Unified Communications in 2013 - Reality Check
Vendors have struggled with this dilemma for some time, and things aren't getting any easier in 2013. Businesses are still trying to extend the life of their legacy systems to manage shrinking budgets, and without a tangible cost reduction story, they're still hesitant to move ahead with UC. Some definitely understand the productivity angle, but others remain skeptical, leaving most of the buyers in the realm of early adopters.
Collaboration is at the Heart of the Telecommuting Debate
The merits and minuses of telecommuting have certainly been part of a lively business discussion in the aftermath of Marissa Mayer's announcement of the cancellation of telecommuting at Yahoo. Are people less productive when they work from home? Is accountability more difficult see? Further, when employees aren't physically in the office, does collective creativity, collaboration and productivity in the workplace as a whole suffer?
Wiretapping's Real Threat: Non-Compliance
CALEA is the federal law requiring CSPs to provide technical assistance to law enforcement agents engaged in lawful electronic surveillance of criminal suspects. The technical nature of the law makes it one of telecom's least understood and, for carriers, hard to implement mandates.
White Spaces and the TV Incentive Auction: It is Not Simple
Coordinating, cooperating, and planning by mobile policy makers and mobile network engineers are the key to a successful new mobile ecosystem. However, traditionally, mobile carrier engineers have not seen the value of unlicensed Wi-Fi and of unlicensed wireless networks built by 80 million U.S. homeowners. The mobile engineers have focused on and depended on cell towers with air-conditioned huts at the tower base and backup generators supporting the huts.
Research Shows More Innovation Under a Joint Chairman/CEO
A new study by Stanford's Shai Bernstein involved extensive analysis of patents from nearly 2,000 companies and discovered the patents at public firms were more incremental than those at private firms. In order to determine the value of a patent she analyzed the amount of times a patent application was cited in other applications. The idea being that breakthrough patents are cited more often and are of greater quality.
TOP OF MIND
The FCC, NFV, SDN and VoIP
Change seems to be the only constant in the communications space. And, so, I wanted to use this space to review and comment on a handful of the important developments at the forefront of communications at the moment.
Steve Wozniak to Keynote at ITEXPO Las Vegas 2013
At ITEXPO Miami earlier this year, we were graced with insightful words by John Sculley, former CEO at Apple Inc. Today, we look ahead with excitement to the presence of yet another tech and Apple veteran - Steve Wozniak, at ITEXPO Las Vegas set for this August.Some of us go way back to the early days of personal computing. In fact, we can more or less go back to what is, relatively speaking, day one of the personal computing industry. To qualify, you would've had to actually program an MIT 8-bit computer by actually entering binary numbers through a toggle switch (up for ones down for zeros), then entering the true machine instruction. Yeah, we did that.
Partnering for Success
In 1996, the cloud was still a future concept and even today many health care professions have only a vague idea of what the term really means. These professionals may be highly educated, but the medical field is so far removed from the world of Internet telephony, SaaS, hosted VoIP, hybrid fax and other cloud technologies that the terms have little meaning. Regardless, many organizations have been attracted by the many benefits of cloud solutions including the inherent disaster recovery features, as mandated by HIPAA, and have been migrating to the cloud. This migration has created some concern among government regulators who feel that security is being jeopardized.
Going to Kansas City, Kansas City Here We Come!
In 2013, 61 years later, Kansas City is buzzing once again, but this time it is not a song about access to "crazy little women" that is causing the stir. It is about access to the Internet. It is even more so about access to the growing start-up company scene, or just becoming a part of something that is about to take off while the basis is still near zero. This modern-day digital Gold Rush is music to the ears of the people of Kansas City.
DDoS: The Application Connection
Attacks in general have been moving up the network stack to layer 7 for some time, but those we hear the most about tend to be those that result in data breaches such as SQL injection and XSS (Cross-Site Scripting). Lesser mentioned are the application-layer DDoS attacks, maybe because if they are difficult to defend against, they are even more difficult to simply detect.
Ask the SIP Trunk Expert
SIP Trunking and UC with Lync: The Role of the E-SBC
Enterprise session border controllers play an important role in enabling SIP trunking and all unified communications applications with Lync. Ingate Systems' E-SBC, the SIParator, is fully certified for use in Lync environments and meets or exceeds both the required and optional test parameters, making it one of the few E-SBCs that can support TLS and other security features offered by Microsoft.
Do You Have a Mobile Strategy?
We are just beginning to understand the implications of BYOI, and while this is primarily an IT issue, it's going to become a mobility issue given how much our personal identities are connected to our mobile devices. This adds a layer of complexity to BYOD that could pose both networking and ethical challenges for your business. Given how tightly privacy is tied to identity, along with the pervasiveness of cloud-based social media sites, managing identity may prove more difficult than managing the mobile devices themselves.
Centering Customer Analytics Around the Contact Center
Companies today are looking for a more consistent, real-time and clear view of their customers in order to stay competitive in today's hyper-connected economy -- from who their customers are, to what they need, to how they feel at any given time, and even what they might want or do in the future. Enterprises now have the potential to create this view.
The Telecom Server Landscape is Changing
Let's start with a look at the changes in the market. According to the International Telecommunications Union, there are more than 200,000 text messages sent every second worldwide. The Apple iPad's LTE and HD video support make a powerful combination and also drives up the demand for data-rich HD movies from service providers. Some full-length HD movie files can measure up to 4GB. This constant demand by consumers for more data and an unwillingness to pay for it presents some big challenges in the telco industry.
What Happened to Presence?
Caller ID fulfills half the promise of presence, by allowing you only to be interrupted by calls that you want to take. Instead of laboriously constructing and keeping current a whitelist of callers, you just look at the screen and make a decision. Then you take the interruption when you are ready, by picking up your voicemail.
Tax Policies Can Limit IT Growth, Innovation and Jobs
The IT industry is a vital contributor to our economy. The U.S. market accounts for approximately 26 percent of the $3.6 trillion global industry, representing more than $950 billion in IT hardware, software, services and telecommunications. Through innovation and growth, domestic IT firms have remained globally competitive and economically strong.
Considering a Spectrum of Developments
The mobile and wireless world is dominated by regulators and is dependent on smart, innovative regulation of spectrum. There is only a limited amount of spectrum and the job the regulators around the globe, and here in the U.S., is to ensure that the spectrum is efficiently and effectively used by those licensed to use that spectrum.
Are You Ready to be a Software Telco?
In a recent conversation with Steve Gleave and Carol Daniels of Metaswitch, I learned the company is taking the move to virtualization seriously and that the company's product launch of 19 months ago involves an SBC that was developed to run in such an environment. Expect the Metaswitch you know as the application server, gateway and SBC company to still do all these things but in software, running in virtualized environments on bare-metal servers. Their goal is to sell these solutions to you in order to turn your hardware telco into a software telco.
TOP OF MIND
Food for Thought
Mobile communications has taken over the world. That's clear if you just look around at what most people are doing at any public event, or within your own household. The point that wireless communications is center stage was crystal clear at the recent Mobile World Congress, where companies like Ericsson and Samsung spent a fortune on their massive exhibit spaces with attractive furnishings and extensive culinary spreads.
Guest Room (with Tech-Clarity)
How to Get the Right Products to Market Fast
The battle cry for most product development organizations today is speed. The sooner a company gets new products to market, the more likely it is to get a jump on the competition. The prize is first mover's advantage, which results in higher market share, price premiums and a profit margin advantage.
What Made ITEXPO Miami Hot
Having just recently wrapped up an incredibly successful ITEXPO Miami, I came away with a few important observations - other than the fact that South Beach is much warmer than New England in January.
Is Your Network Ready for Virtualization Protocols?
Software-defined networking has become the technology darling du jour. With its popularity comes the inevitable over-hyped use of the term to describe everything from network virtualization protocols to holistic dynamic data center fabric-style overlays. Most likely to be adopted in data center networks are network virtualization protocols such as VXLAN and NVGRE.
Ask the SIP Trunk Expert
Business Continuity with SIP Trunking
We are all reminded of the need for contingency planning for our data as well as voice communications when a natural disaster strikes. However, interrupted service can also be caused by unexpected call spikes, power outages, PBX failures, loss of connectivity, as well as a natural disaster.
Social Networking for Business - is it Just Social?
I think it's fair to say that the term social networking is on par with unified communications and cloud for being amorphous, ambiguous and just a little bit confusing. In the consumer world, most of us have a pretty good idea of what that looks like - Facebook, MySpace, Twitter, Google+, etc. To various degrees, these platforms have business applications - LinkedIn being the best example.
Deciphering Apple’s Success Involves a Simple Equation
A recent blog by Charlie Stross of Charlie’s Diary explains why he thinks Apple is blocking Flash from many of its newer devices. In a nutshell, Flash allows cross-platform development, and Apple of course doesn’t want to see this being done. There are other cross-platform tools available for the iPhone, but let’s not go there at this moment.
ARIN’s Guide to IPv6 Preparedness
Every device directly connected to the Internet needs an IP address. There are two versions: IP version 4, better known as IPv4, and IP version 6, aka IPv6. IPv4, the current version, holds 4,294,967,296 addresses, and about 92 percent of them have already been distributed. IPv6, the newer version, holds 340,282,366,920,938,463,463,374,607,431,768,211,456 addresses.
Next Wave Redux
Enterprise Social Networking, Beyond the Enterprise
There’s a classic study, “How Bell Labs Creates Star Performers” by Robert Kelley and Janet Caplan, that was published in the Harvard Business Review in 1993. In their studies, everyone they dealt with was smart. The first difference between star and middle performers was initiative, but No. 2 was work strategies for networking and self-management.
The FCC’s National Broadband Plan and Its Affect on VoIP
On March 16, 2010, after a 13-month study, the FCC released “Connecting America: The National Broadband Plan,” containing policy recommendations for achieving national goals identified by Congress. The plan recommends six long-term goals, many of which will undoubtedly affect VoIP providers, their markets, and the regulation of their services.
A Simple, Affordable Business Continuity Strategy
Today’s SMBs are faced with many challenges. Business continuity applications are crucial to a company’s survival. However, the start-up costs and the need for specialized IT staff sometimes prevent or delay a timely BC deployment until it is too late. Fortunately, today’s subscription-based service industry makes it easy and affordable to deploy a BC plan quickly. These solutions are generally referred to as SaaS or cloud computing. Some service providers support reseller channels to make it even easier for SMBs to acquire these technologies.
Developing a ‘Smart Appliance’ Strategy
As ISVs and OEMs rush to plan their cloud computing strategies, IT enterprises are looking to solve real business problems in the near term. Cloud computing is considered a disruptive technology as companies try to maximize their IT-related spending. Analysts report that more than 20 percent of enterprises are either piloting or implementing some cloud/utility computing solutions today and do not plan to own any IT assets after 2012.
VMware: Watching Microsoft and Citrix Partner Up
In a previous virtualization column I discussed how the popularity of virtualization has a good bit to do with provisioning, orchestration, and management. Once a dynamic infrastructure supporting the virtual platform is in place it becomes much easier to provision and turn up new virtual machines and resources than it does to turn up physical resources because the infrastructure is still made up of physical resources: physical machines with real CPUs and RAM, physical networks with real cabling and ports, and physical appliances that are better suited to running on hardware. However, in the current data center model where virtualization is king, physical resources and virtual resources need to work together as one unit. Despite the explosive growth of virtualization over the past few years, this integrated management and provisioning component has been missing.
Top of Mind
Tell Me What You Want, What You Really, Really Want
The need for more wireless spectrum to support the boom in mobile devices and bandwidth has been discussed at great length and, I thought, was an idea on which most in the industry agreed. But recently this supposition, as well as how wireless spectrum is made available for this purpose, has been thrown into question.
Ask the SIP Trunk Expert
SIP Trunking with Microsoft OCS
SIP trunking with Microsoft Office Communications Server presents a unique challenge, one that’s being faced by many enterprises today. It’s a problem with a simple solution, but one that needs to be addressed in order for SIP trunking to be possible.
Thinking IT Through
Choosing Between UC ROI and TCO Tools
SMBs are approaching UC deployment in a deliberate manner befitting the financial struggles many are experiencing. They see UC as a pathway for addressing several key business pain points.
CENX - Carrier Ethernet Interconnections with a Voice Exchange
A new entrant to the Ethernet exchange world has arrived – CENX. Carrier Ethernet Neutral Exchange is the proper name and what really defines this business model is the service of facilitating interconnections between Ethernet transport networks. This is done through a common Layer 2 Ethernet switch as VLANs between the carrier participants. Logically, each must be an operator of an Ethernet transport network, or at least have an Ethernet interface, in order to participate.
Viewpoint: Voice of the Customer
Five Things You Can Do to Improve Your Customer Experience
As a customer advocate, I’m happy to hear so many companies talk about the importance of customer experience. But how many are really taking steps to improve it across all channels?
Building Support for E911 — It Takes a Village
Building support inside your organization to implement E911 is an important task. There are multiple stakeholders within your organization that will be affected in some way by the implementation of E911, and it is important to explain the project to them, identify how E911 will affect them and gain their support. Not only does this approach ensure success in the implementation phase of the project, but it is often the most important success factor in obtaining executive and financial approval to move forward with an E911 project.
INTERNET TELEPHONY Newsletter
Sign up for our free weekly INTERNET TELEPHONY Newsletter!
Get the latest expert news, reviews & resources. Tailored specifically for VoIP and IP Communications.