www.fgks.org   »   [go: up one dir, main page]

 WARNING: JavaScript is either disabled or not supported by your browser. You may encounter problems using various features on CircleID. 

VoIP

Blogs

IP Network Transformation: Waiting Costs More Than You Think

Few CSPs would dispute that IP-based mobile communications are the future. But some still see little reason to replace TDM switches that, on the surface, cost them little beyond energy and housing expenses. At the recent Neustar Interactive Insights Summit, telecommunications experts Jennifer Pigg, Vice President at Yankee Group, outlined the conundrum -- and revealed the cost of doing nothing is higher than many think. more»

Webinar Tomorrow (May 22) - IPv6 and Telecom: IPv4 is Finally Running Out. Now What?

What is the impact of IPv6 on telecommunications, VoIP, unified communications, etc? Why should telecom operators care about IPv6? What VoIP systems already support IPv6? What efforts are underway within organizations like the IETF and the SIP Forum to ensure that telecommunications can work over IPv6? more»

STIR Working Group Officially Formed to Work on Secure Caller ID For VoIP

Interested in working on an open standard for "secure Caller ID" for voice-over-IP (VoIP)? If so, the new "Secure Telephone Identity Revisited (STIR)" working group was just officially chartered within the IETF and the mailing list is open for all to subscribe.  more»

Video: IETF Chair Jari Arkko Summarizes The Activities of IETF 87 In Berlin

The 87th meeting of the Internet Engineering Task Force (IETF) in Berlin, Germany, concluded on August 2, 2013. IETF Chair Jari Arkko recently published his summary of IETF 87 on the IETF Blog highlighting what he felt were some of the more important aspects of what was a very successful IETF meeting. I also had the privilege of interviewing Jari on video about the meeting. more»

Can We Create a Secure Caller ID For VoIP?

Can we create a "secure Caller ID" for IP-based communications, a.k.a. voice-over-IP (VoIP)? And specifically for VoIP based on the Session Initiation Protocol (SIP)? Can we create a way to securely identify the origin of a call that can be used to combat robocalling, phishing and telephony denial-of-service (TDOS) attacks? That is the challenge to be undertaken by the "Secure Telephone Identity Revisited (STIR)" group meeting tomorrow morning, July 30, 2013, at 9:00 am in Berlin, Germany, as part of the 87th meeting of the Internet Engineering Task Force (IETF). more»

Why the Opus Codec Matters - Even if You Don't Care About Audio

What makes the Opus codec so interesting? Why is there such a buzz about Opus right now? If you are not in telecom or doing anything with audio, why should you even remotely care about Opus? In a word... Innovation! And because Opus has the potential to let us communicate with each other across the Internet with a richer and more natural sound. You will be able to hear people or music or presenters with much more clarity and more like you are right there with them. more»

Moving Beyond Telephone Numbers - The Need for a Secure, Ubiquitous Application-Layer Identifier

Do "smart" parking meters really need phone numbers? Does every "smart meter" installed by electric utilities need a telephone number? Does every new car with a built-in navigation system need a phone number? Does every Amazon Kindle (and similar e-readers) really need its own phone number? In the absence of an alternative identifier, the answer seems to be a resounding "yes" to all of the above. more»

SIP Network Operators Conference (SIPNOC) Starts Tonight in Herndon, Virginia

Tonight begins the third annual SIP Network Operators Conference (SIPNOC) in Herndon, Virginia, where technical and operations staff from service providers around the world with gather to share information and learn about the latest trends in IP communications services - and specifically those based on the Session Initiation Protocol (SIP). Produced by the nonprofit SIP Forum, SIPNOC is an educational event sharing best practices, deployment information and technology updates. Attendees range from many traditional telecom carriers to newer VoIP-focused service providers and application developers. more»

An Introduction to Security and Reliability - What Does It Really Mean?

I co-authored a book in 2005, titled "Extreme Exploits: Advanced Defenses Against Hardcore Hacks." My chapters focused on securing routing protocols such as BGP, and securing systems related to DMZs, firewalls, and network connectivity. As I look back over those chapters, I realize that the basic fundamentals of network security really haven't changed much even though technology has advanced at an incredible pace. "Defense in depth" was a hot catch phrase seven years ago, and it still applies today. more»

Follow a Phishing Case in Real Time: postfinances.com / Swiss Post

It is just another phishing case. Why should I care? I happened to receive my own copy of the phishing email message. Most Internet users will just smile bitterly before deleting it. I checked it to see why it had gone through the spam filters. It had no URL in the text but a reply-to address. So it needed a valid domain name, and had one: postfinances.com. PostFinance (without trailing "s") is the payment system of the Swiss Post. It has millions of users. more»

It's Not Paranoia if They Are Really After You!

In the latest development from the World Conference on International Telecommunications, a new "compromise proposal" has been leaked to wcitleaks.org. This proposal is certainly no compromise, as it not only is a bald faced power grab by the sponsors (Russia, UAE, China, Saudi Arabia, Algeria, Sudan at this point), but shows a stunning lack of comprehension of how the Internet works and how it is currently governed. It also shows that the coalition of Civil Society groups and private sector organisations that have focused on WCIT have been correct all along.  more»

IETF 85 Begins Next Week In Atlanta - Here Is How To Follow Along

The 85th meeting of the Internet Engineering Task Force (IETF) begins next week in Atlanta, Georgia, USA. Over 1000 engineers, maybe as many as 1400 or more, from all around the world will gather in various working groups to discuss and debate issues relating to the open standards that define the Internet's infrastructure. more»

Ethiopia's Ban on Skype: An Excessive Stretch

Most international Medias picked the story wrong. And I see it being repeated. It is true that there is some legislative initiative regarding the regulation of VoIP calls and mainly the telecommunication sector in Ethiopia. But the initiative is just a draft, noting more. Besides there is no such a thing as 15 years punishment in the draft law for using Skype. Here are the provisions in the draft law that are stretched in many news headlines to bemoan that the use of Skype in Ethiopia entails 15 years punishment. more»

WebRTC/RTCWEB Congestion Control Workshop on July 28 in Vancouver

As we start moving more real-time communications into web browsers with the upcoming WebRTC/RTCWEB offerings, what do we do about congestion control? How do we ensure that all these browser-based communications sessions share the network fairly? With RTC capabilities now already available in builds for browsers such as Google Chrome and Mozilla Firefox, how do we deal with the expected increase in voice, video, chat and data traffic? more»

A Quick Primer on Internet Peering and Settlements

The business world today features many complex global service activities which involve multiple interconnected service providers. Customers normally expect to execute a single paid transaction with one service provider, but many service providers may assist in the delivery of the service. These contributory service providers seek compensation for their efforts from the initial provider. However, within a system of interdependent providers a service provider may undertake both roles of primary and contributory provider, depending on the context of each individual customer transaction. more»

News Briefs

U.S. Telcos to Test IP-Based Calling, FCC Approves Trials

FBI Pushing Plans to Force Surveillance Backdoors on Social Networks, VoIP, and Email Providers

Skype Now Officially Part of Microsoft

Microsoft to Acquire Skype

Skype Targets Developing Markets for Next Phase of Growth

12% of International Calls on Skype, Traffic Soaring According to Study

Cablecos Continue to Gain Telcom Market Share; Now at 15% and Growing

Google CEO Discusses Future of the Web and Enterprise Computing

Annual Global IP Traffic Will Exceed Two-Third of a Zettabyte in 4 Years

Obama to Name Mignon Clyburn as FCC Commissioner

National Domain Registry Nominet Launches UK ENUM

VoIP Services Reshaping the Fixed Line Market in Europe, Uptake Varies Widely

India to Block Close to 39 Foreign VoIP Service Providers

New Internet Study Finds Web and Streaming Higher Than P2P Traffic

Comcast Accused of Degrading VoIP Sound Quality of Competitors, Under FCC Investigation

Lawrence Lessig: FCC Beyond Repair, Should be Abolished

German Court Bans VoIP App for iPhone

Wi-Fi Alliance Now Certifying Devices for Voice Over Wi-Fi Applications

U.S. Bill Grants VoIP Providers Full 911 Access

VoIP Compression Technique Vulnerable to Ease Dropping

Most Viewed

Internet Governance: An Antispam Perspective

Examining Two Well-Known Attacks on VoIP

IPv6: Extinction, Evolution or Revolution?

NAT: Just Say No

Introductory Remarks from Innovation '08

Most Commented

Industry Updates

Participants – Random Selection