VoIP

VoIP / Featured Blogs

IP Network Transformation: Waiting Costs More Than You Think

Few CSPs would dispute that IP-based mobile communications are the future. But some still see little reason to replace TDM switches that, on the surface, cost them little beyond energy and housing expenses. At the recent Neustar Interactive Insights Summit, telecommunications experts Jennifer Pigg, Vice President at Yankee Group, outlined the conundrum -- and revealed the cost of doing nothing is higher than many think. more»

Webinar Tomorrow (May 22) - IPv6 and Telecom: IPv4 is Finally Running Out. Now What?

What is the impact of IPv6 on telecommunications, VoIP, unified communications, etc? Why should telecom operators care about IPv6? What VoIP systems already support IPv6? What efforts are underway within organizations like the IETF and the SIP Forum to ensure that telecommunications can work over IPv6? more»

STIR Working Group Officially Formed to Work on Secure Caller ID For VoIP

Interested in working on an open standard for "secure Caller ID" for voice-over-IP (VoIP)? If so, the new "Secure Telephone Identity Revisited (STIR)" working group was just officially chartered within the IETF and the mailing list is open for all to subscribe.  more»

Video: IETF Chair Jari Arkko Summarizes The Activities of IETF 87 In Berlin

The 87th meeting of the Internet Engineering Task Force (IETF) in Berlin, Germany, concluded on August 2, 2013. IETF Chair Jari Arkko recently published his summary of IETF 87 on the IETF Blog highlighting what he felt were some of the more important aspects of what was a very successful IETF meeting. I also had the privilege of interviewing Jari on video about the meeting. more»

Can We Create a Secure Caller ID For VoIP?

Can we create a "secure Caller ID" for IP-based communications, a.k.a. voice-over-IP (VoIP)? And specifically for VoIP based on the Session Initiation Protocol (SIP)? Can we create a way to securely identify the origin of a call that can be used to combat robocalling, phishing and telephony denial-of-service (TDOS) attacks? That is the challenge to be undertaken by the "Secure Telephone Identity Revisited (STIR)" group meeting tomorrow morning, July 30, 2013, at 9:00 am in Berlin, Germany, as part of the 87th meeting of the Internet Engineering Task Force (IETF). more»

Why the Opus Codec Matters - Even if You Don't Care About Audio

What makes the Opus codec so interesting? Why is there such a buzz about Opus right now? If you are not in telecom or doing anything with audio, why should you even remotely care about Opus? In a word... Innovation! And because Opus has the potential to let us communicate with each other across the Internet with a richer and more natural sound. You will be able to hear people or music or presenters with much more clarity and more like you are right there with them. more»

Moving Beyond Telephone Numbers - The Need for a Secure, Ubiquitous Application-Layer Identifier

Do "smart" parking meters really need phone numbers? Does every "smart meter" installed by electric utilities need a telephone number? Does every new car with a built-in navigation system need a phone number? Does every Amazon Kindle (and similar e-readers) really need its own phone number? In the absence of an alternative identifier, the answer seems to be a resounding "yes" to all of the above. more»

SIP Network Operators Conference (SIPNOC) Starts Tonight in Herndon, Virginia

Tonight begins the third annual SIP Network Operators Conference (SIPNOC) in Herndon, Virginia, where technical and operations staff from service providers around the world with gather to share information and learn about the latest trends in IP communications services - and specifically those based on the Session Initiation Protocol (SIP). Produced by the nonprofit SIP Forum, SIPNOC is an educational event sharing best practices, deployment information and technology updates. Attendees range from many traditional telecom carriers to newer VoIP-focused service providers and application developers. more»

An Introduction to Security and Reliability - What Does It Really Mean?

I co-authored a book in 2005, titled "Extreme Exploits: Advanced Defenses Against Hardcore Hacks." My chapters focused on securing routing protocols such as BGP, and securing systems related to DMZs, firewalls, and network connectivity. As I look back over those chapters, I realize that the basic fundamentals of network security really haven't changed much even though technology has advanced at an incredible pace. "Defense in depth" was a hot catch phrase seven years ago, and it still applies today. more»

Follow a Phishing Case in Real Time: postfinances.com / Swiss Post

It is just another phishing case. Why should I care? I happened to receive my own copy of the phishing email message. Most Internet users will just smile bitterly before deleting it. I checked it to see why it had gone through the spam filters. It had no URL in the text but a reply-to address. So it needed a valid domain name, and had one: postfinances.com. PostFinance (without trailing "s") is the payment system of the Swiss Post. It has millions of users. more»