- Security Experts Warn VoIP Attacks May Be Just Around the Corner
- 4 months, 5 days, 1 hour, 53 minutes ago - Comments: 0
- Survey Finds VOIP User Satisfaction Despite Some Disconnect
- 4 months, 2 weeks, 2 days, 23 hours, 46 minutes ago - Comments: 0
- Vonage, D-Link Offer Co-Branded VOIP Adapter
- 4 months, 2 weeks, 2 days, 23 hours, 51 minutes ago - Comments: 0
- More News...
Inside: Technologies
Mar 30, 2006
Many communications networks are constructed for a single form of communication, and are ill suited to being used for any other form. Although the Internet is also a specialized network in terms of supporting digital communications, its relatively unique flexibility lies in its ability to digitally encode a very diverse set of communications formats, and then support their interaction over the Internet. In this way many communications networks can be mapped into an Internet application and in so doing become just another distributed application overlayed on the Internet. From this admittedly Internet-centric perspective, voice is just another Internet application. And for the growing population of Voice over IP (VoIP) users, this is indeed the case... ›››
By Geoff Huston |
Posted 7:55 pm PDT
/ Comments: 0
/ Views:
2005
|
Inside: Exploring Frontlines
Mar 24, 2006
›››
Inside: Regulation & Policies
Mar 23, 2006
Over the last ten years, Andrew Odlyzko has been writing about a pricing algorithm that would assure reasonable service levels at reasonable prices. If you're going to F2C, you might want to read that brief article or this slightly more complex one to learn (or refresh your sense of) PMP -- Paris Metro Pricing models to deal with network congestion. You'll also get a sense of why throwing bandwidth at the network will not be sufficient. Here's a great article from 1995... ›››
Inside: Regulation & Policies
Mar 23, 2006
The ›››
Inside: Regulation & Policies
Mar 22, 2006
Dave Farber was recently interviewed as part of the 37th KMB Conference, March 8, 9, &10, 2006 held at St. Petes Beach FL. Dave Farber provides the following background information and link to this video interview: "We have seen the Internet become a truly mass market phenomenon, reaching more than half of all American households. Broadband networks have been and are being deployed that are moving us towards higher levels of speed and capability. My concern with all of the debate and discussion I've reviewed to date is that there is far too little solid, in depth analysis and understanding on all sides and their implications on the future of the Internet." ›››
Inside: Technologies
Mar 20, 2006
Rob Hyndman has a pointer to Mark Cuban's latest: ›››
Inside: Technologies
Mar 20, 2006
I promised to finish up my VON posting after getting back, and wanted to comment briefly on two keynotes I particularly enjoyed. First was Tim O'Reilly, who is Jeff Pulver's counterpart in the Web 2.0 space. Jeff and Tim's worlds are increasingly sharing a common orbit, and I hope we'll see more cross-pollination here in future shows. Actually, Tim's presence struck me as the only really fresh wrinkle in the VON format, and I suspect -- and hope -- to see more content moving beyond voice to encompass things like Web 2.0 and video. Tim message about tech innovation had parallels to Jeff's keynote... ›››
By Jon Arnold |
Posted 1:14 pm PDT
/ Comments: 0
/ Views:
784
|
Inside: Exploring Frontlines
Mar 16, 2006
Burton Group issued a press release last week announcing the conclusions of my recent report on Skype. I thought the release clearly stated our conclusions on Skype, which essentially were that there are indeed security and management concerns that enterprises ought to be aware of, but that those risks may be outweighed by the business benefits offered by the use of the application, and that enterprises must carefully weigh risk vs. reward when evaluating Skype usage. ›››
By Irwin Lazar |
Posted 5:29 pm PDT
/ Comments: 0
/ Views:
852
|
Inside: Technologies
Mar 16, 2006
A buzzword in the cable/ilec world is IPTV, a plan to deliver TV over IP. Microsoft and several other companies have built IPTV offerings, to give phone and cable companies what they like to call a "triple play" (voice, video and data) and be the one-stop communications company. ...I'm at the pulver.com Von conference where people are pushing this, notably the BellSouth exec who just spoke. But they've got it wrong. We don't need IPTV. We want TVoIP or perhaps more accurately Vid-o-IP. ›››
Inside: Regulation & Policies
Mar 15, 2006
In this article, published in the Federal Communications Law Journal (›››
Inside: Security
Mar 14, 2006
Philip Zimmermann, creator of PGP, has announced the first official release of Zfone -- a system for encrypting any SIP VoIP voice stream. Below is Philip's introduction on Zfone as posted on his ›››
Inside: Regulation & Policies
Mar 13, 2006
Is the United States in full retreat from internationally recognized regulatory best practice? Or is it instead headed toward some different destination -- "dancing to the beat of a different drummer"? Where is this likely to lead? The following is an introduction to a paper, published by ›››
By Scott Marcus |
Posted 7:32 am PDT
/ Comments: 0
/ Views:
735
|
Inside: Business Strategies
Mar 09, 2006
The recent announcement that (new) AT&T will merge with (medium new) BellSouth doesn't change the current policy landscape very much. The dinosaurs are huddling ever-closer in the snow, hoping to survive whatever changes are ahead. It's a smart move on AT&T's part. Sheer numbers (70 million phone customers, 22 states, $130 billion in sales) may speak to AT&T's investors in a way that their business plans may not. ›››
Inside: Business Strategies
Mar 08, 2006
Next week, I'll be at ›››
Inside: Regulation & Policies
Mar 08, 2006
As I keep pointing out -- there is indeed a viable alternative of a real marketplace not a fake one. Today's system is a fake because it depends on capturing the value of the application - communications - in the transport and that is no longer possible because with the Internet the value is created OUTSIDE the network. One example of the collateral damage caused by today's approach is the utter lack of simple wireless connectivity. Another is that we have redundant capital intensive bit paths whose only purpose is to contain bits within billing paths. ›››
Page 2 of 4 pages:
< 1 2 3 4 >
Archives -
Search Tools
|
|