This Q&A presentation was influenced by Kyle Kingsbury’s work on Jepsen, an exploration of modern databases. If you haven’t seen his work and you like this stuff, you should go check it out. It’s awesome.
Visualizing a Cyber Attack on a VoIP server. Really cool visualization!
The best part is that the honeypot (the server setup by the security researchers) is not even broadcast to the public internet as a VoIP server. Imagine the scale of attacks advertised servers receive.
It seems like everywhere you look these days, someone is killing the voice network. ReadWriteWeb says “Microsoft’s Skype owns 1/3rd of a dying network” and Facebook has amobile client that now does free phone calls, but all of these projects are missing the point.
Ho Ho Ho! It’s time for the holidays around these parts but things aren’t quite as silent as one might hope. Thanks to a big holiday present from the International Telecom Union (ITU) the whole world is watching as operators drink eggnog and debate the free world as we know it.
Firewalls or SBC’s? What’s the difference to you and me?
Seems like this question comes up a lot in our business. Controlling access to a site is critically important for most enterprises and the most common way to enforce policies is a firewall.
“If you’re going through Hell, Keep Going”-Winston ChurchillWinston Churchill had it right when he talked about perseverance. When things look grim, it’s time to double down and make things right. Today we’re talking about Disaster Recovery: how you can stay online even when the streets look like a scene from I am Legend.
WebRTC: Frictionless Communications
Humans have always needed to communicate. We are a social species, vulnerable to loneliness and keen on group input. Throughout the ages, humans have developed many creative ways to satisfy their need for connection. Before the advent of communications technology in the 20th century, the primary method was face to face meeting. Our communication options...
Many companies are just getting started in social media and navigating that ocean of public opinion can be a handful. Customers can give your firm a positive, or a negative, image in a moment’s notice — via Twitter, Facebook and other sites.
Discussion here on Hacker News.
Those of you who follow 2600hz know that we use OpenSIPs as our Session Border Controller, or perhaps more accurately, our Edge Proxy. This is about to change: 2600hz is moving to Kamailio.
This week’s GoDaddy outage took down millions of websites – but it also took down thousands of VoIP phones. Many people aren’t aware of how their VoIP phone is programmed, but it must know how to reach the VoIP service provider and usually
Back to the Future Part 1: Who Am I?
This post is brought to you by Joshua Goldbard. He’s our Biz Dev ambassador, a writer, loves talking to people and for some reason is crazy about phone systems. Find him out and about in the Bay Area or at the pub with a pint of Pliny the Elder in hand.
This post is cross-posted from James Aimonetti’s personal blog.
While writing a bulk importer for Crossbar, I took a look at squeezing some performance out of BigCouch for the actual inserting of documents into the database.
Google’s foray into the Voice market has made a mess of text messaging. Don’t believe us? Check out this laundry list of complaints that go well into the hundreds
Short for Public Switched Telephone Network, basically what preceded the VoIP era. It’s your standard telephone network that involves telephone lines, fiber optic cables, cell networks, satellites and telephone cables that were dropped