News and blogs
Topic
- All Topics
- 5G
- Clearwater Core
- Cloud Native
- Contact center
- Converged Network Message Store (CNMS)
- Events
- Fixed-Line Voice
- Interconnect
- Internet of Things (IoT)
- Internet Protocol (IP)
- IP Multimedia Subsystem (IMS)
- MANO
- Market Analysis
- MaX
- Messaging
- MetaSphere
- MetaView
- Mobile
- Mobile Backhaul
- Network Functions Virtualization (NFV)
- Network Operating System (NOS)
- News
- Open Service Creation
- Path Computational Element (PCE)
- Perimeta SBC
- Privacy
- Rich Communications Suite (RCS)
- Robocall Blocking
- Security
- Service Assurance Server
- Session Border Controller (SBC)
- SIP trunking
- Software Defined Networking (SDN)
- Unified Communications (UC)
- Universal Media Gateway
- Voice over Internet Protocol (VoIP)
- Voice over LTE (VoLTE)
- Voice over Wi-Fi (VoWiFi)
- WebRTC
- Wi-Fi

Senior Product Line Management, SIP Trunking and Hosted PBX
Posted By Steven Kennedy on August 31, 2018
The unfortunate truth these days is that you simply aren’t a communications service provider until you’ve had a run-in with telecom fraud. This can ...
Posted By Steven Kennedy on October 13, 2017
The move to all-IP networking from proprietary telecom technologies helps service providers reach more people, on more devices, more quickly than ...
Posted By Steven Kennedy on July 28, 2017
This blog post discusses the security implications of switching to VoLTE for mobile operators. Traditionally, the voice traffic elements of mobile ...
Posted By Steven Kennedy on October 03, 2014
We all know that SIP is a hodge-podge of standards, with a variety of “interesting” implementations floating around in the market.
Posted By Steven Kennedy on June 04, 2014
Are you watching the French Open tennis tournament? It’s great to see top athletes competing against one another. How would they perform if they were ...
Posted By Steven Kennedy on February 18, 2014
I’d like to use this blog post to highlight an often overlooked benefit of a software SBC, such as Perimeta. If only a low capacity SBC is required ...
Posted By Steven Kennedy on December 19, 2013
There is a thriving black-market in hacking communication systems. These systems are valuable targets for hackers, who will use their ingenuity to ...
Posted By Steven Kennedy on November 15, 2013
It happens so often throughout history that the acceptance of great, new ideas follows a pattern. Initially there is scepticism. People fear ...
Posted By Steven Kennedy on October 30, 2013
What does a cloud SBC look like? A key requirement of any cloud application is elasticity, so as the incident rate of your VOIP traffic varies you ...
Posted By Steven Kennedy on October 03, 2013
This is the third in a series of blog posts about WebRTC. It describes the encryption schemes used in WebRTC. WARNING – DISCUSSIONS OF ENCRYPTION ...
Posted By Steven Kennedy on September 23, 2013
This is the second in a series of blog posts about WebRTC. See part 1 here, which outlined the reasons why we expect to see a WebRTC gateway ...
Posted By Steven Kennedy on September 12, 2013
WebRTC (http://www.webrtc.org/), is used to set up voice and video calls between different web browsers. It’s easier to use than other OTT ...