Monthly Archives: February 2015

Saving Lives with WebRTC

Dynamic information such as GPS coordinates are known by Google, Siri and other Apps on a smart phone, but these Apps don’t have the way, or key, to share that information with the outside world. It’s available on the phone, but the 9-1-1 center can’t get at it. Even though my name doesn’t appear on […]

Understanding Security Certificates for SIP Clients

Let me make this perfectly clear. I would never recommend that a company roll-out SIP clients (hard or soft telephones) without enacting comprehensive security policies. This applies to endpoints inside and outside the corporate network. Security is something that needs to be applied regardless of how or where users connect their devices. If a hacker […]

Solving the WebRTC Interoperability Problem

For me, the biggest concern with WebRTC is that it purposely does not define a signaling protocol. While the designers of WebRTC are proud of the flexibility this brings, pragmatic people like me are confused and frustrated. No standard signaling protocol means that there is no guarantee that anyone’s WebRTC application can talk to anyone […]

Get Out of Your Unified Communications Comfort Zone Now!

I love my job, but like all jobs, it comes with its own set of frustrations. Outside of the long hours and a grueling travel schedule, I am most frustrated by people unwilling to move out of their comfort zones. I am sure you know of whom I am talking. These are the people who […]

Understanding SIP Re-INVITE

For the most part, SIP isn’t all that complicated. The messages are fairly easy to understand and the call flows are straightforward enough.   In previous articles, I have shown how vendors like Avaya have implemented SIP solutions that make it more difficult to follow some call flows, but even they become manageable once you understand […]

A Primer on Communications Security

You can’t apply security in just one place and be done with it. In my latest article for No Jitter, I explore the fundamentals of  keeping prying eyes and ears away from your enterprise communications.  In a world where hackers are everywhere and the damage they do can be enormous, this is not a subject […]

Exploring Interoperability

Interoperability is something I deal with every single day of my working life. Just today I spent a significant amount of time researching which session border controllers successfully interoperate with which call recorders. While it might seem like a fairly straightforward task, this level of detail is rarely found in marketing brochures or product bulletins. […]