David Byrd : Byrd's Eye View
David Byrd
Chief Marketing Officer for ANPI

Wearable Tech Expo 2014 Kicking off in NYC

My team is at the Jacob Javits Center setting up for Wearable Tech Expo 2014 which will take place Wednesday and Thursday...

Full Story »

When Does WebRTC Need a Media Server? Reason #7

Tsahi Levent-Levi’s white paper, “Seven Reasons for WebRTC Server-Side Processing,” details a variety of WebRTC-related scenarios that necessitate a media server....

Full Story »

How signaling spikes affect networks: 3 real-world examples

By: Josee Loudiadis, Director of Network Intelligence, Alcatel-Lucent

Data and signaling growth are usually good news for network operators, since growth often translates into higher revenues. But when growth is averaged over a month or quarter, the daily highs and lows of network activity are smoothed out. And signaling spikes remain hidden within the averages. These spikes can overwhelm available signaling capacity, which impairs the customer experience, as well as the operator’s reputation.

What happens when a spike occurs? Typically, a CPU Overload alarm appears on various mobile nodes. And the Network Operations Center (NOC) immediately starts praying that the burst is short-lived and doesn’t go over maximum peak-rate capacity. Because when that happens, all consumers are denied service access. Then, the process of identifying the source of the problem begins. This can be arduous, because it often involves applications completely out of NOC control. And the issue can’t be resolved easily without solid network analytics that enables engagement with application and device developers.

That’s the reason signaling information is a crucial part of the Alcatel-Lucent Mobile Apps Rankings report and why LTE World 2014 devotes an entire pre-conference day to the topic. It’s also why this blog offers a closer look at how some real-world disruptive signaling spikes got started — and were finally resolved.

Full Story »

The Expanding Channel Programs

Not only do I see more cloud service providers looking to the channel for sales, I see other channel programs expanding....

Full Story »

When Does WebRTC Need a Media Server? Reason #6

In a recent blog about the current state of WebRTC, I mentioned that readers should check out an excellent white paper...

Full Story »

The Six Degrees of Mobile Data Plan Innovation: It's Not All About Data- Mobile Voice and Messaging Share Plans Offer Plenty of Appeal

Alcatel-Lucent’s Rich Crowe continues the Six Degrees of Mobile Data Plan Innovation blog series by examining the degree to which consumers are interested in share plans that include unlimited voice and messaging but don’t include data.

The last Six Degrees blog explored consumer attitudes toward two different mobile share plan options: sharing data only and sharing voice, messaging and data. This blog will explore attitudes toward a 3rd option: sharing unlimited voice and messaging — but not data — across multiple devices or subscribers.

Full Story »

200G Optical Networks: What you need to know

By: Earl Kennedy, IP Transport Product Marketing, Alcatel-Lucent

Optical network operators have already made the move to 100G. But skyrocketing bandwidth demand means many are already pondering what’s next. With a 200G optical solution hitting the market, you probably have questions about when to move to 200G optical – and what you need to know when you make that move.

Full Story »

Hosting Services

March 9, 2012

Hosting services primary difference from cloud computing is that the hosted service provider is expected to provide servers for applications requested by the client or user. Therefore, a hosted environment can involve both the service provider and the client needing to learn about how the applications will interact with those offered by the service provider and those proposed by the client. Furthermore, most hosted environments are shared and although virtual machines are built running separate applications, one virtual server failure can affect another.

Interestingly, Broadvox delivers hosted communications with some customization but we do not allow for client provided applications to be loaded onto those servers.  

Cloud Computing, Hosted and Managed

March 7, 2012

Interestingly, I considered describing the differences between cloud computing, hosted and managed services as a somewhat unique for today’s and Friday’s blogs. However, there are several years worth of articles and blogs attempting to clarify these three offerings. Yet, my opinion of how the market and customers should view them remained unchanged even after a bit of research. While each has unique qualities, companies such as Broadvox offer all three.

Hot, Hot, Hot

March 5, 2012

I was definitely inspired to cook this weekend. Friday, Gay, my wife asked for chicken fried steak which I made along with chicken fried chicken. Saturday, began with shrimp omelettes for breakfast with meatloaf for dinner. Given that my first recipe turned many of you off because I did not use catsup as a topping.

Up, Up and Away

March 2, 2012

The Dow Jones Industrial average finally crossed 13,000 and held it earlier this week. That was significant because it has been four years since the Dow closed above 13,000. The last time the Dow reached 13,000 was in May of 2008. Some will lament that the number means little since it is still below the highest closing of 14,164 in October of 2007.

Scotch Eggs and FRAND for Breakfast

February 27, 2012

Scotch Eggs and FRAND for Breakfast

I have been waiting for a neighborhood Irish bar to open for months. The place was suppose to open in September but was delayed until last week. I had perused the menu prior to going and decided I wanted Scotch Eggs along with something else (fish and chips was high on the list).

BYOD is not for Everyone

February 24, 2012

The first thing people think of when BYOD is an option is security. In fact, Practicing Safe SIP was the most read blog I ever authored. However, the security concerns with BYOD are very different from those of properly protecting the enterprise from external threats. With BYOD you are inviting the threats as guests into the enterprise and you have no idea where those devices have been.

Mobile UC More than FMC

February 22, 2012

Fixed Mobile Convergence (FMC) once synonymous with mobile UC is now defined as merely a capability that most UC platforms deliver. The ability to transfer a call from a desk top device to a mobile device is not mobile UC. Furthermore, expanding IP communications from the VLAN to Wi-Fi is not UC. The use of Wi-Fi as a transport medium is more closely related convenience, cost reduction and technology leverage than UC.

Serious Mumbo Jumbo Gumbo

February 20, 2012

I was reminded that Mardi Gras is this week and was offered a gumbo recipe to try. First of all, I seldom use any recipes when cooking. I prefer to use my understanding of food elements or cuisines to develop recipes. Second, I am very serious about food from New Orleans, I enjoy fixing all it from Cajun to Creole to just plan good.

Cloud Privacy, An Unreasonable Expectation?

February 17, 2012

Cloud Privacy, An Unreasonable Expectation?

This morning it was announced that Google and other companies bypassed the privacy settings of iPhone users and computers using Apple’s Safari browser. After the discovery, Google, who has been reprimanded both here and abroad for violating privacy guidelines and policies, removed language from its site indicating Safari users could trust the Safari's privacy settings to prevent tracking. In a separate story Twitter acknowledged that it had copied the entire address books from both iPhones and Android smartphones.

Where No Man Has Gone Before

February 15, 2012

NASA announced this week that it was shutting down its last mainframe which generated a few memories. The first mainframe computer that I ever worked with was an IBM 360. Granted, I was not allowed to touch it, but after teaching myself FORTRAN, I was provided time to run research programs. Yes, we not only needed permission to gain access to this new computing power but we had to schedule time to do so.
Featured Events