David Byrd : Byrd's Eye View
David Byrd
Chief Marketing Officer for ANPI

Wearable Tech Expo 2014 Kicking off in NYC

My team is at the Jacob Javits Center setting up for Wearable Tech Expo 2014 which will take place Wednesday and Thursday...

Full Story »

When Does WebRTC Need a Media Server? Reason #7

Tsahi Levent-Levi’s white paper, “Seven Reasons for WebRTC Server-Side Processing,” details a variety of WebRTC-related scenarios that necessitate a media server....

Full Story »

How signaling spikes affect networks: 3 real-world examples

By: Josee Loudiadis, Director of Network Intelligence, Alcatel-Lucent

Data and signaling growth are usually good news for network operators, since growth often translates into higher revenues. But when growth is averaged over a month or quarter, the daily highs and lows of network activity are smoothed out. And signaling spikes remain hidden within the averages. These spikes can overwhelm available signaling capacity, which impairs the customer experience, as well as the operator’s reputation.

What happens when a spike occurs? Typically, a CPU Overload alarm appears on various mobile nodes. And the Network Operations Center (NOC) immediately starts praying that the burst is short-lived and doesn’t go over maximum peak-rate capacity. Because when that happens, all consumers are denied service access. Then, the process of identifying the source of the problem begins. This can be arduous, because it often involves applications completely out of NOC control. And the issue can’t be resolved easily without solid network analytics that enables engagement with application and device developers.

That’s the reason signaling information is a crucial part of the Alcatel-Lucent Mobile Apps Rankings report and why LTE World 2014 devotes an entire pre-conference day to the topic. It’s also why this blog offers a closer look at how some real-world disruptive signaling spikes got started — and were finally resolved.

Full Story »

The Expanding Channel Programs

Not only do I see more cloud service providers looking to the channel for sales, I see other channel programs expanding....

Full Story »

When Does WebRTC Need a Media Server? Reason #6

In a recent blog about the current state of WebRTC, I mentioned that readers should check out an excellent white paper...

Full Story »

The Six Degrees of Mobile Data Plan Innovation: It's Not All About Data- Mobile Voice and Messaging Share Plans Offer Plenty of Appeal

Alcatel-Lucent’s Rich Crowe continues the Six Degrees of Mobile Data Plan Innovation blog series by examining the degree to which consumers are interested in share plans that include unlimited voice and messaging but don’t include data.

The last Six Degrees blog explored consumer attitudes toward two different mobile share plan options: sharing data only and sharing voice, messaging and data. This blog will explore attitudes toward a 3rd option: sharing unlimited voice and messaging — but not data — across multiple devices or subscribers.

Full Story »

200G Optical Networks: What you need to know

By: Earl Kennedy, IP Transport Product Marketing, Alcatel-Lucent

Optical network operators have already made the move to 100G. But skyrocketing bandwidth demand means many are already pondering what’s next. With a 200G optical solution hitting the market, you probably have questions about when to move to 200G optical – and what you need to know when you make that move.

Full Story »

Spicy Asian Chops and Too Hot Huawei

August 23, 2010

Few times do I enter a weekend knowing the recipe of the week. Last week was such a weekend. I made two fabulous grilled dishes last week, blackened New York strip steak and spicy Asian chops. I had never prepared blacked steaks before but given the result, I will do them again.

The Wild Wild West and Net Neutrality

August 20, 2010

The immediate barrage of comments related to the net neutrality proposal from Google and Verizon gave me pause. While looking to such major players to devise a net neutrality plan that would truly address the concerns of consumer activists and Internet entrepreneurs would be foolish. I needed time to consume the proposal to understand was it really that bad for the industry and Broadvox. In some ways, the proposal begins to address my change in position regarding net neutrality.

Offal is not Awful and the Seven Deadliest Attacks

August 18, 2010

Last week was great for food. I was in Cleveland to train our new channel managers when I found I had an evening to myself. I went to Lola, owned by Michael Symon, an Iron Chef on the food network. I chose the restaurant because he is into offal and there will be sweetbreads on the menu.

Survivability

August 18, 2010

Last week, I missed posting my Friday blog. I was working on a response to a proposal for a large multi-national enterprise. It was different from most RFPs we receive, in that pricing and traffic were not the primary concern. Instead, the primary concern was business continuity or survivability.

Cloud Nine is Thai Green Curry and No PBXs

August 16, 2010

I had my older grandson, Jake, for the weekend, so cooking took an interesting turn. Friday was burgers with Belgian fries. Since Jake loves sushi, Saturday, we took him to an Asian buffet for dinner called Tokyo One. Although, only thirteen he attacked the variety of food with zest.

The 75 Coolest Service Providers

August 11, 2010

When I joined Broadvox three years ago, I was not familiar with the company. Although, I had an asterisk-based PBX in my home office, I was also unfamiliar with SIP Trunking. The challenge at the time of my hiring was to establish both the company and the technology as mainstream for VARs, consultants and, of course, end-users. Over the last three years, we have developed a superb organization (see the August Newsletter) and a very robust and feature-rich product offering.

Roasted and Fired

August 9, 2010

I actually accomplished a long desired goal this weekend. I took my grandkids to the Ringling Brothers and Barnum & Bailey Circus. Previously, they were too young or too busy or lived out of the state. Sunday, though everything came together.

Combating the Seven Deadliest Attacks with an E-SBC

August 6, 2010

The seven deadliest attacks on Unified Communications do not need to be fatal. However, they do require multiple approaches. First, here is the list as developed by Dan York. If you want to see details, please visit the Wednesday blog or read his book, the "Seven Deadliest Unified Communications Attacks".

1)      The Ecosystem Expansion exposes voice and video applications to the same security challenges as data.

The Seven Deadliest UC Attacks

August 4, 2010

The number of end points continues to increase dramatically. As such, they are drawing the attention of hackers globally. Just as smartphones using Apple OS and Android are attracting the attention of hackers, as noted with the increase in benign and malicious phone apps, so too has the IP community become a target. In addressing this increase, service providers must work in conjunction with their sales channels and customers to make every effort to prevent or minimize the exposure.

CPNI

July 30, 2010

As the FCC has increased penalties for violating CPNI, service providers are improving their policies regarding the requirement. Customer information such as name, address and billing telephone number, is known as "Customer Proprietary Network information," or CPNI. Additionally, service features, class of service, phone charges, billing and call records are considered elements of CPNI. The FCC has issued a requirement that all parties with access to CPNI must give the customer the option of disallowing the information to be used for certain marketing activates and certainly restricting its resell to third parties. The penalties are such that each violation carries a substantial fine.

Featured Events