David Byrd : Byrd's Eye View
David Byrd
Chief Marketing Officer for ANPI

AirHopper: Even Air-Gap Networks are Not Secure

It’s a good time to be in the Cybersecurity business. Quite often, highly secure computers are disconnected from the outside world so...

Full Story »

The era of the hardware-based media server is over -scaling software-based media servers

As the telecom world moves closer and closer to software- based infrastructure, many questions are being asked about scalability of these...

Full Story »

Brochures

Full Story »

10 Reasons Why Microsoft is Winning

With new CEO Satya Nadella at the helm, Microsoft is changing and into something it needs to be. A company embracing a...

Full Story »

Recognizing the Similarities Between WebRTC and VoIP

Next week I’ll be giving a keynote at the WebRTC Conference and Expo V.  When I last gave a keynote at...

Full Story »

Invisible is Good Design

The whole idea of being a technology provider is that you make the technology invisible to the customer. They just have...

Full Story »

VDSL and Vectoring are Important Parts of Broadband Deployment

By: Wendy Zajack, Dir. Product Communications, Alcatel-Lucent

From original on Alcatel-Lucent corporate blog

A few months ago our home WiFi slowed to a crawl. At first we thought it was a temporary thing, but after my son ran a diagnostic there was a problem with our high-speed broadband.  

While the technician was fixing it, he mentioned that for an extra $10 a month we could get a faster plan.  Living in the US we already (in my opinion) pay enough for our monthly broadband package so I immediately said ‘no.’ But I told my kids that IF they wanted to pay for it … we would consider it.

Full Story »

Spicy Asian Chops and Too Hot Huawei

August 23, 2010

Few times do I enter a weekend knowing the recipe of the week. Last week was such a weekend. I made two fabulous grilled dishes last week, blackened New York strip steak and spicy Asian chops. I had never prepared blacked steaks before but given the result, I will do them again.

The Wild Wild West and Net Neutrality

August 20, 2010

The immediate barrage of comments related to the net neutrality proposal from Google and Verizon gave me pause. While looking to such major players to devise a net neutrality plan that would truly address the concerns of consumer activists and Internet entrepreneurs would be foolish. I needed time to consume the proposal to understand was it really that bad for the industry and Broadvox. In some ways, the proposal begins to address my change in position regarding net neutrality.

Offal is not Awful and the Seven Deadliest Attacks

August 18, 2010

Last week was great for food. I was in Cleveland to train our new channel managers when I found I had an evening to myself. I went to Lola, owned by Michael Symon, an Iron Chef on the food network. I chose the restaurant because he is into offal and there will be sweetbreads on the menu.

Survivability

August 18, 2010

Last week, I missed posting my Friday blog. I was working on a response to a proposal for a large multi-national enterprise. It was different from most RFPs we receive, in that pricing and traffic were not the primary concern. Instead, the primary concern was business continuity or survivability.

Cloud Nine is Thai Green Curry and No PBXs

August 16, 2010

I had my older grandson, Jake, for the weekend, so cooking took an interesting turn. Friday was burgers with Belgian fries. Since Jake loves sushi, Saturday, we took him to an Asian buffet for dinner called Tokyo One. Although, only thirteen he attacked the variety of food with zest.

The 75 Coolest Service Providers

August 11, 2010

When I joined Broadvox three years ago, I was not familiar with the company. Although, I had an asterisk-based PBX in my home office, I was also unfamiliar with SIP Trunking. The challenge at the time of my hiring was to establish both the company and the technology as mainstream for VARs, consultants and, of course, end-users. Over the last three years, we have developed a superb organization (see the August Newsletter) and a very robust and feature-rich product offering.

Roasted and Fired

August 9, 2010

I actually accomplished a long desired goal this weekend. I took my grandkids to the Ringling Brothers and Barnum & Bailey Circus. Previously, they were too young or too busy or lived out of the state. Sunday, though everything came together.

Combating the Seven Deadliest Attacks with an E-SBC

August 6, 2010

The seven deadliest attacks on Unified Communications do not need to be fatal. However, they do require multiple approaches. First, here is the list as developed by Dan York. If you want to see details, please visit the Wednesday blog or read his book, the "Seven Deadliest Unified Communications Attacks".

1)      The Ecosystem Expansion exposes voice and video applications to the same security challenges as data.

The Seven Deadliest UC Attacks

August 4, 2010

The number of end points continues to increase dramatically. As such, they are drawing the attention of hackers globally. Just as smartphones using Apple OS and Android are attracting the attention of hackers, as noted with the increase in benign and malicious phone apps, so too has the IP community become a target. In addressing this increase, service providers must work in conjunction with their sales channels and customers to make every effort to prevent or minimize the exposure.

CPNI

July 30, 2010

As the FCC has increased penalties for violating CPNI, service providers are improving their policies regarding the requirement. Customer information such as name, address and billing telephone number, is known as "Customer Proprietary Network information," or CPNI. Additionally, service features, class of service, phone charges, billing and call records are considered elements of CPNI. The FCC has issued a requirement that all parties with access to CPNI must give the customer the option of disallowing the information to be used for certain marketing activates and certainly restricting its resell to third parties. The penalties are such that each violation carries a substantial fine.

Featured Events