3,287 research outputs found
Reflections on security options for the real-time transport protocol framework
The Real-time Transport Protocol (RTP) supports a range of video conferencing, telephony, and streaming video ap- plications, but offers few native security features. We discuss the problem of securing RTP, considering the range of applications. We outline why this makes RTP a difficult protocol to secure, and describe the approach we have recently proposed in the IETF to provide security for RTP applications. This approach treats RTP as a framework with a set of extensible security building blocks, and prescribes mandatory-to-implement security at the level of different application classes, rather than at the level of the media transport protocol
Analysis of google entry in unified communications from a resource and competence perspective
The business communications market has been deeply transformed by technological and product convergence, due to the progressive substitution of traditional TDM-based voice products and services by ToIP (Telephony over IP) based products and services. The adoption of IP and the management of voice applications in the same way as data application has given rise to convergence offerings under the name of Unified Communications, and allowed the entry of data communications vendors, such as Cisco, in a market initially dominated by TDM-based product vendors. The increasing dissociation between hardware and software and the virtualisation of services have induced the entry of new players relying on their position in software and web services, among which Microsoft and Google. In this paper, drawing on the resource-based perspective, we analyse the patterns of entry of Google in this market. In particular, we highlight how Google relies on current specific resources, acquire and/or develop complementary resources in order to be able to compete on this market. In this work in progress paper, we put emphasis on the acquisition strategy of Google --
The diffusion of IP telephony and vendors' commercialisation strategies
This is a post-peer-review, pre-copyedit version of an article published in the Journal of Information Technology. The definitive publisher-authenticated version is available at the link below.The Internet telephony (IP telephony) has been presented as a technology that can replace existing fixed-line services and disrupt the telecommunications industry by offering new low-priced services. This study investigates the diffusion of IP telephony in Denmark by focusing on vendorsâ commercialisation strategies. The theory of disruptive innovation is introduced to investigate vendorsâ perceptions about IP telephony and explore their strategies that affect the diffusion process in the residential market. The analysis is based on interview data collected from the key market players. The study's findings suggest that IP telephony is treated as a sustaining innovation that goes beyond the typical voice transmission and enables provision of advanced services such as video telephony
Securing the RTP framework: why RTP does not mandate a single media security solution
This memo discusses the problem of securing real-time multimedia
sessions, and explains why the Real-time Transport Protocol (RTP),
and the associated RTP control protocol (RTCP), do not mandate a
single media security mechanism. Guidelines for designers and
reviewers of future RTP extensions are provided, to ensure that
appropriate security mechanisms are mandated, and that any such
mechanisms are specified in a manner that conforms with the RTP
architecture
TV-Centric technologies to provide remote areas with two-way satellite broadband access
October 1-2, 2007, Rome, Italy TV-Centric Technologies To Provide Remote Areas With Two-Way Satellite Broadband Acces
A two-way interactive broadband satellite architecture to break the digital divide barrier
September 24-26, 2007, Turin, Ital
- âŠ