Articles in Developers

We’re Opening Up (Nearly) Everything We Do. Here’s Why.

  • Gary E. Barnett
  • December 10, 2014 | Estimated reading time: 3 minutes to read
  • Technology wants to be open. This concept—giving people the tools and freedom to build new applications, based on open APIs—is disrupting every corner of technology.…

An Introduction to the Avaya WebRTC Snap-In

  • Andrew Prokop
  • October 22, 2014 | Estimated reading time: 8 minutes to read
  • Over the last several months, I’ve written a number of articles about WebRTC. I discussed encryption, network address translation, signaling, and--over the course of four…

Writing Your First WebRTC Application: Part 3

  • Andrew Prokop
  • September 23, 2014 | Estimated reading time: 6 minutes to read
  • Welcome to part three in my series of “Writing Your First WebRTC Application” articles. Part one described the basic components involved in a WebRTC solution…

Writing Your First WebRTC Application: Part 2

  • Andrew Prokop
  • September 4, 2014 | Estimated reading time: 4 minutes to read
  • Last week I posted the first article in my series on writing your first WebRTC application. In it, I explained the high level aspects of…

Writing Your First WebRTC Application: Part 1

  • Andrew Prokop
  • August 12, 2014 | Estimated reading time: 5 minutes to read
  • This is not the article that I intended to post today. The real article, which is still a work in progress, is a step-by-step approach…

Understanding WebRTC Media Connections: ICE, STUN and TURN

  • Andrew Prokop
  • August 11, 2014 | Estimated reading time: 6 minutes to read
  • In my previous blog article, An Introduction to WebRTC Signaling, I presented the basic flow of two Web browsers exchanging SDP through a signaling server.…

Introduction to WebRTC Signaling

  • Andrew Prokop
  • August 7, 2014 | Estimated reading time: 3 minutes to read
  • There is something you need to know about me. When I get excited about something, I tend to get really excited. Case in point is…

Writing Your First Avaya Aura Collaboration Environment App

  • Andrew Prokop
  • August 4, 2014 | Estimated reading time: 8 minutes to read
  • This is my fourth blog article about the Avaya Aura Collaboration Environment. My previous articles were fairly high level in nature and explained what you…

An Introduction to the Opus Codec

  • Andrew Prokop
  • July 15, 2014 | Estimated reading time: 4 minutes to read
  • This is my third article on audio codecs. The first two covered the common codecs such as G.711 and G.729, along with the relative newcomers…

A WebRTC Security Primer

  • Andrew Prokop
  • July 15, 2014 | Estimated reading time: 3 minutes to read
  • There are a number of reoccurring themes in my blog articles and security is near the top of the playlist. If you’ve been a long…

WebRTC: What It Is, and Why It's Coming to a Browser Near You Soon

  • Andrew Prokop
  • June 23, 2014 | Estimated reading time: 6 minutes to read
  • I have been working in the field of communications for a long time, and have witnessed many significant changes over the years. Some ideas, like…

Building a Killer 'Over the Top' Communications App Without Killing Someone

  • Mark J. Fletcher, ENP
  • June 2, 2014 | Estimated reading time: 4 minutes to read
  • With the recent announcements about text-to-911 becoming a reality in the US--despite its limited geographic deployment--we can firmly state that Next Generation 911 has evolved…

How Do You Implement Presence with SIP?

  • Andrew Prokop
  • June 2, 2014 | Estimated reading time: 6 minutes to read
  • Are you familiar with busy lamps on telephones? For many years, they were the only way you could “see” the telephone status of a coworker.…

Would an Emergency 911 Call Work from a SIP Phone?

  • Andrew Prokop
  • May 16, 2014 | Estimated reading time: 8 minutes to read
  • Have you ever had the need to dial 9-1-1? Unfortunately, I have. It was just one time, but one time is enough for me. I…

What Happens if You Don’t Create a Secure SIP Infrastructure? Bad Things.

  • Andrew Prokop
  • May 12, 2014 | Estimated reading time: 4 minutes to read
  • What happens if you don’t create a secure SIP infrastructure? Bad things can happen. There are lots of nasty people out there who are determined…