SlideShare una empresa de Scribd logo
1 de 8
www.trilogy-lte.com

Threat Or Opportunity

Venky Swaminathan
www.trilogy-lte.com
Confidential
COMMUNICATION IS MOVING TO THE WEB

www.trilogy-lte.com

• Service
• Subscribers
• Subscription

• Application
• Users
• Transient

• Feature
• Contextual
• Revenue?

2

What HTML Did To Content – WebRTC Will Do To Telephony
Confidential
W HAT IS W EBRTC?
Voice

www.trilogy-lte.com

Video
File Sharing

Browser
Based
3

Peer to Peer
• Disruptive

HTML5

Drafted by W3C. Standard Open Source Libraries.
Confidential
S IGNALING
Control Messages

XMPP

www.trilogy-lte.com

Session Management

SIP

4

WebRTC Does Not Specify Signaling Method
Confidential
U SE C ASES

www.trilogy-lte.com

Browser to Browser

5

• Social Media
• Entertainment
• Conferencing
• App To App
• Gaming

Enterprise

• Click To Call
• Video Chat
• Sales
• Support

Telecom

• Traditional
Calls
• Non Traditional
Devices
• Video

Verticals

• Healthcare
• Education
• Emergency

Repeat of Smartphone App Phenomenon – Millions of Apps
Confidential
O PPORTUNITIES

www.trilogy-lte.com

Audio/V
ideo
Apps

Your Current
Services

OTT Apps

Gateway to
your
Network

WebRTC

Toolkits
& API’s
6

From Device Centric To Access Centric Solutions
Confidential
W EBRTC S ERVICES
Platform As a Service

www.trilogy-lte.com

WebRTC To SIP

Video/Media Gateway

Softphones

Roaming

Apps

Developer Program

Toolkits
7

API

Prepare For New & Untested Revenue Models
Confidential
www.trilogy-lte.com

DAAS - DIAMETER AS A
SERVICE
Thank You

www.trilogy-lte.com
Confidential

Más contenido relacionado

La actualidad más candente

How To Protect Mobile Apps and APIs from Attackers
How To Protect Mobile Apps and APIs from AttackersHow To Protect Mobile Apps and APIs from Attackers
How To Protect Mobile Apps and APIs from AttackersCentextech
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Ping Identity
 
WiFi Hotspot
WiFi HotspotWiFi Hotspot
WiFi HotspotWispot
 
Manage Your Mesh
Manage Your MeshManage Your Mesh
Manage Your MeshAkana
 
Managing Identities in the World of APIs
Managing Identities in the World of APIsManaging Identities in the World of APIs
Managing Identities in the World of APIsApigee | Google Cloud
 
Building better security for your API platform using Azure API Management
Building better security for your API platform using Azure API ManagementBuilding better security for your API platform using Azure API Management
Building better security for your API platform using Azure API ManagementEldert Grootenboer
 
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...CA API Management
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
Security Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessSecurity Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessMegan Bell
 
Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsCatherine MacAllister
 
Backstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity SummitBackstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity SummitForgeRock
 
Enhanced home security solutions kalay v2
Enhanced home security solutions  kalay v2Enhanced home security solutions  kalay v2
Enhanced home security solutions kalay v2Willie Lin
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesPing Identity
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactSalesforce Admins
 

La actualidad más candente (15)

How To Protect Mobile Apps and APIs from Attackers
How To Protect Mobile Apps and APIs from AttackersHow To Protect Mobile Apps and APIs from Attackers
How To Protect Mobile Apps and APIs from Attackers
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
 
WiFi Hotspot
WiFi HotspotWiFi Hotspot
WiFi Hotspot
 
Manage Your Mesh
Manage Your MeshManage Your Mesh
Manage Your Mesh
 
Managing Identities in the World of APIs
Managing Identities in the World of APIsManaging Identities in the World of APIs
Managing Identities in the World of APIs
 
Building better security for your API platform using Azure API Management
Building better security for your API platform using Azure API ManagementBuilding better security for your API platform using Azure API Management
Building better security for your API platform using Azure API Management
 
OAuth 1.0
OAuth 1.0OAuth 1.0
OAuth 1.0
 
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Security Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessSecurity Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info Wireless
 
Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless Connections
 
Backstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity SummitBackstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity Summit
 
Enhanced home security solutions kalay v2
Enhanced home security solutions  kalay v2Enhanced home security solutions  kalay v2
Enhanced home security solutions kalay v2
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major Impact
 

Similar a WebRTC: Market Disruption

AdhearsionConf 2013 Keynote
AdhearsionConf 2013 KeynoteAdhearsionConf 2013 Keynote
AdhearsionConf 2013 KeynoteMojo Lingo
 
Wind River Chumby Motorola Stacatto
Wind River   Chumby   Motorola   StacattoWind River   Chumby   Motorola   Stacatto
Wind River Chumby Motorola StacattoMarco Thompson
 
Real-time Communications at Internet Speed
Real-time Communications at Internet SpeedReal-time Communications at Internet Speed
Real-time Communications at Internet SpeedBrian Pulito
 
WebRTC and Telehealth
WebRTC and TelehealthWebRTC and Telehealth
WebRTC and TelehealthArin Sime
 
Identity Theft
Identity TheftIdentity Theft
Identity TheftSimpletel
 
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access Board
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access BoardSection 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access Board
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access BoardVirtual Ability, Inc.
 
Telco Adoption Of Web 2.0 & Open Innovation Issue 1
Telco Adoption Of Web 2.0 & Open Innovation Issue 1Telco Adoption Of Web 2.0 & Open Innovation Issue 1
Telco Adoption Of Web 2.0 & Open Innovation Issue 1Alan Quayle
 
What's new in web standards?
What's new in web standards?What's new in web standards?
What's new in web standards?Daniel Appelquist
 
Building Peru interactive-collaboration
Building Peru interactive-collaborationBuilding Peru interactive-collaboration
Building Peru interactive-collaborationEnrique Mesones
 
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...Nordic Infrastructure Conference
 
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...Felipe Prado
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low CostDonald Malloy
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecuritySherif Mansour
 
Firefox OS: Challenges and opportunities for an open source mobile OS
Firefox OS: Challenges and opportunities for an open source mobile OSFirefox OS: Challenges and opportunities for an open source mobile OS
Firefox OS: Challenges and opportunities for an open source mobile OSJacques Chicourel
 
Telefonica CCN and SDN / NFV
Telefonica CCN and SDN / NFVTelefonica CCN and SDN / NFV
Telefonica CCN and SDN / NFVPatrick Lopez
 
LyncConference2013 - Dimensionnement et gestion des Réseaux
LyncConference2013 - Dimensionnement et gestion des RéseauxLyncConference2013 - Dimensionnement et gestion des Réseaux
LyncConference2013 - Dimensionnement et gestion des RéseauxMicrosoft Technet France
 
HTML 5 & The Modern Web
HTML 5 & The Modern WebHTML 5 & The Modern Web
HTML 5 & The Modern WebJumping Bean
 
WebRTC and Telehealth
WebRTC and TelehealthWebRTC and Telehealth
WebRTC and TelehealthArin Sime
 

Similar a WebRTC: Market Disruption (20)

AdhearsionConf 2013 Keynote
AdhearsionConf 2013 KeynoteAdhearsionConf 2013 Keynote
AdhearsionConf 2013 Keynote
 
Wind River Chumby Motorola Stacatto
Wind River   Chumby   Motorola   StacattoWind River   Chumby   Motorola   Stacatto
Wind River Chumby Motorola Stacatto
 
Real-time Communications at Internet Speed
Real-time Communications at Internet SpeedReal-time Communications at Internet Speed
Real-time Communications at Internet Speed
 
WebRTC and Telehealth
WebRTC and TelehealthWebRTC and Telehealth
WebRTC and Telehealth
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access Board
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access BoardSection 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access Board
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access Board
 
Telco Adoption Of Web 2.0 & Open Innovation Issue 1
Telco Adoption Of Web 2.0 & Open Innovation Issue 1Telco Adoption Of Web 2.0 & Open Innovation Issue 1
Telco Adoption Of Web 2.0 & Open Innovation Issue 1
 
What's new in web standards?
What's new in web standards?What's new in web standards?
What's new in web standards?
 
Building Peru interactive-collaboration
Building Peru interactive-collaborationBuilding Peru interactive-collaboration
Building Peru interactive-collaboration
 
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
 
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low Cost
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in Security
 
Firefox OS: Challenges and opportunities for an open source mobile OS
Firefox OS: Challenges and opportunities for an open source mobile OSFirefox OS: Challenges and opportunities for an open source mobile OS
Firefox OS: Challenges and opportunities for an open source mobile OS
 
Small Cells Service
Small Cells ServiceSmall Cells Service
Small Cells Service
 
Keynote lessard
Keynote lessardKeynote lessard
Keynote lessard
 
Telefonica CCN and SDN / NFV
Telefonica CCN and SDN / NFVTelefonica CCN and SDN / NFV
Telefonica CCN and SDN / NFV
 
LyncConference2013 - Dimensionnement et gestion des Réseaux
LyncConference2013 - Dimensionnement et gestion des RéseauxLyncConference2013 - Dimensionnement et gestion des Réseaux
LyncConference2013 - Dimensionnement et gestion des Réseaux
 
HTML 5 & The Modern Web
HTML 5 & The Modern WebHTML 5 & The Modern Web
HTML 5 & The Modern Web
 
WebRTC and Telehealth
WebRTC and TelehealthWebRTC and Telehealth
WebRTC and Telehealth
 

Último

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

WebRTC: Market Disruption

  • 1. www.trilogy-lte.com Threat Or Opportunity Venky Swaminathan www.trilogy-lte.com Confidential
  • 2. COMMUNICATION IS MOVING TO THE WEB www.trilogy-lte.com • Service • Subscribers • Subscription • Application • Users • Transient • Feature • Contextual • Revenue? 2 What HTML Did To Content – WebRTC Will Do To Telephony Confidential
  • 3. W HAT IS W EBRTC? Voice www.trilogy-lte.com Video File Sharing Browser Based 3 Peer to Peer • Disruptive HTML5 Drafted by W3C. Standard Open Source Libraries. Confidential
  • 4. S IGNALING Control Messages XMPP www.trilogy-lte.com Session Management SIP 4 WebRTC Does Not Specify Signaling Method Confidential
  • 5. U SE C ASES www.trilogy-lte.com Browser to Browser 5 • Social Media • Entertainment • Conferencing • App To App • Gaming Enterprise • Click To Call • Video Chat • Sales • Support Telecom • Traditional Calls • Non Traditional Devices • Video Verticals • Healthcare • Education • Emergency Repeat of Smartphone App Phenomenon – Millions of Apps Confidential
  • 6. O PPORTUNITIES www.trilogy-lte.com Audio/V ideo Apps Your Current Services OTT Apps Gateway to your Network WebRTC Toolkits & API’s 6 From Device Centric To Access Centric Solutions Confidential
  • 7. W EBRTC S ERVICES Platform As a Service www.trilogy-lte.com WebRTC To SIP Video/Media Gateway Softphones Roaming Apps Developer Program Toolkits 7 API Prepare For New & Untested Revenue Models Confidential
  • 8. www.trilogy-lte.com DAAS - DIAMETER AS A SERVICE Thank You www.trilogy-lte.com Confidential

Notas del editor

  1. For the past many decades telephony was a service. Telephone companies provided a service and they had subscribers and monthly subscriptionFundamental business model – wireline and remained pretty much the same for wirelessWith Smartphones, calling became an app. Just like other apps on the phoneThere were users for the app and they were transient. Lot of alternatives for calling/messagingVoice revenue has saturated.Now communication is moving to the web – Voice, video, data sharing, screen sharingIt can be enabled on any connected deviceVoice calling is becoming a feature that is enabled on apps. I don’t need to remember a phone numberThe phone number is becoming irrelevant – Anyone I want to call is connected and signed in.It is contextual based on the requirements of the appFor example, You are browsing a website for clothes and want to talk to a sales agent, you simply click on the call button and you both sharing the same screenNow how do you monetize that ? Who is going to pay for that call, the customer ?, the store ? Did the call use your voice network ? That is the biggest challengeYou all saw what happened to content with the advent of the Internet browsers and HTML. It flattened the entire ecosystem. Anybody could set up a web site, post blogs and sell goods and servicesThat is exactly is what is going to happen to Telephony. This is the end of telephony as we know it.
  2. It is a set of standards from W3C to enable real time communication on the web between browsersChrome, Firefox and Opera browsers natively support itYou can do peer to peer phone calls, video chat, share screens and exchange files.Apps can be built with HTML5 and JavaScriptSoftware kits are available to build mobile apps.Any connected device can be WebRTC enabledSo every connected device becomes a communication device.
  3. Interestingly the WebRTC spec does not specify any methods for signalingI think it is a very wise decisionAll of the call initiation, management, teardown, authentication, accounting can be implemented using any method.There are a lot of technologies out there for controlling and managing communicationsThey can be integrated to WebRTC. Service providers have a lot of experience in this domain and have an exciting opportunity hereIntegrating WebRTC to their existing telecom infrastructure combines best of both worldsThe latest web technology and reliable telecom infrastructure that results in cool applications
  4. The most obvious ones are the apps built for browsers and communicates between browsers – drivers – stickiness, spend longer time on the site.Natural extension is embedding the browser into mobile appsEnterprise will start adopting WebRTC as they realize cost savings and easier maintenance of their complex call center and conferencing applications. Telecom service providers and platform providers will see their value erode as enterprise adopt WebRTCPBX equipment/hosted services will have to support webRTCIntegration to telecom networks - This is the biggest opportunity for service providers – terminating calls to PSTN – traditional devices and to non traditional devices – any connected device.Supporting video is a big new opportunityIndustry specific applications are the most exciting. Imagine combining real time communication with contextual data/screen sharing. A lot of innovative apps will be builtIt will be a repeat of the smartphone app phenomenon - The world of developers will build cool communication apps that we have never imagined before.
  5. What are the opportunities for service providers ?Look at how you intersect with the WebRTC and over the top applications.I included OTT apps because they will adopt WebRTC and even more erode into your space. But the overlaps open up 3 sets of opportunitiesThe first is opening up your network to be a gateway for webRTC apps to integrate – “Platform a service” Using your existing SIP gateway and session border controllers you can set up the platform and offer it as a serviceAnother one is making available your own OTT audio/video apps . This will depend on your resources. You can partner with app developers and build this.
  6. Platform as a service – easy extension to your existing servicesWebRTC to SIP Adapters for Enterprise CustomersSoftphone for roaming and other appsDeveloper Program with Toolkits and API’s for access to your networkMake it very easy for your customers to build WebRTC apps. Provide the toolkits and API’s to your network. Become developer friendly.
  7. In conclusion, It is a brave new world of technological changesChanging value propositions, changing business modelsThe opportunities are there, but it requires good understanding of where the value is and how to deliver it.