Document sharing

Call identification and banking industry in Spain As of today, in Spain there is no legislation around call verification and identification, besides, operators are legally bound to terminate all voice traffic they receive. This legal framework creates a scenario of legal helplessness, not only for the users but also for the banks. Spanish jurisprudence has been…
The meaning of independence in the ICT sector When it comes to the procurement of information and communication technology, many companies tend to choose one of the major vendors. They go with the seemingly safest option, living up to the old phrase “nobody ever got fired for buying IBM”. Nowadays, this saying might not apply…
The communication platform that truly gives you the control The new release of Quobis Communications Platform (Sippo 4.0) has been born under the commitment of giving full control of enterprise communications to whom must have it. Aiming to guarantee security, scalability, reliability and better usage of corporate communication resources as well as build new professional communications tools….
The booth showcased IdentityCall to service providers and voice system integrators, showing them how they can offer a new value-added call authentication services to their corporate customers (banks, insurance, health industry and public administration). To learn more about IdentitityCall by Quobis, please visit www.IdentityCall.com. About International CTIA WIRELESS® 2012 Conference & Expo May 7 & 8-10, 2012Ernest N….
Another high cost that was not mentioned before are the compliance costs, these translate mainly into auditing costs and administrative procedures of complex regulation. It is true that these costs do not affect all actors the same way as the level of compliance depends on the number of annual transactions, from level 1 (over 6…
Small devices (embedded things, etc.) might take advantage of WebRTC as it provides a communication channel for real time communication, not only for video calls. Websockets provide a way to exchange traffic (data) in real time, with the characteristics of technology like security by default (both signalling and media are ciphered), low-latency and network efficiency….