VoIP and Embedded Linux
According to statistics from aplio.com, the market for VoIP/Internet telephony is expected to explode. One research company, Probe Research Inc., suggests that the total traffic for Internet telephony will reach or exceed 250 billion conversation minutes by 2005. Aplio recorded its five millionth minute in June 1999.
Calvo notes that 70% of those who use the Aplio/Phone and Aplio/Pro are what he calls members of “ethnic communities” or those “global citizens” who work in one country yet often have family or other strong ties to another country. These core Aplio/Phone users would otherwise face heavy long-distance charges without a solution such as VoIP. Similarly, Calvo estimates that the remaining 30% of Aplio's customer base consists of internationally oriented businesses, who are also looking to avoid long-distance tolls while conducting business around the world.
Asked to characterize the Aplio premium on VoIP Internet appliances, Calvo offered the expected: (1) Aplio/Phone and Aplio/Pro are non-PC products; (2) both appliances have “extremely good” voice quality; and (3) both Aplio/Phone and Aplio/Pro feature easy-to-manage user interfaces. “Our goal is to have many companies build[ing] many different appliances. In that sense, betting on an open-source operating system like Linux is a good thing, because we can very quickly prototype, develop and test our products and get them to market.”
|Where's That Pesky Hidden Word?||Aug 28, 2015|
|A Project to Guarantee Better Security for Open-Source Projects||Aug 27, 2015|
|Concerning Containers' Connections: on Docker Networking||Aug 26, 2015|
|My Network Go-Bag||Aug 24, 2015|
|Doing Astronomy with Python||Aug 19, 2015|
|Build a “Virtual SuperComputer” with Process Virtualization||Aug 18, 2015|
- Concerning Containers' Connections: on Docker Networking
- Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them
- A Project to Guarantee Better Security for Open-Source Projects
- Where's That Pesky Hidden Word?
- Firefox Security Exploit Targets Linux Users and Web Developers
- My Network Go-Bag
- Doing Astronomy with Python
- Three More Lessons
- Build a “Virtual SuperComputer” with Process Virtualization
- diff -u: What's New in Kernel Development