SlideShare a Scribd company logo
1 of 8
www.trilogy-lte.com

Threat Or Opportunity

Venky Swaminathan
www.trilogy-lte.com
Confidential
COMMUNICATION IS MOVING TO THE WEB

www.trilogy-lte.com

• Service
• Subscribers
• Subscription

• Application
• Users
• Transient

• Feature
• Contextual
• Revenue?

2

What HTML Did To Content – WebRTC Will Do To Telephony
Confidential
W HAT IS W EBRTC?
Voice

www.trilogy-lte.com

Video
File Sharing

Browser
Based
3

Peer to Peer
• Disruptive

HTML5

Drafted by W3C. Standard Open Source Libraries.
Confidential
S IGNALING
Control Messages

XMPP

www.trilogy-lte.com

Session Management

SIP

4

WebRTC Does Not Specify Signaling Method
Confidential
U SE C ASES

www.trilogy-lte.com

Browser to Browser

5

• Social Media
• Entertainment
• Conferencing
• App To App
• Gaming

Enterprise

• Click To Call
• Video Chat
• Sales
• Support

Telecom

• Traditional
Calls
• Non Traditional
Devices
• Video

Verticals

• Healthcare
• Education
• Emergency

Repeat of Smartphone App Phenomenon – Millions of Apps
Confidential
O PPORTUNITIES

www.trilogy-lte.com

Audio/V
ideo
Apps

Your Current
Services

OTT Apps

Gateway to
your
Network

WebRTC

Toolkits
& API’s
6

From Device Centric To Access Centric Solutions
Confidential
W EBRTC S ERVICES
Platform As a Service

www.trilogy-lte.com

WebRTC To SIP

Video/Media Gateway

Softphones

Roaming

Apps

Developer Program

Toolkits
7

API

Prepare For New & Untested Revenue Models
Confidential
www.trilogy-lte.com

DAAS - DIAMETER AS A
SERVICE
Thank You

www.trilogy-lte.com
Confidential

More Related Content

What's hot

How To Protect Mobile Apps and APIs from Attackers
How To Protect Mobile Apps and APIs from AttackersHow To Protect Mobile Apps and APIs from Attackers
How To Protect Mobile Apps and APIs from AttackersCentextech
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Ping Identity
 
WiFi Hotspot
WiFi HotspotWiFi Hotspot
WiFi HotspotWispot
 
Manage Your Mesh
Manage Your MeshManage Your Mesh
Manage Your MeshAkana
 
Managing Identities in the World of APIs
Managing Identities in the World of APIsManaging Identities in the World of APIs
Managing Identities in the World of APIsApigee | Google Cloud
 
Building better security for your API platform using Azure API Management
Building better security for your API platform using Azure API ManagementBuilding better security for your API platform using Azure API Management
Building better security for your API platform using Azure API ManagementEldert Grootenboer
 
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...CA API Management
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
Security Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessSecurity Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessMegan Bell
 
Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsCatherine MacAllister
 
Backstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity SummitBackstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity SummitForgeRock
 
Enhanced home security solutions kalay v2
Enhanced home security solutions  kalay v2Enhanced home security solutions  kalay v2
Enhanced home security solutions kalay v2Willie Lin
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesPing Identity
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactSalesforce Admins
 

What's hot (15)

How To Protect Mobile Apps and APIs from Attackers
How To Protect Mobile Apps and APIs from AttackersHow To Protect Mobile Apps and APIs from Attackers
How To Protect Mobile Apps and APIs from Attackers
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
 
WiFi Hotspot
WiFi HotspotWiFi Hotspot
WiFi Hotspot
 
Manage Your Mesh
Manage Your MeshManage Your Mesh
Manage Your Mesh
 
Managing Identities in the World of APIs
Managing Identities in the World of APIsManaging Identities in the World of APIs
Managing Identities in the World of APIs
 
Building better security for your API platform using Azure API Management
Building better security for your API platform using Azure API ManagementBuilding better security for your API platform using Azure API Management
Building better security for your API platform using Azure API Management
 
OAuth 1.0
OAuth 1.0OAuth 1.0
OAuth 1.0
 
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Security Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessSecurity Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info Wireless
 
Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless Connections
 
Backstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity SummitBackstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity Summit
 
Enhanced home security solutions kalay v2
Enhanced home security solutions  kalay v2Enhanced home security solutions  kalay v2
Enhanced home security solutions kalay v2
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major Impact
 

Similar to WebRTC: Market Disruption

AdhearsionConf 2013 Keynote
AdhearsionConf 2013 KeynoteAdhearsionConf 2013 Keynote
AdhearsionConf 2013 KeynoteMojo Lingo
 
Wind River Chumby Motorola Stacatto
Wind River   Chumby   Motorola   StacattoWind River   Chumby   Motorola   Stacatto
Wind River Chumby Motorola StacattoMarco Thompson
 
Real-time Communications at Internet Speed
Real-time Communications at Internet SpeedReal-time Communications at Internet Speed
Real-time Communications at Internet SpeedBrian Pulito
 
WebRTC and Telehealth
WebRTC and TelehealthWebRTC and Telehealth
WebRTC and TelehealthArin Sime
 
Identity Theft
Identity TheftIdentity Theft
Identity TheftSimpletel
 
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access Board
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access BoardSection 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access Board
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access BoardVirtual Ability, Inc.
 
Telco Adoption Of Web 2.0 & Open Innovation Issue 1
Telco Adoption Of Web 2.0 & Open Innovation Issue 1Telco Adoption Of Web 2.0 & Open Innovation Issue 1
Telco Adoption Of Web 2.0 & Open Innovation Issue 1Alan Quayle
 
What's new in web standards?
What's new in web standards?What's new in web standards?
What's new in web standards?Daniel Appelquist
 
Building Peru interactive-collaboration
Building Peru interactive-collaborationBuilding Peru interactive-collaboration
Building Peru interactive-collaborationEnrique Mesones
 
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...Nordic Infrastructure Conference
 
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...Felipe Prado
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low CostDonald Malloy
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecuritySherif Mansour
 
Firefox OS: Challenges and opportunities for an open source mobile OS
Firefox OS: Challenges and opportunities for an open source mobile OSFirefox OS: Challenges and opportunities for an open source mobile OS
Firefox OS: Challenges and opportunities for an open source mobile OSJacques Chicourel
 
Telefonica CCN and SDN / NFV
Telefonica CCN and SDN / NFVTelefonica CCN and SDN / NFV
Telefonica CCN and SDN / NFVPatrick Lopez
 
LyncConference2013 - Dimensionnement et gestion des Réseaux
LyncConference2013 - Dimensionnement et gestion des RéseauxLyncConference2013 - Dimensionnement et gestion des Réseaux
LyncConference2013 - Dimensionnement et gestion des RéseauxMicrosoft Technet France
 
HTML 5 & The Modern Web
HTML 5 & The Modern WebHTML 5 & The Modern Web
HTML 5 & The Modern WebJumping Bean
 
WebRTC and Telehealth
WebRTC and TelehealthWebRTC and Telehealth
WebRTC and TelehealthArin Sime
 

Similar to WebRTC: Market Disruption (20)

AdhearsionConf 2013 Keynote
AdhearsionConf 2013 KeynoteAdhearsionConf 2013 Keynote
AdhearsionConf 2013 Keynote
 
Wind River Chumby Motorola Stacatto
Wind River   Chumby   Motorola   StacattoWind River   Chumby   Motorola   Stacatto
Wind River Chumby Motorola Stacatto
 
Real-time Communications at Internet Speed
Real-time Communications at Internet SpeedReal-time Communications at Internet Speed
Real-time Communications at Internet Speed
 
WebRTC and Telehealth
WebRTC and TelehealthWebRTC and Telehealth
WebRTC and Telehealth
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access Board
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access BoardSection 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access Board
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access Board
 
Telco Adoption Of Web 2.0 & Open Innovation Issue 1
Telco Adoption Of Web 2.0 & Open Innovation Issue 1Telco Adoption Of Web 2.0 & Open Innovation Issue 1
Telco Adoption Of Web 2.0 & Open Innovation Issue 1
 
What's new in web standards?
What's new in web standards?What's new in web standards?
What's new in web standards?
 
Building Peru interactive-collaboration
Building Peru interactive-collaborationBuilding Peru interactive-collaboration
Building Peru interactive-collaboration
 
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
 
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low Cost
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in Security
 
Firefox OS: Challenges and opportunities for an open source mobile OS
Firefox OS: Challenges and opportunities for an open source mobile OSFirefox OS: Challenges and opportunities for an open source mobile OS
Firefox OS: Challenges and opportunities for an open source mobile OS
 
Small Cells Service
Small Cells ServiceSmall Cells Service
Small Cells Service
 
Keynote lessard
Keynote lessardKeynote lessard
Keynote lessard
 
Telefonica CCN and SDN / NFV
Telefonica CCN and SDN / NFVTelefonica CCN and SDN / NFV
Telefonica CCN and SDN / NFV
 
LyncConference2013 - Dimensionnement et gestion des Réseaux
LyncConference2013 - Dimensionnement et gestion des RéseauxLyncConference2013 - Dimensionnement et gestion des Réseaux
LyncConference2013 - Dimensionnement et gestion des Réseaux
 
HTML 5 & The Modern Web
HTML 5 & The Modern WebHTML 5 & The Modern Web
HTML 5 & The Modern Web
 
WebRTC and Telehealth
WebRTC and TelehealthWebRTC and Telehealth
WebRTC and Telehealth
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

WebRTC: Market Disruption

  • 1. www.trilogy-lte.com Threat Or Opportunity Venky Swaminathan www.trilogy-lte.com Confidential
  • 2. COMMUNICATION IS MOVING TO THE WEB www.trilogy-lte.com • Service • Subscribers • Subscription • Application • Users • Transient • Feature • Contextual • Revenue? 2 What HTML Did To Content – WebRTC Will Do To Telephony Confidential
  • 3. W HAT IS W EBRTC? Voice www.trilogy-lte.com Video File Sharing Browser Based 3 Peer to Peer • Disruptive HTML5 Drafted by W3C. Standard Open Source Libraries. Confidential
  • 4. S IGNALING Control Messages XMPP www.trilogy-lte.com Session Management SIP 4 WebRTC Does Not Specify Signaling Method Confidential
  • 5. U SE C ASES www.trilogy-lte.com Browser to Browser 5 • Social Media • Entertainment • Conferencing • App To App • Gaming Enterprise • Click To Call • Video Chat • Sales • Support Telecom • Traditional Calls • Non Traditional Devices • Video Verticals • Healthcare • Education • Emergency Repeat of Smartphone App Phenomenon – Millions of Apps Confidential
  • 6. O PPORTUNITIES www.trilogy-lte.com Audio/V ideo Apps Your Current Services OTT Apps Gateway to your Network WebRTC Toolkits & API’s 6 From Device Centric To Access Centric Solutions Confidential
  • 7. W EBRTC S ERVICES Platform As a Service www.trilogy-lte.com WebRTC To SIP Video/Media Gateway Softphones Roaming Apps Developer Program Toolkits 7 API Prepare For New & Untested Revenue Models Confidential
  • 8. www.trilogy-lte.com DAAS - DIAMETER AS A SERVICE Thank You www.trilogy-lte.com Confidential

Editor's Notes

  1. For the past many decades telephony was a service. Telephone companies provided a service and they had subscribers and monthly subscriptionFundamental business model – wireline and remained pretty much the same for wirelessWith Smartphones, calling became an app. Just like other apps on the phoneThere were users for the app and they were transient. Lot of alternatives for calling/messagingVoice revenue has saturated.Now communication is moving to the web – Voice, video, data sharing, screen sharingIt can be enabled on any connected deviceVoice calling is becoming a feature that is enabled on apps. I don’t need to remember a phone numberThe phone number is becoming irrelevant – Anyone I want to call is connected and signed in.It is contextual based on the requirements of the appFor example, You are browsing a website for clothes and want to talk to a sales agent, you simply click on the call button and you both sharing the same screenNow how do you monetize that ? Who is going to pay for that call, the customer ?, the store ? Did the call use your voice network ? That is the biggest challengeYou all saw what happened to content with the advent of the Internet browsers and HTML. It flattened the entire ecosystem. Anybody could set up a web site, post blogs and sell goods and servicesThat is exactly is what is going to happen to Telephony. This is the end of telephony as we know it.
  2. It is a set of standards from W3C to enable real time communication on the web between browsersChrome, Firefox and Opera browsers natively support itYou can do peer to peer phone calls, video chat, share screens and exchange files.Apps can be built with HTML5 and JavaScriptSoftware kits are available to build mobile apps.Any connected device can be WebRTC enabledSo every connected device becomes a communication device.
  3. Interestingly the WebRTC spec does not specify any methods for signalingI think it is a very wise decisionAll of the call initiation, management, teardown, authentication, accounting can be implemented using any method.There are a lot of technologies out there for controlling and managing communicationsThey can be integrated to WebRTC. Service providers have a lot of experience in this domain and have an exciting opportunity hereIntegrating WebRTC to their existing telecom infrastructure combines best of both worldsThe latest web technology and reliable telecom infrastructure that results in cool applications
  4. The most obvious ones are the apps built for browsers and communicates between browsers – drivers – stickiness, spend longer time on the site.Natural extension is embedding the browser into mobile appsEnterprise will start adopting WebRTC as they realize cost savings and easier maintenance of their complex call center and conferencing applications. Telecom service providers and platform providers will see their value erode as enterprise adopt WebRTCPBX equipment/hosted services will have to support webRTCIntegration to telecom networks - This is the biggest opportunity for service providers – terminating calls to PSTN – traditional devices and to non traditional devices – any connected device.Supporting video is a big new opportunityIndustry specific applications are the most exciting. Imagine combining real time communication with contextual data/screen sharing. A lot of innovative apps will be builtIt will be a repeat of the smartphone app phenomenon - The world of developers will build cool communication apps that we have never imagined before.
  5. What are the opportunities for service providers ?Look at how you intersect with the WebRTC and over the top applications.I included OTT apps because they will adopt WebRTC and even more erode into your space. But the overlaps open up 3 sets of opportunitiesThe first is opening up your network to be a gateway for webRTC apps to integrate – “Platform a service” Using your existing SIP gateway and session border controllers you can set up the platform and offer it as a serviceAnother one is making available your own OTT audio/video apps . This will depend on your resources. You can partner with app developers and build this.
  6. Platform as a service – easy extension to your existing servicesWebRTC to SIP Adapters for Enterprise CustomersSoftphone for roaming and other appsDeveloper Program with Toolkits and API’s for access to your networkMake it very easy for your customers to build WebRTC apps. Provide the toolkits and API’s to your network. Become developer friendly.
  7. In conclusion, It is a brave new world of technological changesChanging value propositions, changing business modelsThe opportunities are there, but it requires good understanding of where the value is and how to deliver it.