SlideShare a Scribd company logo
www.trilogy-lte.com

Threat Or Opportunity

Venky Swaminathan
www.trilogy-lte.com
Confidential
COMMUNICATION IS MOVING TO THE WEB

www.trilogy-lte.com

• Service
• Subscribers
• Subscription

• Application
• Users
• Transient

• Feature
• Contextual
• Revenue?

2

What HTML Did To Content – WebRTC Will Do To Telephony
Confidential
W HAT IS W EBRTC?
Voice

www.trilogy-lte.com

Video
File Sharing

Browser
Based
3

Peer to Peer
• Disruptive

HTML5

Drafted by W3C. Standard Open Source Libraries.
Confidential
S IGNALING
Control Messages

XMPP

www.trilogy-lte.com

Session Management

SIP

4

WebRTC Does Not Specify Signaling Method
Confidential
U SE C ASES

www.trilogy-lte.com

Browser to Browser

5

• Social Media
• Entertainment
• Conferencing
• App To App
• Gaming

Enterprise

• Click To Call
• Video Chat
• Sales
• Support

Telecom

• Traditional
Calls
• Non Traditional
Devices
• Video

Verticals

• Healthcare
• Education
• Emergency

Repeat of Smartphone App Phenomenon – Millions of Apps
Confidential
O PPORTUNITIES

www.trilogy-lte.com

Audio/V
ideo
Apps

Your Current
Services

OTT Apps

Gateway to
your
Network

WebRTC

Toolkits
& API’s
6

From Device Centric To Access Centric Solutions
Confidential
W EBRTC S ERVICES
Platform As a Service

www.trilogy-lte.com

WebRTC To SIP

Video/Media Gateway

Softphones

Roaming

Apps

Developer Program

Toolkits
7

API

Prepare For New & Untested Revenue Models
Confidential
www.trilogy-lte.com

DAAS - DIAMETER AS A
SERVICE
Thank You

www.trilogy-lte.com
Confidential

More Related Content

What's hot

How To Protect Mobile Apps and APIs from Attackers
How To Protect Mobile Apps and APIs from AttackersHow To Protect Mobile Apps and APIs from Attackers
How To Protect Mobile Apps and APIs from Attackers
Centextech
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Ping Identity
 
WiFi Hotspot
WiFi HotspotWiFi Hotspot
WiFi Hotspot
Wispot
 
Manage Your Mesh
Manage Your MeshManage Your Mesh
Manage Your Mesh
Akana
 
Managing Identities in the World of APIs
Managing Identities in the World of APIsManaging Identities in the World of APIs
Managing Identities in the World of APIs
Apigee | Google Cloud
 
Building better security for your API platform using Azure API Management
Building better security for your API platform using Azure API ManagementBuilding better security for your API platform using Azure API Management
Building better security for your API platform using Azure API Management
Eldert Grootenboer
 
OAuth 1.0
OAuth 1.0OAuth 1.0
OAuth 1.0
simonetripodi
 
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
CA API Management
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
Ping Identity
 
Security Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessSecurity Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info Wireless
Megan Bell
 
Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless Connections
Catherine MacAllister
 
Backstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity SummitBackstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity Summit
ForgeRock
 
Enhanced home security solutions kalay v2
Enhanced home security solutions  kalay v2Enhanced home security solutions  kalay v2
Enhanced home security solutions kalay v2
Willie Lin
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Ping Identity
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major Impact
Salesforce Admins
 

What's hot (15)

How To Protect Mobile Apps and APIs from Attackers
How To Protect Mobile Apps and APIs from AttackersHow To Protect Mobile Apps and APIs from Attackers
How To Protect Mobile Apps and APIs from Attackers
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
 
WiFi Hotspot
WiFi HotspotWiFi Hotspot
WiFi Hotspot
 
Manage Your Mesh
Manage Your MeshManage Your Mesh
Manage Your Mesh
 
Managing Identities in the World of APIs
Managing Identities in the World of APIsManaging Identities in the World of APIs
Managing Identities in the World of APIs
 
Building better security for your API platform using Azure API Management
Building better security for your API platform using Azure API ManagementBuilding better security for your API platform using Azure API Management
Building better security for your API platform using Azure API Management
 
OAuth 1.0
OAuth 1.0OAuth 1.0
OAuth 1.0
 
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Security Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessSecurity Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info Wireless
 
Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless Connections
 
Backstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity SummitBackstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity Summit
 
Enhanced home security solutions kalay v2
Enhanced home security solutions  kalay v2Enhanced home security solutions  kalay v2
Enhanced home security solutions kalay v2
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major Impact
 

Similar to WebRTC: Market Disruption

AdhearsionConf 2013 Keynote
AdhearsionConf 2013 KeynoteAdhearsionConf 2013 Keynote
AdhearsionConf 2013 Keynote
Mojo Lingo
 
Wind River Chumby Motorola Stacatto
Wind River   Chumby   Motorola   StacattoWind River   Chumby   Motorola   Stacatto
Wind River Chumby Motorola Stacatto
Marco Thompson
 
Real-time Communications at Internet Speed
Real-time Communications at Internet SpeedReal-time Communications at Internet Speed
Real-time Communications at Internet Speed
Brian Pulito
 
WebRTC and Telehealth
WebRTC and TelehealthWebRTC and Telehealth
WebRTC and Telehealth
Arin Sime
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
Simpletel
 
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access Board
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access BoardSection 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access Board
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access Board
Virtual Ability, Inc.
 
Telco Adoption Of Web 2.0 & Open Innovation Issue 1
Telco Adoption Of Web 2.0 & Open Innovation Issue 1Telco Adoption Of Web 2.0 & Open Innovation Issue 1
Telco Adoption Of Web 2.0 & Open Innovation Issue 1
Alan Quayle
 
What's new in web standards?
What's new in web standards?What's new in web standards?
What's new in web standards?
Daniel Appelquist
 
Building Peru interactive-collaboration
Building Peru interactive-collaborationBuilding Peru interactive-collaboration
Building Peru interactive-collaboration
Enrique Mesones
 
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Nordic Infrastructure Conference
 
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
Felipe Prado
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low Cost
Donald Malloy
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in Security
Sherif Mansour
 
Firefox OS: Challenges and opportunities for an open source mobile OS
Firefox OS: Challenges and opportunities for an open source mobile OSFirefox OS: Challenges and opportunities for an open source mobile OS
Firefox OS: Challenges and opportunities for an open source mobile OS
Jacques Chicourel
 
Small Cells Service
Small Cells ServiceSmall Cells Service
Small Cells Service
Small Cell Forum
 
Keynote lessard
Keynote lessardKeynote lessard
Keynote lessard
RavingTiger
 
Telefonica CCN and SDN / NFV
Telefonica CCN and SDN / NFVTelefonica CCN and SDN / NFV
Telefonica CCN and SDN / NFV
Patrick Lopez
 
LyncConference2013 - Dimensionnement et gestion des Réseaux
LyncConference2013 - Dimensionnement et gestion des RéseauxLyncConference2013 - Dimensionnement et gestion des Réseaux
LyncConference2013 - Dimensionnement et gestion des Réseaux
Microsoft Technet France
 
HTML 5 & The Modern Web
HTML 5 & The Modern WebHTML 5 & The Modern Web
HTML 5 & The Modern Web
Jumping Bean
 
WebRTC and Telehealth
WebRTC and TelehealthWebRTC and Telehealth
WebRTC and Telehealth
Arin Sime
 

Similar to WebRTC: Market Disruption (20)

AdhearsionConf 2013 Keynote
AdhearsionConf 2013 KeynoteAdhearsionConf 2013 Keynote
AdhearsionConf 2013 Keynote
 
Wind River Chumby Motorola Stacatto
Wind River   Chumby   Motorola   StacattoWind River   Chumby   Motorola   Stacatto
Wind River Chumby Motorola Stacatto
 
Real-time Communications at Internet Speed
Real-time Communications at Internet SpeedReal-time Communications at Internet Speed
Real-time Communications at Internet Speed
 
WebRTC and Telehealth
WebRTC and TelehealthWebRTC and Telehealth
WebRTC and Telehealth
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access Board
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access BoardSection 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access Board
Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access Board
 
Telco Adoption Of Web 2.0 & Open Innovation Issue 1
Telco Adoption Of Web 2.0 & Open Innovation Issue 1Telco Adoption Of Web 2.0 & Open Innovation Issue 1
Telco Adoption Of Web 2.0 & Open Innovation Issue 1
 
What's new in web standards?
What's new in web standards?What's new in web standards?
What's new in web standards?
 
Building Peru interactive-collaboration
Building Peru interactive-collaborationBuilding Peru interactive-collaboration
Building Peru interactive-collaboration
 
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
 
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low Cost
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in Security
 
Firefox OS: Challenges and opportunities for an open source mobile OS
Firefox OS: Challenges and opportunities for an open source mobile OSFirefox OS: Challenges and opportunities for an open source mobile OS
Firefox OS: Challenges and opportunities for an open source mobile OS
 
Small Cells Service
Small Cells ServiceSmall Cells Service
Small Cells Service
 
Keynote lessard
Keynote lessardKeynote lessard
Keynote lessard
 
Telefonica CCN and SDN / NFV
Telefonica CCN and SDN / NFVTelefonica CCN and SDN / NFV
Telefonica CCN and SDN / NFV
 
LyncConference2013 - Dimensionnement et gestion des Réseaux
LyncConference2013 - Dimensionnement et gestion des RéseauxLyncConference2013 - Dimensionnement et gestion des Réseaux
LyncConference2013 - Dimensionnement et gestion des Réseaux
 
HTML 5 & The Modern Web
HTML 5 & The Modern WebHTML 5 & The Modern Web
HTML 5 & The Modern Web
 
WebRTC and Telehealth
WebRTC and TelehealthWebRTC and Telehealth
WebRTC and Telehealth
 

Recently uploaded

GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 

Recently uploaded (20)

GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 

WebRTC: Market Disruption

  • 1. www.trilogy-lte.com Threat Or Opportunity Venky Swaminathan www.trilogy-lte.com Confidential
  • 2. COMMUNICATION IS MOVING TO THE WEB www.trilogy-lte.com • Service • Subscribers • Subscription • Application • Users • Transient • Feature • Contextual • Revenue? 2 What HTML Did To Content – WebRTC Will Do To Telephony Confidential
  • 3. W HAT IS W EBRTC? Voice www.trilogy-lte.com Video File Sharing Browser Based 3 Peer to Peer • Disruptive HTML5 Drafted by W3C. Standard Open Source Libraries. Confidential
  • 4. S IGNALING Control Messages XMPP www.trilogy-lte.com Session Management SIP 4 WebRTC Does Not Specify Signaling Method Confidential
  • 5. U SE C ASES www.trilogy-lte.com Browser to Browser 5 • Social Media • Entertainment • Conferencing • App To App • Gaming Enterprise • Click To Call • Video Chat • Sales • Support Telecom • Traditional Calls • Non Traditional Devices • Video Verticals • Healthcare • Education • Emergency Repeat of Smartphone App Phenomenon – Millions of Apps Confidential
  • 6. O PPORTUNITIES www.trilogy-lte.com Audio/V ideo Apps Your Current Services OTT Apps Gateway to your Network WebRTC Toolkits & API’s 6 From Device Centric To Access Centric Solutions Confidential
  • 7. W EBRTC S ERVICES Platform As a Service www.trilogy-lte.com WebRTC To SIP Video/Media Gateway Softphones Roaming Apps Developer Program Toolkits 7 API Prepare For New & Untested Revenue Models Confidential
  • 8. www.trilogy-lte.com DAAS - DIAMETER AS A SERVICE Thank You www.trilogy-lte.com Confidential

Editor's Notes

  1. For the past many decades telephony was a service. Telephone companies provided a service and they had subscribers and monthly subscriptionFundamental business model – wireline and remained pretty much the same for wirelessWith Smartphones, calling became an app. Just like other apps on the phoneThere were users for the app and they were transient. Lot of alternatives for calling/messagingVoice revenue has saturated.Now communication is moving to the web – Voice, video, data sharing, screen sharingIt can be enabled on any connected deviceVoice calling is becoming a feature that is enabled on apps. I don’t need to remember a phone numberThe phone number is becoming irrelevant – Anyone I want to call is connected and signed in.It is contextual based on the requirements of the appFor example, You are browsing a website for clothes and want to talk to a sales agent, you simply click on the call button and you both sharing the same screenNow how do you monetize that ? Who is going to pay for that call, the customer ?, the store ? Did the call use your voice network ? That is the biggest challengeYou all saw what happened to content with the advent of the Internet browsers and HTML. It flattened the entire ecosystem. Anybody could set up a web site, post blogs and sell goods and servicesThat is exactly is what is going to happen to Telephony. This is the end of telephony as we know it.
  2. It is a set of standards from W3C to enable real time communication on the web between browsersChrome, Firefox and Opera browsers natively support itYou can do peer to peer phone calls, video chat, share screens and exchange files.Apps can be built with HTML5 and JavaScriptSoftware kits are available to build mobile apps.Any connected device can be WebRTC enabledSo every connected device becomes a communication device.
  3. Interestingly the WebRTC spec does not specify any methods for signalingI think it is a very wise decisionAll of the call initiation, management, teardown, authentication, accounting can be implemented using any method.There are a lot of technologies out there for controlling and managing communicationsThey can be integrated to WebRTC. Service providers have a lot of experience in this domain and have an exciting opportunity hereIntegrating WebRTC to their existing telecom infrastructure combines best of both worldsThe latest web technology and reliable telecom infrastructure that results in cool applications
  4. The most obvious ones are the apps built for browsers and communicates between browsers – drivers – stickiness, spend longer time on the site.Natural extension is embedding the browser into mobile appsEnterprise will start adopting WebRTC as they realize cost savings and easier maintenance of their complex call center and conferencing applications. Telecom service providers and platform providers will see their value erode as enterprise adopt WebRTCPBX equipment/hosted services will have to support webRTCIntegration to telecom networks - This is the biggest opportunity for service providers – terminating calls to PSTN – traditional devices and to non traditional devices – any connected device.Supporting video is a big new opportunityIndustry specific applications are the most exciting. Imagine combining real time communication with contextual data/screen sharing. A lot of innovative apps will be builtIt will be a repeat of the smartphone app phenomenon - The world of developers will build cool communication apps that we have never imagined before.
  5. What are the opportunities for service providers ?Look at how you intersect with the WebRTC and over the top applications.I included OTT apps because they will adopt WebRTC and even more erode into your space. But the overlaps open up 3 sets of opportunitiesThe first is opening up your network to be a gateway for webRTC apps to integrate – “Platform a service” Using your existing SIP gateway and session border controllers you can set up the platform and offer it as a serviceAnother one is making available your own OTT audio/video apps . This will depend on your resources. You can partner with app developers and build this.
  6. Platform as a service – easy extension to your existing servicesWebRTC to SIP Adapters for Enterprise CustomersSoftphone for roaming and other appsDeveloper Program with Toolkits and API’s for access to your networkMake it very easy for your customers to build WebRTC apps. Provide the toolkits and API’s to your network. Become developer friendly.
  7. In conclusion, It is a brave new world of technological changesChanging value propositions, changing business modelsThe opportunities are there, but it requires good understanding of where the value is and how to deliver it.