Today saw the introduction of a new model in Polycom’s VVX Business Media phones. The Poycom VVX D60 is described as a “wireless accessory” to compliment the existing VVX series of desk phones. Examining the brochure it seems that the…
We’ve had the Gigaset C610A in the house for quite some time. It’s long been on my list of devices for review. However, it’s difficult to find the time to commit to such tasks when the current model of Gigaset is so much like one of the prior models. There’s just no getting around the fact that the C61H handset is very like the C59H, which we’ve had for over two years.
That said, the C610A does offer a few niceties that were suggested to the company when they launched the line in the US back in 2009. Earlier today a new thread in the DSL Reports VoIP Forum prompted me to take just a little time to explore dialing by SIP URI on the C61H handset.
Earlier this week someone posed me a question by way of twitter. They asked, “How Will Cat-iq Help HDVoice??” I responded briefly, also via Twitter, but upon reflection I think a longer answer may be in order.
Some time ago VoIP luminary Jeff Pulver started to beat the drum for HDVoice. As an initial part of that effort he organized a couple of HDVoice Summits where interested parties could meet and discuss the issues surrounding widespread adoption of HDVoice.
The first of these events was in May 2009 in New York City. I was fortunate to be able to attend. It was there that I started to track who was promoting the use of HDVoice, how, and sometimes why*.
Earlier today the DECT Forum issued a press release in response to news from last months Chaos Communications Congress (25C3) that the DECT encryption has been cracked. Their press release (PDF) is about what you’d expect. It merely asserts their willingness to work with researchers to develop new and better security provisions as part of the CAT-iQ standard that replaces DECT.
I would hope that they would not only develop a better standard, but also ensure that the encryption provisions are in fact implemented by manufacturers. To my mind the most frightful part of the DeDECTed groups work was finding that some DECT implementations were not encrypted at all. Further, that there was essentially no way for a non-technical user to know if the DECT system that they were buying was encrypted or not.