Skip to Content

Category: Articles

Enterprise Sourcing of SIP Trunking Services

Webtorials Hank Levine & Jack Deal Over the last few years, large enterprises have begun to reap the benefits of moving from “traditional” TDM technology – PBX trunks and the like – to SIP trunking for voice services. SIP, if anyone doesn’t know it by now, is basically a way […]

Prepare, Persist and Protect

The Three Ps of Global Telecoms Project Sourcing and Management Who’s Who Legal Deb Boehling and Hank Levine Twenty years ago, global enterprises rarely exercised common management or control over global telecom resources. Each country or region purchased the services it preferred from the vendor(s) of its choice and interconnected […]

Ten Pitfalls to Avoid When Negotiating Telecom Service Agreements

UTC Journal Jeffrey Sheldon & Justin Castillo The transition to IP-based networks and the development of new utility standards for security and reliability in communications services pose significant challenges to utilities procuring carrier-based network services. Flowing these new standards down to carriers is difficult because they are wary of the […]

Three Troubling Trends in Wireless Contracting

No Jitter (www.nojitter.com) Justin Castillo Enterprises that expect to obtain competitive deals simply by virtue of being large companies will be disappointed. But savvy and aggressive customers can reap rewards. The world of enterprise wireless contracting continues to evolve. Given that wireless now accounts for 40% or more of some […]

Avoid Getting Locked In To Your Wireless Carrier

Maintaining an enterprise’s flexibility to move lines between and among carriers is increasingly difficult. No Jitter (www.nojitter.com) Imix Shish In today’s wireless market, carriers are increasingly presenting enterprise customers with agreements and amendments that rival their wireline counterparts in complexity. Wireless carriers have begun to make custom pricing arrangements more […]

Georgetown Conference Highlights Cybersecurity Challenges

“Spear-phishing” and BYOD were among the biggest concerns, as enterprises try to re-imagine their models for keeping data and communications secure. No Jitter Justin Castillo Most continuing legal education seminars are dull affairs involving lawyers and “talking head” lectures. But last week’s Cybersecurity Law Institute at the Georgetown University Law […]