Dialogic Enables Cloud-Based Voice and Video Application Development

Dialogic is enabling enterprise and service provider customers to build innovative cloud-based HD voice and video solutions in both Linux and Windows.

The company has launched its Dialogic PowerMedia Host Media Processing Software Release 5.0 (PowerMedia HMP 5.0), the first solution in the PowerMedia HMP product family to incorporate a distributed architecture.
HMP 5.0 can scale up to 5,000 simultaneous SIP connections or 1,500 voice sessions and leverages Dialogic’s video technology to enhance video quality through improved bit-rate control.  The solution also supports virtualization and runs on general-purpose servers without the need for specialized hardware.  Developers can also leverage PowerMedia HMP 5.0 to bring many of the multimedia capabilities previously available in the Linux versions of PowerMedia HMP to their Windows-based applications.

Moreover, Dialogic Global Call API and Dialogic Remote R4 API support developers to transition existing applications to software-based IP-enabled solutions, or create completely new mobile interactivity and other multimedia applications.

The Dialogic PowerMedia software portfolio continues to perform very well as a leading media processing engine in the market. With this new addition to PowerMedia HMP, we are delivering an expanded set of multimedia processing and deployment options for our existing customer base and new solution providers,” said Franz-Josef Eberle, vice president and general manager of Dialogic’s Value Added Services and Cloud Enabling Group.

Over the years, Mediatel has delivered numerous contact center solutions in Europe built on Dialogic media and signaling technologies,” said Dan Mazilu, data general manager of Mediatel, a contact center solution provider, which worked with HMP 5.0 during the pre-release period. “As we expand into the Americas, PowerMedia HMP 5.0 will play an integral role in enhancing our solutions with HD voice and video capabilities. In addition, we will be able to increase the reliability and flexibility of our solutions by implementing a distributed architecture.”

By Anuradha Shukla

Sorry, comments are closed for this post.

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…