Skip to main content

The Frrrrrreeeeeeeeeeeee Phone

Initially thought of calling this blog.. " Death of the Phone Company.. Long Live the Phone Company" then changed it to something interesting and simple..

Well Oxymorons are fun, and the way the voice calling is evolving, it is a great time to be in. First we had Google Voice - The grand central of ideas coming to fruition and then we have a slew of products that make use of google Voice. There are so many opportunities that we may see the old gaurds failing if they do not move up the order and provide the necessary services as well as upgrade technologies. Gizmo5 and similar companies may take the mantle of AT&T.. But then the biggest block to the move from PSTN to VoIP is the cost of the phone instruments. Hopefully this is on its way too.. a tumultous times but an area to be watched in the coming days.

How do I use Google Voice, Gizmo5, My Android G1, and SIPDroid and a Clearwire Modem? These devices can make a big difference to how I have come to use my Phone in the last few days. Freedom from SIM... I do not have a SIM and all my calls have been through Wifi. Wherever you go the Clearwire Wimax Network provides the basic connectivity. Gizmo5 is a wonderful SIP Server which does the switching, Voice call a email id is something we would have been happy with and it is getting nearer. How many times have we wondered instead of moving here and forth to just call in and say.. No more emails from you .. I had enough, and funnily without a phone number.

So how much time does it take to be on a VoIP network and make calls to every one as you please .. atleast within the United States.

1. Set up a Gizmo5 account - 3 Minutes - Note down your SIP number that starts with 1-747
2. Set up a Google Voice Account - 3 minutes - If you have an invite and you already have a gmail account you are ready to go.
3. Install SIPDroid on your G1. 2 minutes
4. Connect SIPDroid to the Gizmo5 account - proxy01.sipphone.com - 2 minutes
5. Register the Gizmo5 number in Google Voice - 3 minutes.

Presto ready to go.. Make calls from your G1 by logging into Google Voice and dial from your desktop and provide with google voice to connect you to your Gizmo 5....

F.RRRRR..EEEE Calling A World without a SIM Card

Comments

Popular posts from this blog

Malware Damage - It is real and you need to be ready ...

  Malware, short for "malicious software," is any software intentionally designed to cause harm to computer systems, networks, or devices. Malware can take many forms, including viruses, trojan horses, worms, ransomware, spyware, and adware, among others. The dangers of malware are numerous, and it is crucial to protect yourself from malware to avoid serious consequences, such as: Data theft: Malware can be designed to steal personal information, such as bank account details, social security numbers, and login credentials. Once this information is stolen, it can be used for identity theft, financial fraud, and other malicious activities. System damage: Some malware can damage your computer system, causing it to crash or malfunction. This can result in lost data, system downtime, and costly repairs. Financial loss: Malware can also be used to extort money from victims. For example, ransomware can lock down a victim's computer and demand payment in exchange for the decrypti...

HIPAA - What is that we need to know .... Cyberawareness for a Health Care Organization

  Here is a detailed cyber awareness training for HIPAA candidates: Introduction to HIPAA: Provide an overview of the Health Insurance Portability and Accountability Act (HIPAA) and the importance of protecting patient information. Understanding HIPAA regulations: Explain the different regulations under HIPAA, such as the Privacy Rule, Security Rule, and Breach Notification Rule. Identifying and reporting breaches: Teach employees how to identify a potential breach of patient information and the proper procedures for reporting it. Phishing and social engineering: Provide training on how to identify and avoid phishing emails and other social engineering tactics. Passwords and authentication: Teach employees about the importance of strong passwords and multi-factor authentication. Mobile device security: Discuss the risks of using mobile devices to access patient information and the measures employees can take to keep the information secure. Remote access security: Explain the risks ...

Where are you on your Cybersecurity > Part 1 Evaluate your strenghts and weaknesses..

  here's a checklist to identify strengths and weaknesses in cybersecurity in a team. The user can score themselves against each item to identify gaps in their cybersecurity posture: Cybersecurity Policies and Procedures: Does your team have documented cybersecurity policies and procedures? Are they up-to-date and reviewed regularly? Are they communicated effectively to all team members? Access Controls: Do you have strong password policies in place? Do you enforce multi-factor authentication for sensitive accounts? Do you restrict access to sensitive information and systems on a need-to-know basis? Network Security: Do you have a secure network architecture that includes firewalls, intrusion detection and prevention, and security monitoring? Are your network devices, such as routers and switches, configured securely? Do you monitor and log network activity for potential security threats? Endpoint Security: Do you have antivirus and anti-malware software installed on all endpoints?...