Search This Blog

Wednesday, September 28, 2005

LAMP/Asterisk-powered voicemail keeps Katrina victims in touch

NETWORK WORLD NEWSLETTER: PHIL HOCHMUTH ON LINUX
09/28/05
Today's focus: LAMP/Asterisk-powered voicemail keeps Katrina
victims in touch

Dear security.world@gmail.com,

In this issue:

* LAMP is the engine behind contactlovedones.org
* Links related to Linux
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Nokia
Empower Your Mobile Enterprise

Nokia believes that business mobility will fundamentally change
the way work gets done-and for the better. To allow the entire
organization to get the most from this paradigm shift in
productivity, Nokia Enterprise Solutions focuses on delivering
increased efficiency through enhanced mobility. Learn more by
downloading this white paper today!
http://www.fattail.com/redir/redirect.asp?CID=115986
_______________________________________________________________
IS IT THE NETWORK OR THE STORAGE THAT'S THE PROBLEM?

Midsize and larger businesses often find their IT topology has
become a complex mix of servers, networks and storage systems.
Many of these companies also route long-haul traffic over
fiber-based networks - metropolitan-area networks, WANs and
private optical networks. Who's responsible when a
storage-related problem occurs on a fiber network? For more,
click here:
http://www.fattail.com/redir/redirect.asp?CID=115692
_______________________________________________________________

Today's focus: LAMP/Asterisk-powered voicemail keeps Katrina
victims in touch

By Phil Hochmuth

Linux, Apache Web server, MySQL and PHP - the widely used LAMP
platform - are key parts in a recently-built voicemail system
that is helping displaced residents of the Gulf Coast keep in
touch with family and friends around the country. LAMP
technology is the engine running contactdlovedones.org, a
project that provides freely accessible voicemail services to
people who had to evacuate their homes due to Hurricane Katrina.

The system works like this: displaced people call
1-866-78CONTACT (866-782-6682). At the voice prompt, callers get
the option to leave messages for other people, or to retrieve
messages left for them. Mailboxes are based on old New
Orleans-area phone numbers; to leave a message for someone,
callers enter that person's 504 area code number and then leave
the message. Displaced persons can get their messages by calling
into the system, choosing the "retrieve messages" option, then
entering their old phone number to access the mailbox.

Currently, the system consists of five Debian Linux servers
running the open source Asterisk IP PBX platform for voicemail,
auto-attendant and call processing applications. The MySQL
database back end is used to create mail boxes on the fly, based
on phone numbers callers punch in (any seven-digit number can be
used, not just New Orleans-area exchanges). Files are stored in
compressed WAV format, which also allows users to access voice
messages via the contactlovedones.org Web site.

The Debian/Asterisk servers tie into the public switched
telephone network through gateway ports donated by VoIP service
providers PalTalk, WorldCall and SIP Media, which terminate the
866 calls, translating the signals into TCP/IP session running
the Session Initiation Protocol (Asterisk's native control
protocol). Yaakov Menken, CEO of Capalon Internet Solutions, and
one of the founders of the project, along with Dan Schoeffle and
Asterisk creator Mark Spencer.

"Because asterisk is open source ... programmers can use the
language with which they are most fluent to develop the
applications," Menken says. This allowed the group to build the
system for around $10,000, while it would have cost around six
times that if traditional telephony and voicemail platforms were
used.

"Raw power and stability, ease of use and cost," were among the
reasons Menken went with Linux, he says. "What, you want me to
build this on a Windows box? Yea, Asterisk runs on Windows, but
no, I want this service to be up," he says.

The top 5: Today's most-read stories

1. Skype: Hazardous to network health?
<http://www.networkworld.com/nllinux7832>
2. How to solve Windows system crashes in minutes
<http://www.networkworld.com/nllinux7694>
3. Commuting costs drive up telecommuting
<http://www.networkworld.com/nllinux7833>
4. McAfee, Omniquad top anti-spyware test
<http://www.networkworld.com/nllinux6917>
5. The rise of the IT architect
<http://www.networkworld.com/nllinux7018>

_______________________________________________________________
To contact: Phil Hochmuth

Phil Hochmuth is a Network World Senior Editor and a former
systems integrator. You can reach him at
<mailto:phochmut@nww.com>.
_______________________________________________________________
This newsletter is sponsored by Nokia
Empower Your Mobile Enterprise

Nokia believes that business mobility will fundamentally change
the way work gets done-and for the better. To allow the entire
organization to get the most from this paradigm shift in
productivity, Nokia Enterprise Solutions focuses on delivering
increased efficiency through enhanced mobility. Learn more by
downloading this white paper today!
http://www.fattail.com/redir/redirect.asp?CID=115985
_______________________________________________________________
ARCHIVE LINKS

Breaking Linux news from Network World and around the 'Net,
updated daily: http://www.networkworld.com/topics/linux.html

Archive of the Linux newsletter:
http://www.networkworld.com/newsletters/linux/index.html
_______________________________________________________________
The dynamic world of application acceleration technologies

Companies are undergoing a shift in the way they structure their
internal IT departments and external service components. Find
out about the changing market for application acceleration
technologies.
http://www.fattail.com/redir/redirect.asp?CID=115734
_______________________________________________________________
FEATURED READER RESOURCE

The Trend Micro Threat Map

The Trend Micro Threat Map dynamically displays real-time data
to show worldwide trends in virus and content security threats
as they happen. Collected from actual computer infections, the
Threat Map can be used to help determine appropriate security
policies, based on the prevalence of threats that can adversely
affect your business.

<http://www.networkworld.com/go/trendmicro/trend_frr>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

No comments: