Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

James Donner
on 3 February 2016

Telco Demos With Juju: DataStax


Mobile World Congress is weeks away, and we can’t wait to demonstrate the power of Ubuntu on OpenStack alongside the capabilities of NFV. In the meantime, we’re taking a deep dive into innovative telecom focused applications that can be easily enabled with our services modeling tool Juju.

TeleStax provides Open Source Communications software that enable developers to quickly create telephony applications. One of their products is Restcomm, which is a cloud based communication platform that allows you to build voice, video, and messaging applications. With the Mobicents Restcomm MySQL bundle currently available in the charm store, you can have a full voicemail application up and running within 15 minutes on a local environment. Once it’s deployed on Juju, you can access the telephony features through their WebRTC client Olympus.

At TADsummit in Lisbon, Jean Deruelle from Telestax gave a demonstration of the features listed above using the Juju GUI. See for yourself how simple Juju makes the deployment of telecom services.

Related posts


Michelle Anne Tabirao
13 December 2024

How does OpenSearch work?

Data Platform Article

How does opensearch work? OpenSearch is an open-source search and analytics suite. Developers build solutions for search and more! ...


Michelle Anne Tabirao
13 December 2024

What is RAG?

AI Article

RAG explained: is a technique that enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. ...


Matthew de Klerk
12 December 2024

What is vulnerability management?

Security Article

Vulnerability management is the holistic process of identifying and handling security risks in an organization’s networks, systems and devices. Vulnerability management serves an overarching strategy that describes and outlines the many individual efforts and steps taken to reduce cyber incident risk to acceptable levels and improve overa ...