Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

James Donner
on 3 February 2016

Telco Demos With Juju: DataStax


Mobile World Congress is weeks away, and we can’t wait to demonstrate the power of Ubuntu on OpenStack alongside the capabilities of NFV. In the meantime, we’re taking a deep dive into innovative telecom focused applications that can be easily enabled with our services modeling tool Juju.

TeleStax provides Open Source Communications software that enable developers to quickly create telephony applications. One of their products is Restcomm, which is a cloud based communication platform that allows you to build voice, video, and messaging applications. With the Mobicents Restcomm MySQL bundle currently available in the charm store, you can have a full voicemail application up and running within 15 minutes on a local environment. Once it’s deployed on Juju, you can access the telephony features through their WebRTC client Olympus.

At TADsummit in Lisbon, Jean Deruelle from Telestax gave a demonstration of the features listed above using the Juju GUI. See for yourself how simple Juju makes the deployment of telecom services.

Related posts


Amir Abdel Baki
28 February 2025

Life at Canonical: Akshara Pathak shares her experience as a new joiner in Customer Success

Ubuntu Article

As Canonical continues to grow, we have developed a unique onboarding process that enables our new hires to quickly settle and establish themselves in our globally distributed environment.  During your first few weeks, your manager will create an onboarding plan to introduce you to the business, your closest stakeholders and colleagues. Y ...


Luci Stanescu
28 February 2025

How to conduct a vulnerability assessment

Security Article

The realm of information security is fraught with jargon, as anyone who has come across vulnerability-related terms can tell you. To complicate matters further, some of these terms are used interchangeably or in contexts outside of computing. This can muddy the waters for people looking to learn about vulnerability assessments – so in thi ...


Matthew de Klerk
28 February 2025

Learn how to run your data centre like a cloud at our March after-work event

Cloud and server Article

At this in-person event, you’ll have the chance to rub shoulders with your colleagues in the cloud space, learn first-hand how open source infrastructure can have colossal impacts on your operating costs and business growth, and unwind with coffee, cocktails, and light refreshments. ...