{"id":2474,"date":"2003-12-01T00:00:00","date_gmt":"2003-12-01T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/12\/01\/voip-rules-inch-toward-internet\/"},"modified":"2021-12-30T11:41:24","modified_gmt":"2021-12-30T11:41:24","slug":"voip-rules-inch-toward-internet","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/12\/01\/voip-rules-inch-toward-internet\/","title":{"rendered":"VOIP Rules Inch Toward Internet"},"content":{"rendered":"<p>Federal regulators this week will begin the process of deciding whether to regulate telephone calls placed over the Internet the same way they regulate traditional telephony.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Verizon Communications Inc. and SBC Communications Inc. (see story, Page 26) recently launched VOIP services in selected cities.<\/p>\n<p>In arguments to the FCC, the RBOCs point to Vonage&#8217;s marketing as an illustration that VOIP is the functional equivalent of regular telephone service, but others, including manufacturers such as Cisco Systems Inc., argue that it is an Internet application like instant messaging or e-mail.<\/p>\n<p>More info: [url=http:\/\/www.eweek.com\/article2\/0,3959,1400198,00.asp?kc=EWRSS03119TX1K0000594]http:\/\/www.eweek.com\/article2\/0,3959,1400198,00.asp?kc=EWRSS03119TX1K0000594[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-2474","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2474"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2474\/revisions"}],"predecessor-version":[{"id":4961,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2474\/revisions\/4961"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}