{"id":317,"date":"2005-03-05T00:00:00","date_gmt":"2005-03-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/03\/05\/no-glee-for-voip\/"},"modified":"2021-12-30T11:37:01","modified_gmt":"2021-12-30T11:37:01","slug":"no-glee-for-voip","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/03\/05\/no-glee-for-voip\/","title":{"rendered":"No Glee for VoIP"},"content":{"rendered":"<p>The New York Mercantile Exchange is the latest financial entity to decline the telecom technology that turret-makers promote.  With its commitment to open outcry trading, the New York Mercantile Exchange (Nymex) has a special love for the clear tones of shouting traders, so its telephones are close to its heart.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>But while opinion about the suitability of the latest telephony technology, the Voice over Internet Protocol (VoIP), has been vacillating between whether to adopt it or not within financial institutions, Nymex is holding firm in ruling out the possibility of using the technology for now.<\/p>\n<p>When Nymex officials opted for a digital voice network to replace the legacy V Band analog turret system, they explicitly opted out of using VoIP for the more than 700 trading turret positions.  According to John Barbara, director of telecommunications for the IS department of Nymex, the exchange chose the BT ITS voice trading system over a similar offering from rival IPC Information Systems.  &#8220;Both BT and IPC came up with a four-handset solution, so we put two four-handset turrets in each booth.<\/p>\n<p>Nymex chose the BT ITS solution for its 450 trading position on the Nymex trading floor, where traders deal in energy, crude oil, gasoline, heating oil, natural gas markets and platinum group metals.  Nymex also purchased and implemented 290 positions at its sibling Comex division, where traders deal in gold, silver, copper and aluminum.<\/p>\n<p>http:\/\/db.riskwaters.com\/public\/showPage.html?page=210399<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-317","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=317"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/317\/revisions"}],"predecessor-version":[{"id":2804,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/317\/revisions\/2804"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}