• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      event logo
      Deskflix Financial Services

      oin us for this episode of Deskflix to hear from industry experts and peers on their 2020 best practices, what they’ve learnt for 2021 and how they plan to overcome the next wave of disruption.

      • Date: 03 Mar 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 
  • Telecoms

100 years of hold music: why is audio conferencing still with us?

Death, where is thy sting?

Waiting by the phone
Waiting by the phone
  • John Leonard
  • John Leonard
  • @_JohnLeonard
  • 03 November 2016
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
0 Comments

Imagine the excitement when the first conference call was made 100 years ago. The telephone itself was still pretty new, but suddenly it was possible (after much laying of cable and switchboard jiggery pokery by the operator) to have a conversation rather than just a dialogue over the wires. Alexander Graham Bell placed the call from New York to San Francisco, where Thomas Watson answered. The call was then joined by Theodore Vail, president of AT&T, and then, from the White House, by US president Woodrow Wilson.

Much of the subsequent work in making telephone conferencing more widely available was performed in the 1940s and 1950s by telecommunications engineer and inventor Walter L Shaw, who patented technologies for the conference call as well as for touch-tone phones, call forwarding and the red telephone link between the USA and the former Soviet Union.

Unfortunately when ownership of his ideas was not recognised by his employers AT&T and later Bell Labs, he became embittered and sold another of his ideas, the ‘blue box' untraceable call device, to the Mafia, a crime for which he was jailed in 1975. The blue box was later taken up by two guys named Steve, Jobs and Wozniak, who used it for making prank calls to the Vatican, but that's another story.

The concept of teleconferencing didn't really take off until the 1960s when, acting on Shaw's ideas, devices from the likes of Bell Labs and AT&T made telephone conferencing and even early video conferencing available to businesses. But like the computers of that era, the devices were far too expensive and unreliable to be of much use to any but a select few. Subsequent technological advances such as IRC and SIP trunking have made audio conferencing far more reliable and affordable, but at the same time the mobile revolution has added challenges of its own owing to reception blackspots.

Other communications technologies also have arrived, including functioning HD video and web conferencing as well as multi-party messaging and collaboration platforms; in fact there has been an explosion in ways for work groups to collaborate and keep in touch. Yet, perhaps because everyone is familiar with how it works, audio conferencing remains a very popular - perhaps still the most popular - way for multiple people to meet up to get things done from wherever they are located.

Popular it may be in numbers terms but that's not the same thing as being popular with those who spend large parts of their working lives misdialling long entry codes, enduring tedious hold music and making embarrassing small talk while waiting for participants to arrive.

A necessary evil

Conference calling is undoubtedly very useful, even if the wonder has long since departed. It has meant far fewer unnecessary journeys and saved organisations a lot of time, money and hassle. Indeed, 28 per cent of the 150 IT professionals polled by Computing said conference calls are really helpful in keeping everyone 'on the same page'. However, most people seem to have a weary acceptance of voice conferencing at best, with the largest single proportion describing it as a necessary evil (figure 1).

Audio conference graph 1

Broken etiquette

Because audio conference calls are often joined by callers who feel they are wearing a cloak of invisibility by virtue of being in their own home, the technology has given rise to its own rules and etiquette, around being punctual, not talking out of turn and being mindful of background noise. Nonetheless, these unwritten rules are constantly being broken.

12
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
  • Topics
  • Telecoms
  • Research
  • in-depth
  • Video Conferencing
  • Mobile
  • collaboration
  • NetscoutCollaboration

More on Telecoms

BT faces possible £500m claim for overcharging landline-only customers
BT faces possible £500m claim for overcharging landline-only customers

In 2018, BT had agreed to reduce its landline prices from £18.99 to £11.99 a month for about 900,000 customers

  • Telecoms
  • 18 January 2021
Revving up the 5G rollout at Three UK

Three's 5G rollout means expanding capacity on many fronts at the same time, explains network strategy and architecture manager Firoz Vohra

  • Telecoms
  • 09 October 2020
Greg Clark MP is chairman of the Science and Technology Select Committee
Removing Huawei would cost billions and customers could experience blackouts, BT and Vodafone tell MPs

Telecoms giants urge caution, while Samsung says it's ready to take Huawei's place in the UK's 5G networks

  • Security
  • 10 July 2020
T-Mobile network outage affected thousands of customers in the US
T-Mobile network outage affects thousands of customers in the US, experts reject claims of DDoS attack

Widespread routing issue affected T-Mobile's voice and text service, the company reveals

  • Telecoms
  • 16 June 2020
BT picks Ericsson to deploy the core for its 4G and 5G networks
BT picks Ericsson to deploy the core of its 5G networks

In the wake of uncertainty over Huawaei, Ericsson has been selected on the basis of lab performance and future roadmap, BT says

  • Telecoms
  • 16 April 2020
blog comments powered by Disqus
Back to Top

Most read

Russian malware found on government-issued laptops for home schooling
Russian malware found on government-issued laptops for home schooling
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
Google locks out another top AI ethicist
Google locks out another top AI ethicist
Hackers publish data stolen from SEPA as the agency refuses to pay ransom
Hackers publish data stolen from SEPA as the agency refuses to pay ransom
Hacker leaks data of more than 2 million dating site users
Hacker leaks data of more than 2 million dating site users
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading