Feeds

VoIP is coming to the iPod Touch

Is there nothing an Apple can't do?

Internet Security Threat Report 2014

VoIP provider Truphone has ported its VoIP client to the iPod Touch, enabling the music player to make free phone calls over Wi-Fi networks, but only to other Truphone users for the moment.

Truphone's iPhone application has been around for a while, enabling VoIP calls over Wi-Fi connections, but the application deliberately refuses to work over 3G networks. With the two devices being so closely related it's not surprising that the client has been ported to the iPod Touch.

For the moment the iPod Touch is limited to making calls to other Truphone or GoogleTalk subscribers, but the company promises that general calling and incoming calls are coming real soon now.

The Truphone application is free from the iTunes store, though users will probably want a microphone too. A mic will set you back £20 from the Apple store, but you can than start making calls as long as the Wi-Fi coverage lasts.

It's not clear how many iPod Touch users want to make phone calls on their device - one imagines such people would have bought an iPhone - but if you've got one and keep wishing it would make phone calls then it's your lucky day. ®

Internet Security Threat Report 2014

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.