Skip to main content
  1. Blog
  2. Article

James Donner
on 3 February 2016

Telco Demos With Juju: DataStax


Mobile World Congress is weeks away, and we can’t wait to demonstrate the power of Ubuntu on OpenStack alongside the capabilities of NFV. In the meantime, we’re taking a deep dive into innovative telecom focused applications that can be easily enabled with our services modeling tool Juju.

TeleStax provides Open Source Communications software that enable developers to quickly create telephony applications. One of their products is Restcomm, which is a cloud based communication platform that allows you to build voice, video, and messaging applications. With the Mobicents Restcomm MySQL bundle currently available in the charm store, you can have a full voicemail application up and running within 15 minutes on a local environment. Once it’s deployed on Juju, you can access the telephony features through their WebRTC client Olympus.

At TADsummit in Lisbon, Jean Deruelle from Telestax gave a demonstration of the features listed above using the Juju GUI. See for yourself how simple Juju makes the deployment of telecom services.

Related posts


Miha Purg
15 May 2026

Finding the blind spot: How Canonical hunts logic flaws with AI

AI Article

AI is accelerating and improving how security engineers find and fix vulnerabilities. A new tool developed and used at Canonical, called Redhound, has already uncovered three critical logic vunerabilites, paving the way for a more secure software landscape. ...


Luci Stanescu
14 May 2026

Fragnesia Linux kernel local privilege escalation vulnerability mitigations

Ubuntu Article

A local privilege escalation (LPE) vulnerability affecting the Linux kernel has been publicly disclosed on May 13, 2026. The vulnerability does not have a CVE ID published, but is referred to as “Fragnesia.”  The vulnerability affects multiple Linux distributions, including all Ubuntu releases. The affected components are the Linux kernel ...


Bertrand Boisseau
13 May 2026

Rethinking BYOD security: protecting data without trusting devices

Ubuntu Article

BYOD (bring your own device) has always looked better on paper than it does in real life. The promise is clear: let people use the gadgets they already own. Less friction, lower costs, and more freedom. But when security and privacy are non-negotiable, the conversation around BYOD usually ends quickly. Not because BYOD is a ...