Perspectives on technology in videoconferencing

Donald Trump Just Got Elected President. What Does This Mean for Telehealth?


There’s a lot of uncertainty going around about what the results of this election mean for the nation; healthcare being a major focus. While it’s difficult to determine what will happen with healthcare overall, you can be assured that Telehealth will always be a growing and relevant part of our lives.

Continue reading “Donald Trump Just Got Elected President. What Does This Mean for Telehealth?” »

SecureVideo Launches First Responder, A Specialized HIPAA-Compliant Videoconferencing Solution

As the industry leader in HIPAA-compliant videoconferencing, SecureVideo is excited to introduce a groundbreaking new service offering; First Responder was designed specifically to meet the needs of EMTs, police, and other first responders as they often find themselves in the field, presented with a situation that could benefit from a consult or a second opinion. This new system makes that second opinion available at any time and from anywhere via mobile device with a 4G network.
“EMTs, police, firefighters, and the like, they’re well trained to handle any situation, but sometimes there’s reason to call for help,” said Tom Farris, Chief Clinical Officer at SecureVideo. “We’ve talked with first responders all over the country, and one thing we hear a lot is that. They wish there was a way to get advanced medical or mental health advice in the field. That’s why we developed First Responder, and we’re excited to see it in action.”
While SecureVideo’s First Responder solution is dedicated to making on demand sessions as easily accessible as possible, it can also be used to schedule upcoming meetings for any date or time.

How does it work?
Wherever the system has been implemented, First Responders are able to send direct requests through the touch of a button to specialized medical or mental health professionals. They can either select the button for a specific remote provider or click the button for a group queue with multiple providers. With this, they can also attach a note specifying any details or comments that may be helpful to the situation. Immediately thereafter the provider(s) will see the request, respond and then real-time relevant advice is available to the First Responder — all in a matter of moments.
The First Responder platform is always on, providing continuous connection between a First Responder and medical or mental health advisors. Potential subscribers can rest assured that all clients’ Protected Health Information (PHI) will be safeguarded to HIPAA Technical Standards, which are guaranteed upon signing of a contractual agreement.
Click here to learn more about First Responder from SecureVideo

About SecureVideo was founded in 2012 by a team of behavioral health and technology experts in the San Francisco Bay Area; they recognized a unique need for a videoconference system that could be quickly implemented and adapted to the workflows of any medical environment — hospitals, networks, clinics, individuals and more; a system that would allow existing medical organizations to offer telehealth services. It was evident that technology could now support this “do-it-yourself” approach, but the workflows needed to be designed correctly and it needed to be supported as a service, not just technology. SecureVideo was formed to meet this need, to support medical professionals as they harness technology to transform healthcare. To learn more, visit

When NetBIOS over TCP/IP Name Resolution Stops Working

NetBIOS over TCP/IP, also known as NBT, is a bad idea whose time never should have come. We all know we shouldn’t use it, or WINS for that matter; we should just use DNS everywhere. And we also know that we shouldn’t eat a lot of bacon. But if someone has a plate of bacon ready for me at the bottom of the stairs every morning, I will eat some of that bacon, every morning. And so it is for NetBIOS: in a few cases, such as when connecting to a particular VPN, I will eat the bacon of technology and just let NetBIOS resolve the host names on the remote network.

For the last 15 years, this has generally worked well. And why not? NetBIOS is grossly inefficient–firing broadcasts of all kinds around the entire LAN (and if on a VPN, the remote network) to find out who is who and what is what–but that’s like using a tennis racket to hit a ping pong ball: you’ll hit the ball, every time.

Yesterday, NetBIOS name resolution just stopped working for me. I had put my Windows 7 workstation onto the network of a large corporate customer, and noticed I could no longer reach remote VPN machines using their NetBIOS names. That’s OK, I thought, when I get back onto my home network, all will be well. But all wasn’t well, even on my home network.

After quite a bit of googling, trial, and failure, most of it involving running various nbtstat commands on my adapters or net view commands, I found that ipconfig /all showed a working computer to have a Node Type of “Hybrid“, and my failing workstation to have a Node Type of “Peer-Peer“.

To set the Node Type to “Hybrid”, I had to edit the registry as described here, using these steps:

1) Run the registry editor and open this key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netbt\Parameters
2) Delete the DhcpNodeType value if it’s present.
3) If the NodeType value isn’t present, create it using type: DWORD.
4) Set NodeType to 8 (Hybrid).

Then I disabled and re-enabled my network adapter, and voila! I could once again use NetBIOS, both on my LAN and to reach remote hosts over VPN. Now that’s some good bacon!

Saving Fiddler Responses To Disk


Fiddler is a fantastic tool that allows developers and IT professionals to see what’s happening under the hood when a web page is requested by a user.  Somewhat simplified, when a user visits a web page, whether she knows it or not, she is using the HTTP protocol to request a web resource, and then the web server is using HTTP to respond with the HTML of the page itself.  This HTML is rendered by the browser into a pretty page, after any source files such as images or style sheets that were referenced in the HTML are downloaded, also using HTTP.

For the first time in my career, I came across a situation today where a user’s computer was crashing the moment that user visited a web page using Internet Explorer 9.  While this is apparently some issue with that particular computer–no browser should allow its host to crash, regardless of what HTML is returned–I wanted to see some Fiddler output in order to confirm that the HTML request and response causing this crash were not being intercepted and modified somewhere along the way.  The problem was this: the Fiddler log could not be analyzed or saved, because the computer was crashing the moment the web page was requested!

Fortunately, Fiddler has a scripting technology called FiddlerScript that offers hope in a situation like this.

Step 1: Click “Customize Rules”



Step 2: Add code to decode the response, and then save the response body, into the CustomRules.js file that pops up when you click “Customize Rules”:

 static function OnDone(oSession: Session) {
  // Put the URL you want to save here
  if(oSession.url.Contains("")) {

This will write the response, after Fiddler has received it, and before it is passed to the browser, to your My DocumentsFiddler2Captures folder.

Step 3: Request the crash page, and hopefully after you recover from the crash, you will have one or more HTML files in your My DocumentsFiddler2Captures folder.

Step 4: You can then compare the HTML returned in the capture to the HTML which is returned by any other computer.  If it is the same HTML, then the computer is clearly having some problem, and needs to be fixed.  If the HTML is different, then some process either on the host computer (such as a worm) or on the host network is most likely modifying the HTML to cause the crash.

Note, depending on the timing and cause of the crash, this code might need to be placed in different functions.  I started with the code in OnDone so that it would run once the entire request and response were available, but depending on the crash timing, it might have to be placed earlier.  This whole idea also might or might not work in some cases, depending again on the crash cause and timing.

How to paste a screenshot from Google Chrome to ASP.NET MVC

If you’re like me, someone who has been building web applications for 15 years or so, then like me, you probably freaked out the first time you pasted a screenshot into your gmail.  You thought, “what just happened?”  You thought, “wait, this shouldn’t be possible!”  And your immediate next thought was, “omg, how do I do that?”

This is not a ubiquitous functionality at the moment–I’m not able to paste a screenshot into Yahoo! Mail or WordPress right now, nor did I have a need to figure out a way to paste anything using Internet Explorer or Firefox.  In building a Knowledge Base for our support team to be able to serve content onto our website, we decided to implement the ability for them to paste a screenshot to our server using AJAX, have the server show the URL, and then allow them to upload HTML and include the screenshots by creating image tags using the TinyMCE HTML Editor.

Anyone can implement TinyMCE by googling, but the tricky part was getting the paste and AJAX to work, and mind you, as of the time of this writing, this only works in Chrome.  That’s fine for me since our support team uses Chrome, but if you can’t control the browser choice, then this method will not be as valuable to you.

First, you need to capture the paste event on your web page.  This is done using some Chrome-specific Javascript to handle the paste event, and jquery to send the image to the server via AJAX.

   document.onkeydown = function (e) { return on_keyboard_action(e); }
   document.onkeyup = function (e) { return on_keyboardup_action(e); }

   var ctrl_pressed = false;

   function on_keyboard_action(event) {
       k = event.keyCode;
       if (k == 17) {
           if (ctrl_pressed == false)
               ctrl_pressed = true;
           if (!window.Clipboard)
   function on_keyboardup_action(event) {
       if (k == 17)
           ctrl_pressed = false;

   // Paste in from Chrome clipboard
   window.addEventListener("paste", pasteHandler);
   function pasteHandler(e) {
       if (e.clipboardData) {
           var items = e.clipboardData.items;
           if (items) {
               for (var i = 0; i < items.length; i++) {
                   // Only process anything if we have an image
                   if (items[i].type.indexOf("image") !== -1) {
                       // Get the pasted item as a File Blob
                       var blob = items[i].getAsFile();

                       // Reader will read the file
                       var reader = new FileReader();

                       // This fires after we have a base64 load of the file 
                       reader.onload = function (event) {
                           // Once reader loads, sent the blob to the server
                               type: "POST",
                               url: '/Knowledge/Screencap',
                               success: function (resultHtml) {
                                   // Show the uploaded image
                       // Convert the blob from clipboard to base64
                       // After this finishes, reader.onload event will fire

Once you’ve got the paste and AJAX calls set up, the user pastes an image, and then the AJAX call sends your base64 encoded image to the server.  Here’s the actual content sent in the HTTP POST:


On the ASP.NET MVC side, I was not able to get the controller to automatically bind the posted data into a controller parameter.  It’s probably possible, but I’m under some time pressure, so I just examined the HTTP Request’s Input Stream, and picked the image from there.

   public ActionResult Screencap()
      // Get the raw input stream (return to the start of the stream first!)
      Request.InputStream.Position = 0;
      string payload = new StreamReader(Request.InputStream).ReadToEnd();

      string indicator = "base64,";
      int imageStartIdx = payload.IndexOf(indicator);
      if (imageStartIdx >= 0)
          string base64Image = payload.Substring(imageStartIdx + indicator.Length);
          byte[] fileBytes = Convert.FromBase64String(base64Image);
          System.IO.File.WriteAllBytes(saveToPath, fileBytes);
      // Return the URL of the newly saved file for display on the browser
      return Content(PathManager.ToUrl(saveToPath));

Now my support staff can add Knowledge Articles, including lots and lots of screenshots (a good thing), without ever leaving the browser window!

SecureVideo For Any Professional

Did you know that is not just for people in the medical field that need to abide by HIPAA laws?

The truth is, anyone looking for an easy, secure, low-cost video conferencing connection could use SecureVideo.  Our meetings are peer-to-peer.   That means your video session isn’t routed through any servers and it can’t be saved or recorded by, nor subpoenaed from us.   Your meetings stay confidential, as if you were talking to a person face-to-face.

In general, much of our daily communication is nonverbal.  Unlike phone calls, you can read more of your clients’ or associates’ nonverbal cues through a videoconference call.  This comes in handy, especially since we spend so time communicating electronically, missing the tone and body language that accompany the actual text we read.

SecureVideo customers also benefit from the scheduler included with all SecureVideo plans and branding features you get with the Individual PLUS or Enterprise Plan.   These features enable more of your clients to keep their appointments with you.   Plus, your session invites appear to come from your own videoconferencing platform:   How cool is that?

Video conferencing has become a necessary tool for communication in any field.   For example, lawyers can use it to gather oral statements for a deposition, without involving expensive or lengthy travel.  Or allow loan officers to interview their borrowers remotely and process applications in collaboration with other bank branches.  It could also give Human Resource managers a way to conduct interviews with talented candidates, without restricting their choices to local applicants.

You know your workflow best.  When your business calls for secure, face-to-face communication, you have options.  Try us for free.

SecureVideo vs. Google Helpouts

Doctor’s visits online?  Having multiple carriers to choose from?  Are we living in a futuristic time or what?!  Like many of you out there, I’m new to the field of telemedicine.  Not as a practitioner but as a Technical Support Agent.

I recently moved from the bustling, densely populated San Francisco Bay Area to a picturesque town in rural western Massachusetts.  Adjusting to vast open landscapes and honking bands of geese in a town of 7,000 is radical.  One of the realities living here is a shortage of skilled medical professionals.  Looking for a new doctor has been a feat.  Office after office I’ve called across neighboring towns are not accepting new clients.  The best lead I’ve found is a health center with a waitlist of 100 people for a new doctor they hope to hire by the end of November.   It made perfect sense to learn that telehealth sprouted from the need to serve people in remote areas, according to an interview with Dr. Joseph Kvedar by Lylah M. Alphonse, Managing Editor of Special Reports for U.S. News & World Report.

Using technology to build access and connections with people is so important to our time.  Equally important is privacy.  As we send information into cyberspace, we certainly want it kept securely and ethically.  Patient privacy is of utmost concern in providing online healthcare.  SecureVideo offers a person to person, HIPAA-compliant solution that helps people gain access to care that otherwise might not be available.  We do not have the ability to record sessions, so information shared over stays private always.

As I’m reading up about telemental health, I see that the Google giants are also jumping into remote person-to-person videoconferencing solutions, called Helpouts.  Their service hinges upon people helping people in real-time.  They have different categories of Helpouts, including Health where some health providers are making themselves available.  I thought it would be worthwhile to review how SecureVideo and Google Hangouts stack up for those of you looking into videoconferencing solutions for healthcare.


Affordable. We do not take a fixed % of your session. There are three different plans ranging from $2-$4 per session.  If you are new to videoconferencing, our free account offers you four sessions a month.

True privacy.  HIPAA-compliant one to one connection.  We do not record your sessions.

Sophisticated scheduler and appointment reminder system reduces no-shows.

Branding.  Use your own color schemes, logos, etc.  All outgoing communication to clients will read from you instead of

Business Associate Agreement (BAA).  We can provide a written assurance to properly safeguard protected health information.

Easy PayPal integration. Optional for Individual Plus and Enterprise customers.  Allows your clients to pay for services directly through your session page.

Take your existing business online.  SecureVideo is a great solution for your established or budding practice.

Easy!  You can be up and running literally in minutes.

Google Helpouts:

Up to 20% per transaction.  There is a lack of clarity around how they charge for a health Helpout, but as of Jan. 2014 there will be a fixed percentage charged per transaction.

-A public Google+ page is required to promote your business.

-A Google wallet account is required for set up.

Screening. You must go through a third party screening process to verify your credentials.

-Helpouts offer BAA agreements.  Originally, I had thought they didn’t.  It’s a good thing, since they are required by the United States Department of Health and Human Services for HIPAA compliance.  However, the world recently discovered that the NSA and the British equivalent, GCHQ hacked into Google’s overseas servers.  Levi Sumagaysay, Editor of  SiliconBeat, the San Jose Mercury News’ Tech Blog, wrote “there are more government requests for Google user data than ever, with the number doubling in the past three years.”

100% money back guarantee for clients only when you allow Google to record your sessions for quality assurance.  They seem to be waiving this for Health hangouts to meet HIPAA compliance.

Your privacy is questionable.   This the major sticking point.  On October 30, 2013, The New York Times reported that the National Securtiy Agency tapped Google’s and Yahoo’s fiber-optic cables.  The GCHQ has the “ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be shifted and analysed,” according to an article in June by the Guardian.  Google has shown concern for this kind of spying and has been working on encryption since news of snooping leaked over the summer.  It is clear however, that NSA and GCHQ have the capacity to intercept recordings of calls, emails, and other data- including videoconfrencing sessions.

Without a doubt, Google’s Helpouts page is impressive.  There is a very cool video that reminded me how much I’ve always wanted to take guitar lessons.  But when you cut through the color schemes, the cool video, and the big name:  SecureVideo offers more for less.  Less hassle.  Less artificial constructions that keep you steps away from simple and direct one-to-one connections.  Patients are waiting with real concerns.  Don’t make them wait any longer than necessary.  Meet them with more of you and a lot more privacy.

Snowden Leaks Disclose NSA-Skype Cooperation

In a story that has been developing over the past several weeks, The Guardian disclosed last week that Microsoft has been providing the National Security Agency with access to recorded data collected on Skype, which was purchased by Microsoft for $8.5 billion in 2011.

The files provided by Edward Snowden illustrate the scale of cooperation between a number of Silicon Valley companies and the intelligence agencies over the last three years. They also shed new light on the workings of the top-secret Prism program, which was disclosed by the Guardian and the Washington Post last month.

Microsoft has collaborated closely with US intelligence services to allow users’ communications to be intercepted, including helping the National Security Agency to circumvent the company’s own encryption, according to top-secret documents obtained by the Guardian. In the past, Microsoft has been evasive when asked about the privacy of communications over its popular VOIP platform, but these disclosures have blown the lid off Microsoft’s credibility on the issue. In fact, the recent statement by Microsoft’s general counsel, attempting to rebut the Guardian’s reporting, stated that, “going forward, it assumes Skype calls will be regarded just like any other phone call – mobile or landline.”

It should now be perfectly clear that using Skype for any telemedical communications involving Protected Health Information (PHI) is a prima facie violation of the HIPAA Security Rule.

As our Chief Technical Officer has pointed out, both here and on our website,, we do not record any communications which use our service. All contact between practitioner and patient is direct and unmediated, so there is no way that it can be intercepted or reproduced. Your Protected Health Information is truly protected here.

Stephen C. Taylor
General Counsel

Implementing JSON Web Tokens in .NET with a Base 64 URL Encoded key

I wasn’t able to find any good technical examples of how to implement JSON Web Tokens (JWT) for .NET when the key is Base 64 URL encoded according to the JWT spec (, page 35).

John Sheehan’s JWT library on GitHub is a nice starting point, and works well when the key is ASCII encoded already, but it cannot be used without modification if the key is Base 64 URL Encoded.

Here’s the solution:

// URL Encode the string, according to
//, page 35
public string Base64UrlEncode(byte[] arg)
string s = Convert.ToBase64String(arg); // Regular base64 encoder
s = s.Split('=')[0]; // Remove any trailing '='s
s = s.Replace('+', '-'); // 62nd char of encoding
s = s.Replace('/', '_'); // 63rd char of encoding
return s;
public byte[] Base64UrlDecode(string arg)
string s = arg;
s = s.Replace('-', '+'); // 62nd char of encoding
s = s.Replace('_', '/'); // 63rd char of encoding
switch (s.Length % 4) // Pad with trailing '='s
case 0: break; // No pad chars in this case
case 2: s += "=="; break; // Two pad chars
case 3: s += "="; break; // One pad char
default: throw new System.Exception(
"Illegal base64url string!");
return Convert.FromBase64String(s); // Standard base64 decoder
// Implementation of,
// section A.1.1, JWS using HMAC SHA-256 (encoding), by J.T. Taylor,
public string GetAuthenticationToken(string base64UrlEncodedSecretKey, string userId)
// Prepare authentication token
// Get Unix-style expiration date
double unixSeconds = (DateTime.UtcNow - new DateTime(1970, 1, 1, 0, 0, 0, DateTimeKind.Utc)).TotalSeconds;
double expiry = unixSeconds + (2 * 24 * 60 * 60);
string jwsHeader = "{" +
""typ":"JWT"," +
""alg":"HS256"" +
byte[] jwsHeaderUtf8Bytes = Encoding.UTF8.GetBytes(jwsHeader);
string encodedJwsHeaderValue = Base64UrlEncode(jwsHeaderUtf8Bytes);
string payloadJson = "{" +
""sub":"" + userId + ""," +
""iss":"service-id"," +
""exp":" + expiry.ToString("0") +
byte[] jwsPayloadUtf8Bytes = Encoding.UTF8.GetBytes(payloadJson);
string encodedJwsPayloadValue = Base64UrlEncode(jwsPayloadUtf8Bytes);
string jwsSecuredInputValue = encodedJwsHeaderValue + "." + encodedJwsPayloadValue;
byte[] jwsSecuredInputAsciiBytes = Encoding.ASCII.GetBytes(jwsSecuredInputValue);
byte[] secretKeyBytes = Base64UrlDecode(base64UrlEncodedSecretKey);
var hmacSha256 = new HMACSHA256(secretKeyBytes);
byte[] signatureBytes = hmacSha256.ComputeHash(jwsSecuredInputAsciiBytes);
string encodedJwsSignatureValue = Base64UrlEncode(signatureBytes);
string jwt = jwsSecuredInputValue + "." + encodedJwsSignatureValue;
return jwt;

How to make a High Quality Videoconference

By Jonathan (JT) Taylor, Chief Technology Officer


From a human perspective, a good videoconference is similar to a good movie.  In a good movie, there is a “suspension of disbelief”, whereby the viewer–initially well aware of being seated in a movie theater and thus disbelieving of the reality of images appearing on the screen–eventually suspends that disbelief to the point where the characters, actions, and conversations on the screen appear real.

Likewise, in a good videoconference, the participant is initially aware of communicating with the other party through a screen, camera, microphone, and speaker, but eventually this “disbelief” of in-person contact is suspended, such that after a few minutes both participants really feel like they’re meeing face-to-face.

The time-tested rules to achieve “suspension of disbelief” in videoconferencing are as simple to enumerate as they are complex to technically implement:

Rule #1) the video must be of a high enough resolution that each speaker’s eyes, hands, facial gestures, and body language can be clearly understood by each listener.

Rule #2) the audio must be clear enough so as to approximate the sounds the listener would hear if the speaker was in the same room.

Rule #3) the video and audio must flow smoothly and naturally, with no hiccups, stops, or gaps.

Rule #4) there must be no delays between the video and audio portions–when the speaker’s mouth moves, the speaker’s words must be heard at the exact same moment.

Sounds easy enough, right?  It is perhaps, until one considers the various “videoconferencing trolls” which lurk in the shadows of the internet to often confound even the most expert videoconferencers.  To get a high quality videoconference, each of these trolls must be avoided.


The Inferior Audio-Video Equipment Troll.  As I mentioned earlier, in order to videoconference, each party must have a web camera and microphone–to send the video and audio–and a screen and speakers–to receive the video and audio.  (Many users prefer to use a headset, which combines the speaker and microphone functions, and also overcomes the pesky “Echo” troll.)

A web camera that has low resolution, supports only a low frame rate, or handles light contrast poorly, will break rule #1.  As will a low resolution, or very small screen image on the viewer’s end.  On the audio side, a microphone or headset that do not pick up the speaker’s words with the proper sensitivity and digital sampling, will break rule #2.  A low quality speaker on the listener’s end will have the same effect.

These AV Equipment trolls are theoretically simple enough for each participant to fix–it just requires spending some money (usually $50 is enough for a webcam, and $30 for a headset which contains both speakers and microphone).  However, more videoconferences than I can count have failed to achieve “suspension of disbelief” due to inferior equipment.


The Slow Computer Troll.  Let’s say you’re in a videoconference, and everyone has cleverly avoided The Inferior Audio-Video Equipment Troll by having good equipment.  Your web camera and microphone are picking up your images and words really well, and sending them to your computer.  Now all your computer has to do is to encode those images and words into a digital stream of 0’s and 1’s and send them over the internet, and it has to do so at least as quickly as the 0’s and 1’s are arriving from your A/V devices.

But, alas!  It turns out that this encoding takes a lot of computer processing power (much more so than decoding, as it happens), and if your computer does not possess sufficient processing power, then your 0’s and 1’s will not be able to be sent to your videoconferencing partners at the same rate they’re arriving from your A/V equipment, and thus your videoconference will be defeated by The Slow Computer Troll, manifesting through the violation of rules #3 and #4 above.

To avoid The Slow Computer Troll, you simply need to have a good enough Computer or device. offers a computer speed test, so you can see whether The Slow Computer Troll is inhabiting your computer or not.  The latest Apple iPad (the iPad 3) runs a very lovely videoconference, so that could be a good way to avoid this particular troll.  If you want to stay with your computer to run the Troll out of town, you could consider a CPU (processor) upgrade.

Networking Trolls.  If your A/V equipment and computer are high enough quality, unfortunately there is an entire phylum of Videoconferencing Trolls which threaten your blissful videoconference: The Networking Trolls.

(Hint: you can conduct a network speed test you can use to check whether your network speed will avoid the Networking Trolls.)

Networking Trolls generally take one of three sub-forms:

The Firewall Troll.  The Firewall Troll holds sway when there is a firewall between your computer and the Internet, as often happens when you’re on a corporate network.  In this case, The Firewall Troll (and his cousin, The Network Address Translation Troll) can often prevent videoconferencing connection altogether.  The solutions to this Troll are varied and generally complex.  At, we use a combination of Video Proxies, which restrict the videoconference to ports which are commonly unaffected by firewalls, and protocols such as STUN and ICE which are specifically designed to overcome address translation issues.  I have seen several other solutions to this problem in the field, most being variants of this approach.

The Low Bandwidth Troll.  The Low Bandwidth Troll appears in the slower corners of the internet where bandwidth is less than 1 megabit per second: generally these are 3G and slower 4G mobile connections, many DSL connections, and corporate T1 networks with many users.  While the normal solution for this problem is to obtain a faster Internet connection, this is generally the most difficult to achieve, often involving high cost and lengthy lead times.  At, our platform uses a technology called “Adaptive Layering” to greatly mitigate this problem.

Adaptive Layering means that the 0s and 1s are not sent in a single stream which is then transmitted to all participants (which is how almost all other platforms operate.)  Instead, the 0s and 1s are arranged into a number of layers.  Participants who can receive the highest resolution streams receive all the layers and get a perfect experience.  Participants who cannot, receive only those layers which comprise the lower resolution stream.  In this way, the media streams are optimized for each participant.

The Intermittent Troll.  The Intermittent Troll is the King of all the Videoconferencing Trolls.  It is the most common, and the most obstinate.  The Intermittent Troll operates like this: let’s say all other Trolls have been mitigated, and the videoconference is going very well, and every participant truly has suspended their disbelief and now feels exactly as if they’re meeting in person.  Then, for one of the participants, their internet connection hiccups, either due to a routing glitch, network congestion, or a temporarily overloaded internet router somewhere between here and there.  For the vast majority of videoconferencing platforms, The Intermittent Troll will cause choppiness, gaps, freezes, and out-of-sync between video and audio.  Sometimes this condition even forces the participant to disconnect.

Dealing with The Intermittent Troll separates the top videoconferencing platforms from the also-rans.  The platform uses Scalable Video Coding (SVC) to solve the problem.  With SVC, when an intermittent network hiccup is encountered, the video (and occasionally the audio) resolution will be subtly and immediately adjusted, such that there is no interruption in the streams, and no syncing issue.  The only perceptible effect to the participants are that the background may get a little fuzzier, or in the extreme case, the entire video stream gets less sharp and perhaps even the audio loses a little clarity.  However, once the intermittent condition resolves, the software automatically and quickly adjusts back to the maximum resolution.  From a suspension of disbelief standpoint, it is similar to a part in the movie where one thinks momentarily about other roles one of the actors has played, but quickly reabsorbs back into the plot line.  In my many years in videoconferencing, the SVC technology is the only effective way I have ever seen to deal with that King of videoconferencing trolls, The Intermittent Troll.


The Echo Troll.  The last major Videoconferencing Troll is The Echo Troll.  The Echo Troll manifestation is where a speaker hears himself speak, on a slight delay, as he speaks, which has a most disconcerting effect.  It is generally caused by a listener’s microphone and speakers placed too closely together, whereby 1) the talker speaks; 2) the sound comes out the speaker of the listener; 3) the same sound enters the microphone of the listener; 4) that sound is sent back to the talker’s speaker; and, finally, 5) the talker is quickly driven insane.

Headphones are a great way to deal with the Echo Troll, as is an echo cancelling speakerphone, such as the Phoenix Duet series.  If you don’t have headphones or an echo cancelling speakerphone, then to defeat the Echo Troll it is necessary to move the microphone and speakers as far apart as possible.

If this is not possible, as with a laptop which may have built in microphone and speakers, then you’d better hope the video-conferencing platform supports echo cancellation.  Which many don’t, but of course, does.

So What?

My #3 hope is that this blog entry will have educated you significantly about how videoconferences work, the possibility to achieve “suspension of disbelief” on a high quality videoconference, the requirements to actually achieve a high quality videoconference, and why it can often be so difficult to achieve high quality due to the many Videoconferencing Trolls which can so easily harry and peck at your meetings.

My #2 hope is that you have an excellent remainder of your day, after having read this blog entry.  If this happens, I wouldn’t presume to take credit for it, but then you never really know, right?


My #1 hope is that after reading this, you’ll realize that no videoconferencing platform on this planet is as effective in shutting down the Videoconferencing Trolls, and thereby creating real “suspension of disbelief”, as, and you will see the light and sign up this very moment for a 30 day free trial so that you can see the quality difference for yourself.

Even after as few as 2 or 3 videoconferences, I believe that you’ll start to see what I’m talking about: that a high quality videoconference will make you feel like you really are in the same room as the other person, and after exchanging the subtle nonverbal cues, facial expressions, body language, and eye contact, you will be truly amazed at the power of our technology.