This document discusses building voice applications with Ruby using the Adhearsion framework. Some key points:
- Adhearsion is a telephony framework that makes building voice applications with Ruby easier through features like an easy DSL, native Ruby code, and powerful event handling system.
- It provides high-level constructs for building voice applications like menus, queues, conferences as well as text-to-speech, voice recognition and call progress detection.
- Adhearsion works with Asterisk for telephony functionality but its event system and ability to add TTS/ASR are advantages over working directly with Asterisk. It also works with Tropo but Tropo lacks event handling and built-in
2015.10.05 Updated > Network Device Development - Part 1: SwitchCheng-Yi Yu
This document provides instructions for setting up a network development environment using a Debian virtual machine. It includes choosing a board and operating system, installing Debian in a VMware virtual machine, configuring virtual networks, developing and installing simple kernel modules to test network functionality, and modifying kernel modules to implement basic firewall rules.
2015.10.05 Updated > Network Device Development - Part 2: Firewall 101Cheng-Yi Yu
This document provides an overview of building a basic firewall. It describes setting up two virtual networks, VMnet2 and VMnet3, with Ubuntu clients on each. A Debian switch is configured with NAT between VMnet1 and the external network. The document explains how to use socket buffers and manipulate packet headers to implement a firewall. It outlines moving between layers 2, 3 and 4 to inspect packets and check protocols, ports, and IP addresses to allow or block traffic between the two virtual networks. The next steps involve modifying the main.c file to implement the firewall rules and testing connectivity between the VMnet clients.
This document provides specifications for a 16-channel surveillance system that includes a DVR with 2TB of storage, 16 cameras (12 indoor domes and 4 indoor/outdoor bullets), cables, and software for remote viewing and motion detection alerts. The system offers H.264 video compression, 480ips recording speed, and network connectivity for remote monitoring and setup.
This document provides an overview of iOS jailbreaking. It explains that jailbreaking removes limitations imposed by Apple to allow root access and installation of unauthorized apps. Reasons for jailbreaking include customization, adding features, and making development easier. The document discusses the jailbreaking process, which involves exploiting checkpoints in the device startup process. It also covers jailbreak tools, repositories for unauthorized apps like Cydia, common jailbreak terms, and legal issues.
TCUK 2013 - Martin Block - Creating narrated videos for user assistanceTCUK Conference
The document discusses creating narrated video tutorials to supplement written help documentation for software. It outlines developing a proof of concept for videos supporting key topics in the help system for an access control software called EntroWatch. The summary describes preparing scripts, recording audio narration, creating animation-only videos, and editing the videos by matching script snippets to the animations. The final concept involved assembling a list of topics for videos, writing scripts, recording audio, preparing animations, and compiling the videos within an editing package to be accessed from help topics.
This document discusses building voice applications with Ruby using the Adhearsion framework. Some key points:
- Adhearsion is a telephony framework that makes building voice applications with Ruby easier through features like an easy DSL, native Ruby code, and powerful event handling system.
- It provides high-level constructs for building voice applications like menus, queues, conferences as well as text-to-speech, voice recognition and call progress detection.
- Adhearsion works with Asterisk for telephony functionality but its event system and ability to add TTS/ASR are advantages over working directly with Asterisk. It also works with Tropo but Tropo lacks event handling and built-in
2015.10.05 Updated > Network Device Development - Part 1: SwitchCheng-Yi Yu
This document provides instructions for setting up a network development environment using a Debian virtual machine. It includes choosing a board and operating system, installing Debian in a VMware virtual machine, configuring virtual networks, developing and installing simple kernel modules to test network functionality, and modifying kernel modules to implement basic firewall rules.
2015.10.05 Updated > Network Device Development - Part 2: Firewall 101Cheng-Yi Yu
This document provides an overview of building a basic firewall. It describes setting up two virtual networks, VMnet2 and VMnet3, with Ubuntu clients on each. A Debian switch is configured with NAT between VMnet1 and the external network. The document explains how to use socket buffers and manipulate packet headers to implement a firewall. It outlines moving between layers 2, 3 and 4 to inspect packets and check protocols, ports, and IP addresses to allow or block traffic between the two virtual networks. The next steps involve modifying the main.c file to implement the firewall rules and testing connectivity between the VMnet clients.
This document provides specifications for a 16-channel surveillance system that includes a DVR with 2TB of storage, 16 cameras (12 indoor domes and 4 indoor/outdoor bullets), cables, and software for remote viewing and motion detection alerts. The system offers H.264 video compression, 480ips recording speed, and network connectivity for remote monitoring and setup.
This document provides an overview of iOS jailbreaking. It explains that jailbreaking removes limitations imposed by Apple to allow root access and installation of unauthorized apps. Reasons for jailbreaking include customization, adding features, and making development easier. The document discusses the jailbreaking process, which involves exploiting checkpoints in the device startup process. It also covers jailbreak tools, repositories for unauthorized apps like Cydia, common jailbreak terms, and legal issues.
TCUK 2013 - Martin Block - Creating narrated videos for user assistanceTCUK Conference
The document discusses creating narrated video tutorials to supplement written help documentation for software. It outlines developing a proof of concept for videos supporting key topics in the help system for an access control software called EntroWatch. The summary describes preparing scripts, recording audio narration, creating animation-only videos, and editing the videos by matching script snippets to the animations. The final concept involved assembling a list of topics for videos, writing scripts, recording audio, preparing animations, and compiling the videos within an editing package to be accessed from help topics.
Supergluing Asterisk to the Web with AdhearsionMojo Lingo
The document discusses Adhearsion, an open source voice application development framework built on Ruby. It can integrate with Rails and runs on any platform that supports Ruby or JRuby. Adhearsion allows building voice applications for call centers, sales automation, conferencing, translation and more. It provides tools for call control and dynamic configuration of Asterisk via its AMI interface.
Ben Klang is the leader of the Adhearsion project, an open source voice application development framework built on Ruby. Adhearsion allows developers to build voice applications quickly by integrating voice capabilities into existing systems. It works with platforms like Asterisk and Tropo and provides benefits like rapid development, reusability, and cloud deployment of voice applications.
Adhearsion is a framework for building voice applications that enables innovation in the voice space. It allows outside applications and services to operate on carriers' and service providers' networks without giving up control of customers, collecting revenue from startups. Frameworks like Adhearsion and Rails make developing applications faster and easier, lowering the barrier for more ideas to reach users. Mojo Lingo is excited about voice applications because technologies now allow voice to integrate with data, web, IM, and organizational data to solve real problems in areas like call centers, sales, and conferencing.
Adhearsion is a voice application framework that provides a modern approach for building voice applications with features like logging, plugins, fault isolation, daemonization/threading, connection management, and decoupling logic from the engine. It aims to offer developers a common way to build voice applications.
Call Control Power Tools with Adhearsion Mojo Lingo
This document introduces Adhearsion, an open source voice application development framework built on Ruby. It can be used to build applications like call centers, sales force automation, conferencing, translation services, IVRs, and more. The document discusses Adhearsion's architecture and how it allows changing Asterisk configurations at runtime through AMI. It also introduces the Adhearsion Console.
This document provides an overview of Adhearsion, an open source framework for building voice applications using Ruby. It discusses why voice is an important medium, provides code samples, and summarizes key features of Adhearsion like its easy-to-use DSL and support for Asterisk. Use cases like call centers, conferencing, and polling are presented. The architecture, future plans for version 2.0, and potential far-future directions are also outlined. The presentation aims to illustrate how Adhearsion brings modern development practices to telephony.
This document provides an introduction to installing and configuring the Asterisk PBX software. It begins with an agenda that covers installing Asterisk, the basics of how Asterisk works, configuring telephony hardware, basic configuration files like sip.conf and extensions.conf, and advanced topics like voicemail, conferencing and scaling. It then discusses downloading and compiling the required components like Zaptel and Libpri as well as configuring SIP endpoints. The document provides an overview of Asterisk's architecture and components and how to structure dial plans using contexts, extensions, applications and variables.
This document provides an introduction to installing and configuring the Asterisk PBX software. It begins with an agenda that covers installing Asterisk, the basics of how Asterisk works, configuring telephony hardware, basic configuration, codecs, system requirements, voicemail, conferencing, administration, and advanced topics. It then discusses downloading and compiling the required components of Asterisk including Zaptel, Libpri, and sounds. Finally, it reviews the basic configuration files needed to set up SIP endpoints and a simple dial plan.
This document provides an introduction to installing and configuring the Asterisk PBX software. It outlines the agenda which includes installing Asterisk, an overview of Asterisk, configuring telephony hardware, basic configuration, codecs, system requirements, voicemail, conferencing, administration, and advanced topics. It then discusses downloading and compiling the required components, including Asterisk, Zaptel, and Libpri. Finally, it covers basic Asterisk configuration files locations, architecture, and setting up a simple system with SIP endpoints and a SIP gateway.
This document provides an introduction to installing and configuring the Asterisk PBX software. It begins with an agenda that covers installing Asterisk, the basics of how Asterisk works, configuring telephony hardware, basic configuration files like sip.conf and extensions.conf, and advanced topics like voicemail, conferencing and scaling. It then discusses downloading and compiling the required components like Zaptel and Libpri as well as configuring SIP endpoints. The document provides an overview of Asterisk's architecture and components and how to structure dial plans using contexts, extensions, applications and variables.
This document discusses best practices for deploying WebRTC to replace or augment existing SIP-based phone systems. It covers choosing appropriate codecs to balance bandwidth usage and call quality for different use cases. It also addresses WebRTC-specific considerations like ICE, DTLS, and asymmetric call patterns. Performance metrics are provided from test calls using different codecs on an Asterisk server. The presentation includes diagrams of common WebRTC deployment architectures and links to live demos.
Getting the Best Out Of WebRTC - Astricon 2014Dan Jenkins
This document discusses best practices for deploying WebRTC to replace or augment existing SIP-based phone systems. It covers choosing appropriate codecs to balance bandwidth usage and call quality for different use cases. It also addresses WebRTC-specific considerations like ICE, DTLS, and asymmetric call patterns. Performance metrics are provided from test calls using different codecs on an Asterisk server. The presentation includes diagrams of common WebRTC deployment architectures and links to live demos.
IDNOG 4 Lightning Talks - Documenting your Network in 3 Simple StepsAffan Basalamah
This document provides a 3-step process for documenting a network in a sane and healthy way:
1. Draw network diagrams using tools like Visio or OmniGraffle to depict the physical, logical, and application layers. Store the diagrams online or in a wiki for easy access.
2. Backup network configurations regularly using tools like RANCID or Oxidize, which can save configurations to a repository and detect changes between backups.
3. Use IP address management (IPAM) tools like Netbox to document IP assignments, devices, rack locations, and network connections. This provides a single source of truth for the physical and logical network resources.
Following these steps provides visibility into
This document provides a 3-step process for documenting a network in a sane and healthy way:
1. Draw network diagrams using tools like Visio or OmniGraffle to depict the physical, logical, and application layers. Store the diagrams online or with network monitoring tools.
2. Backup network configurations regularly using tools like RANCID or Oxidize, which can save configurations to repositories and alert administrators of changes via email or messaging.
3. Use IP address management (IPAM) tools like Netbox to document IP prefixes, devices, rack locations, and network links. This provides a single source of truth for the physical and logical network resources.
Properly documenting the network
Introducing resinOS: An Operating System Tailored for Containers and Built fo...Balena
This presentation, from the Embedded Linux Conference Europe in October 2016, discusses how resinOS was built, highlights some of its key features, and shares a roadmap for future development and contribution.
resinOS is the latest open-source tool built by resin.io to enable the future of hardware with the tools of modern software. resinOS is a simple yet powerful operating system that brings standard Docker containers to embedded devices and works on a wide variety of device types and architectures. resinOS was born from the team’s experience deploying embedded containers across device types and has been battle-tested in production environments.
You can download resinOS at https://resinos.io
High Availability Asterisk and FreePBX on Microsoft AzureSanjay Willie
In this slide, we presented to MaGIC Malaysia for entrepreneurs wanting to get an Asterisk business on cloud going. Here, we provide the most basic, lowest level method of having a HA on Microsoft Azure with FreePBX,
Components used with Azure's Ubuntu 14.04 image
1) Asterisk 11
2) FreePBX 2.11
3) DRBD
4) Heartbeat - but without actually relying on Virtual IP since we use Azure Cloud to do the HA by exposing TCP5060
5) Use Azure's HA method to achieve HA by ensuring that whichever server that "listens" to port TCP5060 will have all the HA DNS name of Asterisk traffic redirected there.
The document provides agendas and information for OSSEC Con workshops on days 3 and 4, including:
- Day 3 agenda with workshops and lab time from 09:30 to 16:00
- Day 4 agenda with similar schedule and an exam from 16:00 to 16:45
It also includes links for downloading examples and workshop topics covering OSSEC installation, configuration, troubleshooting, file integrity monitoring, and more.
This document discusses bringing Japanese input capabilities to the Tizen 2.0 Alpha operating system. It summarizes the current state of input support in Tizen, describes how to port the Anthy Japanese input engine to Tizen by cross-compiling it using the GBS build system, and demonstrates installing and using the Anthy IME. It then outlines the goals of the new "TAIYAKI Project" to create a virtual keyboard interface and full keyboard support for Tizen, in order to fully support Japanese text input.
Provisioning Windows instances at scale on Azure, AWS and OpenStack - Adrian ...ITCamp
In a cloud based environment, where automation is a primary concern, guest operating systems need to be provisioned at boot time.
There are a lot of actions that need to be performed at this stage, ranging from assigning the admin user’s credentials to creating WinRM listeners, storage configurations, RDP settings, guest agent installation, custom data execution and much more.
The de-facto standard guest provisioning tools are cloud-init on Linux and cloudbase-init on Windows.
I will present how cloudbase-init runs on all the Microsoft supported Windows editions (there are quite a few) and how it supports a plethora of metadata service implementations (EC2, OpenStack, the recently added Azure).
Cloudbase-init is being run thousands of times daily all over the world’s public clouds and data centers and it has reached more than 5 million known runs to date.
We will also take an in-depth look at the Argus integration testing framework, which automates the integration testing of cloudbase-init on real world platforms, to make sure it meets a very strict set of performance, compatibility and security requirements.
At the end I will show you a live demo with a cloudbase-init bootstrapped Windows instance on Azure, and how you can benefit from the provisioning process.
This document discusses using QNAP NAS devices as an easy-to-deploy IoT server platform. It highlights the NAS's ability to run virtual machines and containers for application deployment through Virtualization Station and Container Station. The document also notes that QNAP NAS devices provide remote management and access capabilities as well as the ability to sync with public clouds. Finally, it argues that QNAP NAS devices offer a complete, secure private cloud solution for intelligent system deployment.
This document provides an overview of the technical architecture for a cloud platform. It discusses various components including source control, continuous integration/build services, artifact storage, deployment services, infrastructure as code, orchestration, configuration/vaults, logging, monitoring, service discovery, load balancing, and platform services. For each component, it outlines relevant features, example solutions, and standards. The overall goal is to provide guidance on architecting a cloud platform that can build, deploy, host, run, and monitor application services.
Supergluing Asterisk to the Web with AdhearsionMojo Lingo
The document discusses Adhearsion, an open source voice application development framework built on Ruby. It can integrate with Rails and runs on any platform that supports Ruby or JRuby. Adhearsion allows building voice applications for call centers, sales automation, conferencing, translation and more. It provides tools for call control and dynamic configuration of Asterisk via its AMI interface.
Ben Klang is the leader of the Adhearsion project, an open source voice application development framework built on Ruby. Adhearsion allows developers to build voice applications quickly by integrating voice capabilities into existing systems. It works with platforms like Asterisk and Tropo and provides benefits like rapid development, reusability, and cloud deployment of voice applications.
Adhearsion is a framework for building voice applications that enables innovation in the voice space. It allows outside applications and services to operate on carriers' and service providers' networks without giving up control of customers, collecting revenue from startups. Frameworks like Adhearsion and Rails make developing applications faster and easier, lowering the barrier for more ideas to reach users. Mojo Lingo is excited about voice applications because technologies now allow voice to integrate with data, web, IM, and organizational data to solve real problems in areas like call centers, sales, and conferencing.
Adhearsion is a voice application framework that provides a modern approach for building voice applications with features like logging, plugins, fault isolation, daemonization/threading, connection management, and decoupling logic from the engine. It aims to offer developers a common way to build voice applications.
Call Control Power Tools with Adhearsion Mojo Lingo
This document introduces Adhearsion, an open source voice application development framework built on Ruby. It can be used to build applications like call centers, sales force automation, conferencing, translation services, IVRs, and more. The document discusses Adhearsion's architecture and how it allows changing Asterisk configurations at runtime through AMI. It also introduces the Adhearsion Console.
This document provides an overview of Adhearsion, an open source framework for building voice applications using Ruby. It discusses why voice is an important medium, provides code samples, and summarizes key features of Adhearsion like its easy-to-use DSL and support for Asterisk. Use cases like call centers, conferencing, and polling are presented. The architecture, future plans for version 2.0, and potential far-future directions are also outlined. The presentation aims to illustrate how Adhearsion brings modern development practices to telephony.
This document provides an introduction to installing and configuring the Asterisk PBX software. It begins with an agenda that covers installing Asterisk, the basics of how Asterisk works, configuring telephony hardware, basic configuration files like sip.conf and extensions.conf, and advanced topics like voicemail, conferencing and scaling. It then discusses downloading and compiling the required components like Zaptel and Libpri as well as configuring SIP endpoints. The document provides an overview of Asterisk's architecture and components and how to structure dial plans using contexts, extensions, applications and variables.
This document provides an introduction to installing and configuring the Asterisk PBX software. It begins with an agenda that covers installing Asterisk, the basics of how Asterisk works, configuring telephony hardware, basic configuration, codecs, system requirements, voicemail, conferencing, administration, and advanced topics. It then discusses downloading and compiling the required components of Asterisk including Zaptel, Libpri, and sounds. Finally, it reviews the basic configuration files needed to set up SIP endpoints and a simple dial plan.
This document provides an introduction to installing and configuring the Asterisk PBX software. It outlines the agenda which includes installing Asterisk, an overview of Asterisk, configuring telephony hardware, basic configuration, codecs, system requirements, voicemail, conferencing, administration, and advanced topics. It then discusses downloading and compiling the required components, including Asterisk, Zaptel, and Libpri. Finally, it covers basic Asterisk configuration files locations, architecture, and setting up a simple system with SIP endpoints and a SIP gateway.
This document provides an introduction to installing and configuring the Asterisk PBX software. It begins with an agenda that covers installing Asterisk, the basics of how Asterisk works, configuring telephony hardware, basic configuration files like sip.conf and extensions.conf, and advanced topics like voicemail, conferencing and scaling. It then discusses downloading and compiling the required components like Zaptel and Libpri as well as configuring SIP endpoints. The document provides an overview of Asterisk's architecture and components and how to structure dial plans using contexts, extensions, applications and variables.
This document discusses best practices for deploying WebRTC to replace or augment existing SIP-based phone systems. It covers choosing appropriate codecs to balance bandwidth usage and call quality for different use cases. It also addresses WebRTC-specific considerations like ICE, DTLS, and asymmetric call patterns. Performance metrics are provided from test calls using different codecs on an Asterisk server. The presentation includes diagrams of common WebRTC deployment architectures and links to live demos.
Getting the Best Out Of WebRTC - Astricon 2014Dan Jenkins
This document discusses best practices for deploying WebRTC to replace or augment existing SIP-based phone systems. It covers choosing appropriate codecs to balance bandwidth usage and call quality for different use cases. It also addresses WebRTC-specific considerations like ICE, DTLS, and asymmetric call patterns. Performance metrics are provided from test calls using different codecs on an Asterisk server. The presentation includes diagrams of common WebRTC deployment architectures and links to live demos.
IDNOG 4 Lightning Talks - Documenting your Network in 3 Simple StepsAffan Basalamah
This document provides a 3-step process for documenting a network in a sane and healthy way:
1. Draw network diagrams using tools like Visio or OmniGraffle to depict the physical, logical, and application layers. Store the diagrams online or in a wiki for easy access.
2. Backup network configurations regularly using tools like RANCID or Oxidize, which can save configurations to a repository and detect changes between backups.
3. Use IP address management (IPAM) tools like Netbox to document IP assignments, devices, rack locations, and network connections. This provides a single source of truth for the physical and logical network resources.
Following these steps provides visibility into
This document provides a 3-step process for documenting a network in a sane and healthy way:
1. Draw network diagrams using tools like Visio or OmniGraffle to depict the physical, logical, and application layers. Store the diagrams online or with network monitoring tools.
2. Backup network configurations regularly using tools like RANCID or Oxidize, which can save configurations to repositories and alert administrators of changes via email or messaging.
3. Use IP address management (IPAM) tools like Netbox to document IP prefixes, devices, rack locations, and network links. This provides a single source of truth for the physical and logical network resources.
Properly documenting the network
Introducing resinOS: An Operating System Tailored for Containers and Built fo...Balena
This presentation, from the Embedded Linux Conference Europe in October 2016, discusses how resinOS was built, highlights some of its key features, and shares a roadmap for future development and contribution.
resinOS is the latest open-source tool built by resin.io to enable the future of hardware with the tools of modern software. resinOS is a simple yet powerful operating system that brings standard Docker containers to embedded devices and works on a wide variety of device types and architectures. resinOS was born from the team’s experience deploying embedded containers across device types and has been battle-tested in production environments.
You can download resinOS at https://resinos.io
High Availability Asterisk and FreePBX on Microsoft AzureSanjay Willie
In this slide, we presented to MaGIC Malaysia for entrepreneurs wanting to get an Asterisk business on cloud going. Here, we provide the most basic, lowest level method of having a HA on Microsoft Azure with FreePBX,
Components used with Azure's Ubuntu 14.04 image
1) Asterisk 11
2) FreePBX 2.11
3) DRBD
4) Heartbeat - but without actually relying on Virtual IP since we use Azure Cloud to do the HA by exposing TCP5060
5) Use Azure's HA method to achieve HA by ensuring that whichever server that "listens" to port TCP5060 will have all the HA DNS name of Asterisk traffic redirected there.
The document provides agendas and information for OSSEC Con workshops on days 3 and 4, including:
- Day 3 agenda with workshops and lab time from 09:30 to 16:00
- Day 4 agenda with similar schedule and an exam from 16:00 to 16:45
It also includes links for downloading examples and workshop topics covering OSSEC installation, configuration, troubleshooting, file integrity monitoring, and more.
This document discusses bringing Japanese input capabilities to the Tizen 2.0 Alpha operating system. It summarizes the current state of input support in Tizen, describes how to port the Anthy Japanese input engine to Tizen by cross-compiling it using the GBS build system, and demonstrates installing and using the Anthy IME. It then outlines the goals of the new "TAIYAKI Project" to create a virtual keyboard interface and full keyboard support for Tizen, in order to fully support Japanese text input.
Provisioning Windows instances at scale on Azure, AWS and OpenStack - Adrian ...ITCamp
In a cloud based environment, where automation is a primary concern, guest operating systems need to be provisioned at boot time.
There are a lot of actions that need to be performed at this stage, ranging from assigning the admin user’s credentials to creating WinRM listeners, storage configurations, RDP settings, guest agent installation, custom data execution and much more.
The de-facto standard guest provisioning tools are cloud-init on Linux and cloudbase-init on Windows.
I will present how cloudbase-init runs on all the Microsoft supported Windows editions (there are quite a few) and how it supports a plethora of metadata service implementations (EC2, OpenStack, the recently added Azure).
Cloudbase-init is being run thousands of times daily all over the world’s public clouds and data centers and it has reached more than 5 million known runs to date.
We will also take an in-depth look at the Argus integration testing framework, which automates the integration testing of cloudbase-init on real world platforms, to make sure it meets a very strict set of performance, compatibility and security requirements.
At the end I will show you a live demo with a cloudbase-init bootstrapped Windows instance on Azure, and how you can benefit from the provisioning process.
This document discusses using QNAP NAS devices as an easy-to-deploy IoT server platform. It highlights the NAS's ability to run virtual machines and containers for application deployment through Virtualization Station and Container Station. The document also notes that QNAP NAS devices provide remote management and access capabilities as well as the ability to sync with public clouds. Finally, it argues that QNAP NAS devices offer a complete, secure private cloud solution for intelligent system deployment.
This document provides an overview of the technical architecture for a cloud platform. It discusses various components including source control, continuous integration/build services, artifact storage, deployment services, infrastructure as code, orchestration, configuration/vaults, logging, monitoring, service discovery, load balancing, and platform services. For each component, it outlines relevant features, example solutions, and standards. The overall goal is to provide guidance on architecting a cloud platform that can build, deploy, host, run, and monitor application services.
This document discusses using Chef on SmartOS. It begins with an introduction to the speaker and their company Wanelo. It then provides an overview of SmartOS and zones, and explains benefits like ZFS, visibility tools, and lower latency. The document discusses using the knife-joyent plugin to manage SmartOS servers from Chef, including creating servers, listing servers, and managing keys. It notes some differences in SmartOS like package and service management. Finally it discusses useful LWRPs and cookbooks for using Chef on SmartOS.
I was asked to talk in front of Computer science students at the Bar-Ilan university about "what happens" when you don't care about writing "secured" or "safe" code. A perfect example for that, in my opinion, was the world of embedded computing AKA the IoT. I talked about the history of consumer embedded devices and showed a live demo of an 0day I found in one of the most popular routers in the country.
This document provides an overview of building an Asterisk-based call center. It discusses options for inbound-only call centers using base Asterisk versus proprietary or open-source solutions that support inbound/outbound calls. It describes typical configurations for agents, queues, and extensions for inbound call routing. Outbound and blended call center solutions from companies like Aheeva, DACX, DragonSuite, and Indosoft as well as open-source options are also summarized. Considerations for server hardware, agent hardware, scaling, recording, monitoring, compliance, languages, reporting and costs are covered at a high-level.
Similar to State of the Art Telephony with Ruby (20)
ConnectJS 2015: Video Killed the Telephone StarMojo Lingo
When you want to talk to someone, where do you turn? Skype? Slack or HipChat? Maybe even an old-fashioned telephone? As great (or not) as these are, they all fail in one important way: Context. As developers, why don’t we enable our users to communicate where they are doing everything else, right inside the browser or mobile app The technology to create contextual communications is evolving quickly with exciting technologies like WebRTC. This talk is about how to use WebRTC with Rails to enhance almost any application with voice, video & text. We will cover some of the ways communications can be best employed, including design considerations, as well as available Open Source projects. We will feature a recently released Rails Engine called Talking Stick that makes adding WebRTC to any Rails app a snap.
AstriCon 2015: WebRTC: How it Works, and How it BreaksMojo Lingo
WebRTC is an exciting new technology, perhaps the most exciting thing to happen to voice communication since the invention of Voice over IP. With WebRTC, we are no longer limited to a disjointed communication experience with poor quality audio on antiquated networks. Now we have the ability to put high-definition audio and video where it will have the most impact: right in line with the business processes that benefit the most from it.
This session will present an overview of how WebRTC works, reviewing both the network services that support it and the user-facing software that delivers it. We will look at how Asterisk can be used to give WebRTC additional capabilities that aren’t possible with browsers alone, and how to deploy Asterisk to get the most out of this powerful combination.
As with all new technology, however, there are rough edges. In the final part of this presentation, we will look at the common ways that WebRTC can break down, from technical deployment problems to user interface and design issues. These lessons are drawn from real-world experience deploying WebRTC over the last 3 years and multiple applications that are in production today.
FreeSWITCH, FreeSWITCH Everywhere, and Not A Phone In SightMojo Lingo
That smartphone in your pocket has already replaced your watch, your camera, several volumes of books, whatever music device you may carry, and even in many ways your desktop computer. As technology continues to gobble up and replace legacy devices with ever smaller hardware and ever more capable software, why are we still stuck with a DTMF keypad? As the task of communicating continues to move on to the web and into apps, what will happen to the PSTN.
Today big carriers like AT&T are making plans to finally shut down the copper networks entirely. Let’s talk about the role of FreeSWITCH in this future world, and how can it enable the next generation of communications applications.
Now Hear This! Putting Voice, Video, and Text into Ruby on RailsMojo Lingo
When you want to talk to someone, where do you turn? Skype? Slack or HipChat? Maybe even an old-fashioned telephone? As great (or not) as these are, they all fail in one important way: Context. As developers, why don’t we enable our users to communicate where they are doing everything else, right inside the browser or mobile app? The technology to make contextual communications is evolving quickly with exciting technologies like WebRTC, speech recognition and natural language processing. This talk is about how to apply those building blocks and bring contextual communication to your apps.
Presented at RailsConf 2015 in Atlanta, GA
In the film “Her” the protagonist falls in love with his computer, an artificial intelligence operating system. While most of us already love Asterisk, things really get interesting when we give Asterisk a voice, and the ability to listen to our instructions.
Fortunately for us, Asterisk has impressive capabilities for adding speech recognition and text-to-speech to our calls. This talk will cover many facets of speech applications with Asterisk. We will look at the various commercial and open source speech engines available, as well as how to integrate them into Asterisk. We will look at ways prompts and grammars can be designed to give the caller the best possible experience. We will hear samples of the right and hilariously wrong ways speech can be used. We will cover the various types of speech recognition that exist today (grammar-driven, transcription, hotword and voice biometrics) and how each should be applied.
Finally, we’ll show how these pieces come together to make it possible to build something that (for a brief moment) passes as intelligent. Maybe.
Tipping the Scales: Measuring and Scaling AsteriskMojo Lingo
In this presentation delivered at AstriCon 2014, we look at answering the question: "Does Asterisk scale?!" The answer is nuanced. The presentation includes terminology and tools, as well as some notes on methodology. In the final few slides, we look at several ways Asterisk is employed (B2BUA, transcoding, conferencing, recording) and the impact each feature has on scaling Asterisk. Using the tools and methodologies presented here, I encourage everyone to test their own voice applications and answer the question for themselves: Does It Scale?!
Hear how to develop and implement WebRTC using the new IETF and W3C standards. This session will overview the concepts and structure of WebRTC and how it is defined in the emerging standards. The session will bring everyone up to a clear understanding of WebRTC for the technical discussions in the next session.
This workshop will include specific examples of how to code and create real-time interactions. The session will be interactive, allowing for open and clear discussion.
Opening presentation given at AdhearsionConf 2013. This talks about a vision for the future of the Adhearsion project as well as the future of real-time communications applications.
An overview of the technology options for adding speech to web applications. It covers the HTML5 Speech Input API for speech recognition, using the Audio tag with 3rd party APIs for text-to-speech, and an overview of WebRTC application possibilities.
Presented at the Atlanta Ruby Users Group meeting on November 13, 2013.
This document discusses WebRTC, which enables real-time communication like voice and video calls directly in web browsers. It explains that WebRTC uses JavaScript APIs and standards for negotiating connections between peers and for interoperability. While signaling can use SIP, WebRTC does not mandate a signaling protocol. Challenges include the specification still being developed, large SDP messages, opaque handling of SDP, mandatory encryption, debates over video codecs, and inconsistent browser support.
O documento discute a tecnologia de voz e aplicações de voz. Ele descreve como a tecnologia evoluiu de sistemas proprietários e ilhadas para sistemas abertos e baseados na nuvem. O documento também apresenta o framework Ruby Adhearsion como uma maneira fácil de desenvolver aplicações de voz flexíveis que podem ser implantadas em qualquer lugar.
This document discusses enhancing FreePBX with Adhearsion, a Ruby framework for building telephony applications. It describes installing Adhearsion, creating a basic dialplan application, and configuring FreePBX and Asterisk to interface with the Adhearsion application. It also provides an example of using Adhearsion to implement time-based outbound call restrictions and monitoring Asterisk events through AMI.
The document discusses Connect Adhearsion, a platform for connecting phone calls and other multimedia interactions to backend services through a distributed architecture. It provides examples of using Adhearsion to connect phone calls to databases, queues, messaging systems and external APIs. The author advocates for distributed, asynchronous architectures and shares a wishlist for improving Adhearsion's integration with technologies like Sidekiq, DCell and AMQP.
The document discusses various types of testing for voice application including unit testing, functional testing, and load testing. Unit testing involves testing classes individually using a framework like RSpec. Functional testing uses tools like SIPp, ahn-loadbot, and PJSUA to test call flows. Load testing involves running high volumes of concurrent calls to test the system under heavy load. The document provides examples and best practices for each type of testing.
Testing Telephony: It's Not All TerribleMojo Lingo
This document discusses testing telephony applications. It recommends unit testing components and domain logic in models. For integration testing, it suggests using Cucumber-VoIP, an open source and extensible framework, to automate testing of the entire stack including voice interactions and media. This helps address the challenges of complex scenarios, branching flows, and regressions when quality assuring telephony applications.
This document introduces Rayo, an open protocol for building telephony applications over XMPP. Rayo allows for call control without handling media directly, using existing protocols like SIP and Jingle. It provides primitives like making and handling calls as well as advanced features like audio playback, speech synthesis, DTMF detection, and recording. Rayo was designed as a simple, cross-platform, asynchronous protocol to build flexible telephony applications.
This document discusses real-time communication technologies compared to web technologies. It describes how prior to 2000, telephony involved proprietary systems with islands of functionality and no APIs. Since 2000, VoIP emerged along with smarter endpoints and convergence of messaging and presence. The next decade may see further decentralization, open architectures, federation, and multi-modal integration. Voice applications can now go beyond phone calls to include services like translation, reminders, and CRM integration. The Ruby framework Adhearsion provides an easy way to build voice applications that can integrate with telephony networks and deploy on cloud platforms.
This document summarizes Luca Pradovera's presentation on Adhearsion, an open source Ruby framework for building voice applications. Adhearsion allows developers to build voice applications using Ruby and integrates with telephony platforms like Asterisk, FreeSWITCH, and Voxeo PRISM. It provides features for call control, playback, recording, and event handling. Adhearsion is used by several companies to build hosted IVR systems, call tracking applications, and voice translation services.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
State of the Art Telephony with Ruby
1. State of the Art Telephony
with Ruby
Who has tried to build a voice app?
Who wants to build a voice app? Ben Klang
Founder, Mojo Lingo
Anyone running voice apps in production?
bklang@mojolingo.com
Twitter/Github: @bklang
2. But wait...
telephony is HARD right??
Photo by Joseph A. Carr from http://en.wikipedia.org/wiki/File:JT_Switchboard_770x540.jpg
6. More than a library
* Threads
* Events
* Plugins
* Daemonization
7. ✴ A voice application development
framework
More than a library
* Threads
* Events
* Plugins
* Daemonization
8. ✴ A voice application development
framework
✴ Independent from, but compatible
with, Rails More than a library
* Threads
* Events
* Plugins
* Daemonization
9. ✴ A voice application development
framework
✴ Independent from, but compatible
with, Rails More than a library
* Threads
* Events
* Plugins
* Daemonization
Voice applications the Ruby Way
19. Adhearsion Architecture
Asterisk Pros:
* Run on your server Tropo Pros:
* Widely Deployed * Easy to set up
* Eventing System * Awesome TTS/ASR
* SMS & International
Cons:
* Tricky to set up/Requires Cons:
hardware * No manager events
* No TTS/ASR * No built-in recordings
Note: AGItate first written 1
year ago
20. Adhearsion Architecture
Asterisk Pros:
* Run on your server Tropo Pros:
* Widely Deployed * Easy to set up
* Eventing System * Awesome TTS/ASR
* SMS & International
Cons:
* Tricky to set up/Requires Cons:
hardware * No manager events
* No TTS/ASR * No built-in recordings
Note: AGItate first written 1
year ago
21. Adhearsion Architecture
Asterisk Pros:
* Run on your server Tropo Pros:
* Widely Deployed * Easy to set up
* Eventing System * Awesome TTS/ASR
* SMS & International
Cons:
* Tricky to set up/Requires Cons:
hardware * No manager events
* No TTS/ASR * No built-in recordings
Note: AGItate first written 1
year ago
22. Adhearsion Architecture
Asterisk Pros:
* Run on your server Tropo Pros:
* Widely Deployed * Easy to set up
* Eventing System * Awesome TTS/ASR
* SMS & International
Cons:
* Tricky to set up/Requires Cons:
hardware * No manager events
* No TTS/ASR * No built-in recordings
Note: AGItate first written 1
year ago
23. Adhearsion Architecture
Asterisk Pros:
* Run on your server Tropo Pros:
* Widely Deployed * Easy to set up
* Eventing System * Awesome TTS/ASR
* SMS & International
Cons:
* Tricky to set up/Requires Cons:
hardware * No manager events
* No TTS/ASR * No built-in recordings
Note: AGItate first written 1
year ago
24. Adhearsion Architecture
Asterisk Pros:
* Run on your server Tropo Pros:
* Widely Deployed * Easy to set up
* Eventing System * Awesome TTS/ASR
* SMS & International
Cons:
* Tricky to set up/Requires Cons:
hardware * No manager events
* No TTS/ASR * No built-in recordings
Note: AGItate first written 1
year ago
SQL
25. Adhearsion Architecture
Asterisk Pros:
* Run on your server Tropo Pros:
* Widely Deployed * Easy to set up
* Eventing System * Awesome TTS/ASR
* SMS & International
Cons:
* Tricky to set up/Requires Cons:
hardware * No manager events
* No TTS/ASR * No built-in recordings
Note: AGItate first written 1
year ago
SQL LDAP
26. Adhearsion Architecture
Asterisk Pros:
* Run on your server Tropo Pros:
* Widely Deployed * Easy to set up
* Eventing System * Awesome TTS/ASR
* SMS & International
Cons:
* Tricky to set up/Requires Cons:
hardware * No manager events
* No TTS/ASR * No built-in recordings
Note: AGItate first written 1
year ago
SQL LDAP XMPP/Jabber
27. Adhearsion Architecture
Asterisk Pros:
* Run on your server Tropo Pros:
* Widely Deployed * Easy to set up
* Eventing System * Awesome TTS/ASR
* SMS & International
Cons:
* Tricky to set up/Requires Cons:
hardware * No manager events
* No TTS/ASR * No built-in recordings
Note: AGItate first written 1
year ago
XMPP/Jabber Web
SQL LDAP REST/JSON/XML