Skype was founded in 2003 and offers free voice calls over the internet using peer-to-peer software. It had over 100 million users by 2006 and revenue of $406 million in the first half of 2010. Skype allows free calls between users and paid calls to regular phones. It has faced challenges with network bandwidth usage, call quality, and lack of security reviews. However, partnerships with businesses and opportunities in mobility and bundled services could help it grow its enterprise and consumer business in the future.
Ericsson Labs is a website primarily provided to you as a developer and innovator of new applications where we will provide you early prototypes of new enabling technologies for you to experiment with.
Planning for BYOD and CYOD in future UCC infrastructureAnders Løkke
This slide deck was presented by Justin Bondi, Director of Worldwide Service Provider Architecture, as a part of the InfoComm University educational track at InfoComm 2016.
The presentation lasted 90 minutes, including a Q&A section at the end, and earned InfoComm University attendees 1.5 CTS Renewal Units.
Developer Jam Session - Intro to Voxeo ProductsVoxeo Corp
In this Voxeo VoiceObjects Developer Jam Session on February 10, 2009, Dan York and Andreas Volmer provide an overview of Voxeo's products and how they relate to VoiceObjects developer tools. A recording of the webinar can be found at: http://developers.voiceobjects.com/tech-topics/monthly-jam-sessions/
Integrating Microsoft Surface Hub with legacy videoconferencing and UCCAnders Løkke
This slide deck was presented by Marius Nilsen, VP of Architecture, as a part of the InfoComm University educational track at InfoComm 2016.
The presentation lasted 90 minutes, including a Q&A section at the end, and earned InfoComm University attendees 1.5 CTS Renewal Units.
Ericsson Labs is a website primarily provided to you as a developer and innovator of new applications where we will provide you early prototypes of new enabling technologies for you to experiment with.
Planning for BYOD and CYOD in future UCC infrastructureAnders Løkke
This slide deck was presented by Justin Bondi, Director of Worldwide Service Provider Architecture, as a part of the InfoComm University educational track at InfoComm 2016.
The presentation lasted 90 minutes, including a Q&A section at the end, and earned InfoComm University attendees 1.5 CTS Renewal Units.
Developer Jam Session - Intro to Voxeo ProductsVoxeo Corp
In this Voxeo VoiceObjects Developer Jam Session on February 10, 2009, Dan York and Andreas Volmer provide an overview of Voxeo's products and how they relate to VoiceObjects developer tools. A recording of the webinar can be found at: http://developers.voiceobjects.com/tech-topics/monthly-jam-sessions/
Integrating Microsoft Surface Hub with legacy videoconferencing and UCCAnders Løkke
This slide deck was presented by Marius Nilsen, VP of Architecture, as a part of the InfoComm University educational track at InfoComm 2016.
The presentation lasted 90 minutes, including a Q&A section at the end, and earned InfoComm University attendees 1.5 CTS Renewal Units.
The Business of APIs 2009 - ProgrammableWeb.comMashery
What can be done with an API is limited only by imagination. However, what should be done using your API may have a more definable answer. Whether you are planning to leverage your API to extend your business model into new channels or to capture new revenue, it is The Business of APIs.
Internal seminar on Openess at Telenor, Nov 08.
This is a way to start understanding the different strategies to be open. I am sure some are missing, and that there are other ways to categorise openness. Comments are welcome.
With more than 1.5 million developers worldwide, Appcelerator's ecosystem is a key part of its developers' success. Nolan Wright, Appcelerator's CTO, will discuss how ISVs like PayPal and Box.net are adding great fuel to the Titanium development fire with new capabilities and resources for mobile developers.
Nolan Wright, Co-founder and CTO, leads engineering and product management at Appcelerator.
Avaya and Skype Connect PacketBase is an Avaya BusinessPartnerPacketBase, Inc.
On September 29, 2010, Avaya and Skype announced a strategic agreement to deliver innovative, real-time communications and collaboration solutions to businesses of all sizes. The multi-phase deal includes both go-to-market and an industry-first, joint technology integration that seeks to enable businesses to lower costs and expand how employees, customers, partners and suppliers communicate and collaborate with greater convenience and efficiency.
P2P - Real Time Communications in the EnterpriseMead Eblan
"Mainstreaming Peer-to-Peer Connectivity:
Real-Time Communications in the Enterprise"
- Presented at Digital Government Institute Conference on IPv6
- September 2007
Imaginea brings more than 12 years of product engineering and services to software companies from several different industries at any stage of the life-cycle process. Through the use of several technologies and strong, innovative development processes, we deliver dependable software products at a lower cost and fulfill our customer’s business needs.
It is no wonder then that all of our customers, from the startups to the big guys, call on us for comprehensive development of core products and are often return customers!
We provide product engineering services with a very reliable technology partnership to independent software vendors, enterprises and online SaaS businesses. Services are comprehensive and cover the development process from beginning to end.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
2. A long time ago…
March 10th 1876
“Mr. Watson - come here - I want to see you.” -
Alexander Graham Bell made the first telephone
call to his assistant Thomas Watson
2
4. Introduction
Founded in „03 by Swedish entrepreneur Niklas Zennstrom & the Dane Janus Friis
Software developed by Estonian developers who were initially part of P2P file
sharing software KaZaA
Offers Free, Unlimited, Superior Quality of Worldwide Calling via Next
Generation Peer-to-Peer Software
Revenue for 1st half of 2010 - $406.2 million
One of the biggest P2P success stories in the web 2.0 era
Skype is expected to be valued at $3 billion by the time it plans to launch its IPO
4
5. The Skype story
Nov 2009: eBay
sells 70% stake in
Skype Jan 2008: Skype
available in
smartphones March 2007:
Paypal integration
into Skype client
April 2006: > 100
million users
Oct 2010: New Skype
for windows; with Dec 2005:
facebook news and Video
Phonebook telephony
launched
Oct 2005: eBay
purchased
July 2004: Skype
SkypeIN, SkypeOUT
, voicemail
Aug 2003: launched
Domain name
registered, s/w
Sept 2002: Initial released
VC investment in
Skype
5
7. Product Offering…
SkypeOut
Place calls from PCs to any regular telephone
Charges as per call duration
Flat rate subscriptions
SkypeIn
Receive calls on PCs from regular phone subscribers
12-month subscription facility
7
8. Product Offering
Skype for Business
Corporate use of Skype services
Business Control Panel (BCP)
Allocate credit to employees & monitor use
Skype for SIP & Skype for Asterisk
Connects VoIP based phone to Skype network
8
9. Key strategies…
Low variable costs
No need of a large number of centralized servers
Users provided for bandwidth using their own internet connections
‘NO’ to overkill of advertisements
Lessons learnt from KaZaA
Viral marketing is the „in‟ thing
The long tail
Target end-to-end of the web by making its software available free on its website
35% of the business is generated from SMBs
9
10. Key Strategies
SummitCircle.com
Focuses on Skype Phones and Add - Ons
150 products & communities
New Capabilities for VoIP App
One step ahead of Skype beta testing
Create an ecosystem similar to Apple‟s iPhone
10
11. Key strategies
Skype Extras
Skype Developer Program
Skype Certified Third Party Applications made
available in Skype Shop
Skype Credit as payment
Third party developers working on hardware and
software compatible for Skype
11
15. Business Model
Partnership
Acquirers
Telco Carriers
Relationship
Technology developers
Capabilities Community
Large user base
Create Value added service
Handle CC transactions
Connect to Telephone network Channel
Value Viral marketing
Proposition Skype Website
Free Skype Accessory partners
Activities VAS
Skype Out
Software development
Grow user base
Business Development
Customers
Private users global
Cost Structure
Developers Salaries
Revenue Structure
Success VAS subscription
Administration cost
Skype out payments
15
16. ‘Free by itself is not a business model. But free coupled with a
compelling upgrade path to paid services, is!!’
19. VoIP services to Consumers & Small
Business
Categories Competitors Advantage over Skype
PC-to-PC • Standalone SIP-Based VoIP • Much smaller than Skype wrt
PC-to-Phone Providers Total Users
Providers (SIPphone, Deltathree’s • Savings on Long Distance
iConnectHere, Net2Phone) Phone Calls
• IM Services
(AOL’s AIM, MSN Messenger, Yahoo!
Messenger)
VoIP Services • StandAlone Players • Substitutes for Regular Fixed-
(Vonage) Line Telephony
• Cable System Operators • Cost Advantage
(Comcast, Cox) • Cox:
• Telecom Carriers Already owned networks
(Verizon, AT&T) End-to-End Managed Networks
Packets tagged for Priority
Transmission
19
20. Distinguishing Factors of
VoIP Services
Interconnected calls to PSTN
Sent traffic over Public Internet
Savings on Long Distance Calls
Transmission Quality not reliable
Delays garbled the conversation
Solution
Private “managed” network carrying IP traffic
along protected paths
20
22. VoIP : Critical Factors
• No of users
Network Bandwidth • Average Call length
• Average Call volume
Network Visibility • Applications using network
• Latency
Performance • Jitter
• Packet loss
• Timely response
Customer service • Proper account credit
22
23. VoIP : Critical Factors
Regulations • Countries have different telecommunication laws
Security Issues • Use NAT
• CLEC and unregulated service providers
Notify Customers • Notify customers of limitations
23
24. Industry Drivers
Customer Service
Cost reduction
satisfaction efficiency
• Reduction in • Service • Voice quality
phone costs connection time • Security level
• Reduction in • Network
bandwidth costs problems
resolution
24
25. Hope for New Entrants
Facilities based competition
• Construct network using own facilities
• Install newest, most efficient technology
Unbundled network elements
• Own parts of network, eg. Local loop
Multi-level Precedence and Pre-emption (MLPP)
• Offer assured services
25
26. Hope for New Entrants
Appease Governments
• Pay service tax, share revenue
• Follow regulations
26
27. Challenges…
Technology related:
Skype‟s signaling protocols are closed and proprietary. Its code
has never been exposed to open source scrutiny
Initial reluctance to adopt the open SIP protocol, a standard in
the VoIP industry
P2P architecture puts a huge burden on users without NAT,
consuming network bandwidth even when idle
Automatic designation of Skype „supernodes‟ can saturate high
speed networks University site bans
27
28. Challenges…
Service related:
Sound and video quality are not consistently good
Remote routing and low bandwidth often led to time
lags, dropouts and „fizz‟
Poor Customer support for premium commercial services
Troubleshooting solely depended on customer feedback
resulting in impractical workarounds
28
29. Challenges
Privacy & Security related
Lack of peer review prohibits external security code verification
Skype creates a file called 1.com in the temp directory which is
capable of reading all BIOS data from a PC. It is used in the
identification of computers
By default, Skype also records data about calls (but not the
message contents) in a "History" file saved on the user's
computer
29
30. Challenges
VoIP Regulations
China
Qatar Mexico
Oman
UAE USA India
Panama USA
Traditional international long distance calls is a major source of tax and foreign exchange
30
31. Worst Fears
Coming under the purview of FCC and adhering to
traditional telephony regulation
Meet obligations to support law enforcement agencies
Wiretapping needs
Emergency services
Contribute to the Universal Service Fund
Pay access fees to ILECs @ 0.5cent/minute
31
32. THE Tech Daily
www.thetechdaily.spj THE WORLD’S FAVOURITE NEWSPAPER - Since 1901
United Nations High Commissioner for Refugees Partners with Skype(Dec 2010)
KDDI and Skype Partner to bring a New Communications Experience to
Japanese Consumers (Oct 2010)
The New Skype brings people together like never
before (Oct 2010)
33. Skype + eBay = Disruptive
Technology?
Sept 2005 – eBay acquired Skype for $2.6 billion
Ease of communication
Pay-per-call
International expansion
Nov 2009 – eBay sold 70% stake of Skype for $2.025 billion
Buyers: Marc Andreesen‟s group, Silver Lake, Joltid ltd
Lack of synergies between Skype and eBay‟s e-commerce and online
payment business
33
34. How is Skype a Web 2.0?
Software above the
Get better with more
The Long Tail level of a single
users
device
• Captured the • Skype did not need • Skype can operate
Consumer and a large number of everywhere from
Small Business centralized servers. the
Groups by offering Users provided Internet, mobile
free Worldwide bandwidth for the devices and
calls from PC-to-PC calls through their Televisions
own internet
connections
34
35. Our Take…
Skype can develop enterprise focused business to compete with
companies like Cisco & others using its own technology
Desktop Sharing
Video Client
Conferencing communication
B2B-B2C
35
36. Our Take…
Skype can provide Bundled Services such as cable television and
internet access to compete directly with companies like Vonage
Partnership
with Cable
TV
providers
Tie Up with
Internet
Service
providers
36
37. Our Take
Mobility is the last anchor to the old way!
The next 10 years:
The Era of Rich Mobile Internet communications
Multi modal communications (original SIP vision)
Real time HD video, Data, Presence, Text, Wideband
Audio
Mash ups of web based communications
37
38. Industry Reactions
Cisco with its inorganic growth strategy might
look to go for an aggressive acquisition of Skype
Google is already in the VoIP segment with
Google chat. It might look to acquire Skype
Vonage and companies in the sector will try to
make its services less expensive
38
39. Thank You
Arunabh Sinha
Balaji Ramamurthy
Jemi Verughese
Johnson Chacko
Rucha Khale
39
Editor's Notes
The strategy has transformed Skype from an upstart rival into an ally of the major telecommunications players. In February, Skype unveiled a mobile application for use on devices carried by Verizon Wireless, the top U.S. mobile company by subscribers. The company has also developed programs for Apple Inc.'s iPhone and other devices as it more aggressively moves into the mobile world. In addition, it has signed deals with television manufacturers LG, Panasonic and Samsung Electronics to embed Skype technology in their products.
For example, if there were only 3 Skype users in the world and 2 were communicating, the 3rd computer would be taxed to support the application, even if not using Skype at the time. The large number of Skype computers means that this activity is diffuse, it can lead to performance issues on standby Skype users, and presents a conduit for security breaches
Managing customer relationship at Skype’s neck breaking global growth is an important challengeand may hinder its ability to attract mainstream customer segments. For example, on Skype’scompany-owned customer forums several threads discuss the firm’s ability to guarantee after-salessupport of credit-card-based purchases. Understanding and adapting to customer demand will be amajor issue if Skype wants to succeed in disrupting incumbents.
Several Middle Eastern countries had blocked VoIP traffic, including Oman, Qatar, and UnitedArab Emirates.Other countries, including Panama, had made special provisions to tax VoIP calls.20In late 2005, China Telecom was experimenting with systems to block PC-to-PC calling in majorurban centers.21 Likewise, Skype had been blocked by the leading Mexican telecommunicationscarrier, Telmex.22 In the U.S., a rural telecommunications carrier was fined in March 2005 by theFederal Communications Commission for blocking VoIP calls.23In what seems to be a blast from the pastthe Indian Government has once again set it’s eyes on BlackBerry maker RIM’s services for security reasons. What’s more is that this time it has pulled in Skype and Google too. The DoT has said that it will approach the companies and ask them to ensure that data transferred through their services is available to Indian Security Agencies. While RIM and Skype will be given a 15-day deadline to comply, Google will also be contacted to ensure that Gmail follows suit. They have not been given