This document provides an overview and discussion of faxing over IP networks. It discusses some key challenges with IP faxing including jitter, codec selection, T.38 negotiation, and latency. T.38 is presented as a way to help deal with jitter by modifying the transmission mechanism and duplicating packets. The importance of carrier support for T.38 is highlighted. Questions from an expert panel discuss virtualization opportunities and best practices for avoiding issues when faxing at scale over IP networks.
How you shouldn't just look at IP technologies in broadcast but also look at how off-the-shelf IT equipment can be used. Presented at NAB BEITC Engage! 2017
Softimize - Connecting Devices to GatewaysYael Malki
BLE is probably the most popular method of device-to-gateway protocols. I'm going to describe the strength and weaknesses of BLE and then dive in. We'll discuss GATT, including services and characteristics, Beacons, chips, mobile, and some protocol design patterns.
WIFI RTLS technologies, BLE, LCD, Cellular modem are all part of the new STANLEY Healthcare IoT gateway that is based on nothing else by the Raspberry PI(!). In this talk I'll deep dive into those technologies and the challenges around using Raspberry PI as a production ready IOT Gateway – namely its stability and security.
Pavel stessin - building and selecting hardware for connected devicesYael Malki
In this talk, we will show the building blocks of connected products, we will discuss the various considerations for selecting the hardware and components. Deeper examples of BLE products will be given.
Asterisk is an Open Source PBX - but how does it support larger installations? Can you scale it up to thousands of users, with hundreds of simultaneous calls? What about failover, backups and the famous blinking lamps? Olle Johansson goes through various models and describes where some of his current projects with strange names - Pinefrog, Pinana, Pinetree and Bufo fits into this picture.
This is a fun one! Learn how to hack up robots you can buy at a local toy store. You’ll see the methods used to take the video stream out of the robot and turn it into a format Flash likes. You’ll get the lowdown on how to send API commands to control the bot. We’ll show you how to connect it to alternative controllers and use ActionScript for some simple color detection on the video stream.
How to switch from analog or ISDN to VoIP - webinar 2016, EnglishAskozia
The migration from analog or ISDN phone systems to Voice-over-IP can lead to significant changes in business communications. In this webinar, we discuss the future of IP communications and how businesses can successfully perform the migration to Voice-over-IP.
Slides from a workshop in Sofia University about Antelope Audio licensing solution for software features on the products, the challenges of implementing secure anti-piracy protocol.
[DSC Europe 22] Make some noise for AI in JavaScript - Sead DelalicDataScienceConferenc1
Noise suppression during audio calls is expected from any real-time communication platform. Good denoising means exhaustive use of modern neural networks. AI implies heavy processing, real-time requires speed, and a large number of calls means a large need for resources. Therefore, the questions are: can clients do the necessary processing and can AI solutions be integrated on the client side? We will present a neural network for noise suppression implemented as part of the Infobip WebRTC platform. A generic way of integrating AI solutions with client-side JavaScript will be described, with a special focus on real-time requirements. The final solution based on RNNoise will be presented.
Radio Frequencies are all around us. Our organizations use them, and our traditional security measures don't often account for them. What sort of tools and programs do you need to help you find them so that you can begin to have conversations about the information on them and how to secure it.
VoIP is one of the most widely-used technologies among businesses and, increasingly, in households. It represents a combination of Internet technology and phone technology that enhances and expands the possibilities of both. One of these possibilities involves using it for botnet command and control infrastructure and a data exfiltration vector.
The concept of VoIP Botnet is to operate in closed networks with limited access and the potential of censorship using everyday telecommunication and telephony services such as voicemail, conference calls, voice and signaling information.
Moshi Moshi is a proof of concept VoIP Botnet that allows the operator to dial in from a pay phone or mobile phone, and get shell access and exfiltrate data from the bots.
This presentation will discuss and demonstrate the use of VoIP technology to create "Moshi Moshi," we also explore some interesting properties of VoIP based botnet.
Additionally, we will discuss mitigating factors and ways that VoIP providers should implement in order to prevent further VoIP abuse.
Slides of my presentation at the Paris Hackers meetup (Oct 2014)
Overview of what Sigfox is about, its benefits & constraints. Use cases, alternatives, et al
From an outsider point of view ;) I joined Sigfox several months after that
Top 5 Things I've Messed Up in Live StreamingFastly
June 24, 2014 - SF Video Technology Meetup. Live streaming can be difficult and challenging, yet extremely rewarding. In the video gaming world, it has become the most powerful way of reaching your audience. It combines traditional web technologies with even more traditional broadcast video stacks in a "it's going live now" environment. In this presentation Lee Chen, head of product at Fastly, goes over the top 5 things that have lost him sleep, made his eyebrows go up, and sometimes even made him fail -- what he did to correct it.
How you shouldn't just look at IP technologies in broadcast but also look at how off-the-shelf IT equipment can be used. Presented at NAB BEITC Engage! 2017
Softimize - Connecting Devices to GatewaysYael Malki
BLE is probably the most popular method of device-to-gateway protocols. I'm going to describe the strength and weaknesses of BLE and then dive in. We'll discuss GATT, including services and characteristics, Beacons, chips, mobile, and some protocol design patterns.
WIFI RTLS technologies, BLE, LCD, Cellular modem are all part of the new STANLEY Healthcare IoT gateway that is based on nothing else by the Raspberry PI(!). In this talk I'll deep dive into those technologies and the challenges around using Raspberry PI as a production ready IOT Gateway – namely its stability and security.
Pavel stessin - building and selecting hardware for connected devicesYael Malki
In this talk, we will show the building blocks of connected products, we will discuss the various considerations for selecting the hardware and components. Deeper examples of BLE products will be given.
Asterisk is an Open Source PBX - but how does it support larger installations? Can you scale it up to thousands of users, with hundreds of simultaneous calls? What about failover, backups and the famous blinking lamps? Olle Johansson goes through various models and describes where some of his current projects with strange names - Pinefrog, Pinana, Pinetree and Bufo fits into this picture.
This is a fun one! Learn how to hack up robots you can buy at a local toy store. You’ll see the methods used to take the video stream out of the robot and turn it into a format Flash likes. You’ll get the lowdown on how to send API commands to control the bot. We’ll show you how to connect it to alternative controllers and use ActionScript for some simple color detection on the video stream.
How to switch from analog or ISDN to VoIP - webinar 2016, EnglishAskozia
The migration from analog or ISDN phone systems to Voice-over-IP can lead to significant changes in business communications. In this webinar, we discuss the future of IP communications and how businesses can successfully perform the migration to Voice-over-IP.
Slides from a workshop in Sofia University about Antelope Audio licensing solution for software features on the products, the challenges of implementing secure anti-piracy protocol.
[DSC Europe 22] Make some noise for AI in JavaScript - Sead DelalicDataScienceConferenc1
Noise suppression during audio calls is expected from any real-time communication platform. Good denoising means exhaustive use of modern neural networks. AI implies heavy processing, real-time requires speed, and a large number of calls means a large need for resources. Therefore, the questions are: can clients do the necessary processing and can AI solutions be integrated on the client side? We will present a neural network for noise suppression implemented as part of the Infobip WebRTC platform. A generic way of integrating AI solutions with client-side JavaScript will be described, with a special focus on real-time requirements. The final solution based on RNNoise will be presented.
Radio Frequencies are all around us. Our organizations use them, and our traditional security measures don't often account for them. What sort of tools and programs do you need to help you find them so that you can begin to have conversations about the information on them and how to secure it.
VoIP is one of the most widely-used technologies among businesses and, increasingly, in households. It represents a combination of Internet technology and phone technology that enhances and expands the possibilities of both. One of these possibilities involves using it for botnet command and control infrastructure and a data exfiltration vector.
The concept of VoIP Botnet is to operate in closed networks with limited access and the potential of censorship using everyday telecommunication and telephony services such as voicemail, conference calls, voice and signaling information.
Moshi Moshi is a proof of concept VoIP Botnet that allows the operator to dial in from a pay phone or mobile phone, and get shell access and exfiltrate data from the bots.
This presentation will discuss and demonstrate the use of VoIP technology to create "Moshi Moshi," we also explore some interesting properties of VoIP based botnet.
Additionally, we will discuss mitigating factors and ways that VoIP providers should implement in order to prevent further VoIP abuse.
Slides of my presentation at the Paris Hackers meetup (Oct 2014)
Overview of what Sigfox is about, its benefits & constraints. Use cases, alternatives, et al
From an outsider point of view ;) I joined Sigfox several months after that
Top 5 Things I've Messed Up in Live StreamingFastly
June 24, 2014 - SF Video Technology Meetup. Live streaming can be difficult and challenging, yet extremely rewarding. In the video gaming world, it has become the most powerful way of reaching your audience. It combines traditional web technologies with even more traditional broadcast video stacks in a "it's going live now" environment. In this presentation Lee Chen, head of product at Fastly, goes over the top 5 things that have lost him sleep, made his eyebrows go up, and sometimes even made him fail -- what he did to correct it.
Real-Time Text and WebRTC @ Kamailio World 2023Lorenzo Miniero
Slides for my "Bringing real-time text to WebRTC for NG Emergency Services" presentation at Kamailio World 2023.
They describe my prototype efforts to get SIP-based T.140 Real-Time Text to work with WebRTC endpoints via data channels, thanks to Janus acting as a gateway for the purpose.
OSINT RF Reverse Engineering by Marc NewlinEC-Council
IoT devices frequently include obscure RF transceivers with little or no documentation, which can hinder the reverse engineering research process. Fortunately, regulatory bodies like the United States’ FCC contain a wealth of useful information.
In order to certify wireless devices for sale in different markets, manufacturers must submit their products to test labs which evaluate the behavior of their RF emissions. The test reports often contain detailed physical layer operating characteristics, including RF channels, modulation, and frequency hopping behavior.
By translating regulatory test reports into GNU Radio flow graphs, a researcher is able to focus their efforts on understanding packet formats and protocol behavior instead of grinding away at the physical layer. In this talk, I will discuss the techniques I used while researching the MouseJack vulnerabilities, which allowed me to expedite the process of evaluating a large number of vulnerable devices.
Talk Outline
Overview of various regulatory bodies (FCC, KCC/MSIP, IC, etc), and the data they make publicly available
Discussion of the official and third party tools to query regulatory bodies for specific device information
Using internal device photos from regulatory bodies to identify transceiver part numbers
Using test reports to identify physical layer operating characteristics
Building a GNU Radio flow graph based on information gathered from regulatory test reports or transceiver spec sheets
Sniffing device traffic, inferring operating behavior, and building out a model of the device communication protocol
Speaker: Nicole Tanzillo, Director of IT Marketing, Spiceworks
Location: Boardroom | 13:45 - 14:45
Lightning round anyone? Have you just been through a major operating system upgrade? Did you recently migrate your network from virtualized servers to the cloud? And do you have a few bits & bobs you’d like to share with SpiceHeads who are in your same situation? Attend this session to get four snippets of IT know-how from those who have gone before you.
SpiceSpeakers & Topics
Anthony Sutcliffe - Virtualization
Tino Todino - VoIP
Ben Snape - Wireless Display
Peter Craine - BYOD
Slides for my "Am I sober or am I trunk? A Janus story" presentation at Kamailio World 2024.
They describe my prototype efforts to add an option to create a trunk between a Janus instance and a SIP server, with the related implementation challenges and the interesting opportunities it opens.
Slides for the presentation I made at ClueCon 21 on the experimental RED support in WebRTC, and how we've started tinkering with it in Janus. The presentation also addresses a more generic overview on audio features in WebRTC.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
1. Powerful, Distributed, API Communications
Call-in Number: 805-309-5900 Pin 705-705-
141
Expert Q&A: Faxing Edition
May 3rd
, 2013
2. BEFORE WE BEGIN!
This presentation will make absolutely no sense
to you if you do not watch the following video
http://bit.ly/15980DW
FROM MINUTES 00:44 through 2:50
Call-in Number: 805-309-5900 Pin 705-705-
141 Expert Q&A: Faxing Edition
May 3rd
, 2013
7. What is a Fax?
• First patented in 1843
• Morse was 1844
• Bell was 1876
• Used to send documents using the most available
infrastructure
• Preceded by flag and smoke signaling
8. • 1843: Fax Patented
• 1924: First Color Fax
• 1964: Xerox invents Digital Faxing
• 1985: First Computer Fax Board
Very old industry, lots of standardization and lots of
weirdness
Major Milestones
9. IP Faxing is weird…
• No transport advantage when compared to other IP transit
• Expensive
• Slow
• Kind of a pain
Why do we do it? Facsimiles are legally binding; ergo regulations.
Plus, people are stubborn and used to their “old” technology
10. Why IP Fax > Analog Faxing
• IP Fax is cheaper
• IP Fax can be centralized
• IP is much easier to manipulate and integrate
• Analog has a long setup time (45 days for PRI)
• IP Fax can be geographically fault tolerant
14. Faxing is sort of “synchronous”
• One side at a time!
• One side sends a message while the other side is silent
• When the sending side pauses, it means it’s time for the
opposite side to respond
• Fax transmission is made up of tones and silence
• Tones represent signaling
• “static” sound represents your data image (very fast tones)
• Silence represents a hand-off of control to the other side
15. A standard fax transmission
Hi!
I’m ready
Hey! Me
Too!
Let’s test
out this
line!
Heard you
perfectly! Send me a
page!
Here you
go!
Done!
OK! What
next?
16. Look Closely
• If only one person can “speak” at a time…
How do you tell the other guy you’re done and it’s his turn?
SILENCE IS GOLDEN!
17. A standard fax transmission
Hi!
I’m ready
Hey! Me
Too!
Let’s test
out this
line!
Heard you
perfectly! Send me a
page!
Here you
go!
Done!
OK! What
next?
18. This works great on the PSTN
• PSTN isn’t perfect
• It has cracks, pops, hisses, static
• Fax machines were designed for that, so they can remove
those in most cases
• PSTN does have some general guarantees
• The audio, even if distorted, almost always makes it
• Not really a concept of “cutting out” in PSTN land
• So, fax machines assume there will not be cutting out
19. PSTN call w/ Noise
This will get
corrected
Still clear gaps
of silence
(end)
20. But VoIP introduces jitter…
• Jitter is a slight pause when audio packets are missing
• Usually because the line is too slow/congested and the data
doesn’t get there in time
• Or because of packet loss on a misconfigured device
• Some other reasons as well, but those are the major ones
21. VoIP Fax w/ Jitter
Heard you
perfectly, send me
a page!
OK, sending!
Umm, hey, you paused, I
thought you were done!
Synchronization is
lost…
22. Dealing with Jitter
• First, note that a line which sounds perfectly fine for voice
calls may still have lots of jitter
• The human ear tolerates some amounts of jitter so you
don’t notice it
• Faxes do not
• You can deal with jitter on VoIP most of the time
• Most devices have a jitter buffer. Turn it up (high)
• Turn OFF adaptive jitter buffers. Faxes need the timing and
signal to be consistent
23. Dealing with Jitter
• Let’s take a look at how to adjust the jitter buffer settings
• It’s so easy!
• Sidebar: Turn off echo cancellation while you’re at it
• Since the fax is not listening to itself anyway while it’s
sending, echo almost never matters
• Echo cancellation just adds one more “feature” on the
device that might screw up faxing
25. T. 38 Overview
• Another way of dealing with Jitter is T.38
• T.38 is an adaptation of faxing designed for VoIP
• Modifies the transmission mechanism on the IP side
• Inserts padding / white-noise on the PSTN side
• Intentionally duplicates RTP packets to make sure they get
there
26. VoIP Fax w/ Jitter + T. 38
Fax would have
continued!
T. 38 would have
filled this in with
whitespace
27. T. 38 Overview
• T. 38 was mainly designed for converting faxes when running
long-distances between PSTN endpoints
• Began being added to endpoint devices directly
• The idea was to get the T.38 conversion to happen as close as
possible to the fax machine
30. T. 38
• But people always say, T. 38 doesn’t work that well.
• Why?
• Different vendors implemented it slightly differently
• Sometimes the ATA or device you’re using doesn’t work
with your vendor
• BUT MORE LIKELY
• Your vendor sometimes cheats
• More on that next…
31. T. 38
• Here’s a secret
• When you do a PCMU call, your vendor often has
equipment that just passes the data along with minimal / no
processing
• When you do G729 or T. 38 your call must be routed to
special equipment on the carrier side to handle that and
convert it to PCMU
• That is why some carriers tell you to start fax calls as G.
729
32. T. 38
• This leads to the typical requirement that…
• You use a carrier who supports T. 38 (has the equipment)
• You start your call as something other than PCMU
• You properly setup T. 38 on your side and request it
properly
• Let’s look at a sample request
33. T. 38
• But wait – G729 causes a problem…
• Why is this a problem?
FAILBACK!
37. How do you fit a 14.4kbps
fax over a 8kbps voice
signal?
ANSWER: YOU CAN’T
38. Lessons from the front lines
• What codec is best?
• T.38? Why or why not?
• A cornucopia of telecom equipment
• Fax Servers
• Configuration settings
• NAT Transversal
39. Let’s take some time to pontificate about
faxing at scale…
Massive Lethal Papercuts
43. • Faxing is hard because IP
Introduces unbounded time
Uncertainty
• Variation in time is unexpected
behavior for faxing equipment
• Solution: Reduce Complexity
• (As much as you possibly can)
Recap