SlideShare a Scribd company logo
www.internetsociety.org
Open Source And The Global
Disruption Of Telecom
What Choices Will We Make?
AstriCon 2015, Orlando, Florida
14 October 2015
Dan York, Senior Content Strategist
www.internetsociety.org
(pi)
www.internetsociety.org
(roomba 1)
www.internetsociety.org
(roomba and Asterisk)
www.internetsociety.org
?
www.internetsociety.org
(power of play)
…
www.internetsociety.org
(IETF 1)
(SIP)
www.internetsociety.org
(telephone wires)
www.internetsociety.org
(repeat pi)
www.internetsociety.org
(innovation)
https://www.flickr.com/photos/boegh/6085347780/
www.internetsociety.org
(ask permission)
https://www.flickr.com/photos/irontec/2595219688
www.internetsociety.org
(Voxeo story)
www.internetsociety.org
Permissionless"
Innovation
www.internetsociety.org
Internet!
of!
Opportunity
www.internetsociety.org
?
(Economist)
The State of Broadband 2015, ITU
Image: epSos.de on Flickr
https://www.flickr.com/photos/uwehermann/3100832391
https://www.flickr.com/photos/zieak/2265541510/
Image: mosaaberisingon Flickr
www.internetsociety.org
Image: Christian Schnettelker (manoftaste-de) on Flickr
https://www.flickr.com/photos/gsfc/8805097211
Online, 43%
Offline, 57%
Connecting the next 4 billion
The State of Broadband 2015, ITU
Kolawole Ogunyomade teaching Asterisk in Nigeria
www.internetsociety.org
“If when you say internet, !
you think of a computer, !
then you probably don't live !
in an African country.”

http://edition.cnn.com/2015/02/19/africa/africa-mobile-internet/
www.internetsociety.org
http://www.internetsociety.org/globalinternetreport/
94% of the world’s
population can receive a
mobile telephone signal
50% of the world’s
population can receive a
mobile internet signal
36% of the population has
subscribed to the mobile
internet
(messaging shift)
www.internetsociety.org
(Meeker Internet "
Trends)
http://www.kpcb.com/internet-trends
www.internetsociety.org
(Meeker Internet "
Trends)
http://www.kpcb.com/internet-trends
www.internetsociety.org
(IPv6)
www.internetsociety.org
(Google stats)
www.internetsociety.org
http://www.worldipv6launch.org/measurements/
www.internetsociety.org
(river running dry)
https://www.flickr.com/photos/ejmc/5801349332/
www.internetsociety.org
(repeat pi)
www.internetsociety.org
http://www.internetsociety.org/iot/
www.internetsociety.org
(trust)
https://www.flickr.com/photos/powerbooktrance/466709245
www.internetsociety.org
Data Breaches
"Edward Snowden-2" by Laura
Poitras / Praxis Films. Licensed
under CC BY 3.0 via Commons
https://www.flickr.com/photos/home_of_chaos/6332465890/
https://www.flickr.com/photos/jonhathaway/16300982764
The erosion of trust...
www.internetsociety.org
91%
www.internetsociety.org
RFC 7258
www.internetsociety.org
Pervasive surveillance


Pervasive encryption
www.internetsociety.org
Internet
www.internetsociety.org
Present
Accessible /
Innovative
Decentralized
Closed /
Fragmented
Centralized
www.internetsociety.org
Internet Invariants
•  Global Reach
•  General Purpose
•  Permissionless Innovation
•  Accessible – connect, build, study
•  Conventions and social behavior
•  Reusable tech building blocks
•  No permanent favorites
www.internetsociety.org
Distributed and Decentralized
End to End
Intelligence at the edge
BBSs
www.internetsociety.org
Image: dehub on Flickr
www.internetsociety.org
Image: erictastad on Flickr
www.internetsociety.org
Creates the “lens”"
through which "
people experience"
the “Internet”
http://listicle.io/cluetrain/
www.internetsociety.org
(ask permission)
https://www.flickr.com/photos/irontec/2595219688
https://www.flickr.com/photos/cc_chapman/8105389823/
WHO will be the"
gatekeepers?
https://www.flickr.com/photos/soldiersmediacenter/6384362033
https://www.flickr.com/photos/neilsingapore/12822356355
https://www.flickr.com/photos/spicuzza/4661860670
www.internetsociety.org
WHO will be the"
gatekeepers?
www.internetsociety.org
Permissionless"
Innovation
www.internetsociety.org
Collaborative"
(Security, Governance)
https://www.flickr.com/photos/aadamus/16506071003/
December 2015

www.internetsociety.org/wsis
https://www.flickr.com/photos/james_wheeler/9468151425
1. Get Involved
Our mission is to promote the open development, evolution,
and use of the Internet for the benefit of all people throughout
the world.
Founded in 1992.
Organizational home of Internet Engineering Task Force (IETF)
www.internetsociety.org
Internet Society
87
Global Presence
110
Chapters
Worldwide
79k
Members and
Supporters
146
Organization
Members
6
Regional
Bureaus
20
Countries with
ISOC Offices
NORTH AMERICA
LATIN AMERICA/CARIBBEAN
EUROPE
AFRICA
THE MIDDLE EAST
ASIA
More than
Updated September 2015
87
Global
Staff
2. Work To Restore Trust
https://www.flickr.com/photos/44124466731@N01/27687364
https://www.flickr.com/photos/zigazou76/8989516885
3. Make A Conscious Choice
www.internetsociety.org
Image: tedandjen on Flickr
“If you choose not to decide,
you still have made a 
choice.”

- “Free will” from Rush
Image: epSos.de on Flickr
www.internetsociety.org
Internet!
of!
Opportunity
www.internetsociety.org
(pi)
www.internetsociety.org
york@isoc.org
@danyork
www.internetsociety.org
Dan York
Senior Content Strategist
Thank You!
www.internetsociety.org
danyork.me
Books
Blogs
Podcasts
1980’s
Nonprofits
Telecom"
VoIP
Disruptive"
Telephony
Linux
UNH
VoIP Security"
Alliance (VOIPSA)

More Related Content

Viewers also liked

SIP & TLS - Security in a peer to peer world
SIP & TLS - Security in a peer to peer worldSIP & TLS - Security in a peer to peer world
SIP & TLS - Security in a peer to peer world
Olle E Johansson
 
Reboot the Open Realtime Revolution - #MoreCrypto (Fall 2014)
Reboot the Open Realtime Revolution - #MoreCrypto (Fall 2014)Reboot the Open Realtime Revolution - #MoreCrypto (Fall 2014)
Reboot the Open Realtime Revolution - #MoreCrypto (Fall 2014)
Olle E Johansson
 
Disruption And VoIp
Disruption And VoIpDisruption And VoIp
Disruption And VoIp
Urian1983
 
Monetizing open-source projects
Monetizing open-source projectsMonetizing open-source projects
Monetizing open-source projects
iText Group nv
 
End to End Open Source Telecom
End to End Open Source TelecomEnd to End Open Source Telecom
End to End Open Source Telecom
Ashish Banerjee
 
IIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now DemocratizedIIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now Democratized
Alan Quayle
 
WebRTC for Telco: Informa's WebRTC Global Summit Preconference
WebRTC for Telco: Informa's WebRTC Global Summit PreconferenceWebRTC for Telco: Informa's WebRTC Global Summit Preconference
WebRTC for Telco: Informa's WebRTC Global Summit Preconference
Tsahi Levent-levi
 
Comprendre comment utiliser le web et les médias sociaux à son avantage et ce...
Comprendre comment utiliser le web et les médias sociaux à son avantage et ce...Comprendre comment utiliser le web et les médias sociaux à son avantage et ce...
Comprendre comment utiliser le web et les médias sociaux à son avantage et ce...
Michelle Blanc
 
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social Singapore
 
Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)
We Are Social Singapore
 
Digital, Social & Mobile in 2015
Digital, Social & Mobile in 2015Digital, Social & Mobile in 2015
Digital, Social & Mobile in 2015
We Are Social Singapore
 
Digital in 2017 Global Overview
Digital in 2017 Global OverviewDigital in 2017 Global Overview
Digital in 2017 Global Overview
We Are Social Singapore
 
Digital in 2016
Digital in 2016Digital in 2016
Digital in 2016
We Are Social Singapore
 

Viewers also liked (13)

SIP & TLS - Security in a peer to peer world
SIP & TLS - Security in a peer to peer worldSIP & TLS - Security in a peer to peer world
SIP & TLS - Security in a peer to peer world
 
Reboot the Open Realtime Revolution - #MoreCrypto (Fall 2014)
Reboot the Open Realtime Revolution - #MoreCrypto (Fall 2014)Reboot the Open Realtime Revolution - #MoreCrypto (Fall 2014)
Reboot the Open Realtime Revolution - #MoreCrypto (Fall 2014)
 
Disruption And VoIp
Disruption And VoIpDisruption And VoIp
Disruption And VoIp
 
Monetizing open-source projects
Monetizing open-source projectsMonetizing open-source projects
Monetizing open-source projects
 
End to End Open Source Telecom
End to End Open Source TelecomEnd to End Open Source Telecom
End to End Open Source Telecom
 
IIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now DemocratizedIIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now Democratized
 
WebRTC for Telco: Informa's WebRTC Global Summit Preconference
WebRTC for Telco: Informa's WebRTC Global Summit PreconferenceWebRTC for Telco: Informa's WebRTC Global Summit Preconference
WebRTC for Telco: Informa's WebRTC Global Summit Preconference
 
Comprendre comment utiliser le web et les médias sociaux à son avantage et ce...
Comprendre comment utiliser le web et les médias sociaux à son avantage et ce...Comprendre comment utiliser le web et les médias sociaux à son avantage et ce...
Comprendre comment utiliser le web et les médias sociaux à son avantage et ce...
 
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
 
Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)
 
Digital, Social & Mobile in 2015
Digital, Social & Mobile in 2015Digital, Social & Mobile in 2015
Digital, Social & Mobile in 2015
 
Digital in 2017 Global Overview
Digital in 2017 Global OverviewDigital in 2017 Global Overview
Digital in 2017 Global Overview
 
Digital in 2016
Digital in 2016Digital in 2016
Digital in 2016
 

Similar to Open Source and The Global Disruption Of Telecom: What Choices Will We Make?

A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
Dan York
 
互联网精神
互联网精神互联网精神
互联网精神
kaven yan
 
Challenging Web 2.0
Challenging Web 2.0Challenging Web 2.0
Challenging Web 2.0
Roland Alton
 
SXSWi: Mobile Social Games - the next frontier (2011-03-13)
SXSWi: Mobile Social Games - the next frontier (2011-03-13)SXSWi: Mobile Social Games - the next frontier (2011-03-13)
SXSWi: Mobile Social Games - the next frontier (2011-03-13)
Volker Hirsch
 
Preparing for the Impact of Web 3.0
Preparing for the Impact of Web 3.0 Preparing for the Impact of Web 3.0
Preparing for the Impact of Web 3.0
Judy O'Connell
 
BBC Backstage Web Horizon 2007 Presentation
BBC  Backstage Web Horizon 2007 PresentationBBC  Backstage Web Horizon 2007 Presentation
BBC Backstage Web Horizon 2007 Presentation
Ian Forrester
 
A Qualitative Approach towards Discovering Microblogging Practices of Scientists
A Qualitative Approach towards Discovering Microblogging Practices of ScientistsA Qualitative Approach towards Discovering Microblogging Practices of Scientists
A Qualitative Approach towards Discovering Microblogging Practices of Scientists
Martin Ebner
 
Harsh Horizons For the Socialmediaforum
Harsh Horizons For the SocialmediaforumHarsh Horizons For the Socialmediaforum
Harsh Horizons For the Socialmediaforum
Ian Forrester
 
Spotting (Draft)
Spotting (Draft)Spotting (Draft)
Spotting (Draft)
Keith Lyons
 
SFX, Metalib, mobile services and social networks
SFX, Metalib, mobile services and social networksSFX, Metalib, mobile services and social networks
SFX, Metalib, mobile services and social networks
Ian Clark
 
Leed6820 Class1
Leed6820 Class1Leed6820 Class1
Leed6820 Class1
Emmett Floyd
 
Imagination and Innovation in IT
Imagination and Innovation in ITImagination and Innovation in IT
Imagination and Innovation in IT
Kanda Runapongsa Saikaew
 
Spotting
SpottingSpotting
Spotting
Keith Lyons
 
This Transliterate Life
This Transliterate LifeThis Transliterate Life
This Transliterate Life
Bobbi Newman
 
Ou conference openness and skills june 2010
Ou conference openness and skills june 2010Ou conference openness and skills june 2010
Ou conference openness and skills june 2010
Katharine Reedy
 
Viz thinkbos 10192011_share
Viz thinkbos 10192011_shareViz thinkbos 10192011_share
Viz thinkbos 10192011_share
charlene mcbride
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
Charles Mok
 
Volker Hirsch's Presentation
Volker Hirsch's PresentationVolker Hirsch's Presentation
Volker Hirsch's Presentation
Mediabistro
 
Conquering new spaces 20101110
Conquering new spaces 20101110Conquering new spaces 20101110
Conquering new spaces 20101110
Volker Hirsch
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the Web
Jamie Reffell
 

Similar to Open Source and The Global Disruption Of Telecom: What Choices Will We Make? (20)

A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
 
互联网精神
互联网精神互联网精神
互联网精神
 
Challenging Web 2.0
Challenging Web 2.0Challenging Web 2.0
Challenging Web 2.0
 
SXSWi: Mobile Social Games - the next frontier (2011-03-13)
SXSWi: Mobile Social Games - the next frontier (2011-03-13)SXSWi: Mobile Social Games - the next frontier (2011-03-13)
SXSWi: Mobile Social Games - the next frontier (2011-03-13)
 
Preparing for the Impact of Web 3.0
Preparing for the Impact of Web 3.0 Preparing for the Impact of Web 3.0
Preparing for the Impact of Web 3.0
 
BBC Backstage Web Horizon 2007 Presentation
BBC  Backstage Web Horizon 2007 PresentationBBC  Backstage Web Horizon 2007 Presentation
BBC Backstage Web Horizon 2007 Presentation
 
A Qualitative Approach towards Discovering Microblogging Practices of Scientists
A Qualitative Approach towards Discovering Microblogging Practices of ScientistsA Qualitative Approach towards Discovering Microblogging Practices of Scientists
A Qualitative Approach towards Discovering Microblogging Practices of Scientists
 
Harsh Horizons For the Socialmediaforum
Harsh Horizons For the SocialmediaforumHarsh Horizons For the Socialmediaforum
Harsh Horizons For the Socialmediaforum
 
Spotting (Draft)
Spotting (Draft)Spotting (Draft)
Spotting (Draft)
 
SFX, Metalib, mobile services and social networks
SFX, Metalib, mobile services and social networksSFX, Metalib, mobile services and social networks
SFX, Metalib, mobile services and social networks
 
Leed6820 Class1
Leed6820 Class1Leed6820 Class1
Leed6820 Class1
 
Imagination and Innovation in IT
Imagination and Innovation in ITImagination and Innovation in IT
Imagination and Innovation in IT
 
Spotting
SpottingSpotting
Spotting
 
This Transliterate Life
This Transliterate LifeThis Transliterate Life
This Transliterate Life
 
Ou conference openness and skills june 2010
Ou conference openness and skills june 2010Ou conference openness and skills june 2010
Ou conference openness and skills june 2010
 
Viz thinkbos 10192011_share
Viz thinkbos 10192011_shareViz thinkbos 10192011_share
Viz thinkbos 10192011_share
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
Volker Hirsch's Presentation
Volker Hirsch's PresentationVolker Hirsch's Presentation
Volker Hirsch's Presentation
 
Conquering new spaces 20101110
Conquering new spaces 20101110Conquering new spaces 20101110
Conquering new spaces 20101110
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the Web
 

More from Dan York

Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible) Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Dan York
 
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 HackathonDNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
Dan York
 
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Dan York
 
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
Dan York
 
How IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About ItHow IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About It
Dan York
 
SIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and SecuritySIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and Security
Dan York
 
ClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin SteveClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin Steve
Dan York
 
SIP Trunking & Security in an Enterprise Network
SIP Trunking & Security  in an Enterprise NetworkSIP Trunking & Security  in an Enterprise Network
SIP Trunking & Security in an Enterprise Network
Dan York
 
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XMLOSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
Dan York
 
IP Telephony Security 101
IP Telephony Security 101IP Telephony Security 101
IP Telephony Security 101
Dan York
 
Recording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/SkypeRecording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/Skype
Dan York
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To Know
Dan York
 
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesE Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
Dan York
 
BLISS Problem Statement and Motivation
BLISS Problem Statement and MotivationBLISS Problem Statement and Motivation
BLISS Problem Statement and Motivation
Dan York
 
ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)
Dan York
 

More from Dan York (15)

Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible) Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
 
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 HackathonDNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
 
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
 
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
 
How IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About ItHow IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About It
 
SIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and SecuritySIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and Security
 
ClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin SteveClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin Steve
 
SIP Trunking & Security in an Enterprise Network
SIP Trunking & Security  in an Enterprise NetworkSIP Trunking & Security  in an Enterprise Network
SIP Trunking & Security in an Enterprise Network
 
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XMLOSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
 
IP Telephony Security 101
IP Telephony Security 101IP Telephony Security 101
IP Telephony Security 101
 
Recording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/SkypeRecording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/Skype
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To Know
 
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesE Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
 
BLISS Problem Statement and Motivation
BLISS Problem Statement and MotivationBLISS Problem Statement and Motivation
BLISS Problem Statement and Motivation
 
ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)
 

Recently uploaded

Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 

Recently uploaded (20)

Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 

Open Source and The Global Disruption Of Telecom: What Choices Will We Make?