Is it time for TLS for SIP-based Voice over IP(VoIP)? At SIPNOC 2014 on June 10, 2014, I spoke about how to secure VOIP communications using TLS and what are both the challenges and benefits.
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?Dan York
I gave the opening keynote at AstriCon 2015 in Orlando on Oct 14, 2015. You can read more at:
http://www.disruptivetelephony.com/2015/09/keynote-at-astricon-on-oct-14-open-source-and-the-global-disruption-of-telecom-what-choices-will-we-make.html
and
http://www.asterisk.org/community/astricon-user-conference/sessions/keynote-address-open-source-and-global-disruption
The abstract is:
There is a battle raging for the global future of telecommunications and the Internet. Taking place in networks, board rooms and legislatures, the battle will determine how we all communicate and what opportunities will exist. Will telecom support innovation? Will it be accessible to all? Will it give us the level of security and privacy we need to have the open, trusted Internet? Or will it be restricted and limited by corporate or government gatekeepers?
The rise of voice-over-IP has fundamentally disrupted the massive global telecommunications industry, infrastructure and policies. Open source software such as Asterisk has been a huge driver of that disruption and innovation.. but now what? What role do platforms such as Asterisk play in this space? And what can be their role in a telecom infrastructure that is now mobile, increasingly embedded (Internet of Things) and more and more using proprietary walled gardens of communication?
Join the Internet Society's Dan York in an exploration of what the future holds for telecom infrastructure and policy - and how the choices we make will determine that future.
Testing iOS apps without jailbreak in 2018SecuRing
Penetration tests of iOS applications usually require jailbreak. On the other hand, software developers often enforce a new version of iOS to run the application. Unfortunately, as history shows, with the release of subsequent versions of the iOS system, pentesters have to wait longer and longer for a stable jailbreak. Finally, by testing iDevices, we become participants of the Russian roulette - remain with an out-of-date iOS with the hope that there won’t be an application requiring a newer version; or take the risk of updating and maybe never get the new jailbreak version? During my presentation, I will show you that it is not necessary to put iRevolver to the head and I will present the techniques of conducting the penetration tests without the need to have a jailbreak. The presentation will also include a live demo presenting the solution to the problem of access to protected application resources on the latest version of iOS.
Incident response : the good the bad and the ugly or how to keep your face af...theAluc
Security breaches occur every day and we have to get used to it. But our Customers will be not- happy if their data are published. Now the question is how do we handle such a breach, which data should we offer to the public. How do we create a incident response plan and how to work with our forensic partner. Which data should you give to the Police and what should we be quiet about. All these and more will be discussed on real life examples.
MIRAI: What is It, How Does it Work and Why Should I Care?Memoori
Cyber Security in 2017! What can Smart Buildings expect?.
These are the slides from a conversation with Billy Rios, Founder of WhiteScope LLC. We take a deep dive into the Mirai DDoS Attacks from last year and try to understand what lessons can be learnt going forward.
Is it time for TLS for SIP-based Voice over IP(VoIP)? At SIPNOC 2014 on June 10, 2014, I spoke about how to secure VOIP communications using TLS and what are both the challenges and benefits.
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?Dan York
I gave the opening keynote at AstriCon 2015 in Orlando on Oct 14, 2015. You can read more at:
http://www.disruptivetelephony.com/2015/09/keynote-at-astricon-on-oct-14-open-source-and-the-global-disruption-of-telecom-what-choices-will-we-make.html
and
http://www.asterisk.org/community/astricon-user-conference/sessions/keynote-address-open-source-and-global-disruption
The abstract is:
There is a battle raging for the global future of telecommunications and the Internet. Taking place in networks, board rooms and legislatures, the battle will determine how we all communicate and what opportunities will exist. Will telecom support innovation? Will it be accessible to all? Will it give us the level of security and privacy we need to have the open, trusted Internet? Or will it be restricted and limited by corporate or government gatekeepers?
The rise of voice-over-IP has fundamentally disrupted the massive global telecommunications industry, infrastructure and policies. Open source software such as Asterisk has been a huge driver of that disruption and innovation.. but now what? What role do platforms such as Asterisk play in this space? And what can be their role in a telecom infrastructure that is now mobile, increasingly embedded (Internet of Things) and more and more using proprietary walled gardens of communication?
Join the Internet Society's Dan York in an exploration of what the future holds for telecom infrastructure and policy - and how the choices we make will determine that future.
Testing iOS apps without jailbreak in 2018SecuRing
Penetration tests of iOS applications usually require jailbreak. On the other hand, software developers often enforce a new version of iOS to run the application. Unfortunately, as history shows, with the release of subsequent versions of the iOS system, pentesters have to wait longer and longer for a stable jailbreak. Finally, by testing iDevices, we become participants of the Russian roulette - remain with an out-of-date iOS with the hope that there won’t be an application requiring a newer version; or take the risk of updating and maybe never get the new jailbreak version? During my presentation, I will show you that it is not necessary to put iRevolver to the head and I will present the techniques of conducting the penetration tests without the need to have a jailbreak. The presentation will also include a live demo presenting the solution to the problem of access to protected application resources on the latest version of iOS.
Incident response : the good the bad and the ugly or how to keep your face af...theAluc
Security breaches occur every day and we have to get used to it. But our Customers will be not- happy if their data are published. Now the question is how do we handle such a breach, which data should we offer to the public. How do we create a incident response plan and how to work with our forensic partner. Which data should you give to the Police and what should we be quiet about. All these and more will be discussed on real life examples.
MIRAI: What is It, How Does it Work and Why Should I Care?Memoori
Cyber Security in 2017! What can Smart Buildings expect?.
These are the slides from a conversation with Billy Rios, Founder of WhiteScope LLC. We take a deep dive into the Mirai DDoS Attacks from last year and try to understand what lessons can be learnt going forward.
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonSSIMeetup
This talk will introduce Zero-Knowledge Proofs (ZKPs) and explain why they are a key element in a growing number of privacy-preserving, digital-identity platforms. Clare will provide basic illustrations of ZKPs and leave the necessary mathematics foundations to the readers.
After this talk you will understand that there is a variety of ZKPs, it’s still early days, and why ZKP is such a perfect tool for digital identity platforms. This talk includes significant updates from the newly-organized ZKProof Standardization organization plus a signal of maturity: one of the first known ZKP vulnerabilities.
Clare will explain why ZKPs are so powerful, and why they are building blocks for a range of applications including privacy-preserving cryptocurrency such as Zcash, Ethereum, Artificial Intelligence, and older versions of Trusted Platform Modules (TPMs). The presentation includes many backup slides for future learning and researching, including four slides of references.
Security professionals at the 2015 RSA Conference share scary stories about unwelcome surprises they found on their networks.
This slideshare features stills from a fun video on the same subject. You can watch it at: bit.ly/network-surprise
---
Featured in this slideshare:
John Bird
Lawrence Cashdollar
James Miante
Dave Lewis
Alex van Someren
Chris Raethke
Robert Jorgensen
Philip Richards
William Olson
Chuck Sedlacek
Kirk Hanratty
Kyle Maxwell
During the Next Generation Network and Data Centre – Now and into the Future ...Cisco Canada
Rapid changes in the world around us, driven by cloud, mobility and the Internet of Everything, are creating significant opportunities for global organizations. With these environmental changes, the sophistication with which cyber threats and attacks are carried out continues to grow rapidly, and attackers are increasingly able to circumvent traditional security systems. To learn more, please visit our website here: http://www.cisco.com/web/CA/index.html
How to secure and manage modern IT - Ondrej VysekITCamp
IT is changing faster and faster and users requires completely different approach – especially millennials. Microsoft reacts to these IT needs by introducing EMS – most complex security and management suite on the market. We will cover how to manage and secure user identity, devices and documents. Discussion will cover not only Microsoft’s operating systems but iOS and Androids as well. As traditional IT assets needs to be maintained as well, SCCM and cloud management can be combined very easily. Join us on this presentation to see today’s possibilities of IT.
Short presentation I did at BrainTank 2012 in Providence RI. The focus was on issues surrounding wireless security at the small business level and how there is not enough being done to address it.
IoT - Internet of Things or something else
OWASP IoT Top Ten
Typical IoT Security Architecture
Recent IoT Attacks incl. DYN DNS SDoS Attack
IoT Security Challenges
Protection from IoT Attacks, beyond Endpoint Security
OxCEPT is a cyber security company providing authentication and encryption technology to product teams building connected products and services. Find out why authentication is critical to all connected products and the safety of their users.
In Hands-on Encrypted Data Analytics, you’ll learn how to configure this new telemetry in Cisco routers and switches, use Stealthwatch to identify non-compliant devices and malware without encryption and speed up incident response and forensics.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9003DzrjT
TechWiseTV: http://cs.co/9009DzrjN
Nowadays REST APIs are behind each mobile and nearly all of web applications. As such they bring a wide range of possibilities in cases of communication and integration with given system. But with great power comes great responsibility. This talk aims to provide general guidance related do API security assessment and covers common API vulnerabilities. We will look at an API interface from the perspective of potential attacker.
I will show:
how to find hidden API interfaces
ways to detect available methods and parameters
fuzzing and pentesting techniques for API calls
typical problems
I will share several interesting cases from public bug bounty reports and personal experience, for example:
* how I got various credentials with one API call
* how to cause DoS by running Garbage Collector from API
Explore the status and future of FIDO in this presentation, which was given at the European Identity & Cloud Conference (EIC) in May, 2015.
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
Kamailio is the leading Open Source SIP Server - a SIP proxy, registrar, location server, presence server, IMS server and much more. Find out more by viewing this quick presentation! (Updated June 2014)
Kamailio combined with Asterisk creates and incredibly robust and durable VoIP framework. With scalability and security, adding Kamailio to an asterisk deployment makes sense and saves money.
Cluecon 2015
Use of external controller applications to fetch the next routes and let Kamailio handle the SIP layer.
Example with Node.js external application and evapi+rtjson modules in Kamailio
A quick introduction to Kamailio - the leading Open Source SIP server (based on OpenSER and SER). Kamailio is quite different than Asterisk, FreeSwitch and many other VoIP platforms - why is that and how do you start getting your head around Kamailio?
Presentation done at Astricon 2013, Atlanta, USA - a look at Kamailio and SIP proxy server concept from the perspective of a media server and PBX such as Asterisk
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonSSIMeetup
This talk will introduce Zero-Knowledge Proofs (ZKPs) and explain why they are a key element in a growing number of privacy-preserving, digital-identity platforms. Clare will provide basic illustrations of ZKPs and leave the necessary mathematics foundations to the readers.
After this talk you will understand that there is a variety of ZKPs, it’s still early days, and why ZKP is such a perfect tool for digital identity platforms. This talk includes significant updates from the newly-organized ZKProof Standardization organization plus a signal of maturity: one of the first known ZKP vulnerabilities.
Clare will explain why ZKPs are so powerful, and why they are building blocks for a range of applications including privacy-preserving cryptocurrency such as Zcash, Ethereum, Artificial Intelligence, and older versions of Trusted Platform Modules (TPMs). The presentation includes many backup slides for future learning and researching, including four slides of references.
Security professionals at the 2015 RSA Conference share scary stories about unwelcome surprises they found on their networks.
This slideshare features stills from a fun video on the same subject. You can watch it at: bit.ly/network-surprise
---
Featured in this slideshare:
John Bird
Lawrence Cashdollar
James Miante
Dave Lewis
Alex van Someren
Chris Raethke
Robert Jorgensen
Philip Richards
William Olson
Chuck Sedlacek
Kirk Hanratty
Kyle Maxwell
During the Next Generation Network and Data Centre – Now and into the Future ...Cisco Canada
Rapid changes in the world around us, driven by cloud, mobility and the Internet of Everything, are creating significant opportunities for global organizations. With these environmental changes, the sophistication with which cyber threats and attacks are carried out continues to grow rapidly, and attackers are increasingly able to circumvent traditional security systems. To learn more, please visit our website here: http://www.cisco.com/web/CA/index.html
How to secure and manage modern IT - Ondrej VysekITCamp
IT is changing faster and faster and users requires completely different approach – especially millennials. Microsoft reacts to these IT needs by introducing EMS – most complex security and management suite on the market. We will cover how to manage and secure user identity, devices and documents. Discussion will cover not only Microsoft’s operating systems but iOS and Androids as well. As traditional IT assets needs to be maintained as well, SCCM and cloud management can be combined very easily. Join us on this presentation to see today’s possibilities of IT.
Short presentation I did at BrainTank 2012 in Providence RI. The focus was on issues surrounding wireless security at the small business level and how there is not enough being done to address it.
IoT - Internet of Things or something else
OWASP IoT Top Ten
Typical IoT Security Architecture
Recent IoT Attacks incl. DYN DNS SDoS Attack
IoT Security Challenges
Protection from IoT Attacks, beyond Endpoint Security
OxCEPT is a cyber security company providing authentication and encryption technology to product teams building connected products and services. Find out why authentication is critical to all connected products and the safety of their users.
In Hands-on Encrypted Data Analytics, you’ll learn how to configure this new telemetry in Cisco routers and switches, use Stealthwatch to identify non-compliant devices and malware without encryption and speed up incident response and forensics.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9003DzrjT
TechWiseTV: http://cs.co/9009DzrjN
Nowadays REST APIs are behind each mobile and nearly all of web applications. As such they bring a wide range of possibilities in cases of communication and integration with given system. But with great power comes great responsibility. This talk aims to provide general guidance related do API security assessment and covers common API vulnerabilities. We will look at an API interface from the perspective of potential attacker.
I will show:
how to find hidden API interfaces
ways to detect available methods and parameters
fuzzing and pentesting techniques for API calls
typical problems
I will share several interesting cases from public bug bounty reports and personal experience, for example:
* how I got various credentials with one API call
* how to cause DoS by running Garbage Collector from API
Explore the status and future of FIDO in this presentation, which was given at the European Identity & Cloud Conference (EIC) in May, 2015.
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
Kamailio is the leading Open Source SIP Server - a SIP proxy, registrar, location server, presence server, IMS server and much more. Find out more by viewing this quick presentation! (Updated June 2014)
Kamailio combined with Asterisk creates and incredibly robust and durable VoIP framework. With scalability and security, adding Kamailio to an asterisk deployment makes sense and saves money.
Cluecon 2015
Use of external controller applications to fetch the next routes and let Kamailio handle the SIP layer.
Example with Node.js external application and evapi+rtjson modules in Kamailio
A quick introduction to Kamailio - the leading Open Source SIP server (based on OpenSER and SER). Kamailio is quite different than Asterisk, FreeSwitch and many other VoIP platforms - why is that and how do you start getting your head around Kamailio?
Presentation done at Astricon 2013, Atlanta, USA - a look at Kamailio and SIP proxy server concept from the perspective of a media server and PBX such as Asterisk
Introduction to WebRTC used in the Stockholm WebRTC Meetup February 16th 2017. Talks about the underlying architecture - RTP, Turn, STUN, Ice and the world of changing IP networks
Asterisk is an Open Source PBX - but how does it support larger installations? Can you scale it up to thousands of users, with hundreds of simultaneous calls? What about failover, backups and the famous blinking lamps? Olle Johansson goes through various models and describes where some of his current projects with strange names - Pinefrog, Pinana, Pinetree and Bufo fits into this picture.
The future of multimedia communications and services: Kurento and it's roleLuis Lopez
This is a presentation specifically created for the GSMA interest group on WebRTC. This presentations introduces Kurento from the perspective of operators. Kurento is a multimedia development framework. It has been created to ease the life of multimedia application developers. Using multimedia capabilities such as embedding a video onto your app or establishing a video conferencing link between two clients may be tricky, but there is no rocket science there. However, for applications requiring more advanced features things quickly get unmanageable. If you have been involved in multimedia projects, you probably know that features such as interoperable group communications, different communication roles (e. g.. publishers/viewers), video transforming and transcoding, video storage and tagging, integration into legacy video/voice infrastructures, computer vision, augmented reality, integration with external systems and databases and many others, pose quite a complex challenge, which usually requires huge expertise and effort. Specially when real-time communications are involved. If this is your case, Kurento will help you.
Presentation done at AstriCon 2014, Las Vegas, USA - how relevant can be SIP signaling traffic in a Real Time Communications platform and where pure SIP signaling servers such as Kamailio can be used.
Presentation done at Kamailio World 2013, Berlin, Germany - several options for scalability of SIP routing with Kamailio, from configuration file tricks to stateless and stateful load balancing with dispatcher module.
Find out six common misconceptions people have about developing mobile apps (take a long time, cost a lot, require technical skills) and find out how Fliplet can dispel them.
Presentation taken from Mobile World Congress 2015
Applying Innovation in Software DevelopmentAmish Gandhi
Sometimes the only difference between the winners and the losers is that the winners figure out how to innovate. Innovation is a broad term and this presentation outlines what it means for enterprises and companies involved in developing software. This presentation highlights how innovation can be applied at various stages of software product development and in different ways by applying special techniques, tools and frameworks.
Note: This was also a QCon Shanghai Keynote Talk. Full talk up at http://www.infoq.com/cn/presentations/business-innovation
Perpetual website: http://www.perpetualny.com
Have you ever wonder how does a mobile app developing process works like? Well, check out our presentation! 6 steps to develop a mobile app - Appformation
The Gannons Intellectual Property Technology seminar brings together respected professionals from the legal and commercial technology sectors.
Our seminar covers:
Tech and Software: Discover how businesses navigate, embrace and compete with the deluge of disruptive technologies.
IP Tech from a Legal perspective: Resolve the major legal challenges faced by tech firms. We share our knowledge and expertise.
IP Insurance: Intellectual property insurance needn't be expensive. We demonstrate the options available for Tech businesses.
The Speakers:
Jimmy Vestbirk - a technologist with a focus on LawTech and works with start ups.
Graham Bell - a technical consultant specialising in product development, and has extensive international experience advising clients in the creation, application and exploitation of technology with a core focus in telecommunications and consumer electronics.
Amardeep Dhillon - a barrister who specialises in IP. Amardeep is regularly instructed in matters in the High Court, Companies Court and has appeared before the Court of Appeal. He will discuss case studies on IP and Technology.
An IP Expert in ATE (after the event) and BTE (before the event) insurance solutions helping businesses to reduce their financial risks in litigation.
Managing micro services for your companyJustin Lovell
Justin Lovell introduces API management and how various cogs of technology may be implemented such that companies are able to succeed by building a deep foundation whilst moving at the speed of Agile.
Open Source & What It Means For Self-Sovereign Identity (SSI)Evernym
Open source and open standards have been two pillars of self-sovereign identity since the beginning. Only by breaking down barriers to both development and production can we ensure that SSI works for everyone, everywhere.
Openness is also at the core of how Evernym operates, and our motivation for launching Sovrin, subsequently donating Hyperledger Indy to the world, and more recently, open-sourcing our own products.
In this webinar, we covered:
- The importance of open source software, and why it's needed for self-sovereign identity
- The open source tools available today, from Hyperledger Indy and Aries to Evernym's Verity
- What Evernym's open-sourcing of Verity means for developers
- Getting started with either open source or our free Sandbox plan
You can’t throw a party, if the front door is blocked. More than 60% of users sign up for a service, bounce during onboarding, and never return. If your company depends on developers, then how they get started, use, and contribute to your communities, libraries, tools and APIs should be more than just painless. Your onboarding design should be elegant. In this Heavybit Speaker Series presentation, GitHub Developer Advocate Brian Douglas will discuss:
Best practices in designing a stellar first user experience;
Tools, content and tactics to maintain user momentum; and,
Examples of the breadcrumbs and carrots that communities like GitHub, Netlify, Stripe and Graphcool use to help developers succeed
The Development Graveyard: How Software Projects DieErika Barron
Learn the top 5 reasons why software projects fail. The scariest part is that the failure causes are easily avoidable - yet as IT professionals, we continue to make life more difficult than it really needs to be.
10 Steps to Developing Great Ideas on time and on budget using Lean & Agile...DigitalWoman.com
My Name is Nelly Yusupova. I’m the CTO of Webgrrls International, I am also a technology advisor and consultant to many startups and businesses and the creator of 2 bootcamps TechSpeak for Entrepreneurs & Build your Social Media Footprint.
I’ve been building software products for over a decade now and what I’ve learned is that most business ideas fail not because they have the wrong technology but because they don’t have a well defined business model….how they are going to make money.
There is a whole movement in startups known as the LEAN movement that encourages entrepreneurs to validate their idea and understand the problem it solves before investing a lot of technology into it.
In this presentation, you will learn about the 10 Steps to Developing Great Ideas on time and on budget using Lean & Agile Methodologies. Each step is essential and is designed to help you minimize the damage of mistakes by seeing the red flags earlier and catch mistakes earlier...saving you lots of money and lots of time
Introduction to GraphQL (or How I Learned to Stop Worrying about REST APIs)Hafiz Ismail
Talk for FOSSASIA 2016 (http://2016.fossasia.org)
----
This talk will give a brief and enlightening look into how GraphQL can help you address common weaknesses that you, as a web / mobile developer, would normally face with using / building typical REST API systems.
Let's stop fighting about whether we should implement the strictest interpretation of REST or how pragmatic REST-ful design is the only way to go, or debate about what REST is or what it should be.
A couple of demos (In Golang! Yay!) will be shown that are guaranteed to open up your eyes and see that the dawn of liberation for product developers is finally here.
Background: GraphQL is a data query language and runtime designed and used at Facebook to request and deliver data to mobile and web apps since 2012.
Hafiz Ismail (@sogko) is a contributor to Go / Golang implementation of GraphQL server library (https://github.com/graphql-go/graphql) and is looking to encourage fellow developers to join in the collaborative effort.
How To (Not) Open Source - Javazone, Oslo 2014gdusbabek
Releasing an open source project while maintaining a shipping product is hard! Different behaviors, attitudes and actions can help or hinder your cause; and they are not always obvious.
The Blueflood distributed metrics engine was released as open source software by Rackspace in August 2012. In the succeeding months the team had to strike a manageable balance between the challenges of growing a community, being good open source stewards, and maintaining a shipping product for Rackspace. Find out what worked, what did not work, and the lessons that can be applied as you endeavor to take your project out into the open.
In this presentation you will learn about strategies for releasing open source products, pitfalls to avoid, and the potential benefits of moving more of your development out in the open.
We have also made a few realizations about the community growing up around metrics. It is still young, and there are problems that come with that youth. I'll talk about some things we can do to make a better software ecosystem.
Inspired by my work on understanding the effects of the EU cyber resilience act, I made this presentation on vulnerability handling - SBOM, Vex, CVE, CVSS, CWE and more.
Introduction to the proposed EU cyber resilience act (CRA)Olle E Johansson
A short introduction to the proposed EU Cyber Resilience Act. It's a large document to parse, so please don't take my words as a truth, just indications of what will come. The CRA will impact everyone that distributes software and connected devices on the EU market, so it's important to stay up to date with this regulation.
Januscon 2019: Slides from my short talk about the need for a federation solution to connect all isolated WebRTC and SIP islands out there. Sorry for the lack of text, hopefully it will be available in a streamed version soon.
Photos (C) Olle E. Johansson
A talk about me discovering new architectures, new ways of building scalable realtime platforms #SIP #WebRTC #Kamailio #MQTT #NODERED
Watch it live at https://www.youtube.com/watch?v=BbfUXUWtxIg
A presentation for Kamailio World 2017 in Berlin: How Open Standards and Open Source affect national public radio broadcast. My personal view and opinions. Also, some information about Project IrisBroadcast.
Realtime communication over a dual stack networkOlle E Johansson
Fosdem 2017: A short talk about dual stack (IPv4 and IPv6) issues when using SIP, WebRTC, XMPP and other realtime platforms in a dual stack world - where both client and server is connecting to the new and the old Internet.
Side note: Uploads to slide share doesn't work on IPv6-only networks.
My talk at Voip2day 2016 in Madrid (organised by Avanzada 7 in Malaga).
This talks cover recent trends in realtime communication, from VoIP to WebRTC and Internet of Things
A presentation covering work that needs to happen. We jokingly came up with a non-existing organisation that maintains a reference profile for SIP. While the organisation is just a joke, the work is quite serious.
A presentation about new functionality in SIP that is really needed for Hosted PBX services, SIP on mobile phones and more situations. #SIP #Kamailio #Asterisk #TLS #MoreCrypto
A video with this presentation is available on YouTube at
https://www.youtube.com/watch?v=uqFNlqB_Ssw
2015 update: SIP and IPv6 issues - staying Happy in SIPOlle E Johansson
What's the state of SIP and IPv6?
- An update I gave at the Netnod spring Meeting 2015.
Nothing much is happening, despite the fact that we have proven real issues with dual stacks in SIP.
SIP and DNS - federation, failover, load balancing and moreOlle E Johansson
SIP use DNS to find a server for a specific URI, like sip:alice@example.com. With DNS a SIP service can provide failover, load balancing and much more. SIP without DNS is a broken solution. SIP and DNS rocks!
A presentation about how we can make the Internet hard to monitor - how we can and should encrypt more communication. This version includes a presentation of the TLS protocol.
Changes in 2.2: Added quotes from Viktor Dukhovni's IETF RFC 7435 about Opportunistic Security
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
2. 1. Improve your
application
• At SIPit you bring your application and put
it to tests with a large set of other SIP
implementations.You will get feedback that
will improve your application.
3. 2. Find bugs before your
customers find them
• At SIPit, your application will be interacting
with a large set of applications that your
customers use, and put in situations you
have not expected. Find the bugs first.
4. 3. Learn more
• At SIPit you learn more about SIP and new
things added to the SIP family of standards.
You meet the people working with SIP in
the IETF and can ask all your questions.
5. 4. Build a network
• At SIPit you meet developers from a large
set of companies working with SIP. You
build a personal network that you can use
when you get interoperability issues later
on.
6. 5. Innovations
happen here.
• At SIPit, there’s room to discuss new ideas
and explore new stuff. You spend one week
in a room filled with innovative people
working with real time communication.
Get inspiration and immediate feedback.
7. Golden rule
• Tests are confidential. You are in a safe
environment for new and coming products.
8. What we test.
• One-to-one and group tests
• Based on the need of participating
implementations
• Basic 3261 call scenarios over IPv4 and IPv6
as well as new things like GIN, WebRTC, SIP
Outbound, SIP identity and much more.
9. Short facts.
• SIPit #31 is taking place in Nice, France,
Sept 29 - Oct 3 2014, hosted by Etsi
• Organized by the SIP Forum
• We will include WebRTC-IT
interoperability tests
• http://www.sipit.net
Register today!