Presentación utilizada por Iago Soto el 11 de Febrero de 2010 en la sede ON de la Rua Nova de Santiago dentro de la primera reunión de Grupo Exportación Tic Galicia
Este documento describe varios ataques y medidas de protección para redes VoIP. Los ataques incluyen denegación de servicio, fraude en llamadas, escuchas ilegales y control ilegal. La protección se logra mediante el diseño de la infraestructura, tecnologías seguras como TLS, SRTP y SBC, y monitoreo de la calidad de servicio.
Quobis webinar Siete avances clave en la operabilidad de redes VoIP y NGNQuobis
Este documento describe 7 avances clave en la operabilidad de redes VoIP y NGN: 1) mayor flexibilidad y seguridad que soluciones de fabricante, 2) diseño de entornos escalables orientados a la continuidad de negocio, 3) especialización tecnológica para ayudar a grandes retos de clientes, 4) proyectos llave en mano desde fases iniciales.
This document discusses VoIP security threats like fraud and denial of service attacks. It provides examples of VoIP fraud causing losses of thousands of dollars or euros. It also describes common VoIP attacks like extension/password brute forcing, INVITE attacks, and exploiting default passwords. The document demonstrates using the Metasploit framework to launch SIP-based denial of service floods and discusses countermeasures like firewalls, monitoring, and session border controllers. It includes exercise notes about configuring Kamailio to defend a VoIP provider serving a lawless island from various attacks.
This document describes a virtual audio conferencing system called Multi Conference Unit. It allows multiple phone lines to participate in the same call simultaneously without additional communication costs. The system can integrate with existing corporate telephone systems and supports a minimum of 20 concurrent audio conferences each with 20 or more users. Licenses are available based on the number of virtual conference rooms needed.
Kamailio practice Quobis-University of Vigo Laboratory of Commutation 2012-2...Quobis
1. This document outlines an exercise for configuring the Kamailio softswitch to support a simulated telecommunications system across multiple islands.
2. Students will choose one of four options to expand the basic call functionality between 100 users to include load balancing international calls, call transfer, security testing, or adapting codecs based on weather conditions.
3. The document provides general considerations, tools recommended, and references for completing the exercise.
Quobis presented information on IP telephony and SIP. They discussed the history and evolution of telephony from fixed lines to mobile networks. IP telephony offers advantages like reusing existing infrastructure and open source projects. SIP is the dominant signaling protocol and allows for establishing multimedia sessions through signaling and negotiation of session parameters. Kamailio is an open source SIP softswitch that can perform proxy and registrar roles and is high performance software used in commercial VoIP networks.
Voice Traffic Data Mining (VTDM) es una solución de monitorización del tráfico telefónico saliente que permite agrupar líneas y destinos, estimar costes, y mejorar la gestión de los recursos de comunicaciones a través de la automatización de tareas de control.
Presentación utilizada por Iago Soto el 11 de Febrero de 2010 en la sede ON de la Rua Nova de Santiago dentro de la primera reunión de Grupo Exportación Tic Galicia
Este documento describe varios ataques y medidas de protección para redes VoIP. Los ataques incluyen denegación de servicio, fraude en llamadas, escuchas ilegales y control ilegal. La protección se logra mediante el diseño de la infraestructura, tecnologías seguras como TLS, SRTP y SBC, y monitoreo de la calidad de servicio.
Quobis webinar Siete avances clave en la operabilidad de redes VoIP y NGNQuobis
Este documento describe 7 avances clave en la operabilidad de redes VoIP y NGN: 1) mayor flexibilidad y seguridad que soluciones de fabricante, 2) diseño de entornos escalables orientados a la continuidad de negocio, 3) especialización tecnológica para ayudar a grandes retos de clientes, 4) proyectos llave en mano desde fases iniciales.
This document discusses VoIP security threats like fraud and denial of service attacks. It provides examples of VoIP fraud causing losses of thousands of dollars or euros. It also describes common VoIP attacks like extension/password brute forcing, INVITE attacks, and exploiting default passwords. The document demonstrates using the Metasploit framework to launch SIP-based denial of service floods and discusses countermeasures like firewalls, monitoring, and session border controllers. It includes exercise notes about configuring Kamailio to defend a VoIP provider serving a lawless island from various attacks.
This document describes a virtual audio conferencing system called Multi Conference Unit. It allows multiple phone lines to participate in the same call simultaneously without additional communication costs. The system can integrate with existing corporate telephone systems and supports a minimum of 20 concurrent audio conferences each with 20 or more users. Licenses are available based on the number of virtual conference rooms needed.
Kamailio practice Quobis-University of Vigo Laboratory of Commutation 2012-2...Quobis
1. This document outlines an exercise for configuring the Kamailio softswitch to support a simulated telecommunications system across multiple islands.
2. Students will choose one of four options to expand the basic call functionality between 100 users to include load balancing international calls, call transfer, security testing, or adapting codecs based on weather conditions.
3. The document provides general considerations, tools recommended, and references for completing the exercise.
Quobis presented information on IP telephony and SIP. They discussed the history and evolution of telephony from fixed lines to mobile networks. IP telephony offers advantages like reusing existing infrastructure and open source projects. SIP is the dominant signaling protocol and allows for establishing multimedia sessions through signaling and negotiation of session parameters. Kamailio is an open source SIP softswitch that can perform proxy and registrar roles and is high performance software used in commercial VoIP networks.
Voice Traffic Data Mining (VTDM) es una solución de monitorización del tráfico telefónico saliente que permite agrupar líneas y destinos, estimar costes, y mejorar la gestión de los recursos de comunicaciones a través de la automatización de tareas de control.
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"Quobis
WebRTC inherits all the threats of traditional VoIP services together with existing web attacks. In this session Antón Román will explain this together with ad-hoc WebRTC attacks and ways to deal with Identity and keep the services secure.
- VoIP attacks Denial of service. Fraud. Illegal interception. Illegal control.
- Adhoc WebRTC attacks: malicious HTML code. Webservers. Forced DoS. Cam/mic control. Etc.
- Protection: Role of border elements (SBC, media gateways,...). WebRTC Portal and web servers. Browser mechanisms
- Identity Management: Anonymous calls. OpenID and third parties. Telco identity. Real implementations
- VoIP attacks Denial of service. Fraud. Illegal interception. Illegal control.
- Adhoc WebRTC attacks: malicious HTML code. Webservers. Forced DoS. Cam/mic control. Etc.
- Protection: Role of border elements (SBC, media gateways,...). WebRTC Portal and web servers. Browser mechanisms
- Identity Management: Anonymous calls. OpenID and third parties. Telco identity. Real implementations
This document provides an overview of WebRTC, including:
- WebRTC allows real-time communications directly in web browsers using JavaScript APIs without plugins.
- It covers the definition, implementations, signaling methods, demos of WebRTC applications, and the relationship between WebRTC and SIP.
- The document also discusses QoffeeSIP, a JavaScript SIP stack that can be used with WebRTC, and potential final year project proposals related to WebRTC.
Quobis is a leading European provider of carrier-class unified communications solutions with a focus on security and interconnection. They offer advisory services, product development, and integration of session border controllers, webRTC, voice applications, and softswitches. Quobis has experience developing open source solutions and has worked on SIP projects for six years, developing their own products for two years.
WebRTC will enable real-time communications like voice and video directly in web browsers without plugins. The presenters will discuss their vision for this technology and how to implement it for corporations and telecom networks. They will cover introductions to HTML5, WebRTC, and network architectures; technical challenges around codecs, encryption, and NAT traversal; application cases for telecoms, companies, social media, and manufacturers; and demos of WebRTC applications and identity management. The presentation aims to show how voice traffic will migrate to the web, with browsers as new endpoints and websites as potential call centers, changing how telephone numbers and communications are managed.
WebRTC permitirá comunicaciones de voz y video nativas en los navegadores. La presentación describe WebRTC y HTML5, arquitecturas de red, retos técnicos como códecs y NAT, casos de aplicación como telcos y empresas, y una demo de TalkSetup. Gestión de identidad es crucial para la seguridad y privacidad de WebRTC.
¿Cómo está cambiando la industria del call center?Quobis
El documento describe cómo la industria de los call centers está cambiando hacia el uso de VoIP SIP trunks, IMS y la nube. Esto permite una mayor flexibilidad, funcionalidad y ahorro de costos en comparación con las líneas TDM tradicionales. También cubre consideraciones de seguridad, calidad y aplicaciones avanzadas como grabación, conferencias y autenticación de llamadas.
Quobis develops the TalkStorage voice call recording platform. TalkStorage provides a simple and cost-effective solution for basic call recording needs in small call centers or outsourcers. It can record up to 300 calls concurrently and integrate easily with various VoIP PBX systems without needing additional hardware. Recorded calls can be stored on TalkStorage or the customer's storage and accessed through a web interface.
Quobis Networks provides expertise in network integration, voice security, service assurance, and application servers focused on service providers and enterprises. They have 6 years experience working on SIP projects and developing their own products for over 2 years, including their Click to Call Application Server called VoiceInstant. VoiceInstant is an application server that enables click-to-call functionality in corporate networks and integrates with corporate applications through a multilingual API. It unifies call flows across different office locations and network topologies.
Este documento presenta los servicios y soluciones de Quobis Networks para proyectos de comunicaciones unificadas. Ofrece consultoría, diseño de arquitecturas, integración de sistemas y soporte basados en estándares abiertos. Quobis se especializa en proyectos llave en mano para grandes redes, con foco en interconexión, seguridad, gestión de tráfico y plataformas.
La Unión Europea ha acordado un paquete de sanciones contra Rusia por su invasión de Ucrania. Las sanciones incluyen restricciones a las importaciones de productos rusos de alta tecnología y a las exportaciones de bienes de lujo a Rusia. Además, se congelarán los activos de varios oligarcas rusos y se prohibirá el acceso de los bancos rusos a los mercados financieros de la UE.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
“Pode a Ibéria ser um mercado único para uma start-up?”Quobis
O documento discute se a Península Ibérica pode ser um mercado único para startups. Aponta que Portugal e Espanha têm mercados complementares, história comum, línguas acessíveis e fortes laços comerciais, o que torna a região atraente. Sugere seis passos para startups aproveitarem essa oportunidade: 1) realizar missões comerciais; 2) contratar funcionários do outro país; 3) ter fornecedores do outro país; 4) conquistar o primeiro cliente estrangeiro; 5) participar de associações do outro
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"Quobis
WebRTC inherits all the threats of traditional VoIP services together with existing web attacks. In this session Antón Román will explain this together with ad-hoc WebRTC attacks and ways to deal with Identity and keep the services secure.
- VoIP attacks Denial of service. Fraud. Illegal interception. Illegal control.
- Adhoc WebRTC attacks: malicious HTML code. Webservers. Forced DoS. Cam/mic control. Etc.
- Protection: Role of border elements (SBC, media gateways,...). WebRTC Portal and web servers. Browser mechanisms
- Identity Management: Anonymous calls. OpenID and third parties. Telco identity. Real implementations
- VoIP attacks Denial of service. Fraud. Illegal interception. Illegal control.
- Adhoc WebRTC attacks: malicious HTML code. Webservers. Forced DoS. Cam/mic control. Etc.
- Protection: Role of border elements (SBC, media gateways,...). WebRTC Portal and web servers. Browser mechanisms
- Identity Management: Anonymous calls. OpenID and third parties. Telco identity. Real implementations
This document provides an overview of WebRTC, including:
- WebRTC allows real-time communications directly in web browsers using JavaScript APIs without plugins.
- It covers the definition, implementations, signaling methods, demos of WebRTC applications, and the relationship between WebRTC and SIP.
- The document also discusses QoffeeSIP, a JavaScript SIP stack that can be used with WebRTC, and potential final year project proposals related to WebRTC.
Quobis is a leading European provider of carrier-class unified communications solutions with a focus on security and interconnection. They offer advisory services, product development, and integration of session border controllers, webRTC, voice applications, and softswitches. Quobis has experience developing open source solutions and has worked on SIP projects for six years, developing their own products for two years.
WebRTC will enable real-time communications like voice and video directly in web browsers without plugins. The presenters will discuss their vision for this technology and how to implement it for corporations and telecom networks. They will cover introductions to HTML5, WebRTC, and network architectures; technical challenges around codecs, encryption, and NAT traversal; application cases for telecoms, companies, social media, and manufacturers; and demos of WebRTC applications and identity management. The presentation aims to show how voice traffic will migrate to the web, with browsers as new endpoints and websites as potential call centers, changing how telephone numbers and communications are managed.
WebRTC permitirá comunicaciones de voz y video nativas en los navegadores. La presentación describe WebRTC y HTML5, arquitecturas de red, retos técnicos como códecs y NAT, casos de aplicación como telcos y empresas, y una demo de TalkSetup. Gestión de identidad es crucial para la seguridad y privacidad de WebRTC.
¿Cómo está cambiando la industria del call center?Quobis
El documento describe cómo la industria de los call centers está cambiando hacia el uso de VoIP SIP trunks, IMS y la nube. Esto permite una mayor flexibilidad, funcionalidad y ahorro de costos en comparación con las líneas TDM tradicionales. También cubre consideraciones de seguridad, calidad y aplicaciones avanzadas como grabación, conferencias y autenticación de llamadas.
Quobis develops the TalkStorage voice call recording platform. TalkStorage provides a simple and cost-effective solution for basic call recording needs in small call centers or outsourcers. It can record up to 300 calls concurrently and integrate easily with various VoIP PBX systems without needing additional hardware. Recorded calls can be stored on TalkStorage or the customer's storage and accessed through a web interface.
Quobis Networks provides expertise in network integration, voice security, service assurance, and application servers focused on service providers and enterprises. They have 6 years experience working on SIP projects and developing their own products for over 2 years, including their Click to Call Application Server called VoiceInstant. VoiceInstant is an application server that enables click-to-call functionality in corporate networks and integrates with corporate applications through a multilingual API. It unifies call flows across different office locations and network topologies.
Este documento presenta los servicios y soluciones de Quobis Networks para proyectos de comunicaciones unificadas. Ofrece consultoría, diseño de arquitecturas, integración de sistemas y soporte basados en estándares abiertos. Quobis se especializa en proyectos llave en mano para grandes redes, con foco en interconexión, seguridad, gestión de tráfico y plataformas.
La Unión Europea ha acordado un paquete de sanciones contra Rusia por su invasión de Ucrania. Las sanciones incluyen restricciones a las importaciones de productos rusos de alta tecnología y a las exportaciones de bienes de lujo a Rusia. Además, se congelarán los activos de varios oligarcas rusos y se prohibirá el acceso de los bancos rusos a los mercados financieros de la UE.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
“Pode a Ibéria ser um mercado único para uma start-up?”Quobis
O documento discute se a Península Ibérica pode ser um mercado único para startups. Aponta que Portugal e Espanha têm mercados complementares, história comum, línguas acessíveis e fortes laços comerciais, o que torna a região atraente. Sugere seis passos para startups aproveitarem essa oportunidade: 1) realizar missões comerciais; 2) contratar funcionários do outro país; 3) ter fornecedores do outro país; 4) conquistar o primeiro cliente estrangeiro; 5) participar de associações do outro
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
HCL Notes and Domino License Cost Reduction in the World of DLAU
Kamailio practice Quobis-University of Vigo Laboratory of Commutation 2011-2012
1. Laboratorio de Conmutación
Kamailio Lab (version 1.0)
Introduction
As you know, Quobis Networks is collaborating in the extended practice of Laboratorio de
Conmutación. This is our proposal for the Kamailio exercise. Honestly we can say it is not
difficult at all but it requires you to know a few VoIP concepts and learn how to configure
Kamailio. We recommend to read a SIP tutorial (see bibliography section) before starting the
practice, you will get very valuable skills for the practice and your professional life.
Why Kamailio?
We have already presented the amazing features of Kamailio in previous classes. It is the
most powerful SIP Open Source softswitch used in real VoIP operators such as 1&1 and
Freenet. In the bibliography section you can find links to good Kamailio documentation.
Exercise.
Welcome to an imaginary real-world: in this practice you will have to configure a SIP softswitch
for a ‘real’ operator.
Imagine an archipelago country, called United Archipelago Republic, formed by more than 100
islands. Fortunately, 99% of population happily lives in the 4 biggest islands, namely, Big
Banana, Big Treasure, Drake Island and Lost Island.
The national telecommunication operator has been recently sold and its new owner is a Galician
capital risk fund. For operative reasons, we, the technical managers decided to divide the
operator in four smaller operator based in the 4 main islands. This way they can avoid taxes for
2. big companies and get a more logical deployment from a technical point of view. You were
selected to manage the SIP deployment of the island operator you choose and you will be
posted there by your Telecom company.
To implement the central softswitch infrastructure you have a limited budget. You are willing to
work hard and get a solid know-how in VoIP technologies so you will use Kamailio project to
implement your VoIP network.
Basic functionality.
All groups must configure Kamailio so that tbe able to:
1. Register up to 100 users (except for team 2).
2. establish calls between registered users.
3. establish calls to each other groups.
Additional functionality.
Additionally to the basic exercise, every group must chose one of the following options:
Option 1: you will configure Kamailio for Big Banana Island. With a population of 10,000 native
residents, it reaches 100,000 during tourist season. To avoid service disruption Kamailio must
implement peak load protection. To simulate call peaks you can use sipp. XML sipp conf files
will be provided by Quobis. The prefix assigned for Big Banana island is: 001788[0-3]
Option 2: you will configure Kamailio for Big Treasure Island. This Island is famous by its
money laundering activities so encrypted communications are vital to protect their customers
from Interpol. This operator must offer their clients SIPS signaling (SIP over TLS) which is
perfectly supported by Kamailio. Only server authentication is required. The prefix assigned
for Big Treasure Island is: 001788[4-5]
Option 3: you will configure Kamailio for Drake Island. This island has been a pirate refuge for
centuries. This tradition survives and nowadays this island has the world highest cracker rate
per km2. Most of them use Sipvicious toolkit to attack VoIP servers. This is the reason why
security is a mandatory requirement for this operator. Kamailio must reject messages coming
from SIPvicious scripts. Quobis will provide info about how to use Sipvicious. The prefix
assigned for Drake Island is: 001788[6-7]
Option 4: Lost island. The Lost Island operator must offer services to many small islands
connected to Lost Island through WiMAX links. So bandwidth saving is a must in all the VoIP
3. communication. As you should know, in VoIP communication most of the required bandwidth is
consumed by audio/video RTP flows. You must configure Kamailio to modify the SDP
messages to only allow the use of GSM codec in every call. The prefix assigned for
Drake Island is: 001788[8-9]
Help!
Take it easy, luckily you are not alone. Quobis is going to support you during the practice, we
will offer at least one more lesson and provide e-mail support: university@quobis.com
On the other side, Kamailio project is supported by a big community formed by developers,
testers and users who are looking forward to helping you in your challenging project. You can
visit the Kamailio web site and subscribe to Kamailio mailing lists.
Note about using Kamailio mailing list: many people is going to invest their time in reading all
the list mails everyday so, please, read carefully the documentation and try to find similar
questions already answered in the list. If you don’t find the answer on your own, send a mail to
the list trying to write it in an understandable way, including what have you done so far.
What tools can I use?
There are many tools which can be really useful to carry out this exercise. Below you can find
some of them:
● wireshark: protocol analyzer.
● ngrep-sip: sip-adapted ngrep http://dev.sipdoc.net/projects/sip-stuff/wiki/Ngrep-
SIP
● sipp
● jitsi: a Java softphone.
● sipp and SIPvicous: check links included in bibliography section.
Bibliography
1. SIP tutorial: http://www.iptel.org/files/sip_tutorial.pdf
2. Kamailio Knowledge Base: http://kb.asipto.com/kamailio:index
3. Kamailio Wiki: http://www.kamailio.org/dokuwiki/doku.php/start
4. Sipp: http://sipp.sourceforge.net/
5. SIPvicious: http://blog.sipvicious.org/