At the Commsday event in Sydney April 4th 2016, Thomas Vasen, Subscriber Experience Evangelist at Procera Networks, made the case on how operators should change how they measure the quality their network is capable of delivering in order to fight back the OTT players’ Scorecards. And I’ll bring you’re a case study how this was done successfully.
Slides from the recorded webinar hosted by our VP of Marketing, Cam Cullen, on the Procera Solution - where he outlines how Procera can help you navigate your way through difficulties incurred by your broadband, network, hosting, business or servicing platforms.
1) The document discusses measuring and reporting on network performance metrics like throughput, latency, and packet loss from the subscriber's perspective.
2) It recommends that ISPs measure all subscriber traffic all the time to provide actual customer experience data over reasonable periods during peak usage, meeting FCC guidance.
3) Measuring all traffic would allow ISPs to create their own network performance "scorecards" to report to regulators, market different service offerings to subscribers based on applications, and improve deficient areas of the network.
The presentation is ideal for people who needs to know how Bluecoat packetshaper could be beneficial to any organization. Especially with organizations having problems with Data network visibility traversing across WAN/LAN traffic.
Optimizing Network Connectivity to your Data CenterThousandEyes
This document discusses optimizing network connectivity to data centers. It describes how enterprise networks have become more complex with connections to cloud providers, SaaS applications, mobile users and branch offices. This lack of clear boundaries creates visibility challenges across different network segments. ThousandEyes provides visibility into data centers, WANs and the internet to help monitor performance, identify issues in specific locations or with particular ISPs, and troubleshoot connectivity problems collaboratively with service providers.
ThousandEyes Alerting Essentials for Your NetworkThousandEyes
ThousandEyes provides network monitoring and alerting capabilities. Alerts are triggered based on conditions defined in alert rules, which specify tests, thresholds, and notification policies. Alerts can be configured for various network and application scenarios based on factors like loss, latency, routing changes, DNS issues, page load times, and more. Notifications can be sent by email, PagerDuty integration, or custom webhooks. The system aims to reduce false positives through configurable filtering and requiring multiple failed tests. Historical alert data is also available.
- ThousandEyes delivers network intelligence into every network through cloud, enterprise, and endpoint agents that provide visibility.
- It tackles challenges in hybrid network environments and provides end-to-end visibility through these different agent types located throughout the network.
- The solution also detects internet outages through analyzing aggregated anonymous traffic and routing data from across its global customer base to identify outage events, their scope and likely root causes.
Slides from the recorded webinar hosted by our VP of Marketing, Cam Cullen, on the Procera Solution - where he outlines how Procera can help you navigate your way through difficulties incurred by your broadband, network, hosting, business or servicing platforms.
1) The document discusses measuring and reporting on network performance metrics like throughput, latency, and packet loss from the subscriber's perspective.
2) It recommends that ISPs measure all subscriber traffic all the time to provide actual customer experience data over reasonable periods during peak usage, meeting FCC guidance.
3) Measuring all traffic would allow ISPs to create their own network performance "scorecards" to report to regulators, market different service offerings to subscribers based on applications, and improve deficient areas of the network.
The presentation is ideal for people who needs to know how Bluecoat packetshaper could be beneficial to any organization. Especially with organizations having problems with Data network visibility traversing across WAN/LAN traffic.
Optimizing Network Connectivity to your Data CenterThousandEyes
This document discusses optimizing network connectivity to data centers. It describes how enterprise networks have become more complex with connections to cloud providers, SaaS applications, mobile users and branch offices. This lack of clear boundaries creates visibility challenges across different network segments. ThousandEyes provides visibility into data centers, WANs and the internet to help monitor performance, identify issues in specific locations or with particular ISPs, and troubleshoot connectivity problems collaboratively with service providers.
ThousandEyes Alerting Essentials for Your NetworkThousandEyes
ThousandEyes provides network monitoring and alerting capabilities. Alerts are triggered based on conditions defined in alert rules, which specify tests, thresholds, and notification policies. Alerts can be configured for various network and application scenarios based on factors like loss, latency, routing changes, DNS issues, page load times, and more. Notifications can be sent by email, PagerDuty integration, or custom webhooks. The system aims to reduce false positives through configurable filtering and requiring multiple failed tests. Historical alert data is also available.
- ThousandEyes delivers network intelligence into every network through cloud, enterprise, and endpoint agents that provide visibility.
- It tackles challenges in hybrid network environments and provides end-to-end visibility through these different agent types located throughout the network.
- The solution also detects internet outages through analyzing aggregated anonymous traffic and routing data from across its global customer base to identify outage events, their scope and likely root causes.
Internet Outage Detection allows users to rapidly detect both network and routing outages and understand their scope and likely root cause. Explore data from major outages and learn to use Internet Outage Detection to diagnose issues and their impact. See the webinar recording at https://www.thousandeyes.com/resources/diagnosing-internet-outages-webinar
1) WTHI is implementing an enhanced corporate security plan across its 4 locations to address issues with its existing security systems and wide area network (WAN).
2) The plan includes upgrading the video surveillance, badge access control, WAN, firewalls, intrusion detection, web filtering, anti-spam, antivirus, and VPN.
3) The total capital cost is $442,079 and annual recurring costs are $131,200 but the revenue generated would cover these costs within a few hours, demonstrating a quick payoff period. Failing to upgrade security could result in network downtime costing $45,000 per hour.
Vfm bluecoat proxy sg solution with web filter and reportervfmindia
The Bluecoat ProxySG solution provides web filtering, malware protection, and reporting through its integrated WebFilter and WebPulse cloud services which analyze over 2 billion requests per week to provide real-time web ratings and threats intelligence to the ProxySG appliance. The new Reporter 9 interface provides customized dashboards and reporting for up to 150,000 users with scalable log storage and performance.
The document provides an introduction to ACI for network administrators. It discusses building an ACI network through the perspective of a network administrator. The session objectives are to understand ACI components and models, configure external connectivity and integrate third-party devices, and automate ACI configuration. The agenda covers topics such as ACI building blocks, VMware integration, service graphs, and getting started with ACI.
This document provides information on Blue Coat's PacketShaper and ProxySG products. PacketShaper provides application visibility and quality of service to prioritize important applications. It can identify over 600 applications and provide bandwidth controls. ProxySG provides secure web gateway functionality including malware protection, web content filtering, and WAN optimization techniques like caching and compression to accelerate application performance. Both products integrate with Blue Coat's management platforms.
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityThousandEyes
The presentation summarized Facebook's outage in October 2021. It discussed how Facebook's DNS architecture was hosted in their own data centers. During the outage, Facebook's authoritative nameservers became nonresponsive. Additionally, BGP advertisements for Facebook's DNS IP blocks were withdrawn, making the DNS servers unreachable. This caused users to be unable to access Facebook services. The root cause analysis showed that maintenance impacted Facebook's internal backbone connections. Lessons included avoiding single points of failure in DNS, diversifying providers and services, and optimizing business continuity strategies.
Find out how UniCredit Leasing, an international financial corporation, delivers seamless services to their worldwide user base with Applications Manager.
ISP Connectivity Webinar: No Longer a Black BoxThousandEyes
Your Internet Service Providers are critical to keeping your data centers and offices connected. Yet you may not have much insight into the performance of ISP links outside your network. ThousandEyes maps network topologies across ISP networks, measures performance of data center ingress and egress, and captures BGP routing changes across all relevant prefixes.
In this webinar, we’ll share how to:
*Get visibility into ISP environments in just minutes
*Associate path and route changes to app and network performance
*Share data on specific problem interfaces and links with your ISPs
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...ThousandEyes
The network is a key component in application delivery and is often a direct or indirect target of security attacks
such as DDoS and BGP hijacking. Mitigation strategies often involve using a third party cloud service without any
visibility into whether the mitigation is working well. Using real life examples, we will show how one can measure
the user perceived impact of an ongoing attack, as well as identify which aspects of the mitigation are not working
as desired. With this detailed availability and performance data at the various layers, financial firms can learn how
to better manage ongoing attacks.
This document provides an introduction and overview of ThousandEyes. It begins with an introduction of ThousandEyes and what it is, followed by an agenda for the presentation which includes an introduction, demo, and Q&A section. It then provides background on ThousandEyes including its locations, founding year, customer base, and features. The remainder of the document demonstrates how ThousandEyes provides internet and cloud visibility for enterprises, highlights common enterprise problems it can help with, shows its monitoring capabilities and use cases. It also includes demos on supporting remote workforces and digital experience monitoring before concluding with customer case studies and Cisco integration information.
Deceptive Speed: How to Fix Fast, Unstable Wi-FiNETSCOUT
View the on-demand webinar here: http://www.netscout.link/60048mlcI
What's worse than bad Wi-Fi? Bad Wi-Fi that tests like good Wi-Fi. Join NETSCOUT and Ben Miller for this webinar, Deceptive Speed: How to Fix Fast, Unstable Wi-Fi, and learn simple tools and methods for diagnosing and resolving real world Wi-Fi performance issues.
Ben Miller is a wireless specialist based out of Los Angeles, CA. Ben offers training services for professional training centers and organizations looking to design, manage and support wireless networks. Mr. Miller also offers surveying services to organizations in need of wireless network optimization.
Endpoint Agent Part 1: End User ExperienceThousandEyes
Endpoint Agent monitors end user experience from employee laptops and desktops to understand web performance and Internet connectivity of any browser-based service.
Virtual meetings require only a computer, mobile device, internet connection and Adobe Flash player. Hardware needs are minimal, requiring only a webcam and headphones. Sufficient bandwidth is dependent on number of participants and data transmitted, but a medium quality meeting between three users would require around 128kbps upload and 256kbps download speeds per participant. The client must have access to ports 80, 82, 443 and 1935 and disabling video may help if bandwidth is insufficient.
Reverse Path Visibility with Agent-to-Agent TestsThousandEyes
This document discusses reverse path visibility using agent-to-agent tests in ThousandEyes. It describes how agent-to-agent tests provide bidirectional path visibility across internal and external networks to accurately monitor the forward and reverse paths. This gives more precise diagnostic data to isolate network faults. It also explains how enabling NAT traversal allows agent-to-agent tests to work across NAT devices without requiring inbound port forwarding rules.
Network monitoring tools provide several key benefits: they help stay ahead of issues reported by users to achieve service level agreements; provide constant monitoring of network performance; identify current network loads to optimize resources; automate repeated troubleshooting tasks; and store historical data to analyze trends and make strategic decisions. ManageEngine OpManager offers features like network and server monitoring, traffic analysis, configuration management, fault management, and workflow automation.
This document provides information about network latency, packet loss, and jitter. It defines these terms and discusses their causes and effects. It also provides tips on diagnosing and addressing issues, including performing ping and traceroute tests, using network monitoring tools, and optimizing hardware, software, bandwidth and network configuration. The overall goal is to help readers understand these network performance issues and how to improve latency, packet handling, and the end user experience.
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...Savvius, Inc
With over 10 years of deployment history, VoIP is the primary voice solution for just about every company in existence - large, medium, or small. But even with all that history, recent research from TRAC shows that VoIP is still the number one IT initiative impacting network performance. And with the growth of 802.11 and Wi-Fi enabled smart phones, the use of voice over Wi-Fi (VoFi) promises to increase the volume of VoIP traffic even more. Analyzing VoIP traffic alone is not enough. VoIP analysis must be part of your overall network performance analysis. After all, VoIP is just another data type on your network, and according to TRAC, it is impacting your network performance, so you must monitor and analyze the network as a whole, including voice and video over IP. Join us to see how easy it is to capture and analyze voice, video, and data traffic simultaneously, allowing you to pinpoint the impact of each data type on your overall network performance.
Metrics & Challenges for Testing Streaming Applications in 2019Sarah Elson
Streaming rich media has become an integral part of our daily lives. From watching tutorials on YouTube, Udemy etc. to playing RPGs(Role-Playing Games) on the internet, a major percentage of internet traffic nowadays spends their data on browsing through audio and video contents. With the data speed increasing day by day, media streaming has become the primary way of spreading information to the crowd.
A Comprehensive Guide to Videoconferencing and Media in ICTMatthew Wolff
The document describes an IT consulting firm designing video conferencing suites for Rock-ICT to enable communication between their Lahore and Dubai offices. It discusses the hardware requirements for the suites, including large monitors, webcams, microphones, and a broadband or satellite connection. The software requirements for video conferencing are also outlined, such as conferencing software to compress and transmit audio and video in real-time. Alternative communication methods like VOIP and instant messaging are also discussed and compared to video conferencing.
Internet Outage Detection allows users to rapidly detect both network and routing outages and understand their scope and likely root cause. Explore data from major outages and learn to use Internet Outage Detection to diagnose issues and their impact. See the webinar recording at https://www.thousandeyes.com/resources/diagnosing-internet-outages-webinar
1) WTHI is implementing an enhanced corporate security plan across its 4 locations to address issues with its existing security systems and wide area network (WAN).
2) The plan includes upgrading the video surveillance, badge access control, WAN, firewalls, intrusion detection, web filtering, anti-spam, antivirus, and VPN.
3) The total capital cost is $442,079 and annual recurring costs are $131,200 but the revenue generated would cover these costs within a few hours, demonstrating a quick payoff period. Failing to upgrade security could result in network downtime costing $45,000 per hour.
Vfm bluecoat proxy sg solution with web filter and reportervfmindia
The Bluecoat ProxySG solution provides web filtering, malware protection, and reporting through its integrated WebFilter and WebPulse cloud services which analyze over 2 billion requests per week to provide real-time web ratings and threats intelligence to the ProxySG appliance. The new Reporter 9 interface provides customized dashboards and reporting for up to 150,000 users with scalable log storage and performance.
The document provides an introduction to ACI for network administrators. It discusses building an ACI network through the perspective of a network administrator. The session objectives are to understand ACI components and models, configure external connectivity and integrate third-party devices, and automate ACI configuration. The agenda covers topics such as ACI building blocks, VMware integration, service graphs, and getting started with ACI.
This document provides information on Blue Coat's PacketShaper and ProxySG products. PacketShaper provides application visibility and quality of service to prioritize important applications. It can identify over 600 applications and provide bandwidth controls. ProxySG provides secure web gateway functionality including malware protection, web content filtering, and WAN optimization techniques like caching and compression to accelerate application performance. Both products integrate with Blue Coat's management platforms.
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityThousandEyes
The presentation summarized Facebook's outage in October 2021. It discussed how Facebook's DNS architecture was hosted in their own data centers. During the outage, Facebook's authoritative nameservers became nonresponsive. Additionally, BGP advertisements for Facebook's DNS IP blocks were withdrawn, making the DNS servers unreachable. This caused users to be unable to access Facebook services. The root cause analysis showed that maintenance impacted Facebook's internal backbone connections. Lessons included avoiding single points of failure in DNS, diversifying providers and services, and optimizing business continuity strategies.
Find out how UniCredit Leasing, an international financial corporation, delivers seamless services to their worldwide user base with Applications Manager.
ISP Connectivity Webinar: No Longer a Black BoxThousandEyes
Your Internet Service Providers are critical to keeping your data centers and offices connected. Yet you may not have much insight into the performance of ISP links outside your network. ThousandEyes maps network topologies across ISP networks, measures performance of data center ingress and egress, and captures BGP routing changes across all relevant prefixes.
In this webinar, we’ll share how to:
*Get visibility into ISP environments in just minutes
*Associate path and route changes to app and network performance
*Share data on specific problem interfaces and links with your ISPs
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...ThousandEyes
The network is a key component in application delivery and is often a direct or indirect target of security attacks
such as DDoS and BGP hijacking. Mitigation strategies often involve using a third party cloud service without any
visibility into whether the mitigation is working well. Using real life examples, we will show how one can measure
the user perceived impact of an ongoing attack, as well as identify which aspects of the mitigation are not working
as desired. With this detailed availability and performance data at the various layers, financial firms can learn how
to better manage ongoing attacks.
This document provides an introduction and overview of ThousandEyes. It begins with an introduction of ThousandEyes and what it is, followed by an agenda for the presentation which includes an introduction, demo, and Q&A section. It then provides background on ThousandEyes including its locations, founding year, customer base, and features. The remainder of the document demonstrates how ThousandEyes provides internet and cloud visibility for enterprises, highlights common enterprise problems it can help with, shows its monitoring capabilities and use cases. It also includes demos on supporting remote workforces and digital experience monitoring before concluding with customer case studies and Cisco integration information.
Deceptive Speed: How to Fix Fast, Unstable Wi-FiNETSCOUT
View the on-demand webinar here: http://www.netscout.link/60048mlcI
What's worse than bad Wi-Fi? Bad Wi-Fi that tests like good Wi-Fi. Join NETSCOUT and Ben Miller for this webinar, Deceptive Speed: How to Fix Fast, Unstable Wi-Fi, and learn simple tools and methods for diagnosing and resolving real world Wi-Fi performance issues.
Ben Miller is a wireless specialist based out of Los Angeles, CA. Ben offers training services for professional training centers and organizations looking to design, manage and support wireless networks. Mr. Miller also offers surveying services to organizations in need of wireless network optimization.
Endpoint Agent Part 1: End User ExperienceThousandEyes
Endpoint Agent monitors end user experience from employee laptops and desktops to understand web performance and Internet connectivity of any browser-based service.
Virtual meetings require only a computer, mobile device, internet connection and Adobe Flash player. Hardware needs are minimal, requiring only a webcam and headphones. Sufficient bandwidth is dependent on number of participants and data transmitted, but a medium quality meeting between three users would require around 128kbps upload and 256kbps download speeds per participant. The client must have access to ports 80, 82, 443 and 1935 and disabling video may help if bandwidth is insufficient.
Reverse Path Visibility with Agent-to-Agent TestsThousandEyes
This document discusses reverse path visibility using agent-to-agent tests in ThousandEyes. It describes how agent-to-agent tests provide bidirectional path visibility across internal and external networks to accurately monitor the forward and reverse paths. This gives more precise diagnostic data to isolate network faults. It also explains how enabling NAT traversal allows agent-to-agent tests to work across NAT devices without requiring inbound port forwarding rules.
Network monitoring tools provide several key benefits: they help stay ahead of issues reported by users to achieve service level agreements; provide constant monitoring of network performance; identify current network loads to optimize resources; automate repeated troubleshooting tasks; and store historical data to analyze trends and make strategic decisions. ManageEngine OpManager offers features like network and server monitoring, traffic analysis, configuration management, fault management, and workflow automation.
This document provides information about network latency, packet loss, and jitter. It defines these terms and discusses their causes and effects. It also provides tips on diagnosing and addressing issues, including performing ping and traceroute tests, using network monitoring tools, and optimizing hardware, software, bandwidth and network configuration. The overall goal is to help readers understand these network performance issues and how to improve latency, packet handling, and the end user experience.
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...Savvius, Inc
With over 10 years of deployment history, VoIP is the primary voice solution for just about every company in existence - large, medium, or small. But even with all that history, recent research from TRAC shows that VoIP is still the number one IT initiative impacting network performance. And with the growth of 802.11 and Wi-Fi enabled smart phones, the use of voice over Wi-Fi (VoFi) promises to increase the volume of VoIP traffic even more. Analyzing VoIP traffic alone is not enough. VoIP analysis must be part of your overall network performance analysis. After all, VoIP is just another data type on your network, and according to TRAC, it is impacting your network performance, so you must monitor and analyze the network as a whole, including voice and video over IP. Join us to see how easy it is to capture and analyze voice, video, and data traffic simultaneously, allowing you to pinpoint the impact of each data type on your overall network performance.
Metrics & Challenges for Testing Streaming Applications in 2019Sarah Elson
Streaming rich media has become an integral part of our daily lives. From watching tutorials on YouTube, Udemy etc. to playing RPGs(Role-Playing Games) on the internet, a major percentage of internet traffic nowadays spends their data on browsing through audio and video contents. With the data speed increasing day by day, media streaming has become the primary way of spreading information to the crowd.
A Comprehensive Guide to Videoconferencing and Media in ICTMatthew Wolff
The document describes an IT consulting firm designing video conferencing suites for Rock-ICT to enable communication between their Lahore and Dubai offices. It discusses the hardware requirements for the suites, including large monitors, webcams, microphones, and a broadband or satellite connection. The software requirements for video conferencing are also outlined, such as conferencing software to compress and transmit audio and video in real-time. Alternative communication methods like VOIP and instant messaging are also discussed and compared to video conferencing.
This document summarizes key aspects of WebRTC including its core architecture, applications, positives/negatives, security considerations, signaling to connect peers, using STUN/TURN servers, and the data channel. Some key points:
- WebRTC allows for real-time communications like video chat directly in the browser without plugins.
- It uses JavaScript APIs to access the user's camera and microphone, peer-to-peer data connections, and session establishment.
- Applications include video conferencing, telemedicine, gaming, and content delivery networks.
- Positives are no plugins needed, encryption of media, and peer-to-peer connectivity. Negatives include lack of support on some browsers and
The document discusses common network problems such as high bandwidth usage slowing download speeds, high CPU usage degrading network performance, and physical connectivity issues with defective cables. It provides examples of specific causes for each type of problem like video streaming consuming bandwidth, large applications increasing CPU usage, and damaged fiber optic cables reducing data transfer speeds. The document also covers other frequent network issues involving malfunctioning devices, DNS errors preventing access to websites, and wireless interference weakening WiFi signals.
АННА ТИМОФІЄВА & СЕРГІЙ МАЛИНОВСЬКИЙ «Tools and Tips of video connection test...QADay
Kyiv Quality Assurance Day 2019
АННА ТИМОФІЄВА & СЕРГІЙ МАЛИНОВСЬКИЙ
«Tools and Tips of video connection testing»
Телеграм канал: wwww.t.me/goqameetup
Фейсбук сторінці: www.fb.com/goqaevent
Сайт: www.kyiv.qaday.org
Bright talk voip vofi webinar jan2015-v2Savvius, Inc
With over 10 years of deployment history, VoIP is the primary voice solution for just about every company in existence - large, medium, or small. But even with all that history, recent research from TRAC shows that VoIP is still the number one IT initiative impacting network performance. And with the growth of 802.11 and Wi-Fi enabled smart phones, the use of voice over Wi-Fi (VoFi) promises to increase the volume of VoIP traffic even more.
Analyzing VoIP traffic alone is not enough. VoIP analysis must be part of your overall network performance analysis. After all, VoIP is just another data type on your network, and according to TRAC, it is impacting your network performance, so you must monitor and analyze the network as a whole, including voice and video over IP. Watch to see how easy it is to capture and analyze voice, video, and data traffic simultaneously, allowing you to pinpoint the impact of each data type on your overall network performance.
The document discusses video streaming, including definitions and concepts. It covers topics such as the difference between streaming and downloading, common streaming categories like live and on-demand, protocols used for streaming like RTSP and RTP, and the development process for creating streaming video including content planning, capturing, editing, encoding, and integrating with servers.
This document discusses the potential for streaming video technology within corporations to improve communication with customers and employees. It outlines several challenges with streaming video, such as varying bandwidth limitations and network quality issues. It provides examples of bandwidth requirements for different video resolutions and frame rates. Overall, the document argues that while current streaming video technology has limitations, it is viable for applications like training, demonstrations and video conferencing within companies to help connect employees and customers.
Stop Stalling: Video Delivery Best PracticesDoug Sillars
The document discusses optimizing video delivery to prevent buffering and improve the user experience. It notes that video startup delays, failures, and stalling can negatively impact user engagement. It recommends choosing appropriate video bitrates based on estimated network conditions to balance fast loading and video quality. Precaching video segments and avoiding large jumps in bitrate when switching streams can help prevent stalling. Understanding network characteristics and adapting video formats based on device and connection type is important for optimizing content delivery.
This document provides a best practice guide for identifying and addressing general slow throughput issues. It covers key areas to examine such as local hardware, contention, MTU, packet loss, latency, and threading. Recommendations are provided for hardware checks, MTU testing, identifying contention issues, and examining errors and threading. A checklist is also included to methodically work through potential causes of slow throughput.
The document discusses best practices for optimizing video delivery and streaming on websites. It notes that video files are large and growing, and can negatively impact page load times and user data plans. Some key recommendations include resizing videos appropriately for different screens to reduce file sizes, avoiding downloading video files that won't be displayed, stripping audio from silent videos, using video streaming with adaptive bitrates to optimize for network conditions, and auditing third party video hosts for performance. The overall message is to respect mobile users' data plans when delivering video on websites.
This document provides best practices for optimizing video delivery and streaming on the web. It notes that video files are large and growing, and that 19% of videos are identical on desktop and mobile despite different screen sizes. Key recommendations include resizing videos appropriately for devices, stripping audio from silent videos, avoiding preloading videos that won't be visible, and using streaming with adaptive bitrates to optimize for network conditions and faster start times. The document emphasizes respecting mobile users' data plans.
Android Power Optimization: May the Power be with youPrajyot Mainkar
This document discusses various techniques to optimize mobile apps for battery performance. It suggests reducing unnecessary background activities, deferring tasks until the phone is charging, batching network requests, limiting location updates and syncing, adjusting for connection type and charge level, and using tools like Battery Historian to monitor battery usage and identify areas for improvement. The overall message is that optimizing for battery life requires understanding how power is consumed and making strategic tradeoffs between features, performance and energy efficiency.
Watch the full OnDemand Webcast: http://bit.ly/tuneupnetwork
It’s time to make good on that new year’s resolution. Admit it, in a moment of weakness as the clock hit midnight you resolved to dig in and tune up your corporate network in the new year. Well, the new year is already passing quickly by, so if you haven’t yet made good on that resolution, here is your chance. In these slides from our web seminar, we return to the basics – overall network evaluation, baseline measurements and comparisons, typical yet troublesome network issues, sharing bandwidth in the presence of time-sensitive applications, security, and overall network monitoring and reporting, just to name a few. We focus on practical issues and practical methods for improving the overall health of your network.
In these slides, we will cover:
- Critical elements to consider when evaluating your network
- Common pitfalls and how to avoid them
- Developing and using network baselines
- Optimizing network usage in the presence of competing applications and protocols
- Monitoring and reporting on your well-tuned network
What you will learn:
1. How and where to find the data you need
2. How to automate network monitoring and analysis to ensure the success of your tune up
3. How to quickly diagnose problems when things go wrong
This document discusses using webcasting to share live events online. It begins by defining webcasting as a live audio or video stream viewable in a browser. It then addresses common myths and realities, including that webcasting generates shareable video content immediately rather than just live streaming. Key aspects are choosing adequate broadcasting equipment and a service like Ustream, having sufficient bandwidth, and preparing and practicing the webcast. Lessons from experience emphasize the importance of lighting, audio quality over video quality, and publishing content immediately after an event. The document concludes by outlining future directions for mobile webcasting and leveraging recorded content.
This document contains slides about multimedia networking. It discusses various types of multimedia applications like stored streaming, live streaming, and interactive real-time applications. It describes protocols used for multimedia like RTP, RTCP, and RTSP. Application-level techniques for multimedia over best-effort networks are also covered, such as client-side buffering and using UDP. Finally, it provides an example of setting up an interactive Internet phone call using these protocols.
Bart Salaets – is Solutions Architect in F5 Networks specifically focusing on service providers in the EMEA region. Prior to this, he has held IP consulting and technical leadership positions in Juniper Networks, Redback Networks and Alcatel-Lucent, giving him more than 15 years of experience in both fixed and mobile broadband IP network design. Bart Salaets was born and still lives in Belgium and holds a Masters degree in Electrical Engineering from the Catholic University of Leuven, Belgium and an MBA from Flanders Business School in Antwerp, Belgium.
Topic of Presentation: Optimising TCP in today’s changing network environment
Language: English
Abstract: The need to juggle performance across wired, wireless and wi-fi networks is a challenge as each of these paths has very different characteristics when it comes to TCP. Tuning the TCP stack to be optimized for the varying degrees of packet loss, latency and congestion on the different connection types is a challenge. This session will cover tuning several aspects of your network and the underlying TCP stack to deliver an optimized application experience for all users. Topics will include:
Choosing the correct Congestion Control algorithm
Optimizing TCP with techniques like TCP buffering and adjusting TCP window sizes
Rate-based pacing to help multiple request/responses over a single connection
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsRosie Wells
Insight: In a landscape where traditional narrative structures are giving way to fragmented and non-linear forms of storytelling, there lies immense potential for creativity and exploration.
'Collapsing Narratives: Exploring Non-Linearity' is a micro report from Rosie Wells.
Rosie Wells is an Arts & Cultural Strategist uniquely positioned at the intersection of grassroots and mainstream storytelling.
Their work is focused on developing meaningful and lasting connections that can drive social change.
Please download this presentation to enjoy the hyperlinks!
This presentation by OECD, OECD Secretariat, was made during the discussion “Competition and Regulation in Professions and Occupations” held at the 77th meeting of the OECD Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found at oe.cd/crps.
This presentation was uploaded with the author’s consent.
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij
This is a workshop about communication and collaboration. We will experience how we can analyze the reasons for resistance to change (exercise 1) and practice how to improve our conversation style and be more in control and effective in the way we communicate (exercise 2).
This session will use Dave Gray’s Empathy Mapping, Argyris’ Ladder of Inference and The Four Rs from Agile Conversations (Squirrel and Fredrick).
Abstract:
Let’s talk about powerful conversations! We all know how to lead a constructive conversation, right? Then why is it so difficult to have those conversations with people at work, especially those in powerful positions that show resistance to change?
Learning to control and direct conversations takes understanding and practice.
We can combine our innate empathy with our analytical skills to gain a deeper understanding of complex situations at work. Join this session to learn how to prepare for difficult conversations and how to improve our agile conversations in order to be more influential without power. We will use Dave Gray’s Empathy Mapping, Argyris’ Ladder of Inference and The Four Rs from Agile Conversations (Squirrel and Fredrick).
In the session you will experience how preparing and reflecting on your conversation can help you be more influential at work. You will learn how to communicate more effectively with the people needed to achieve positive change. You will leave with a self-revised version of a difficult conversation and a practical model to use when you get back to work.
Come learn more on how to become a real influencer!
This presentation by OECD, OECD Secretariat, was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
This presentation by Yong Lim, Professor of Economic Law at Seoul National University School of Law, was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
This presentation by Professor Alex Robson, Deputy Chair of Australia’s Productivity Commission, was made during the discussion “Competition and Regulation in Professions and Occupations” held at the 77th meeting of the OECD Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found at oe.cd/crps.
This presentation was uploaded with the author’s consent.
XP 2024 presentation: A New Look to Leadershipsamililja
Presentation slides from XP2024 conference, Bolzano IT. The slides describe a new view to leadership and combines it with anthro-complexity (aka cynefin).
This presentation by Juraj Čorba, Chair of OECD Working Party on Artificial Intelligence Governance (AIGO), was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
This presentation by Thibault Schrepel, Associate Professor of Law at Vrije Universiteit Amsterdam University, was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...SkillCertProExams
• For a full set of 760+ questions. Go to
https://skillcertpro.com/product/databricks-certified-data-engineer-associate-exam-questions/
• SkillCertPro offers detailed explanations to each question which helps to understand the concepts better.
• It is recommended to score above 85% in SkillCertPro exams before attempting a real exam.
• SkillCertPro updates exam questions every 2 weeks.
• You will get life time access and life time free updates
• SkillCertPro assures 100% pass guarantee in first attempt.
This presentation by OECD, OECD Secretariat, was made during the discussion “Pro-competitive Industrial Policy” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/pcip.
This presentation was uploaded with the author’s consent.
2. 600 customers – 242 employees (35% R&D):
6
11
18
31
43
50
5
7
13
12
7
15
2010 2011 2012 2013 2014 2015
Existing New
Customer Growth
TIER-1 SERVICE PROVIDERS
15+
YEARS OF SOFTWARE
DEVELOPMENT IN
NETWORKS & APPLICATION
AWARENESS
Corporate Snapshot:
Private company with the backing of
Francisco Partners – a $10B+ portfolio
HQ
R&D R&D
TAC
TAC
Confidential: Not for distribution without written consent of Procera Networks.
9. FCC Network Neutrality
“With respect to network performance, we adopt the following enhancements:
The existing transparency rule requires disclosure of actual network performance.
In adopting that requirement, the Commission mentioned speed and latency as two key
measures. Today we include packet loss as a necessary part of the network
performance disclosure.
We expect that disclosures to consumers of actual network performance data should be
reasonably related to the performance the consumer would likely experience in the
geographic area in which the consumer is purchasing service.
We also expect that network performance will be measured in terms of average
performance over a reasonable period of time and during times of peak usage.”
Source: page 73-74 of FCC-15-24A1, Emphasis Added
15. Throughput/Bandwidth/Speed
Application Type Throughput Needs
Web Needs short bursts of download performance
Video Sustained throughput delivers good quality
Social Media Needs short bursts of download/upload performance
Gaming Most games do not require high bandwidth
Upload Sustained bursts of upload performance
Download Sustained bursts of download performance
Voice Low throughput requirements
Very dependent on the sampling frequency!
16. Latency
Application Type Throughput Needs
Web High latency leads to slow page load times
Video Not usually a concern except for initial loading of video
Social Media High latency can slow interactive sharing experience
Gaming High latency leads to lag in real-time games
Upload N/A
Download N/A
Voice High latency leads to poor voice experience
17. Packet Loss
Application Type Throughput Needs
Web Packet Loss can lead to slow page load times.
Video Less sensitive to loss unless it affects throughput
Social Media Packet Loss can slow interactive sharing experience
Gaming Packet Loss leads to lag in real-time games
Upload N/A
Download N/A
Voice Some loss can be tolerated, high loss leads to perceived latency
18. Different collection approaches…
Active Probes
— Can affect the actual performance of network, especially during peak hours
Sampling
— Does not provide consistent data for entire footprint
All subscriber traffic, all the time
— Meets regulator guidance:
• Actual customer experience
• In the actual geographic area
• During Peak Usage
20. Putting it All Together
Application Type Throughput Latency Loss
Web
Needs short bursts of
download performance
High latency leads to slow
page load times
Packet Loss can lead to slow
page load times.
Video
Sustained throughput delivers
good quality
Not usually a concern except
for initial loading of video
Less sensitive to loss unless it
affects throughput
Social Media
Needs short bursts of
download/upload performance
High latency can slow
interactive sharing experience
Packet Loss can slow
interactive sharing experience
Gaming
Most games do not require
high bandwidth
High latency leads to lag in
real-time games
Packet Loss leads to lag in
real-time games
Upload
Sustained bursts of upload
performance
N/A N/A
Download
Sustained bursts of download
performance
N/A N/A
Voice Low throughput requirements
High latency leads to poor
voice experience
Some loss can be tolerated,
high loss leads to perceived
latency
21. “Graded” Quality Performance
Score Subjective Experience
A Awesome experience
B Almost perfect, but some slight impairments noticed
C Good experience but noticeable impairments
D Usable with frustrating impairments
E Really poor
F Unusable
31. In summary – 3 use-cases
• Reporting to regulators on network performance
with actual subscriber metrics
• Marketing to subscribers
— Targeted service offerings “Good for Gaming!”
— High Value SLA-based offerings
— Scoring Service Plans by performance
• “An A for Video”
— Promoting network capabilities
• Improving the network where deficiencies occur
or
vs
Hello, I’m Thomas Vasen, Subscriber Experience Evangelist at Procera. Today I will be bringing you reasoning on how operators should change how they measure the quality their network is capable of delivering in order to fight back the OTT players’ Scorecards. And I’ll bring you’re a case study how this was done successfully.
In a full customer life-cycle, from finding a good deal, setting up the service towards actually using it, the incidental Support case and the monthly billing cycle – your Usage of the service has the most frequent and lasting interactions. This is why Operators should make sure they can deliver a good quality of service on their network that customers expect.
With the Shift from Voice to DATA it also changes how often we “experience” the services. The Always-On lifestyle we have now is putting more stress on operators to be on their toes. Uptime is important! Availability / Accessibility is KEY!
And if they don’t track this OTT Applications will. Who has seen this before? Netflix launched their own quality indicator for subscribers so they can see what quality they can expect.
But this provides a very narrow view, does not take subscription types in to account and does not provide any actionable data points for the operator to improve their service upon.
If you think that Netflix’s scorecard has little reach...
Consider that many OTT services are building similar report cards.
Here is one from YouTube, you can conveniently compare the video quality per operator in your area.
And the old-timer Speedtest.net - they keep track of your customers' active testing.
The problem with this is that users typically do their test twice: once they get the service – test for the first time – and when they have problems.
The speeds published here are not an accurate representation of the services you provide!
OTT Providers are Winning the Public Relations WAR on Performance
BUT, speed is not an accurate representation of Quality – there are many more factors to consider.
The FCC puts it clearly in their latest net neutrality regulation. This approach is copied everywhere.
- The Commission mentioned speed and latency as two key measures. Today we include packet loss as a necessary part of the network performance disclosure --> 3 kay parameters
- Also should be reasonably related to the performance the consumer would likely experience in the geographic area --> location specific
- performance over a reasonable period of time and during times of peak usage. --> peak hour
In most industries Consumers have a choice in selecting the quality they want.
In the Airline industry you can buy Economy, Business or First class tickets. When choosing a Hotel you can select exactly how many star-ratings you want, and restaurants are grouped and rated by their type of food and quality. You can choose Fast Food or pick Michelin Stars.
But for fixed and mobile broadband there only seems to be Speed and Volume. Once coverage is taken out of the equation: that's It.
Not a very clear way to differentiate, and not very easy to understand for the subscribers.
Subscribers think in OTT Applications. But each application has very different requirements on the networks to deliver a good quality of experience. And the impact of the network quality can be huge.
Instead Operators should understand the quality they can deliver and categorize it by applications commonly used by subscribers. For instance these 7 easy to understand categories:
Web Surfing
Streaming Video
Social Media
Real-Time Gaming
Uploads
Downloads
and Voice Applications
Now let's have a look at how to do that.
To do that you don’t have to dive deep. You just need to make sure you measure everything. Measure these 3 key parameters of all traffic flows, and map the results to the categories.
READ SLIDE
BUT it's very dependent on the sampling frequency!
- 5-minute and 15-minute samples are averages
--> Not very effective at detecting individual user level
- 60-sec usage analysis with 1 second level granualrity tells much different story
Peaks and valleys emerge at the individual user level, but many sessions will be missed.
- Sampling sub-1sec is the answer.
250ms is a good balance between averaging bursts and capturing realized throughput
Throughput overall is a good thing but it doesn’t tell a complete picture
READ SLIDE
READ SLIDE
There are generally 3 ways to collect data
Active Proves - effects performance, especially during peak. Only provides view from probe’s location.
Passive Sampling – Provides only a partial view, lacks consistency
All Traffic, All Subscriber, All the time
Makes data actionable and meets regulator’s guidance on requirements to Secure the Actual experience, During Peak Usage.
Measuring All Traffic, All the Time Enables an Operators to create their own ScoreCard
Putting them all together
And on different levels and combinations of resutlts measured you can now assign a grade. This makes is very easy to understand for consumers.
Operators can now present their ScoreCard in a simple to understand format scaling from A to F.
A "C" in Web Surfing likely means that there are some issues with packet loss.
Social Media and especially Real-Time Gaming are very latency sensitive, and their scores are adjusted to the network’s capabilities accordingly.
Let's have a look at a case study. This is from a fixed operator who wishes to stay anonymous. They where listed #10 on on the Netflix index.
The data is typically captured in the core network, or close to the edges towards the interconnect points. This means very few measurement location are needed, while the solution is still able to separate traffic per access network through the use of reference data and source addressing schemes.
Because an Overall Score for the network is great information, but still not actionable.
The operator therefore groups the scores measured by many different perspectives, such as by Device, Location or Topology (such as RAN location, Wifi Access point or DSLAM) and Subscriber-Tier.
This enables the operators to identify where problems occur, or what customer groups are impacted and act upon them.
On the overall ScoreCard level degradations start to emerge during peak hour. The operator does not think their network is full, but yet Web browsing, Video and Gaming are impacted.
Faulty load balancing
This helped but is not enough to climb the Netflix ladder. Subscriber's perspective is needed
Upsell strategies can be implemented
Operator Tortoise.com has move up the scale and is providing a better service to those customers who care about it.
In summary - 3 use-cases for an operator ScoreCard
Reporting to regulators on network performance with actual subscriber metrics
Marketing to subscribers
Targeted service offerings “Good for Gaming!”
High Value SLA-based offerings
Scoring Service Plans by performance
“An A for Video”
Promoting network capabilities
Improving the network where deficiencies occur.
A new perception of what Quality for a Mobile or Fixed Broadband service is is needed.