SIP has changed since the publication of RFC 3261 in 2002 - ten years ago. One important addition to the SIP family of protocols is ICE. ICE assists in media setup over complicated networks, like NAT and with dual stack IPv4 and IPv6 interfaces.
This presentation is part of Edvina's SIP 2012 project, to help customers write better specifications when purchasing SIP solutions. Read more on http://edvina.net/sip2012
A short presentation by Olle E. Johansson and Saul Ibarra Corretge for the 4K Conference in Buenos Aires Nov 24 2011. The presentation introduces new SIP standards and a vision about future SIP communication beyond the PBX and the PSTN-model phone.
13. The Transition to IPv6 and the Necessity for IP Address Management - Frey...Digicomp Academy AG
IP Address Management (IPAM) is necessary for transitioning to IPv6. Before an organization begins planning for IPv6, it is important to know the current IPv4 inventory. During this session we will discuss and demonstrate how an effective IPAM tool can document and discover an organization's IP and name space, plan and model IPv6 address space and reduce the complexity with documenting dual stacked hosts.
This manual will show you how to prepare an effective IPv6 addressing plan. In making that plan, you will need to make a number of important choices. Please think carefully about these choices to ensure that the addressing plan will meet the requirements of your organisation. The manual will provide suggestions to help you to make the right choices.
Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf...gogo6
gogo6 IPv6 Video Series. Event, presentation and speaker details below:
EVENT
gogoNET LIVE! 3: Enterprise wide Migration. http://gogonetlive.com
November 12 – 14, 2012 at San Jose State University, California
Agenda: http://gogonetlive.com/4105/gogonetlive3-agenda.asp
PRESENTATION
Deploying IPv6 in Cisco's Labs
Presentation video: http://www.gogo6.com/video/deploying-ipv6-in-cisco-s-labs-by-robert-beckett-at-gogonet-live
Interview video: http://www.gogo6.com/video/interview-with-robert-beckett-at-gogonet-live-3-ipv6-conference
SPEAKER
Robert Beckett - Services Technical Leader, Cisco Systems
Bio/Profile: http://www.gogo6.com/profile/RobertBeckett
MORE
Learn more about IPv6 on the gogoNET social network
http://www.gogo6.com
Get free IPv6 connectivity with Freenet6
http://www.gogo6.com/Freenet6
Subscribe to the gogo6 IPv6 Channel on YouTube
http://www.youtube.com/subscription_center?add_user=gogo6videos
Follow gogo6 on Twitter
http://twitter.com/gogo6inc
Like gogo6 on Facebook
http://www.facebook.com/pages/IPv6-products-community-and-services-gogo6/161626696777
A short presentation by Olle E. Johansson and Saul Ibarra Corretge for the 4K Conference in Buenos Aires Nov 24 2011. The presentation introduces new SIP standards and a vision about future SIP communication beyond the PBX and the PSTN-model phone.
13. The Transition to IPv6 and the Necessity for IP Address Management - Frey...Digicomp Academy AG
IP Address Management (IPAM) is necessary for transitioning to IPv6. Before an organization begins planning for IPv6, it is important to know the current IPv4 inventory. During this session we will discuss and demonstrate how an effective IPAM tool can document and discover an organization's IP and name space, plan and model IPv6 address space and reduce the complexity with documenting dual stacked hosts.
This manual will show you how to prepare an effective IPv6 addressing plan. In making that plan, you will need to make a number of important choices. Please think carefully about these choices to ensure that the addressing plan will meet the requirements of your organisation. The manual will provide suggestions to help you to make the right choices.
Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf...gogo6
gogo6 IPv6 Video Series. Event, presentation and speaker details below:
EVENT
gogoNET LIVE! 3: Enterprise wide Migration. http://gogonetlive.com
November 12 – 14, 2012 at San Jose State University, California
Agenda: http://gogonetlive.com/4105/gogonetlive3-agenda.asp
PRESENTATION
Deploying IPv6 in Cisco's Labs
Presentation video: http://www.gogo6.com/video/deploying-ipv6-in-cisco-s-labs-by-robert-beckett-at-gogonet-live
Interview video: http://www.gogo6.com/video/interview-with-robert-beckett-at-gogonet-live-3-ipv6-conference
SPEAKER
Robert Beckett - Services Technical Leader, Cisco Systems
Bio/Profile: http://www.gogo6.com/profile/RobertBeckett
MORE
Learn more about IPv6 on the gogoNET social network
http://www.gogo6.com
Get free IPv6 connectivity with Freenet6
http://www.gogo6.com/Freenet6
Subscribe to the gogo6 IPv6 Channel on YouTube
http://www.youtube.com/subscription_center?add_user=gogo6videos
Follow gogo6 on Twitter
http://twitter.com/gogo6inc
Like gogo6 on Facebook
http://www.facebook.com/pages/IPv6-products-community-and-services-gogo6/161626696777
AnyFirewall Engine is a software toolkit, based on STUN, TURN, and ICE, which enables guaranteed firewall and NAT traversal for fixed and mobile applications over any fixed or mobile network, through any NAT or firewall, and to any device.
AnyFirewall Engine is the world’s most widely deployed NAT and firewall traversal toolkit, having been deployed to more than 20 million subscribers by licensees including Comcast, Digital Lifeboat, Intel, Maxis, Nokia, Nokia Siemens Networks, Polycom, BlackBerry, Smartvue, and more.
AnyFirewall Engine can be deployed with AnyFirewall Server and AnyFirewall Gateway for an end-to-end firewall and NAT traversal solution, or can be combined with third-party, standards-based products.
Introduction to WebRTC used in the Stockholm WebRTC Meetup February 16th 2017. Talks about the underlying architecture - RTP, Turn, STUN, Ice and the world of changing IP networks
Can IPv6 and SIP really work together well? At the SIP Network Operators Conference (SIPNOC) on April 24, 2013, Dan York moderated a panel on this specific question and gave an update on IPv6 deployment and interaction with VoIP.
With World IPv6 Launch happening June 6, 2012, production IPv6 network connectivity will be available to many more businesses and individuals. Major web sites and content providers will all enable IPv6 access to their content. Consumer electronics manufacturers are committing to providing IPv6-enabled devices.
What does this mean for SIP-based real-time communications? How well does SIP work with IPv6 today? What are the challenges to deployment and what steps can be taken to overcome those challenges? What should operators and vendors consider with regard to SIP and IPv6? What software, devices and tools are available to assist? And what case studies and other information is available?
In this session at SIPNOC 2012 on June 26, 2012, in Herndon, Virginia, Dan York discussed all of these points and provided concrete suggestions for moving forward with SIP and IPv6.
Sip Fundamentals and Prospects Tutorial - VoiceCon Orlando 2010Voxeo Corp
At VoiceCon Orlando 2010, Voxeo's Dan York taught a 3-hour tutorial about the Session Initiation Protocol (SIP) that was attended by over 200 people. The session explained the basics of SIP, walked through the message flow, discussed SIMPLE, SIP trunking and explored issues with distributed systems and federation.
http://blogs.voxeo.com/events/voicecon/
Please note that the slides were developed from a set of slides originally created by David Bryan of http://www.ethernot.org/ (used with his permission).
Presentación de Tech Invite del los ejemplos SIP del capítulo 4 (overview of operation), detalladas en el capítulo 24 de RFC 3261 –
SIP: Session Initiation Protocol.
Presented by: Muhammad Yeasir Arafat
ElastixWorld 2013
Today, the session initiation protocol (SIP) is the predominant protocol for IP Telephony Signalling. The intention of this paper is to present an overview of IP Telephony security issues - both current and future – focusing on SIP. We start by presenting some fundamental differences between IP Telephony and the public switched telephone network (PSTN). We then look at specific problems for SIP signalling that arise from these differences. We summarize current activities regarding SIP security, including recent developments in the research community and standardization efforts within the IETF. Finally, the paper gives an outlook on the security issues of IP Telephony.
Download paper at: http://elx.ec/ssiipt
The presentation is a compiled assembly from the SIP RFC' s, and original works of Alan Johnston and Henry Sinnreich . It contains Sip Detailed , Call flows , Architecture descriptions , SIP services , sip security , sip programming.
Inspired by my work on understanding the effects of the EU cyber resilience act, I made this presentation on vulnerability handling - SBOM, Vex, CVE, CVSS, CWE and more.
AnyFirewall Engine is a software toolkit, based on STUN, TURN, and ICE, which enables guaranteed firewall and NAT traversal for fixed and mobile applications over any fixed or mobile network, through any NAT or firewall, and to any device.
AnyFirewall Engine is the world’s most widely deployed NAT and firewall traversal toolkit, having been deployed to more than 20 million subscribers by licensees including Comcast, Digital Lifeboat, Intel, Maxis, Nokia, Nokia Siemens Networks, Polycom, BlackBerry, Smartvue, and more.
AnyFirewall Engine can be deployed with AnyFirewall Server and AnyFirewall Gateway for an end-to-end firewall and NAT traversal solution, or can be combined with third-party, standards-based products.
Introduction to WebRTC used in the Stockholm WebRTC Meetup February 16th 2017. Talks about the underlying architecture - RTP, Turn, STUN, Ice and the world of changing IP networks
Can IPv6 and SIP really work together well? At the SIP Network Operators Conference (SIPNOC) on April 24, 2013, Dan York moderated a panel on this specific question and gave an update on IPv6 deployment and interaction with VoIP.
With World IPv6 Launch happening June 6, 2012, production IPv6 network connectivity will be available to many more businesses and individuals. Major web sites and content providers will all enable IPv6 access to their content. Consumer electronics manufacturers are committing to providing IPv6-enabled devices.
What does this mean for SIP-based real-time communications? How well does SIP work with IPv6 today? What are the challenges to deployment and what steps can be taken to overcome those challenges? What should operators and vendors consider with regard to SIP and IPv6? What software, devices and tools are available to assist? And what case studies and other information is available?
In this session at SIPNOC 2012 on June 26, 2012, in Herndon, Virginia, Dan York discussed all of these points and provided concrete suggestions for moving forward with SIP and IPv6.
Sip Fundamentals and Prospects Tutorial - VoiceCon Orlando 2010Voxeo Corp
At VoiceCon Orlando 2010, Voxeo's Dan York taught a 3-hour tutorial about the Session Initiation Protocol (SIP) that was attended by over 200 people. The session explained the basics of SIP, walked through the message flow, discussed SIMPLE, SIP trunking and explored issues with distributed systems and federation.
http://blogs.voxeo.com/events/voicecon/
Please note that the slides were developed from a set of slides originally created by David Bryan of http://www.ethernot.org/ (used with his permission).
Presentación de Tech Invite del los ejemplos SIP del capítulo 4 (overview of operation), detalladas en el capítulo 24 de RFC 3261 –
SIP: Session Initiation Protocol.
Presented by: Muhammad Yeasir Arafat
ElastixWorld 2013
Today, the session initiation protocol (SIP) is the predominant protocol for IP Telephony Signalling. The intention of this paper is to present an overview of IP Telephony security issues - both current and future – focusing on SIP. We start by presenting some fundamental differences between IP Telephony and the public switched telephone network (PSTN). We then look at specific problems for SIP signalling that arise from these differences. We summarize current activities regarding SIP security, including recent developments in the research community and standardization efforts within the IETF. Finally, the paper gives an outlook on the security issues of IP Telephony.
Download paper at: http://elx.ec/ssiipt
The presentation is a compiled assembly from the SIP RFC' s, and original works of Alan Johnston and Henry Sinnreich . It contains Sip Detailed , Call flows , Architecture descriptions , SIP services , sip security , sip programming.
Inspired by my work on understanding the effects of the EU cyber resilience act, I made this presentation on vulnerability handling - SBOM, Vex, CVE, CVSS, CWE and more.
Introduction to the proposed EU cyber resilience act (CRA)Olle E Johansson
A short introduction to the proposed EU Cyber Resilience Act. It's a large document to parse, so please don't take my words as a truth, just indications of what will come. The CRA will impact everyone that distributes software and connected devices on the EU market, so it's important to stay up to date with this regulation.
Januscon 2019: Slides from my short talk about the need for a federation solution to connect all isolated WebRTC and SIP islands out there. Sorry for the lack of text, hopefully it will be available in a streamed version soon.
Photos (C) Olle E. Johansson
A talk about me discovering new architectures, new ways of building scalable realtime platforms #SIP #WebRTC #Kamailio #MQTT #NODERED
Watch it live at https://www.youtube.com/watch?v=BbfUXUWtxIg
A presentation for Kamailio World 2017 in Berlin: How Open Standards and Open Source affect national public radio broadcast. My personal view and opinions. Also, some information about Project IrisBroadcast.
Realtime communication over a dual stack networkOlle E Johansson
Fosdem 2017: A short talk about dual stack (IPv4 and IPv6) issues when using SIP, WebRTC, XMPP and other realtime platforms in a dual stack world - where both client and server is connecting to the new and the old Internet.
Side note: Uploads to slide share doesn't work on IPv6-only networks.
My talk at Voip2day 2016 in Madrid (organised by Avanzada 7 in Malaga).
This talks cover recent trends in realtime communication, from VoIP to WebRTC and Internet of Things
A presentation covering work that needs to happen. We jokingly came up with a non-existing organisation that maintains a reference profile for SIP. While the organisation is just a joke, the work is quite serious.
A presentation about new functionality in SIP that is really needed for Hosted PBX services, SIP on mobile phones and more situations. #SIP #Kamailio #Asterisk #TLS #MoreCrypto
A video with this presentation is available on YouTube at
https://www.youtube.com/watch?v=uqFNlqB_Ssw
2015 update: SIP and IPv6 issues - staying Happy in SIPOlle E Johansson
What's the state of SIP and IPv6?
- An update I gave at the Netnod spring Meeting 2015.
Nothing much is happening, despite the fact that we have proven real issues with dual stacks in SIP.
A quick introduction to Kamailio - the leading Open Source SIP server (based on OpenSER and SER). Kamailio is quite different than Asterisk, FreeSwitch and many other VoIP platforms - why is that and how do you start getting your head around Kamailio?
SIP and DNS - federation, failover, load balancing and moreOlle E Johansson
SIP use DNS to find a server for a specific URI, like sip:alice@example.com. With DNS a SIP service can provide failover, load balancing and much more. SIP without DNS is a broken solution. SIP and DNS rocks!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.