Review of the TADHack (www.tadhack.com) developer resources available from Oracle and its partners Optare and Alerant. Presented as part of a webinar, details are here: http://blog.tadhack.com/2014/05/05/oracle-webinar/
Given by Doug Tait, Oracle; Mátyás Őrhidi Alerant, Yuste Optare, and myself.
1. ONAP was evolving from a "SOA-like" architecture to a "pure microservices" architecture. MSB provided transparent service registration and communication for ONAP microservices.
2. Istio is an open source service mesh that provides reliability, security, observability and manageability for microservices. It introduces a centralized control plane to manage distributed sidecars.
3. Integrating Istio with ONAP would provide benefits like distributed tracing, metrics visibility and service graph for ONAP microservices. It is important to address challenges in supporting multiple network interfaces and coarse-grained services.
This document provides an overview of the standards and technologies that underpin WebRTC. It describes how WebRTC allows real-time voice, video, and data sharing directly in the browser without plugins. Key points covered include:
- WebRTC is based on standards from the IETF and W3C for signaling, media protocols (like STUN, ICE, DTLS, SRTP), and JavaScript APIs.
- These standards address the challenges of peer-to-peer real-time communication over varied network environments like home networks and cellular data networks.
- WebRTC uses HTTP/HTTPS for signaling and peer-to-peer protocols for media to traverse NATs and firewalls. TURN servers are used
The document discusses Oracle's converged application services and programmable networks. It describes how applications can be always on, sharing, aware and up to date. It outlines the benefits of personalized services, controlled access and expanding service offerings through programmable networks. Oracle Communications Services Gatekeeper allows for API exposure, access control and policy management to enable this programmable network. WebRTC and Telco APIs are proposed as technologies to power new communication services in this converged environment.
PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg PROIDEA
The document discusses using software defined networking (SDN) and open application programming interfaces (APIs) to automate network operations. It provides examples of using IFTTT-style conditional statements to trigger network actions like prioritizing Skype calls or redirecting vulnerable devices. The SDN controller OpenDaylight is examined, along with its northbound and southbound APIs. Service abstraction layers like MD-SAL and AD-SAL are compared for interfacing with network elements and applications. Case studies demonstrate provisioning MPLS networks on-demand and using SDN for Skype call quality of service.
Optare Solutions Network Applications BU Brochureantonry
Carriers concurrently need to re-evaluate their current service delivery strategy when streamlining their systems. Horizontal next-generation service delivery platforms (NG SDPs) are becoming a strategic focus in these scenarios.
Our specialization on Service Gatekeeper (OCSG) and Converged Application Server (OCCAS) from Oracle Communications SDPs suite, give us the ability to offer solutions :
Network and Service exposure
OSS/BSS gateways
Payment Gateways: Personalized Billing and Charging solutions
Third-party Abstraction
Service creation and execution environments
Partner Management
Thanks to our Architects and Consultants we offer services of specific training, consulting and Professional Services, and turn-key project for SDPs deployment and integration.
The document discusses upcoming features in Java EE 8 including enhancements to support HTML5, JSON processing, model-view-controller (MVC) architecture, and HTTP/2. Key areas of focus are improved JSON binding and processing APIs, support for server-sent events, an action-based MVC specification, and integration of HTTP/2 features in technologies like Servlet. The presentation also covers goals of easing development and enabling Java EE applications to better run in the cloud.
1. ONAP was evolving from a "SOA-like" architecture to a "pure microservices" architecture. MSB provided transparent service registration and communication for ONAP microservices.
2. Istio is an open source service mesh that provides reliability, security, observability and manageability for microservices. It introduces a centralized control plane to manage distributed sidecars.
3. Integrating Istio with ONAP would provide benefits like distributed tracing, metrics visibility and service graph for ONAP microservices. It is important to address challenges in supporting multiple network interfaces and coarse-grained services.
This document provides an overview of the standards and technologies that underpin WebRTC. It describes how WebRTC allows real-time voice, video, and data sharing directly in the browser without plugins. Key points covered include:
- WebRTC is based on standards from the IETF and W3C for signaling, media protocols (like STUN, ICE, DTLS, SRTP), and JavaScript APIs.
- These standards address the challenges of peer-to-peer real-time communication over varied network environments like home networks and cellular data networks.
- WebRTC uses HTTP/HTTPS for signaling and peer-to-peer protocols for media to traverse NATs and firewalls. TURN servers are used
The document discusses Oracle's converged application services and programmable networks. It describes how applications can be always on, sharing, aware and up to date. It outlines the benefits of personalized services, controlled access and expanding service offerings through programmable networks. Oracle Communications Services Gatekeeper allows for API exposure, access control and policy management to enable this programmable network. WebRTC and Telco APIs are proposed as technologies to power new communication services in this converged environment.
PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg PROIDEA
The document discusses using software defined networking (SDN) and open application programming interfaces (APIs) to automate network operations. It provides examples of using IFTTT-style conditional statements to trigger network actions like prioritizing Skype calls or redirecting vulnerable devices. The SDN controller OpenDaylight is examined, along with its northbound and southbound APIs. Service abstraction layers like MD-SAL and AD-SAL are compared for interfacing with network elements and applications. Case studies demonstrate provisioning MPLS networks on-demand and using SDN for Skype call quality of service.
Optare Solutions Network Applications BU Brochureantonry
Carriers concurrently need to re-evaluate their current service delivery strategy when streamlining their systems. Horizontal next-generation service delivery platforms (NG SDPs) are becoming a strategic focus in these scenarios.
Our specialization on Service Gatekeeper (OCSG) and Converged Application Server (OCCAS) from Oracle Communications SDPs suite, give us the ability to offer solutions :
Network and Service exposure
OSS/BSS gateways
Payment Gateways: Personalized Billing and Charging solutions
Third-party Abstraction
Service creation and execution environments
Partner Management
Thanks to our Architects and Consultants we offer services of specific training, consulting and Professional Services, and turn-key project for SDPs deployment and integration.
The document discusses upcoming features in Java EE 8 including enhancements to support HTML5, JSON processing, model-view-controller (MVC) architecture, and HTTP/2. Key areas of focus are improved JSON binding and processing APIs, support for server-sent events, an action-based MVC specification, and integration of HTTP/2 features in technologies like Servlet. The presentation also covers goals of easing development and enabling Java EE applications to better run in the cloud.
The document provides an overview of client-server technology, networking concepts like sockets and remote procedure calls, XML, web services, SOAP, and RESTful architectures. It defines key terms like web services, SOAP, WSDL, UDDI, and REST. It describes how SOAP uses XML to define an envelope and headers to package messages and how REST relies on lightweight HTTP to perform CRUD operations on resources identified by URIs.
Explore Advanced CA Release Automation Configuration TopicsCA Technologies
In this session, we will cover configuring SSL/TLS communications within your environment, integrating with Microsoft Active Directory® via LDAP/LDAPS and review the usage of user roles and permissions. We will also cover how to manage deployments using REST, complex architects, security, communications, scalability and troubleshooting.
For more information, please visit http://cainc.to/Nv2VOe
Service Mesh @Lara Camp Myanmar - 02 Sep,2023Hello Cloud
Sai Linnthu is a founding partner at HelloCloud.io and discusses service meshes and Istio. Istio provides a framework-agnostic approach for managing communication policies and observability across cloud-native microservices. While Istio addresses many challenges of microservices, its complexity makes it difficult to use and manage across multiple clouds without additional capabilities like centralized metrics, access logging and lifecycle management.
Join us to explore the Wave Platform, including APIs, data loading, packaging, and licensing. We will discuss using Wave with Force.com, including Visualforce, Lightning, Apex, REST, and more.
The document discusses the evolution of microservices architectures over time as techniques for handling issues like failures and timeouts were developed. It describes how early approaches involved adding timeouts and circuit breakers to code. Later, approaches involved sharing state between services and client-side service discovery. Today, sidecars and service meshes have moved reliability patterns lower in the stack, standardizing protocols and allowing services to abstract away operational concerns. However, meshes also introduce new tradeoffs around portability and development cycles.
Telecoms Service Assurance & Service Fulfillment with Neo4j Graph DatabaseNeo4j
This document discusses how graph databases can help with telecom network management. It presents a sample telecom network data model with nodes for customers, services, equipment, and connections linked by relationships. Graph databases are well-suited because they can efficiently query the complex relationships in telecom network topology data. The document describes how graph queries can help with tasks like capacity planning, path finding, service impact analysis, and alarm correlation that are important for telecom network assurance and service fulfillment.
Get a tour of some of RingCentral’s most advanced integrations: What do they do? Who built them? How are they architected and what APIs do they call upon? We answer these questions to inspire developers about the possibilities of a unified communication platform, and to offer insight on how they were built so that customers might begin to understand how they might go about building solutions themselves.
Cisco Automation with Puppet and onePK - PuppetConf 2013Puppet
"Cisco Automation with Puppet and onePK" by Jason Pfeifer Technical Marketing Engineer, Cisco.
Presentation Overview: This session will provide an overview of the cisco developed puppet functionality for management and configuration of Cisco devices.
Speaker Bio: Jason is a Cisco Technical Marketing Engineer focusing on programmability and automation of Cisco network devices. He is currently supporting, discussing, evangelizing, and writing applications against Cisco's onePK SDK. He also has a long term love affair with Cisco's Embedded Event Manager.
The document discusses the use of event-driven architecture (EDA) across several industries. It provides examples of how EDA is used in digital manufacturing, financial services, gaming/gambling, retail, and government. Some common technical problems addressed by EDA include large connection counts, processing data streams, ensuring zero message loss, and meeting latency requirements. The document also provides a brief quiz asking what EDA is.
This document provides an overview of Oracle Stream Analytics capabilities for processing fast streaming data. It discusses deployment approaches on Oracle Cloud, hybrid cloud, and on-premises. It also covers event processing techniques like pattern detection, time windows, and continuous querying enabled by Oracle Stream Analytics. Specific use cases for retail and healthcare are also presented.
This curriculum vitae summarizes Ajaya Raghava Karimbalappu's experience working for 9+ years in IT projects involving application development and support. He has experience with Oracle PL/SQL, Java, JavaScript, and shell scripting and has worked on telecom OSS/BSS projects using products like AXIOM and Singl.eView. His most recent roles involve programming analysis for projects involving order fulfillment systems.
Shedding Light on LINE Token Economy You Won't Find in Our White PaperLINE Corporation
Toshimasa Nasu
LINE / Blockchain Lab
While the LINE Token Economy concept and white paper was published in late August 2018, technical details and future architectural plans were not. This session focuses on key topics surrounding LINE's blockchain technology, including LINE's decision to expand services utilizing blockchain technology, reasons behind LINE to develop/launch its own blockchain platform, current issues and how LINE is working to solve them, LINE Token Economy infrastructure for creating blocks, and architecture for Smart Contracts execution platform.
Bring Service Mesh To Cloud Native-appsThang Chung
The presentation shows out what is Service Mesh, how is it work, and important concepts what is cloud-native apps. The event organized at Hanoi Oct 2018.
Jan Lindblad's presentation at Layer123 SDN and OpenFlow World Congress in Bad Homburg, Germany. Focusing on a multi-vendor SDN deployment at a Tier 1 Service Provider in Asia.
Tail-f Network Control System (NCS) use case:
• Dynamic control of L3-L7 devices using service- oriented network API
• Service chaining using OpenFlow
• Virtualized appliances
Modern application architectures are embracing public clouds, microservices, and container schedulers like Kubernetes and Nomad. These bring complex service-to-service communication patterns, increased scale, dynamic IP addresses, ephemeral infrastructure, and higher failure rates. These changes require a new approach for service discovery, configuration, and segmentation. Service discovery enables services to find and communicate with each other. Service configuration allows us to dynamically configure applications at runtime. Service segmentations lets us secure our microservices architectures by limiting access. In this talk, we cover these challenges and how to solve them with Consul providing as a service mesh.
Workshop web rtc customers and use casesDouglas Tait
The document discusses various use cases for WebRTC including web conferencing, contact centers, IMS, unified communications, and vertical industries. It provides examples of how WebRTC is being used in Google Hangouts for web collaboration, advanced contact centers to improve customer experiences, and by Amazon for their Mayday customer support. The document also reviews how WebRTC can connect to the public switched telephone network through IMS and enable rich communication services on the web for mobile service providers.
Oop2008 RESTful services with GWT and Apache CXFAdrian Trenaman
This document discusses building and consuming RESTful JSON services with Apache CXF and Google Web Toolkit (GWT). It provides an overview of GWT and how it can be used to build AJAX clients. It then discusses how Apache CXF can be used to build RESTful servers to provide JSON and XML services that GWT clients can consume. The document demonstrates examples of building simple "hello world" services and document-oriented RESTful services with CXF that return JSON payloads. It also discusses conventions for building RESTful services and configuring CXF endpoints to return JSON rather than XML payloads.
The Next Generation of Microservices — YOW 2017 BrisbanePhil Calçado
The document discusses the evolution of microservices architectures over time as techniques were developed to address challenges introduced by highly distributed systems. Early approaches involved implementing circuit breakers, timeouts, and sharing state across services to handle failures. Later, service discovery and client-side load balancing were introduced. Today, sidecars and service meshes move reliability patterns lower in the stack and provide stability, security, and other features to services through a common platform. However, these abstractions also introduce new tradeoffs around opacity, development cycles, and homogeneity.
A Practical Deep Dive into Observability of Streaming Applications with Kosta...HostedbyConfluent
This document provides an overview of observability of streaming applications using Kafka. It discusses the three pillars of observability - logging, metrics, and tracing. It describes how to expose Kafka client-side metrics using interceptors, metric reporters, and the Spring Boot framework. It demonstrates calculating consumer lag from broker and client-side metrics. It introduces OpenTelemetry for collecting telemetry data across applications and exporting to various backends. Finally, it wraps up with lessons on monitoring consumer lag trends and selecting the right metrics to ship.
Managing microservices with Istio Service MeshRafik HARABI
Developing and managing hundreds (or maybe thousands) of microservices at scale is a challenge for both development and operations teams.
We have seen over the last years the appearance of new frameworks dedicated to deliver ‘Cloud Native’ applications by providing a set of (out of box) building blocks. Most of these frameworks integrate microservices concerns at the code level.
Recently, we have seen the emerging of a new pattern known as sidecar or proxy promoting to push all these common concerns outside of the business code and provides them on the edge by integrate a new layer to the underlying platform called Service Mesh.
Istio is one of the leading Service Mesh implementing sidecar pattern.
We will go during the presentation throw the core concepts behind Istio, the capabilities that provides to manage, secure and observe microservices and how it gives a new breath for both developers and operations.
The presentation will be guided by a sequence of demo exposing Istio capabilities.
TADSummit 2022 8/9 Nov Aveiro Portugal
Welcome to vCon! The next leap forward in the programmable communications industry.
Thomas Howe, CTO STROLID
Slides and Video
Why do we need vCon?
What is vCon?
How is it being used today?
Where is vCon going?
Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...Alan Quayle
TADSummit 2022 8/9 Nov Aveiro Portugal
Supercharging CPaaS Growth & Margins with Identity and Authentication
Aditya Khurjekar, GM Prove Protocol
Mobile networks were designed for communication, yet commerce is driving most of the demand for mobile connectivity today
The growth segments in today’s digital economy benefit from CPaaS APIs for Identity verification, authentication, proofs & claims
Commerce-enabling CPaaS APIs rely on the intrinsic security of mobile network and devices
Deterministic (rather than probabilistic) authentication drastically reduces fraud, hence increases margins
The secure element in mobile devices has been under-utilized by carriers
FIDO standard presents a horizontal application opportunity for hardware based (deterministic) authentication
Authenticated ID verification is key to secure yet seamless digital onboarding, leading to financial inclusion & consumer protection
The needs of the new crypto-based (web3) economy can also be satisfied with smart CPaaS offerings that preserve anonymity/pseudonymity
The imminent ubiquity of eSIMs is timely to fight fraud in the increasingly sophisticated digital & crypto-enabled economy
It’s time for a purpose-built global payments network!
The document provides an overview of client-server technology, networking concepts like sockets and remote procedure calls, XML, web services, SOAP, and RESTful architectures. It defines key terms like web services, SOAP, WSDL, UDDI, and REST. It describes how SOAP uses XML to define an envelope and headers to package messages and how REST relies on lightweight HTTP to perform CRUD operations on resources identified by URIs.
Explore Advanced CA Release Automation Configuration TopicsCA Technologies
In this session, we will cover configuring SSL/TLS communications within your environment, integrating with Microsoft Active Directory® via LDAP/LDAPS and review the usage of user roles and permissions. We will also cover how to manage deployments using REST, complex architects, security, communications, scalability and troubleshooting.
For more information, please visit http://cainc.to/Nv2VOe
Service Mesh @Lara Camp Myanmar - 02 Sep,2023Hello Cloud
Sai Linnthu is a founding partner at HelloCloud.io and discusses service meshes and Istio. Istio provides a framework-agnostic approach for managing communication policies and observability across cloud-native microservices. While Istio addresses many challenges of microservices, its complexity makes it difficult to use and manage across multiple clouds without additional capabilities like centralized metrics, access logging and lifecycle management.
Join us to explore the Wave Platform, including APIs, data loading, packaging, and licensing. We will discuss using Wave with Force.com, including Visualforce, Lightning, Apex, REST, and more.
The document discusses the evolution of microservices architectures over time as techniques for handling issues like failures and timeouts were developed. It describes how early approaches involved adding timeouts and circuit breakers to code. Later, approaches involved sharing state between services and client-side service discovery. Today, sidecars and service meshes have moved reliability patterns lower in the stack, standardizing protocols and allowing services to abstract away operational concerns. However, meshes also introduce new tradeoffs around portability and development cycles.
Telecoms Service Assurance & Service Fulfillment with Neo4j Graph DatabaseNeo4j
This document discusses how graph databases can help with telecom network management. It presents a sample telecom network data model with nodes for customers, services, equipment, and connections linked by relationships. Graph databases are well-suited because they can efficiently query the complex relationships in telecom network topology data. The document describes how graph queries can help with tasks like capacity planning, path finding, service impact analysis, and alarm correlation that are important for telecom network assurance and service fulfillment.
Get a tour of some of RingCentral’s most advanced integrations: What do they do? Who built them? How are they architected and what APIs do they call upon? We answer these questions to inspire developers about the possibilities of a unified communication platform, and to offer insight on how they were built so that customers might begin to understand how they might go about building solutions themselves.
Cisco Automation with Puppet and onePK - PuppetConf 2013Puppet
"Cisco Automation with Puppet and onePK" by Jason Pfeifer Technical Marketing Engineer, Cisco.
Presentation Overview: This session will provide an overview of the cisco developed puppet functionality for management and configuration of Cisco devices.
Speaker Bio: Jason is a Cisco Technical Marketing Engineer focusing on programmability and automation of Cisco network devices. He is currently supporting, discussing, evangelizing, and writing applications against Cisco's onePK SDK. He also has a long term love affair with Cisco's Embedded Event Manager.
The document discusses the use of event-driven architecture (EDA) across several industries. It provides examples of how EDA is used in digital manufacturing, financial services, gaming/gambling, retail, and government. Some common technical problems addressed by EDA include large connection counts, processing data streams, ensuring zero message loss, and meeting latency requirements. The document also provides a brief quiz asking what EDA is.
This document provides an overview of Oracle Stream Analytics capabilities for processing fast streaming data. It discusses deployment approaches on Oracle Cloud, hybrid cloud, and on-premises. It also covers event processing techniques like pattern detection, time windows, and continuous querying enabled by Oracle Stream Analytics. Specific use cases for retail and healthcare are also presented.
This curriculum vitae summarizes Ajaya Raghava Karimbalappu's experience working for 9+ years in IT projects involving application development and support. He has experience with Oracle PL/SQL, Java, JavaScript, and shell scripting and has worked on telecom OSS/BSS projects using products like AXIOM and Singl.eView. His most recent roles involve programming analysis for projects involving order fulfillment systems.
Shedding Light on LINE Token Economy You Won't Find in Our White PaperLINE Corporation
Toshimasa Nasu
LINE / Blockchain Lab
While the LINE Token Economy concept and white paper was published in late August 2018, technical details and future architectural plans were not. This session focuses on key topics surrounding LINE's blockchain technology, including LINE's decision to expand services utilizing blockchain technology, reasons behind LINE to develop/launch its own blockchain platform, current issues and how LINE is working to solve them, LINE Token Economy infrastructure for creating blocks, and architecture for Smart Contracts execution platform.
Bring Service Mesh To Cloud Native-appsThang Chung
The presentation shows out what is Service Mesh, how is it work, and important concepts what is cloud-native apps. The event organized at Hanoi Oct 2018.
Jan Lindblad's presentation at Layer123 SDN and OpenFlow World Congress in Bad Homburg, Germany. Focusing on a multi-vendor SDN deployment at a Tier 1 Service Provider in Asia.
Tail-f Network Control System (NCS) use case:
• Dynamic control of L3-L7 devices using service- oriented network API
• Service chaining using OpenFlow
• Virtualized appliances
Modern application architectures are embracing public clouds, microservices, and container schedulers like Kubernetes and Nomad. These bring complex service-to-service communication patterns, increased scale, dynamic IP addresses, ephemeral infrastructure, and higher failure rates. These changes require a new approach for service discovery, configuration, and segmentation. Service discovery enables services to find and communicate with each other. Service configuration allows us to dynamically configure applications at runtime. Service segmentations lets us secure our microservices architectures by limiting access. In this talk, we cover these challenges and how to solve them with Consul providing as a service mesh.
Workshop web rtc customers and use casesDouglas Tait
The document discusses various use cases for WebRTC including web conferencing, contact centers, IMS, unified communications, and vertical industries. It provides examples of how WebRTC is being used in Google Hangouts for web collaboration, advanced contact centers to improve customer experiences, and by Amazon for their Mayday customer support. The document also reviews how WebRTC can connect to the public switched telephone network through IMS and enable rich communication services on the web for mobile service providers.
Oop2008 RESTful services with GWT and Apache CXFAdrian Trenaman
This document discusses building and consuming RESTful JSON services with Apache CXF and Google Web Toolkit (GWT). It provides an overview of GWT and how it can be used to build AJAX clients. It then discusses how Apache CXF can be used to build RESTful servers to provide JSON and XML services that GWT clients can consume. The document demonstrates examples of building simple "hello world" services and document-oriented RESTful services with CXF that return JSON payloads. It also discusses conventions for building RESTful services and configuring CXF endpoints to return JSON rather than XML payloads.
The Next Generation of Microservices — YOW 2017 BrisbanePhil Calçado
The document discusses the evolution of microservices architectures over time as techniques were developed to address challenges introduced by highly distributed systems. Early approaches involved implementing circuit breakers, timeouts, and sharing state across services to handle failures. Later, service discovery and client-side load balancing were introduced. Today, sidecars and service meshes move reliability patterns lower in the stack and provide stability, security, and other features to services through a common platform. However, these abstractions also introduce new tradeoffs around opacity, development cycles, and homogeneity.
A Practical Deep Dive into Observability of Streaming Applications with Kosta...HostedbyConfluent
This document provides an overview of observability of streaming applications using Kafka. It discusses the three pillars of observability - logging, metrics, and tracing. It describes how to expose Kafka client-side metrics using interceptors, metric reporters, and the Spring Boot framework. It demonstrates calculating consumer lag from broker and client-side metrics. It introduces OpenTelemetry for collecting telemetry data across applications and exporting to various backends. Finally, it wraps up with lessons on monitoring consumer lag trends and selecting the right metrics to ship.
Managing microservices with Istio Service MeshRafik HARABI
Developing and managing hundreds (or maybe thousands) of microservices at scale is a challenge for both development and operations teams.
We have seen over the last years the appearance of new frameworks dedicated to deliver ‘Cloud Native’ applications by providing a set of (out of box) building blocks. Most of these frameworks integrate microservices concerns at the code level.
Recently, we have seen the emerging of a new pattern known as sidecar or proxy promoting to push all these common concerns outside of the business code and provides them on the edge by integrate a new layer to the underlying platform called Service Mesh.
Istio is one of the leading Service Mesh implementing sidecar pattern.
We will go during the presentation throw the core concepts behind Istio, the capabilities that provides to manage, secure and observe microservices and how it gives a new breath for both developers and operations.
The presentation will be guided by a sequence of demo exposing Istio capabilities.
Similar to TADHack Oracle Alerant Optare Webinar (20)
TADSummit 2022 8/9 Nov Aveiro Portugal
Welcome to vCon! The next leap forward in the programmable communications industry.
Thomas Howe, CTO STROLID
Slides and Video
Why do we need vCon?
What is vCon?
How is it being used today?
Where is vCon going?
Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...Alan Quayle
TADSummit 2022 8/9 Nov Aveiro Portugal
Supercharging CPaaS Growth & Margins with Identity and Authentication
Aditya Khurjekar, GM Prove Protocol
Mobile networks were designed for communication, yet commerce is driving most of the demand for mobile connectivity today
The growth segments in today’s digital economy benefit from CPaaS APIs for Identity verification, authentication, proofs & claims
Commerce-enabling CPaaS APIs rely on the intrinsic security of mobile network and devices
Deterministic (rather than probabilistic) authentication drastically reduces fraud, hence increases margins
The secure element in mobile devices has been under-utilized by carriers
FIDO standard presents a horizontal application opportunity for hardware based (deterministic) authentication
Authenticated ID verification is key to secure yet seamless digital onboarding, leading to financial inclusion & consumer protection
The needs of the new crypto-based (web3) economy can also be satisfied with smart CPaaS offerings that preserve anonymity/pseudonymity
The imminent ubiquity of eSIMs is timely to fight fraud in the increasingly sophisticated digital & crypto-enabled economy
It’s time for a purpose-built global payments network!
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...Alan Quayle
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-second production broadcasts
Jerod Venema, CEO and Co-Founder, LiveSwitch
In the throes of the pandemic, the WWE debuted its ThunderDome, a world-first, large-scale installation of high resolution LED screens that transformed empty seats into live-streamed fans who joined over video from around the world. Performers in the ring and TV audiences at home could see and hear these virtual fans in real-time. LiveSwitch was selected to develop and manage the ThunderDome’s cloud video infrastructure.
How to enable low-latency, live video streamed via the internet capable of fostering real-time engagement between performers and audiences on a massive scale.
Massive-scale latency challenges and how to overcome them.
Current and future uses of programmable communications for live fan engagement.
What makes a cellular IoT API great? Tobias GoebelAlan Quayle
What makes a cellular IoT API great?
Tobias Goebel, Principal Product Marketing Manager, IoT, Twilio
Why IoT SIMs need an API in the first place
The core functions needed in a cellular IoT API: SIM activation and deactivation, SIM status queries, Network access configuration, Pulling billing information and usage records, Troubleshooting, Device reachability
What matters in a good API (any API)
10 tips and tricks for how to find a good IoT SIM with a strong API
eSIM as Root of Trust for IoT security, João CasalAlan Quayle
This document discusses the role of eSIM in new IoT security services. It begins by providing background on eSIM and SIM technology. It then outlines several ways eSIM can enhance IoT security, including:
1) Enabling zero-touch authentication of IoT devices in third-party services by leveraging the proven authentication of SIMs in cellular networks.
2) Hardening data encryption using the eSIM as a root of trust by generating encryption keys within the secure element of the eSIM.
3) Potential future roles like integrating the eSIM with threat detection to trigger authorization actions, and increasing the robustness of remote attestation through eSIM cryptographic abilities.
The document argues
Architecting your WebRTC application for scalability, Arin SimeAlan Quayle
This document discusses how to architect WebRTC applications for scalability. It begins by outlining some of the challenges in building scalable WebRTC apps. It then presents 4 approaches to building apps: 1) To the WebRTC standard, 2) Unbundled WebRTC, 3) Using open-source media servers, and 4) Using communications platform as a service (CPaaS). Each approach has tradeoffs around cost, difficulty, and features included. The document also discusses using selectice forwarding units or multipoint control units to scale apps and considers architectures using orchestration and containers. It concludes with recommendations around optimizations, load testing, and future technologies.
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...Alan Quayle
TADSummit 2022 8/9 Nov Aveiro Portugal
CPaaS Conversational Platforms and Conversational Customer Service – The Experience Gap”?
Ben Waymark, Chief Technology Officer, Webio.
CPaaS players are doing the low hanging, simple conversations via their conversational design and plug in’s to the messenger layer, but what are they really hoping to achieve, and should they be aimed at the developer community?
No-code low-code configurable conversational customer support have done really well by integrating with customer ticketing, and integrating other platforms into their workflows. Kustomer.com was bought for a billion, something is going right there.
Conversational experiences are becoming part of the digital customer experience. What does this look like and why might this be important for other companies to understand?
Programmable Testing for Programmable Telcos, Andreas GranigAlan Quayle
Programmable Testing for Programmable Telcos
Andreas Granig, Founder & CEO at Sipfront
Advantages and Challenges of automating real-time communication testing
How real-time communication testing could actually be quite pleasant
Creative ways to use typical server-side applications like kamailio and rtpengine as test clients
The revival of sipp, and how you create test scenarios 20 years after its invention
“Just show me the curl command”
How to best maximize the conversation data stream for your business? Surbhi R...Alan Quayle
TADSummit 2022 8/9 Nov Aveiro Portugal
How to best maximize the conversation data stream for your business?
Surbhi Rathore, CEO & Co-Founder, Symbl.ai
How do we go from building a scalable pipeline of conversation data that merges and correlates with other types of data in the business and helps us makes decisions and predictions that are informed by conversations?
We will talk about context, real-time aspects of understanding and how you can use this data combined with sales, marketing, HR, support and other existing analytics to understand behavior and adapt to what works best in each of these functions.
We will go deep into specific use case and customer stories that have adopted Symbl’s conversation understanding platform to drive this change in their organization and give concrete examples of where to start.
Latest Updates and Experiences in Launching Local Language Tools, Karel BourgoisAlan Quayle
TADSummit 2022, 8/9 Nov Aveiro Portugal
Latest Updates and Experiences in Launching Local Language Tools
Karel Bourgois, Founder Voxist, President Le Voice Lab, Exec Director Slatch, Chapter Pilot France AI Hub
Experiences with launching our own speech-to-text (French and English, both HD and Telephony audio, real-time and asynchronous).
‘Implicit Knowledge Management’ solution: using our STT engine we are indexing and searching thousands of hours of video to find those that discuss specific topics or identify people that are experts on those topics.
Latest updates on Voxist and its evolution to a “callbot.”
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...Alan Quayle
This document discusses unlawful robocalls and solutions for CPaaS providers. It outlines that STIR/SHAKEN helps with some caller ID spoofing but not all, and leased phone numbers present challenges. It recommends CPaaS providers monitor customer usage of provided phone numbers and investigate customers' phone number reputations. The document introduces YouMail Score and Watch solutions that help identify unlawful calls and monitor phone number behaviors to improve call screening. It emphasizes that content-based call screening provides a virtually zero false positive rate compared to event-based screening alone.
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...Alan Quayle
Master the Audience Experience Multiverse: AX Best Practices and Success Stories
Ken Herron, Chief Growth Officer, UIB
Customers need you to help them solve their #1 problem – Audience Experience (AX).
Customers struggle with managing their differentiated brand journeys at scale in a post-pandemic world where their external and internal audiences decide the platforms, channels, and languages.
This session will share AX best practices and success stories from Europe, the Middle East, Asia, and the US for how enterprise and small business customers can control their respective brands, journeys, and audiences with a single brand voice –
Create/Control a differentiated AX
Respond in real-time
Mirror channels
Curate audiences
Secure conversational data
Monetize engagement
Scale monitoring
This session will include a live, interactive demo.
Open Source Telecom Software Survey 2022, Alan QuayleAlan Quayle
The survey gathered responses from 120 participants in 2022 compared to 114 in 2021. It covered general topics such as DDoS attacks, security practices, STIR/SHAKEN implementation, IPv6 deployment, and expectations for major tech companies over the next two years. Key findings included that around half of participants have experienced a DDoS attack in 2022 and application-level attacks were as common as volumetric attacks. Most organizations take both reactive and proactive security approaches but more so reactive. STIR/SHAKEN implementation is ongoing with international carriers needing it to terminate traffic in North America. IPv6 deployment remains steady with no major differences between regions. This survey provides insights into trends in the open source tele
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei IancuAlan Quayle
TADSummit 2022, 8/9 Nov Aveiro Portugal
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems.
Bogdan-Andrei Iancu, Founder and Developer at OpenSIPS Project
SIP also supports instant messaging and presence.
Review of Messaging in IMS
Review of Messaging in Unified Communications
OpenSIPS 3.3 in the messaging ecosystem
Review of implementation using Message Session Relay Protocol (RFC 4975, RFC 4976), groups multiple messages in sessions.
Conclusions: OpenSIPS 3.3 targets to implement various components of the overall SIP Instant MESSAGING ecosystem, from gateways and transport to services.
TADS 2022 - Shifting from Voice to Workflow Management, Filipe LeitaoAlan Quayle
TADSummit 2022, 8/9 Nov Aveiro Portugal
Shifting from Voice to Workflow Management
Filipe Leitão, Global Service Provider Channel SE, RingCentral
There is an ongoing consolidation of the Cloud Communications market where mainstream providers compete against each other for the same spaces, UCaaS / CCaaS / CPaaS.
Weapons of choice are the same for everyone: instant messaging, and audio & video conferencing. Most capabilities provided by mainstream UC providers are table stakes.
Find out how RingCentral is looking at UC from more than just a siloed perspective by going one step further and co-innovating with Service and Technology Providers to become a workflow management platform.
What happened since we last met TADSummit 2022, Alan QuayleAlan Quayle
TADSummit 2022, 8/9 Nov Aveiro Portugal
What happened since we last met? Where is the Programmable Comms market going?
Alan Quayle, independent
3 years in Programmable Communications: 2020, 2021, and 2022 all done in 16 slides
Pandemic Consolidation
Post-pandemic Reckoning – I did predict what we’re seeing with Avaya
The Coming of Cost Competition
Messaging, will A2P SMS growth ever stop?
What’s the recession going to do to us?
The Voice AI Reckoning
After all the consolidation, where next? Twilio’s heading there – it’s about the data
And a few more predictions that are usually too optimistic
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike BromwichAlan Quayle
TADSummit 2022, 8/9 Nov Aveiro Portugal
Time to ditch the ‘dumb-pipe’ – reinventing the core mobile network, to put developers first.
Mike Bromwich, CEO / Co-Founder Stacuity & Tim Dowling, Co-Founder Stacuity
The emergence of public cloud has revolutionized the way developers can muster and deploy virtual infrastructures, as and when required.
In contrast, mobile networks are still rigidly defined and protected by operators, who are unable or unwilling to offer such control and flexibility.
As a result, the mobile network operates as little more than a dumb-pipe (unless you have lots of patience and deep pockets).
Addressing this problem requires a different approach, not just the creation of a thin façade over legacy network elements.
How Stacuity is reinventing the core mobile network, to put developers first.
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...Alan Quayle
This document discusses AWA Network, a company that operates a CPaaS proxy providing APIs for SMS delivery. It outlines AWA's features, including anonymous resources, traffic simulation, provider management, pricing, routing, and SMS sending APIs. The document also presents three business models for AWA Network: 1) operating as a managed CPaaS proxy service, 2) allowing users to proxy their own CPaaS providers, and 3) enabling corporations to use AWA's infrastructure. It reflects on the challenges of scaling and finding a viable business and operations model.
Founding a Startup in Telecoms. The good, the bad and the ugly. João CamarateAlan Quayle
TADSummit 2022 8/9 Nov Aveiro Portugal
Founding a Startup in Telecoms. The good, the bad and the ugly.
João Camarate, CTO at Broadvoice & GoContact.
A deep dive into the challenges and opportunities of starting a new venture in the telecom space while leveraging open-source
How to bring down your own RTC platform. Sandro GauciAlan Quayle
Sandro Gauci provides a walkthrough for performing distributed denial of service (DDoS) simulations on real-time communication (RTC) platforms to test security. He recommends starting with simple bandwidth saturation or protocol attacks before moving to specific application attacks. Tools are needed to distribute attacks from nodes, monitor systems, and shut down attacks. Findings should be analyzed with engineers through root cause analysis and documented. Solutions may include updates, rate limiting, or code changes. Regular testing ensures a more robust RTC platform.
From Natural Language to Structured Solr Queries using LLMsSease
This talk draws on experimentation to enable AI applications with Solr. One important use case is to use AI for better accessibility and discoverability of the data: while User eXperience techniques, lexical search improvements, and data harmonization can take organizations to a good level of accessibility, a structural (or “cognitive” gap) remains between the data user needs and the data producer constraints.
That is where AI – and most importantly, Natural Language Processing and Large Language Model techniques – could make a difference. This natural language, conversational engine could facilitate access and usage of the data leveraging the semantics of any data source.
The objective of the presentation is to propose a technical approach and a way forward to achieve this goal.
The key concept is to enable users to express their search queries in natural language, which the LLM then enriches, interprets, and translates into structured queries based on the Solr index’s metadata.
This approach leverages the LLM’s ability to understand the nuances of natural language and the structure of documents within Apache Solr.
The LLM acts as an intermediary agent, offering a transparent experience to users automatically and potentially uncovering relevant documents that conventional search methods might overlook. The presentation will include the results of this experimental work, lessons learned, best practices, and the scope of future work that should improve the approach and make it production-ready.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
"NATO Hackathon Winner: AI-Powered Drug Search", Taras KlobaFwdays
This is a session that details how PostgreSQL's features and Azure AI Services can be effectively used to significantly enhance the search functionality in any application.
In this session, we'll share insights on how we used PostgreSQL to facilitate precise searches across multiple fields in our mobile application. The techniques include using LIKE and ILIKE operators and integrating a trigram-based search to handle potential misspellings, thereby increasing the search accuracy.
We'll also discuss how the azure_ai extension on PostgreSQL databases in Azure and Azure AI Services were utilized to create vectors from user input, a feature beneficial when users wish to find specific items based on text prompts. While our application's case study involves a drug search, the techniques and principles shared in this session can be adapted to improve search functionality in a wide range of applications. Join us to learn how PostgreSQL and Azure AI can be harnessed to enhance your application's search capability.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
9. - WebRTC Session Control and API Management
SignalingMedia
Network
Signaling
Engine
Media
Engine
WebRTC Client Applications
Subscriber Data
Analytics
Partners
Long-Tail
“garage
developers”
Call Control
Charging & Billing
Qo
S
Messaging
Internal
Web
Assets
CSP
Assets
API Exposure
34. • Optare
Solu,ons
was
founded
to
provide
technical
consul;ng
on
new
complex
services
fulfillment
for
a
Spanish
startup
Telco
in
2002.
As
we
helped
them
to
support
a
ten-‐fold
business
growth
in
less
than
5
years,
we
also
grown
and
gain
exper;se
along
with
them.
• During
these
years
other
Telecom
companies
have
required
our
services,
and
we
con;nue
helping
them
to
grow,
increase
their
efficiency,
and
become
a
“Lean
operator”.
• More
than
12
years
working
this
way,
exclusively
for
the
Telecoms
Industry,
haven’t
but
made
us
even
more
“Natural
Born
Telco”
34
35. Optare Solu,ons NAPPS
ü We
work
together
with
our
Clients
to
improve
the
return
of
their
network
investment
by
crea;ng
convergent
services,
exposing
Telecom
services
to
other
companies,
and
deploying
new
Telco
&
OTT
services.
ü Our
architects
and
consultants
team,
specialized
in
Service
Delivery
Plaaorms,
are
ready
to
success
in
Oracle
Communica;ons’
SDPs
deployment
turn-‐key
projects,
as
well
as
Professional
Services
and
Training.
36. Network Applica,ons
36
Carriers
concurrently
need
to
re-‐evaluate
their
current
service
delivery
strategy
when
streamlining
their
systems.
Horizontal
next-‐genera,on
service
delivery
pla?orms
(NG
SDPs)
are
becoming
a
strategic
focus
in
these
scenarios.
• Our
specializa;on
on
Service
Gatekeeper
(OCSG),
Converged
Applica,on
Server
(OCCAS)
and
WebRTC
Session
Controller
(WSC)
from
Oracle
Communica,ons
SDPs
suite,
give
us
the
ability
to
offer
solu;ons
:
• Network
and
Service
exposure
• OSS/BSS
gateways
• Payment
Gateways:
Personalized
Billing
and
Charging
solu;ons
• Third-‐party
Abstrac;on
• Service
crea;on
and
execu;on
environments
• Partner
Management
• Thanks
to
our
Architects
and
Consultants
we
offer
services
of
specific
training,
consul,ng
and
Professional
Services,
and
turn-‐key
project
for
SDPs
deployment
and
integra,on.
37. Products Exper,se
37
• Oracle
Communica,ons
Converged
Applica,on
Server
(OCCAS)
• Speeds
development
and
deployment
of
carrier-‐grade
converged
IP
services
• Lowers
cost
of
development
with
carrier-‐grade
availability
• Maximizes
profitability
of
new
and
exis;ng
converged
IP
services
• Establishes
a
services
layer
founda;on
and
scalable
growth
infrastructure
• Delivers
high
performance
and
low
latency
• Oracle
Communica,ons
Services
Gatekeeper
(OCSG)
• Faster
;me
to
market
and
increased
revenue
• AQrac;ve
to
third-‐party
developers
and
partners
due
to
mul;ple
open
API
op;ons
• Offers
comprehensive
control
of
third-‐party
network
access
and
usage
• Easily
scalable
to
large
numbers
of
third-‐party
developers
and
applica;ons
• Extends
rapidly
to
support
exposure
of
new
telco
and
third-‐party
services
• Oracle
Communica,ons
WebRTC
Session
Controller
(WSC)
• High
reliability
and
performance
with
carrier-‐grade
availability
• Interoperable
between
any
WebRTC
device
and
any
SIP
network
• Comprehensive,
secure
authen;ca;on,
encryp;on,
and
aQack
mi;ga;on
• Stateful
session
management
with
connec;on
rehydra;on
• SDK
for
rapid
real
;me
communica;on
applica;on
development
Oracle
Communica,ons
SDP
is
a
poraolio
of
powerful,
standards-‐
based
telecom
network
services
layer
middleware
and
applica;on
products,
designed
to
enable
service
providers,
enterprises,
and
developers
to
harness
and
cross-‐leverage
the
power
of
the
Web,
telecommunica;ons,
social
networking,
and
IT,
so
that
they
can
rapidly
and
cost-‐effec;vely
create
new
and
converged
internet-‐communica;on
services.
.
38. Optare Solu,ons -‐ Webinar
ü Our
website:
tadhack.optaresolu;ons.com
ü Reques;ng
creden;als
ü Seing
up
an
environment
for
Telco
APIs
ü Seing
up
an
environment
for
WebRTC
ü Reques;ng
Support