SlideShare a Scribd company logo
#TWILIOCON
Communicationswithout Boundaries -
PreparingyourApp forGlobal Use
ANDREW JORDAN, SALES ENGINEER, @ TWILIO
#TWILIOCON
Hi. I’m Andrew Jordan.
I’m a Sales Engineer at Twilio.
My Twitter handle is @andrewkirk
#TWILIOCON
Going Global. Avoiding Common Pitfalls.
Four common issues my team encounters & how to avoid them.
1. Optimizing Call Latency
2. Delivering Unicode encoded SMS
3. Formatting Phone Numbers
4. Preventing Telecom Fraud
GLOBAL LOW LATENCY
#TWILIOCON
Global Low Latency
Oregon
Virginia
Sao Paulo
Dublin
Tokyo
Singapore
#TWILIOCON
Global Low Latency
Virginia
#TWILIOCON
Global Low Latency
Virginia
#TWILIOCON
Global Low Latency
Dublin
#TWILIOCON
Implementing GLL
PSTN <Dial> PSTN REST
PSTN <Record> <Client>
<Conference>
2012 2013
CHARACTER ENCODING
#TWILIOCON
Character Encoding: GSM
GSM is the standard encoding for SMS. Using GSM,
you can send up to 160 characters per message.
Basic Character Set.
(7 Bits, 128 Characters)
#TWILIOCON
Character Encoding: UCS-2
Much larger than GSM. Covers 110,000 characters
(each character is 16-bit). Maximum SMS sizes
drops to 70 characters.
#TWILIOCON
Unicode + Twilio.We’ve got your back.
out how to encode your message for delivery.
All our client libraries do this by default.
Send us a UTF-8 encoded request and we’ll figure
#TWILIOCON
Character Encoding: Common Pitfalls
MAXIMUM
CHARACTERS
If all your characters are GSM, you’ll have 160 maximum
characters per message - otherwise you only get 70.
DATABASE
STORAGE
Make sure your database connections speak UTF-8. If
you’re using MySQL, make sure your columns are stored
in utf8mb4 if you want emoji or other 4 byte characters.
HTTP
PARAMETERS
Make sure your language / framework interprets percent
escaped HTTP parameters as UTF-8, not Latin-1.
NUMBER FORMATTING
#TWILIOCON
Number Formatting: E.164
The E.164 specification is awesome for machines, but
not people. We don’t really use it in our day-to-day lives,
so it’s difficult for us to understand.
Ex. 0844 809 0200 vs. +44 844 809 0200
#TWILIOCON
Design your interfaces to help your users
#TWILIOCON
#TWILIOCON
#TWILIOCON
#TWILIOCON
Libphonenumber
#TWILIOCON
•It’s great for number formatting but also will do the following:
•Parse phone numbers
•Tell you if they’re valid or even possible
•Geocode numbers and tell you their locale in various
languages
•Bindings for Java, JS, C#, Obj-C, Python, Ruby, and PHP
Libphonenumber
#TWILIOCON
Oppa Demo Time.
FRAUD
#TWILIOCON
Telecom Fraud: Traffic Pumping.
1. BUY NUMBERS Attackers buy telephone numbers (or blocks of them).
Typically these have a high per-minute charge.
2. DRIVE TRAFFIC Attackers then drive as much traffic as possible to the
numbers.
3. PROFIT Carriers that receive calls are paid by the carrier where
the call terminates. Typically, attackers are associated
with (or are) carriers.
#TWILIOCON
Telecom Fraud: Protecting Yourself
You have to be proactive to protect yourself from Telecom
Fraud. Make sure you setup sanity checks & limits.
Don’t allow unauthenticated users to make an unlimited
number of phone calls, and charge users in real time, not
after the fact.
#TWILIOCON
Telecom Fraud: Twilio’s Anti-Fraud Measures
Twilio works hard to prevent fraud before it happens. We
use algorithms to detect suspicious behavior and maintain
internal blacklists of known bad or risky routes.
You can also setup International Permissions let
you whitelist places where you do business.
Usage triggers allow you to setup alerts.
#TWILIOCON
Conclusion. Try these at home!
• Use GLL resources to reduce call latency.
• Encode your requests in UTF-8. We’ll pick the right the encoding.
• Encourage correct Phone Number input & validate with libphonenumber.
• Be aware of Telecom Fraud & protect yourself with Twilio’s tools.
QUESTIONS?

More Related Content

What's hot

Csw2016 song li-smart_wars
Csw2016 song li-smart_warsCsw2016 song li-smart_wars
Csw2016 song li-smart_wars
CanSecWest
 
What are the disadvantages of
What are  the disadvantages ofWhat are  the disadvantages of
What are the disadvantages ofhafidz_94
 
Yealink business ip video phone vp530
Yealink business ip video phone vp530Yealink business ip video phone vp530
Yealink business ip video phone vp530
Tran Thanh
 
Twilio using Groovy Grails
Twilio using Groovy GrailsTwilio using Groovy Grails
Twilio using Groovy Grails
Ali Tanwir
 
TeleVerus Business Opportunity
TeleVerus Business OpportunityTeleVerus Business Opportunity
TeleVerus Business Opportunity
Mark Goldberg
 
Sectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based Company
Sectechbiz
 
In Voice Presentation QNet
In Voice  Presentation  QNetIn Voice  Presentation  QNet
In Voice Presentation QNet
Parag Murkute
 
PRIV by BlackBerry Secure Android Smartphone Advertising Images
PRIV by BlackBerry Secure Android Smartphone Advertising ImagesPRIV by BlackBerry Secure Android Smartphone Advertising Images
PRIV by BlackBerry Secure Android Smartphone Advertising Images
BlackBerry
 
NXVision Value Model
NXVision Value ModelNXVision Value Model
NXVision Value Model
markwsmith7
 
Rringg Brochure
Rringg BrochureRringg Brochure
Rringg Brochure
amohamed_itsyn
 

What's hot (10)

Csw2016 song li-smart_wars
Csw2016 song li-smart_warsCsw2016 song li-smart_wars
Csw2016 song li-smart_wars
 
What are the disadvantages of
What are  the disadvantages ofWhat are  the disadvantages of
What are the disadvantages of
 
Yealink business ip video phone vp530
Yealink business ip video phone vp530Yealink business ip video phone vp530
Yealink business ip video phone vp530
 
Twilio using Groovy Grails
Twilio using Groovy GrailsTwilio using Groovy Grails
Twilio using Groovy Grails
 
TeleVerus Business Opportunity
TeleVerus Business OpportunityTeleVerus Business Opportunity
TeleVerus Business Opportunity
 
Sectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based Company
 
In Voice Presentation QNet
In Voice  Presentation  QNetIn Voice  Presentation  QNet
In Voice Presentation QNet
 
PRIV by BlackBerry Secure Android Smartphone Advertising Images
PRIV by BlackBerry Secure Android Smartphone Advertising ImagesPRIV by BlackBerry Secure Android Smartphone Advertising Images
PRIV by BlackBerry Secure Android Smartphone Advertising Images
 
NXVision Value Model
NXVision Value ModelNXVision Value Model
NXVision Value Model
 
Rringg Brochure
Rringg BrochureRringg Brochure
Rringg Brochure
 

Viewers also liked

Edificaciones mas altas
Edificaciones mas altasEdificaciones mas altas
Edificaciones mas altas
Fidel Dominguez Gaspar
 
The Queen of Rock and Roll
The Queen of Rock and RollThe Queen of Rock and Roll
The Queen of Rock and Roll
rockandrollboxmay21
 
A Rainha do Rock and Roll
A Rainha do Rock and RollA Rainha do Rock and Roll
A Rainha do Rock and Roll
rockandrollboxmay21
 
Tina Turner A Rainha do Rock and Roll
Tina Turner A Rainha do Rock and RollTina Turner A Rainha do Rock and Roll
Tina Turner A Rainha do Rock and Roll
rockandrollboxmay21
 
Fantastic Fingers®: Addressing young students fine motor needs through a coll...
Fantastic Fingers®: Addressing young students fine motor needs through a coll...Fantastic Fingers®: Addressing young students fine motor needs through a coll...
Fantastic Fingers®: Addressing young students fine motor needs through a coll...
Ingrid C. King
 
Tina Turner La Reina del Rock and Roll
Tina Turner La Reina del Rock and RollTina Turner La Reina del Rock and Roll
Tina Turner La Reina del Rock and Roll
rockandrollboxmay21
 
Minit mesy guru
Minit mesy guruMinit mesy guru
Minit mesy guru
Kamilia Kasim
 
Tina Turner La Reina del Rock and Roll
Tina Turner La Reina del Rock and RollTina Turner La Reina del Rock and Roll
Tina Turner La Reina del Rock and Roll
rockandrollboxmay21
 
Tina Turner La Reina del Rock and Roll
Tina Turner La Reina del Rock and RollTina Turner La Reina del Rock and Roll
Tina Turner La Reina del Rock and Roll
rockandrollboxmay21
 
Multimedia Project 2
Multimedia Project 2Multimedia Project 2
Multimedia Project 2Rachel Kammen
 
Tina Turner The Queen of Rock and Roll
Tina Turner The Queen of Rock and RollTina Turner The Queen of Rock and Roll
Tina Turner The Queen of Rock and Roll
rockandrollboxmay21
 
The Death of the Reader
The Death of the ReaderThe Death of the Reader
The Death of the Reader
Adam Hyde
 
The Queen of Rock and Roll
The Queen of Rock and RollThe Queen of Rock and Roll
The Queen of Rock and Roll
rockandrollboxmay21
 
Troncones mexico
Troncones mexicoTroncones mexico
Troncones mexico
Casa de la Sirena
 
TTC ITB 2014
TTC ITB 2014TTC ITB 2014
A Rainha do Rock and Roll
A Rainha do Rock and RollA Rainha do Rock and Roll
A Rainha do Rock and Roll
rockandrollboxmay21
 

Viewers also liked (20)

Edificaciones mas altas
Edificaciones mas altasEdificaciones mas altas
Edificaciones mas altas
 
The Queen of Rock and Roll
The Queen of Rock and RollThe Queen of Rock and Roll
The Queen of Rock and Roll
 
A Rainha do Rock and Roll
A Rainha do Rock and RollA Rainha do Rock and Roll
A Rainha do Rock and Roll
 
Laporan akhir
Laporan akhirLaporan akhir
Laporan akhir
 
Tina Turner A Rainha do Rock and Roll
Tina Turner A Rainha do Rock and RollTina Turner A Rainha do Rock and Roll
Tina Turner A Rainha do Rock and Roll
 
MMP 2
MMP 2MMP 2
MMP 2
 
Multi med2
Multi med2Multi med2
Multi med2
 
Fantastic Fingers®: Addressing young students fine motor needs through a coll...
Fantastic Fingers®: Addressing young students fine motor needs through a coll...Fantastic Fingers®: Addressing young students fine motor needs through a coll...
Fantastic Fingers®: Addressing young students fine motor needs through a coll...
 
Tina Turner La Reina del Rock and Roll
Tina Turner La Reina del Rock and RollTina Turner La Reina del Rock and Roll
Tina Turner La Reina del Rock and Roll
 
Minit mesy guru
Minit mesy guruMinit mesy guru
Minit mesy guru
 
Tina Turner La Reina del Rock and Roll
Tina Turner La Reina del Rock and RollTina Turner La Reina del Rock and Roll
Tina Turner La Reina del Rock and Roll
 
Tina Turner La Reina del Rock and Roll
Tina Turner La Reina del Rock and RollTina Turner La Reina del Rock and Roll
Tina Turner La Reina del Rock and Roll
 
Multimedia Project 2
Multimedia Project 2Multimedia Project 2
Multimedia Project 2
 
Tina Turner The Queen of Rock and Roll
Tina Turner The Queen of Rock and RollTina Turner The Queen of Rock and Roll
Tina Turner The Queen of Rock and Roll
 
MMP Two
MMP TwoMMP Two
MMP Two
 
The Death of the Reader
The Death of the ReaderThe Death of the Reader
The Death of the Reader
 
The Queen of Rock and Roll
The Queen of Rock and RollThe Queen of Rock and Roll
The Queen of Rock and Roll
 
Troncones mexico
Troncones mexicoTroncones mexico
Troncones mexico
 
TTC ITB 2014
TTC ITB 2014TTC ITB 2014
TTC ITB 2014
 
A Rainha do Rock and Roll
A Rainha do Rock and RollA Rainha do Rock and Roll
A Rainha do Rock and Roll
 

Similar to TwilioCon 2013 - Communications Without Boundaries

Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Gudia Khan
 
Smarter SIP Trunks: 6 Ways You Can Save Time and Get More Features
Smarter SIP Trunks: 6 Ways You Can Save Time and Get More FeaturesSmarter SIP Trunks: 6 Ways You Can Save Time and Get More Features
Smarter SIP Trunks: 6 Ways You Can Save Time and Get More Features
Twilio Inc
 
Cellphones n calls sreevidhya@students
Cellphones n calls sreevidhya@studentsCellphones n calls sreevidhya@students
Cellphones n calls sreevidhya@students
Sai Srinivas
 
VOIP - Pankaj Karande
VOIP -  Pankaj KarandeVOIP -  Pankaj Karande
VOIP - Pankaj Karande
Shailesh Kabra
 
Final Twilio Under the Radar 2009 Cloud
Final Twilio Under the Radar 2009 CloudFinal Twilio Under the Radar 2009 Cloud
Final Twilio Under the Radar 2009 CloudDealmaker Media
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
maham4569
 
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2Jihad Dib
 



huertanix
 
Mogul Wave VoIP Cloud Services
Mogul Wave VoIP Cloud ServicesMogul Wave VoIP Cloud Services
Mogul Wave VoIP Cloud Services
Linda Kirkland
 
TELEPHONE CONVERSATION RECORDING
TELEPHONE CONVERSATION RECORDINGTELEPHONE CONVERSATION RECORDING
TELEPHONE CONVERSATION RECORDING
Alapati Krishna
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
Ankur Kumar
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
James Watt
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocolJames Watt
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
James Watt
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
Eric Klein
 
SImpleSignal SIP Trunking
SImpleSignal SIP TrunkingSImpleSignal SIP Trunking
SImpleSignal SIP Trunking
Jeffrey P. Pelletier
 
Number one-issue-voip-today-fraud
Number one-issue-voip-today-fraudNumber one-issue-voip-today-fraud
Number one-issue-voip-today-fraud
Flavio Eduardo de Andrade Goncalves
 
Nokia Universal Codes
Nokia Universal CodesNokia Universal Codes
Nokia Universal Codesankur koul
 
NUACOM Cloud Phone System
NUACOM Cloud Phone SystemNUACOM Cloud Phone System
NUACOM Cloud Phone System
RossMcHugh3
 

Similar to TwilioCon 2013 - Communications Without Boundaries (20)

Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Smarter SIP Trunks: 6 Ways You Can Save Time and Get More Features
Smarter SIP Trunks: 6 Ways You Can Save Time and Get More FeaturesSmarter SIP Trunks: 6 Ways You Can Save Time and Get More Features
Smarter SIP Trunks: 6 Ways You Can Save Time and Get More Features
 
Cellphones n calls sreevidhya@students
Cellphones n calls sreevidhya@studentsCellphones n calls sreevidhya@students
Cellphones n calls sreevidhya@students
 
VOIP - Pankaj Karande
VOIP -  Pankaj KarandeVOIP -  Pankaj Karande
VOIP - Pankaj Karande
 
Final Twilio Under the Radar 2009 Cloud
Final Twilio Under the Radar 2009 CloudFinal Twilio Under the Radar 2009 Cloud
Final Twilio Under the Radar 2009 Cloud
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2
 



 
Mogul Wave VoIP Cloud Services
Mogul Wave VoIP Cloud ServicesMogul Wave VoIP Cloud Services
Mogul Wave VoIP Cloud Services
 
TELEPHONE CONVERSATION RECORDING
TELEPHONE CONVERSATION RECORDINGTELEPHONE CONVERSATION RECORDING
TELEPHONE CONVERSATION RECORDING
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
SImpleSignal SIP Trunking
SImpleSignal SIP TrunkingSImpleSignal SIP Trunking
SImpleSignal SIP Trunking
 
Number one-issue-voip-today-fraud
Number one-issue-voip-today-fraudNumber one-issue-voip-today-fraud
Number one-issue-voip-today-fraud
 
Nokia Universal Codes
Nokia Universal CodesNokia Universal Codes
Nokia Universal Codes
 
NUACOM Cloud Phone System
NUACOM Cloud Phone SystemNUACOM Cloud Phone System
NUACOM Cloud Phone System
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

TwilioCon 2013 - Communications Without Boundaries