PCRF- Policy and Charging Rules Function- is a dedicated policy controller equipment standardized in 3GPP, enabling policy function for charging & bandwidth on the multimedia networks. Smart Policy Control function combines network and customer intelligence to launch tailored service offerings for business and residential customers.
Read more: http://www.mahindracomviva.com/products/internet-broadband-solutions/smart-policy-control-suite.htm
Policy and Charging Control - LTE / HSPA / EPC ‘knowledge nuggets’4G-Seminar
Advanced LTE, HSPA and EPC Cellular Systems Training - Public Seminars by Red Banana Wireless, register today at: http://4G-Seminar.com or contact us directly: info@4G-Seminar.com.
Introduction of PS Core Network Elements and little bit of EPC/LTE Network. This is introductory slides pack for a 10 class/slides set for detail introduction of 2G/3G and LTE PS Core Network.
Diameter based Interfaces and descriptionManjeet Kaur
Diameter is an authentication, authorization, and accounting protocol for computer networks. It evolved from the earlier RADIUS protocol. It belongs to the application layer protocols in the internet protocol suite.
Policy and Charging Control - LTE / HSPA / EPC ‘knowledge nuggets’4G-Seminar
Advanced LTE, HSPA and EPC Cellular Systems Training - Public Seminars by Red Banana Wireless, register today at: http://4G-Seminar.com or contact us directly: info@4G-Seminar.com.
Introduction of PS Core Network Elements and little bit of EPC/LTE Network. This is introductory slides pack for a 10 class/slides set for detail introduction of 2G/3G and LTE PS Core Network.
Diameter based Interfaces and descriptionManjeet Kaur
Diameter is an authentication, authorization, and accounting protocol for computer networks. It evolved from the earlier RADIUS protocol. It belongs to the application layer protocols in the internet protocol suite.
Diameter is an authentication, authorization, and accounting protocol for computer networks. It evolved from and replaces the much less capable RADIUS protocol that preceded it. in this presentation I will try to familiarize you with the new AAA protocol and deep dive into the diameter protocol details, Credit Control Application (Gx,Gy and GZ) and sample use case for peering Sandvine PTS (Working as PCEF) with freePCRF.server and finally introduce you with seagull, a popular test tool to test different diameter-based scenarios. Hope you like it
basim.alyy@gmail.com
basimaly.wordpress.com
https://eg.linkedin.com/pub/basim-aly/38/774/228
VoLTE Flows and legacy CS network. Basic call routing to and from CS network using BGCF, MGCF, MGW. ENUM role in routing. IMS Cetralized Services (IMC) and SRVCC scenarios.
In This Presentation, Following Topics for PCRF basic, with details of E// SAPC, are clarified and presented.
SAPC definition
Functional View
Service Aware Policy Control
Bearer Resource Control
Cross Control Functions
Information Model and O&M
Platform
A quick look at 5G System architecture in Reference point representation and in Service Based representation and also look at the different Network Functions (NFs) within the 5G System.
In This Presentation, Following Optional Configuration for PGW/GGSN is clarified and presented.
PISC/SACC Over View
Traffic
Inspection, Analysis
Authorization and QoS
Configuration
Rating Group, Service Set
Header Rule Set , Header Rule
HTTP/WSP Rule
Rating Group Mapping
Determine the required delivery characteristics of a packet stream and how a Traffic Management (TM) module can offload compute-intensive tasks. Hear more about the latest innovations in both DPI & TM solutions.
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
Diameter protocol has been introduced to replace in many aspects SS7/SIGTRAN in the LTE and VoLTE networks, and such as these 2G/3G networks, Diameter also has its dedicated global roaming network named IPX (IP eXchange) that allows international roaming for LTE users..
Back in the days Diameter was already used by the PCRF in 2G/3G networks for charging purposes, but its usage has been extended to completely replace the signalization role of SS7/SIGTRAN in LTE networks. SS7/SIGTRAN security flows are now public after several publications, but what about Diameter security ? By replacing old and insecure protocols, does Diameter come with built-in security?
During the presentation, we will study how the IPX infrastructure operates and how security is taken into account nowadays regarding the newest 4G telecom technologies. Getting into different point of view allowed us to find major Diameter vulnerabilities via the IPX, which affect almost all the network elements HSS, MME, GMLC, PCRF, PDN GW, including DNS serving telecom TLDs. Understanding the mistakes that led to a former generation of telecom networks we came out with insecure protocols will maybe help us to push security by design in the future.
Nevertheless, as a telecom provider we will provide recommendations to secure LTE infrastructures and share technical countermeasures we have implemented against different Diameter attacks and fraud scenarios to protect our network and customers. Along with recommendations, we will present some ways on how to self audit and do self monitoring of your network, as we consider that telecom providers need to take back the control of their networks!
Troopers website link: https://www.troopers.de/events/troopers16/653_assaulting_ipx_diameter_roaming_network/
Diameter is an authentication, authorization, and accounting protocol for computer networks. It evolved from and replaces the much less capable RADIUS protocol that preceded it. in this presentation I will try to familiarize you with the new AAA protocol and deep dive into the diameter protocol details, Credit Control Application (Gx,Gy and GZ) and sample use case for peering Sandvine PTS (Working as PCEF) with freePCRF.server and finally introduce you with seagull, a popular test tool to test different diameter-based scenarios. Hope you like it
basim.alyy@gmail.com
basimaly.wordpress.com
https://eg.linkedin.com/pub/basim-aly/38/774/228
VoLTE Flows and legacy CS network. Basic call routing to and from CS network using BGCF, MGCF, MGW. ENUM role in routing. IMS Cetralized Services (IMC) and SRVCC scenarios.
In This Presentation, Following Topics for PCRF basic, with details of E// SAPC, are clarified and presented.
SAPC definition
Functional View
Service Aware Policy Control
Bearer Resource Control
Cross Control Functions
Information Model and O&M
Platform
A quick look at 5G System architecture in Reference point representation and in Service Based representation and also look at the different Network Functions (NFs) within the 5G System.
In This Presentation, Following Optional Configuration for PGW/GGSN is clarified and presented.
PISC/SACC Over View
Traffic
Inspection, Analysis
Authorization and QoS
Configuration
Rating Group, Service Set
Header Rule Set , Header Rule
HTTP/WSP Rule
Rating Group Mapping
Determine the required delivery characteristics of a packet stream and how a Traffic Management (TM) module can offload compute-intensive tasks. Hear more about the latest innovations in both DPI & TM solutions.
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
Diameter protocol has been introduced to replace in many aspects SS7/SIGTRAN in the LTE and VoLTE networks, and such as these 2G/3G networks, Diameter also has its dedicated global roaming network named IPX (IP eXchange) that allows international roaming for LTE users..
Back in the days Diameter was already used by the PCRF in 2G/3G networks for charging purposes, but its usage has been extended to completely replace the signalization role of SS7/SIGTRAN in LTE networks. SS7/SIGTRAN security flows are now public after several publications, but what about Diameter security ? By replacing old and insecure protocols, does Diameter come with built-in security?
During the presentation, we will study how the IPX infrastructure operates and how security is taken into account nowadays regarding the newest 4G telecom technologies. Getting into different point of view allowed us to find major Diameter vulnerabilities via the IPX, which affect almost all the network elements HSS, MME, GMLC, PCRF, PDN GW, including DNS serving telecom TLDs. Understanding the mistakes that led to a former generation of telecom networks we came out with insecure protocols will maybe help us to push security by design in the future.
Nevertheless, as a telecom provider we will provide recommendations to secure LTE infrastructures and share technical countermeasures we have implemented against different Diameter attacks and fraud scenarios to protect our network and customers. Along with recommendations, we will present some ways on how to self audit and do self monitoring of your network, as we consider that telecom providers need to take back the control of their networks!
Troopers website link: https://www.troopers.de/events/troopers16/653_assaulting_ipx_diameter_roaming_network/
If you're new to openstack and you want get some hands on it then you have to install the Devstack. a bundled version for all openstack services and components in one software.
Whether you are replacing Telnet or Terminal, or need a more capable secure remote access tool, SecureCRT is an application you can live in all day long. With the solid security of SSH, extensive session management, and advanced scripting, SecureCRT will help raise your productivity to the nth degree.
An introductory slides for explaining the SDN and NFV technologies. what's the difference between them and when each one is used. Also it talk about some of Cisco products in each area either SDN or NFV or the Automation with some of real use cases deployed in today's service provider network.
Hope you like it
The Importance & Benefits of IT Managed ServicesMahindra Comviva
IT managed services reduce an operator’s foreseen problems & increase ROI by enhancing focus on core business functions, lower cost & productivity risks & lot more.
All You Need To Know About Network InteroperabilityMahindra Comviva
"Network Interoperability is the continuous ability to send and receive data among the interconnected networks, providing the quality level expected by the end user. It becomes indispensable in order to achieve end-to-end connectivity. The more diverse networks exist, the greater becomes the need to ensure that they can interoperate. Network interoperability being the ability of two networks to communicate can be achieved in two ways: either by having the two networks confirm to a common protocol standard or by defining a standard interface to which all networks need to adhere, or by providing a gateway that translates between the two protocols."
Just- in- time or JIT in capacity management solution is a technique that provides advantageous tangible benefits which can solve the problem of expanding the capacity with its flexibility and tenacity. Many telecom service providers look forward to improve capacity management, which enables better use of the existing resources in addition to plan and upgrade speed where they are most required to improve service quality and user satisfaction.
Telecom operators require to proactively engage customers. The Telecom Loyalty Programs allow the service providers to run high-quality and advanced loyalty programs of different scales that validate their sales and marketing strategies with to retain existing customers & acquire new ones.
Read more: http://www.mahindracomviva.com/products/customer-value-management/mobilytix-suite/mobilytix-loyalty-management-solution.htm
Big data focuses on finding hidden threads, trends, or patterns from heaps of telecom data. It represents significant information which opens new avenues of opportunities.
Big data combines information sources for an end-to-end view of the subscriber-operator interactions. To leverage big data, operators must modify how they gather, verify & make use of the information available.
http://blog.mahindracomviva.com/strategies-monetizing-big-data/
QR Code Based Payment- The most advanced contactless paymentMahindra Comviva
QR-code based payment requires smartphone apps to scan, store & share their code scans in order to allow individuals and business to make and accept payments.
SMS Hub is a complete solution to accommodate the growth of global text messaging traffic. It offers an efficient method of extending, establishing and managing interoperability with multiple global connections and ensures better coverage of the SMS facility.
Read more: http://www.mahindracomviva.com/products/messaging_solutions/sms-hub.htm
Intelligent broadband traffic management ensures that all broadband subscribers connected to the same local exchange have an equal share of bandwidth. This arrangement provides a unique end-to-end quality of service (QoS) differentiation with content adaptation, caching and distributed delivery.
With smartphone penetration reaching unprecedented heights, the demand for multimedia services has increased multifold. This presentation describes the concept of MMSC platform and the advantages of deploying this platform
A new era is about to come in direct operator billing because several companies are exploring the option of selling physical goods through direct operator billing.
Changing Telecom trends with VAS- Value Added ServicesMahindra Comviva
Service assurance is the systematic process of maintaining & improving the service quality provided to customers. It ensures that services offered over networks deliver an optimal subscriber experience.
Read more: http://www.mahindracomviva.com/services/managed_services/managed-vas-services.htm
One of the trends gaining momentum is the adoption of a Mobile Point of Sale system (mPOS, for short).
This presentation describes the concept of mPOS, its use cases and the potential challenges hindering uptake.
The metamophosismm in enterprise messaging has alleviated its use for analytics and newer innovations. Its scope is extending beyond MoM technology to include protocols and standards to enable transport and exchange of messages instantaneously.
In today’s business environment, network traffic is at an all time high due to increased use of data by social media sites and now cloud services. This presentation describes how to monitor Network traffic and its advantages
Similar to What is PCRF? – Detailed PCRF architecture and functioning (20)
In the emerging markets, mobile payment is being widely used for including unbanked mobile subscribers in the financial world. Use of various technologies like QR codes, NFC, Bluetooth low energy on being used for various POS and mobile wallet transactions.
How to analyze churn rate and its effect on businessMahindra Comviva
Churn rate is the loss of customers. It is the measure of customer leaving over a certain time period and is used to identify how much revenue is lost due to this attrition.Churn rate is an important measure used by organizations to understand the revenue opportunity loss.
Mobile payment has transformed the financial services in two different ways. They complement the banking system and they also disrupted the traditional way of banking in India
The role of mobile payment technologies in era of demonitizationMahindra Comviva
Demonetization, gave fuel to mobile ecosystems. Mobile payments were the savior in the time when citizens found themselves paralyzed without any cash in hand and
ATMs ran without cash.
Call Management Services Should be Part of Every Business Telephone SystemMahindra Comviva
Today’s sophisticated call management systems integrate various other devices including mobiles and tabs so that an all inclusive call management can be achieved by the business.
10 Things You Need to Know about Mobile Money Services Mahindra Comviva
We have covered various aspects of mobile money services before. So, we thought we would cover 10 important facts that you need to know about it. There are various facts that are important, here’s our list of top 10 for you.
What is NFV and Why is it Significant to the Networking Industry?Mahindra Comviva
A lot of this rise can be attributed to NFV when telecom operators across the world are adopting the technology to gain competitive advantage. NFV will bring a sea change in how the industry works in the coming years along with fetching extra revenue.
Differentiate Between Omni Channel & Multi Channel Customer ExperienceMahindra Comviva
The customer service industry is captured by two trending terms- “omnichannel customer service” and “multi-channel customer service”. Multi-channel customer support refers to the availability of customer service across two or more channels like web, e-mail, social media, apps, calls etc. & the omnichannel customer service strategy refers to a customer engagement strategy which caters to the customers via all available channels of support.
The SMS Grey route is a term gaining popularity in the telecom world. Grey route SMS refers to an SMS between two parties or countries which is legal for one party at one end but is illegal for the other party at the other end. A good example of a grey route SMS is the Application to Person (A2P) traffic where messages are generated automatically through a sim but are used for Person to Person (P2P) uses.
Mobile POS is the next in thing in the mobile payment solution market in India. The Mobile POS market in India is growing at a 10% rate every year. The number of mobile terminals has grown by 50% in the last one year. Mobile POS makes it easy for businesses to accept payments where-ever you want and whenever you want. All you need is a mobile or a tablet and a good internet connection.
The upcoming mobile financial services of the companion cards like merchant payments, e-commerce, ATM withdrawals, etc. would assist mobile operators expand their bouquet of the offering. They also intrigue the youth for the convenience they get to shop through the virtual cards from local & international markets at being home. Their global usage would make it popular among expats, travellers, students going abroad to meet their financial needs.
The new age big data technologies include predictive analytics, no SQL databases, search and knowledge discovery, stream analytics, in-memory data fabric, data virtualization and more.
Direct carrier billing (DCB) has witnessed significant traction. Initially, the concept was introduced to make purchasing ringtones and wallpapers more convenient. Direct carrier billing is being used for a variety of functions, ranging from purchasing air tickets to paying parking fees.
Banks can Implement NFC Payment Choosing between two Options - HCE platform &...Mahindra Comviva
The financial institutions and banks can compare the pros and cons of using HCE platforms or OEM tokenization. Know which concept is more suitable for NFC in banking.
"A blockchain is a public ledger for all executed Bitcoin transactions. It witnesses constant growth with the addition of ‘completed blocks’ in the form of a new set of recordings to it. These new completed blocks are added in linear, chronological order."
Sound Based Payment technology enables contactless payments through sound waves. There is no dependence on any specific platform and the technology behind it enables
payments on various devices such as smartphones, feature phones, card swipe machines and point-of-sale devices.
Winning Business Models for Mobile Remittances by Hugo Cuevas-Mohr, Mohr Worl...Mahindra Comviva
The right business model is the primary success factor to grow the share of the mobile and other digital channels. The presentation covers successful business models in the digital remittance space by Hugo Cuevas-Mohr, Mohr World Consulting
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.