SlideShare a Scribd company logo
1 of 104
Download to read offline
www.internetsociety.org
Open Source And The Global
Disruption Of Telecom
What Choices Will We Make?
AstriCon 2015, Orlando, Florida
14 October 2015
Dan York, Senior Content Strategist
www.internetsociety.org
(pi)
www.internetsociety.org
(roomba 1)
www.internetsociety.org
(roomba and Asterisk)
www.internetsociety.org
?
www.internetsociety.org
(power of play)
…
www.internetsociety.org
(IETF 1)
(SIP)
www.internetsociety.org
(telephone wires)
www.internetsociety.org
(repeat pi)
www.internetsociety.org
(innovation)
https://www.flickr.com/photos/boegh/6085347780/
www.internetsociety.org
(ask permission)
https://www.flickr.com/photos/irontec/2595219688
www.internetsociety.org
(Voxeo story)
www.internetsociety.org
Permissionless"
Innovation
www.internetsociety.org
Internet!
of!
Opportunity
www.internetsociety.org
?
(Economist)
The State of Broadband 2015, ITU
Image: epSos.de on Flickr
https://www.flickr.com/photos/uwehermann/3100832391
https://www.flickr.com/photos/zieak/2265541510/
Image: mosaaberisingon Flickr
www.internetsociety.org
Image: Christian Schnettelker (manoftaste-de) on Flickr
https://www.flickr.com/photos/gsfc/8805097211
Online, 43%
Offline, 57%
Connecting the next 4 billion
The State of Broadband 2015, ITU
Kolawole Ogunyomade teaching Asterisk in Nigeria
www.internetsociety.org
“If when you say internet, !
you think of a computer, !
then you probably don't live !
in an African country.”

http://edition.cnn.com/2015/02/19/africa/africa-mobile-internet/
www.internetsociety.org
http://www.internetsociety.org/globalinternetreport/
94% of the world’s
population can receive a
mobile telephone signal
50% of the world’s
population can receive a
mobile internet signal
36% of the population has
subscribed to the mobile
internet
(messaging shift)
www.internetsociety.org
(Meeker Internet "
Trends)
http://www.kpcb.com/internet-trends
www.internetsociety.org
(Meeker Internet "
Trends)
http://www.kpcb.com/internet-trends
www.internetsociety.org
(IPv6)
www.internetsociety.org
(Google stats)
www.internetsociety.org
http://www.worldipv6launch.org/measurements/
www.internetsociety.org
(river running dry)
https://www.flickr.com/photos/ejmc/5801349332/
www.internetsociety.org
(repeat pi)
www.internetsociety.org
http://www.internetsociety.org/iot/
www.internetsociety.org
(trust)
https://www.flickr.com/photos/powerbooktrance/466709245
www.internetsociety.org
Data Breaches
"Edward Snowden-2" by Laura
Poitras / Praxis Films. Licensed
under CC BY 3.0 via Commons
https://www.flickr.com/photos/home_of_chaos/6332465890/
https://www.flickr.com/photos/jonhathaway/16300982764
The erosion of trust...
www.internetsociety.org
91%
www.internetsociety.org
RFC 7258
www.internetsociety.org
Pervasive surveillance


Pervasive encryption
www.internetsociety.org
Internet
www.internetsociety.org
Present
Accessible /
Innovative
Decentralized
Closed /
Fragmented
Centralized
www.internetsociety.org
Internet Invariants
•  Global Reach
•  General Purpose
•  Permissionless Innovation
•  Accessible – connect, build, study
•  Conventions and social behavior
•  Reusable tech building blocks
•  No permanent favorites
www.internetsociety.org
Distributed and Decentralized
End to End
Intelligence at the edge
BBSs
www.internetsociety.org
Image: dehub on Flickr
www.internetsociety.org
Image: erictastad on Flickr
www.internetsociety.org
Creates the “lens”"
through which "
people experience"
the “Internet”
http://listicle.io/cluetrain/
www.internetsociety.org
(ask permission)
https://www.flickr.com/photos/irontec/2595219688
https://www.flickr.com/photos/cc_chapman/8105389823/
WHO will be the"
gatekeepers?
https://www.flickr.com/photos/soldiersmediacenter/6384362033
https://www.flickr.com/photos/neilsingapore/12822356355
https://www.flickr.com/photos/spicuzza/4661860670
www.internetsociety.org
WHO will be the"
gatekeepers?
www.internetsociety.org
Permissionless"
Innovation
www.internetsociety.org
Collaborative"
(Security, Governance)
https://www.flickr.com/photos/aadamus/16506071003/
December 2015

www.internetsociety.org/wsis
https://www.flickr.com/photos/james_wheeler/9468151425
1. Get Involved
Our mission is to promote the open development, evolution,
and use of the Internet for the benefit of all people throughout
the world.
Founded in 1992.
Organizational home of Internet Engineering Task Force (IETF)
www.internetsociety.org
Internet Society
87
Global Presence
110
Chapters
Worldwide
79k
Members and
Supporters
146
Organization
Members
6
Regional
Bureaus
20
Countries with
ISOC Offices
NORTH AMERICA
LATIN AMERICA/CARIBBEAN
EUROPE
AFRICA
THE MIDDLE EAST
ASIA
More than
Updated September 2015
87
Global
Staff
2. Work To Restore Trust
https://www.flickr.com/photos/44124466731@N01/27687364
https://www.flickr.com/photos/zigazou76/8989516885
3. Make A Conscious Choice
www.internetsociety.org
Image: tedandjen on Flickr
“If you choose not to decide,
you still have made a 
choice.”

- “Free will” from Rush
Image: epSos.de on Flickr
www.internetsociety.org
Internet!
of!
Opportunity
www.internetsociety.org
(pi)
www.internetsociety.org
york@isoc.org
@danyork
www.internetsociety.org
Dan York
Senior Content Strategist
Thank You!
www.internetsociety.org
danyork.me
Books
Blogs
Podcasts
1980’s
Nonprofits
Telecom"
VoIP
Disruptive"
Telephony
Linux
UNH
VoIP Security"
Alliance (VOIPSA)

More Related Content

Viewers also liked

SIP & TLS - Security in a peer to peer world
SIP & TLS - Security in a peer to peer worldSIP & TLS - Security in a peer to peer world
SIP & TLS - Security in a peer to peer worldOlle E Johansson
 
Reboot the Open Realtime Revolution - #MoreCrypto (Fall 2014)
Reboot the Open Realtime Revolution - #MoreCrypto (Fall 2014)Reboot the Open Realtime Revolution - #MoreCrypto (Fall 2014)
Reboot the Open Realtime Revolution - #MoreCrypto (Fall 2014)Olle E Johansson
 
Disruption And VoIp
Disruption And VoIpDisruption And VoIp
Disruption And VoIpUrian1983
 
Monetizing open-source projects
Monetizing open-source projectsMonetizing open-source projects
Monetizing open-source projectsiText Group nv
 
End to End Open Source Telecom
End to End Open Source TelecomEnd to End Open Source Telecom
End to End Open Source TelecomAshish Banerjee
 
IIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now DemocratizedIIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now DemocratizedAlan Quayle
 
WebRTC for Telco: Informa's WebRTC Global Summit Preconference
WebRTC for Telco: Informa's WebRTC Global Summit PreconferenceWebRTC for Telco: Informa's WebRTC Global Summit Preconference
WebRTC for Telco: Informa's WebRTC Global Summit PreconferenceTsahi Levent-levi
 
Comprendre comment utiliser le web et les médias sociaux à son avantage et ce...
Comprendre comment utiliser le web et les médias sociaux à son avantage et ce...Comprendre comment utiliser le web et les médias sociaux à son avantage et ce...
Comprendre comment utiliser le web et les médias sociaux à son avantage et ce...Michelle Blanc
 
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)We Are Social Singapore
 
Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)We Are Social Singapore
 

Viewers also liked (13)

SIP & TLS - Security in a peer to peer world
SIP & TLS - Security in a peer to peer worldSIP & TLS - Security in a peer to peer world
SIP & TLS - Security in a peer to peer world
 
Reboot the Open Realtime Revolution - #MoreCrypto (Fall 2014)
Reboot the Open Realtime Revolution - #MoreCrypto (Fall 2014)Reboot the Open Realtime Revolution - #MoreCrypto (Fall 2014)
Reboot the Open Realtime Revolution - #MoreCrypto (Fall 2014)
 
Disruption And VoIp
Disruption And VoIpDisruption And VoIp
Disruption And VoIp
 
Monetizing open-source projects
Monetizing open-source projectsMonetizing open-source projects
Monetizing open-source projects
 
End to End Open Source Telecom
End to End Open Source TelecomEnd to End Open Source Telecom
End to End Open Source Telecom
 
IIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now DemocratizedIIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now Democratized
 
WebRTC for Telco: Informa's WebRTC Global Summit Preconference
WebRTC for Telco: Informa's WebRTC Global Summit PreconferenceWebRTC for Telco: Informa's WebRTC Global Summit Preconference
WebRTC for Telco: Informa's WebRTC Global Summit Preconference
 
Comprendre comment utiliser le web et les médias sociaux à son avantage et ce...
Comprendre comment utiliser le web et les médias sociaux à son avantage et ce...Comprendre comment utiliser le web et les médias sociaux à son avantage et ce...
Comprendre comment utiliser le web et les médias sociaux à son avantage et ce...
 
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
 
Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)
 
Digital, Social & Mobile in 2015
Digital, Social & Mobile in 2015Digital, Social & Mobile in 2015
Digital, Social & Mobile in 2015
 
Digital in 2017 Global Overview
Digital in 2017 Global OverviewDigital in 2017 Global Overview
Digital in 2017 Global Overview
 
Digital in 2016
Digital in 2016Digital in 2016
Digital in 2016
 

Similar to Open Source and The Global Disruption Of Telecom: What Choices Will We Make?

A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?Dan York
 
互联网精神
互联网精神互联网精神
互联网精神kaven yan
 
Challenging Web 2.0
Challenging Web 2.0Challenging Web 2.0
Challenging Web 2.0Roland Alton
 
SXSWi: Mobile Social Games - the next frontier (2011-03-13)
SXSWi: Mobile Social Games - the next frontier (2011-03-13)SXSWi: Mobile Social Games - the next frontier (2011-03-13)
SXSWi: Mobile Social Games - the next frontier (2011-03-13)Volker Hirsch
 
Preparing for the Impact of Web 3.0
Preparing for the Impact of Web 3.0 Preparing for the Impact of Web 3.0
Preparing for the Impact of Web 3.0 Judy O'Connell
 
BBC Backstage Web Horizon 2007 Presentation
BBC  Backstage Web Horizon 2007 PresentationBBC  Backstage Web Horizon 2007 Presentation
BBC Backstage Web Horizon 2007 PresentationIan Forrester
 
A Qualitative Approach towards Discovering Microblogging Practices of Scientists
A Qualitative Approach towards Discovering Microblogging Practices of ScientistsA Qualitative Approach towards Discovering Microblogging Practices of Scientists
A Qualitative Approach towards Discovering Microblogging Practices of ScientistsMartin Ebner
 
Harsh Horizons For the Socialmediaforum
Harsh Horizons For the SocialmediaforumHarsh Horizons For the Socialmediaforum
Harsh Horizons For the SocialmediaforumIan Forrester
 
Spotting (Draft)
Spotting (Draft)Spotting (Draft)
Spotting (Draft)Keith Lyons
 
SFX, Metalib, mobile services and social networks
SFX, Metalib, mobile services and social networksSFX, Metalib, mobile services and social networks
SFX, Metalib, mobile services and social networksIan Clark
 
This Transliterate Life
This Transliterate LifeThis Transliterate Life
This Transliterate LifeBobbi Newman
 
Ou conference openness and skills june 2010
Ou conference openness and skills june 2010Ou conference openness and skills june 2010
Ou conference openness and skills june 2010Katharine Reedy
 
Viz thinkbos 10192011_share
Viz thinkbos 10192011_shareViz thinkbos 10192011_share
Viz thinkbos 10192011_sharecharlene mcbride
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet Charles Mok
 
Volker Hirsch's Presentation
Volker Hirsch's PresentationVolker Hirsch's Presentation
Volker Hirsch's PresentationMediabistro
 
Conquering new spaces 20101110
Conquering new spaces 20101110Conquering new spaces 20101110
Conquering new spaces 20101110Volker Hirsch
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebJamie Reffell
 

Similar to Open Source and The Global Disruption Of Telecom: What Choices Will We Make? (20)

A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
 
互联网精神
互联网精神互联网精神
互联网精神
 
Challenging Web 2.0
Challenging Web 2.0Challenging Web 2.0
Challenging Web 2.0
 
SXSWi: Mobile Social Games - the next frontier (2011-03-13)
SXSWi: Mobile Social Games - the next frontier (2011-03-13)SXSWi: Mobile Social Games - the next frontier (2011-03-13)
SXSWi: Mobile Social Games - the next frontier (2011-03-13)
 
Preparing for the Impact of Web 3.0
Preparing for the Impact of Web 3.0 Preparing for the Impact of Web 3.0
Preparing for the Impact of Web 3.0
 
BBC Backstage Web Horizon 2007 Presentation
BBC  Backstage Web Horizon 2007 PresentationBBC  Backstage Web Horizon 2007 Presentation
BBC Backstage Web Horizon 2007 Presentation
 
A Qualitative Approach towards Discovering Microblogging Practices of Scientists
A Qualitative Approach towards Discovering Microblogging Practices of ScientistsA Qualitative Approach towards Discovering Microblogging Practices of Scientists
A Qualitative Approach towards Discovering Microblogging Practices of Scientists
 
Harsh Horizons For the Socialmediaforum
Harsh Horizons For the SocialmediaforumHarsh Horizons For the Socialmediaforum
Harsh Horizons For the Socialmediaforum
 
Spotting (Draft)
Spotting (Draft)Spotting (Draft)
Spotting (Draft)
 
SFX, Metalib, mobile services and social networks
SFX, Metalib, mobile services and social networksSFX, Metalib, mobile services and social networks
SFX, Metalib, mobile services and social networks
 
Leed6820 Class1
Leed6820 Class1Leed6820 Class1
Leed6820 Class1
 
Imagination and Innovation in IT
Imagination and Innovation in ITImagination and Innovation in IT
Imagination and Innovation in IT
 
Spotting
SpottingSpotting
Spotting
 
This Transliterate Life
This Transliterate LifeThis Transliterate Life
This Transliterate Life
 
Ou conference openness and skills june 2010
Ou conference openness and skills june 2010Ou conference openness and skills june 2010
Ou conference openness and skills june 2010
 
Viz thinkbos 10192011_share
Viz thinkbos 10192011_shareViz thinkbos 10192011_share
Viz thinkbos 10192011_share
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
Volker Hirsch's Presentation
Volker Hirsch's PresentationVolker Hirsch's Presentation
Volker Hirsch's Presentation
 
Conquering new spaces 20101110
Conquering new spaces 20101110Conquering new spaces 20101110
Conquering new spaces 20101110
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the Web
 

More from Dan York

Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible) Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible) Dan York
 
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 HackathonDNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 HackathonDan York
 
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Dan York
 
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...Dan York
 
How IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About ItHow IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About ItDan York
 
SIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and SecuritySIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and SecurityDan York
 
ClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin SteveClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin SteveDan York
 
SIP Trunking & Security in an Enterprise Network
SIP Trunking & Security  in an Enterprise NetworkSIP Trunking & Security  in an Enterprise Network
SIP Trunking & Security in an Enterprise NetworkDan York
 
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XMLOSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XMLDan York
 
IP Telephony Security 101
IP Telephony Security 101IP Telephony Security 101
IP Telephony Security 101Dan York
 
Recording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/SkypeRecording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/SkypeDan York
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowDan York
 
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesE Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesDan York
 
BLISS Problem Statement and Motivation
BLISS Problem Statement and MotivationBLISS Problem Statement and Motivation
BLISS Problem Statement and MotivationDan York
 
ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)Dan York
 

More from Dan York (15)

Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible) Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
 
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 HackathonDNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
 
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
 
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
 
How IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About ItHow IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About It
 
SIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and SecuritySIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and Security
 
ClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin SteveClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin Steve
 
SIP Trunking & Security in an Enterprise Network
SIP Trunking & Security  in an Enterprise NetworkSIP Trunking & Security  in an Enterprise Network
SIP Trunking & Security in an Enterprise Network
 
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XMLOSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
 
IP Telephony Security 101
IP Telephony Security 101IP Telephony Security 101
IP Telephony Security 101
 
Recording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/SkypeRecording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/Skype
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To Know
 
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesE Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
 
BLISS Problem Statement and Motivation
BLISS Problem Statement and MotivationBLISS Problem Statement and Motivation
BLISS Problem Statement and Motivation
 
ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Open Source and The Global Disruption Of Telecom: What Choices Will We Make?