In this session Leif and Doug will get their hands on the keyboard, and step you through a fully deployed instance of VNF Asterisk -- showing you how it’s spun up in Kubernetes, and how it’s been instrumented. Then, we’ll get to the good stuff, and show you some calls being made over it, and metrics being collected in Homer. Showing you where we’re going and why, it’ll help make the latter sessions where we’re building things out a little easier to follow along.
“What the future holds for Asterisk (and what’s overhyped)” The Community is familiar with IoT, AI, Blockchain, Robots, 3D-printing and other technologies on the list of “next big things” promised by futurists. But what do any of these mean for communications and IP telephony? This session explores the possible intersection-points between IP communications platforms, and emerging technologies and trends. Can blockchain be used for “data integrity protection,” to ensure anti-tamper controls on call records or even voice recordings? How can AI improve voice? Is it just about speaking home or mobile “assistants,” or can it be applied in contact centers or sales team applications? And what about IoT? Focusing on where machines or sensors can trigger actual human interaction, whether by voice or video, and the fact that all of this has to set against the real world of deployment – skills, costs, and regulation. What might happen when all these intersections bring contradictions, for example, when lawful intercept of calls clashes with medical confidentiality (and device certification) for telemedicine?
Brian will discuss his use of Asterisk on his projects and those projects in his classroom at Saint Joseph’s College. He retired in 2016, as Chair of the Computer Science Department at Saint Joseph's College in Rensselaer, Indiana, after 34 years of teaching there. Saint Joseph’s became one of the first colleges with a full-time Internet connection in 1988 and began offering a for-credit course in VoIP in 2002. He has been a longtime advocate for Open Source software, participated in the process of developing the MIME standard, and was a co-author of RFC 5456, which formalizes the IAX protocol. His current interests focus on the future of the browser as a universal application container, and the technologies used to implement progressive web applications. He has developed a great fondness for modern JavaScript, Node, and React.
How often have you heard the phrase "For a communications company, we don't communicate very well!"? Kenneth O'Neal has the solution...
“Effective Communication” in the Workplace must change from a Parent/Child relationship to an Adult/Adult mature conversation requiring critical agreements. There are rights and responsibilities for all parties. All lives matter and are treated well. These are learned skills.
The whole organization must come before personal ambition
Honest, truthful openness to others’ opinions raises difficult issues; focus on results
Control emotional responses and obtain full information about organization
Make a choice about accountability for organization and understand business reasons
Each member manages their morale, motivation and commitment; supporting others does not take emotional responsibility; no blaming, no condemning, no criticism, no complaining A powerful adult position would be: “As I reflect on this situation, I acknowledge my contribution.”
Case studies will be provided with facts showing a significant increase in productivity.
Performing with elements of high tech (such as Asterisk and the latest unsupported features of Open Source Real Time Communications applications) using Conference WiFi in front of an audience of some of the best comms hackers in the World can be likened to descending the Cresta Run on a Skeleton Bobsleigh - it is risky and dangerous, but if you survive the experience the buzz that you get is just incredible.
Dangerous Demos are aimed to give presenters the chance to experience this rush - whilst providing an exciting, energising, electrifying, engaging and even educational series of lightning presentations to a live audience. Each speaker has precisely THREE minutes to show off their technology, with prizes being awarded to the Most Entertaining, Most Popular (by audience vote - using a very novel and risky voting system) and Most Ridiculously Risky (aka Crash and Burn) presentations.