issa5

Issabel IP PBX 5 based on Rocky Linux 8.8

تتوفر النسخة الجديدة Issabel 5 الآن!

تعتمد Issabel، النظام الرائد في مجال الاتصالات الموحدة ومراكز الاتصال، إطلاق النسخة 5 بفرح. تعتمد هذه النسخة الجديدة على Rocky Linux 8.8، مما يوفر أساسًا قويًا يضمن التحديثات المستمرة والدعم من خلال ‘yum update‘. مع Issabel 5، يمكن للمستخدمين اختيار بين Asterisk 16 و 18، مما يتيح لهم الاستفادة من أحدث التحسينات في الاستقرار وميزات الاتصال.

 

لقد قمنا بإعادة تصميم الواجهة الرسومية بالكامل في تكوين PBX لتقديم بيئة نظيفة وحديثة أكثر، مما يحسن بشكل كبير تجربة المستخدم.

التحسينات الرئيسية

 

– توليد الصوت بواسطة محركات نص إلى كلام مختلفة، مما يثري تخصيص الاتصالات.

– دمج Mirotalk لإجراء مؤتمرات الفيديو.

– تحديث إلى أحدث إصدار من RoundCube webmail، مما يحسن سهولة الاستخدام والأمان لمعالجة البريد الإلكتروني.

– إدخال تدقيق أكثر تفصيلًا لضمان الشفافية والتحكم الأكبر في الاتصالات التجارية.

 

التغييرات المبرزة في Issabel 5

 

– مبنية على Rocky Linux 8.8

Asterisk 16 و Asterisk 18 متاحة PHP الإصدار 7.4

– واجهة حديثة جديدة في تكوين PBX

– توليد الصوت بمحركات TTS مختلفة

– مؤتمرات الفيديو تمت إعادة توجيهها إلى Mirotalk

– أحدث إصدار من RoundCube webmail

– تدقيق أكثر تفصيلًا

– إصلاح الأخطاء والتحسينات

 

تتوفر Issabel 5 منذ 5 أبريل 2024، ويمكن تنزيلها من الموقع الرسمي.

 

بمناسبة إطلاق Issabel 5، سيتم عقد ندوة عبر الإنترنت في 16 مايو لاستكشاف المزيد من التفاصيل حول الميزات والقدرات الجديدة للمنصة. سيتم الإعلان عنها قريبًا على صفحتنا الرسمية، في قسم الفعاليات.

bosch

Elevate Building Security with Bosch’s Outdoor-Ready Bullet Cameras: DINION 5100i IR Series

In today’s fast-paced world, the safety and security of buildings have never been more critical. Security professionals understand the importance of reliable video surveillance systems that can provide clear images, especially in outdoor environments. Bosch, a leader in innovative security solutions, introduces the DINION 5100i IR bullet camera family, designed to enhance safety and security while ensuring the utmost protection for sensitive video data. In this blog, we’ll explore the key features and benefits of these state-of-the-art cameras, as well as their seamless integration into your security infrastructure.

Reliability and Outdoor-Readiness

24/7 Detection You Can Trust The DINION 5100i IR bullet camera family is built for reliable outdoor detection, 24/7. With advanced edge-based AI, these cameras accurately detect, count, and classify both persons and vehicles in the vicinity of your building. This functionality provides valuable insights, such as building or parking occupancy, enabling you to make informed decisions to bolster security.

Durable Design Outdoor security cameras face a variety of environmental challenges, from harsh weather conditions to potential vandalism. Bosch’s bullet cameras are constructed with a robust aluminum housing, ensuring reliable performance in all outdoor conditions. Their durability is a testament to Bosch’s commitment to delivering security solutions that can withstand the test of time.

Efficiency and Sustainability

Efficient Operation Efficiency is the name of the game when it comes to security operations. The DINION 5100i IR cameras save both time and expense for security operators by focusing only on relevant events. Fast and easy installation and commissioning, with zero calibration required for detecting persons and vehicles, further save valuable time and resources.

Sustainability Matters Bosch’s commitment to sustainability extends to its security solutions. The remote access and maintenance capabilities of these cameras reduce energy consumption and the carbon footprint, aligning with your organization’s sustainability goals.

Trust and Data Security

Built-In Quality and Security In an increasingly interconnected world, protecting sensitive video data is of paramount importance. Bosch prioritizes security in network-connected devices, evident through our cameras’ certifications for IEC and UL global cybersecurity standards. Moreover, they are compliant with NDAA Section 889(a)(1)(A)/TAA regulations, making them an ideal choice for securing government properties. Your systems and sensitive video data remain safe with the highest levels of security and built-in quality provided by Bosch.

Seamless Integration for Enhanced Awareness

Integrate with Confidence To improve situational awareness and enhance your security infrastructure, the DINION 5100i IR bullet cameras seamlessly integrate with advanced video analytics, Bosch systems, and leading video management systems. This integration empowers you with comprehensive control and insights, ensuring your building’s security is second to none.

When it comes to securing your building and its surroundings, the Bosch DINION 5100i IR bullet camera family is a reliable choice. With its cutting-edge features, robust design, energy-efficient operation, and top-tier security measures, these cameras provide a comprehensive solution for your security needs. To learn more about their sustainability features, data security, and integration capabilities, explore the links below:

     

    Invest in the safety and security of your building with Bosch’s trusted and innovative technology. Discover the benefits of the DINION 5100i IR bullet camera family today.

    aruba app sec

    Application Visibility, Performance Monitoring and Security

    Introduction

    Aruba EdgeConnect SD-WAN is revolutionizing how organizations manage wide-area networks, offering resilience and efficiency. A crucial aspect of effective SD-WAN infrastructure management lies in application visibility, real-time performance monitoring, and security monitoring. In this blog, we delve into the best practices for achieving these objectives using Aruba EdgeConnect SD-WAN.

    Application Visibility Best Practices

    1. Customizable Orchestrator Dashboard: EdgeConnect empowers you with a customizable dashboard to monitor your network’s health and application performance. Tailor widgets to visualize top talkers, domains, licenses, and appliance health, facilitating network visualization as per your requirements.
    2. NetFlow and IPFIX: Leverage these essential technologies to gain insights into network traffic. Configure EdgeConnect appliances to export NetFlow and IPFIX data to monitoring tools, providing valuable information on application usage, traffic patterns, and bandwidth utilization.
    3. Orchestrator and ECOS REST API: Aruba Orchestrator and EdgeConnect offer comprehensive REST APIs, allowing network engineers to programmatically interact with the SD-WAN infrastructure. This access provides real-time information on applications, network health, and performance, facilitating data-driven decisions.
    4. Polling EdgeConnect Loopback: Pin management traffic to EdgeConnect loopback for better control over application traffic. This practice streamlines the monitoring and management of specific application flows effectively.

    Real-time Performance Monitoring Best Practices

    1. Retrieve Stats from EdgeConnect and Orchestrator: Regularly retrieve and analyze performance metrics from EdgeConnect appliances and Orchestrator to monitor network health, link utilization, and application performance. This proactive approach ensures prompt issue identification and troubleshooting.
    2. APIs for Performance Monitoring: Utilize Aruba’s APIs to collect data about network devices and their performance. These APIs provide insights into interface statistics, CPU usage, memory utilization, and more, simplifying network monitoring.
    3. Understand Overlay vs. Underlay Tunnels: Distinguish between overlay (Business Intent Overlays – BIOs) and underlay tunnels for effective SD-WAN management. BIOs are crucial for application matching and forwarding, and monitoring both overlay and underlay tunnel performance is essential for optimal application delivery.
    4. Steering Synthetic Polling: Use features like AppExpress to measure the performance of specific network paths by steering synthetic polling across selected underlay tunnels. This approach helps make informed routing decisions.

    Security Monitoring Best Practices

    1. Export Syslog Data: Export firewall logs, audit trails, and alarms to a central syslog server. This is vital for security monitoring and compliance, enabling efficient analysis of security events and rapid response to potential threats.
    2. Understanding Traceroute Behavior: Be aware that traceroute behavior across the SD-WAN fabric may differ from traditional networks due to overlay tunnels. Understanding this behavior helps diagnose connectivity issues accurately.

    Conclusion

    Aruba EdgeConnect SD-WAN offers robust capabilities for application visibility, real-time performance monitoring, and security monitoring. By incorporating these best practices, such as using NetFlow and IPFIX, REST APIs, and steering traffic across specific underlay tunnels, organizations can improve network visibility, optimize performance, and ensure a secure SD-WAN infrastructure. Understanding the behavior of overlay and underlay tunnels and implementing security monitoring best practices are essential for achieving a resilient and efficient SD-WAN deployment.

    Stay tuned for more insights on how Aruba EdgeConnect SD-WAN is reshaping the future of network management.

    axis ai

    Unlocking the Potential of Edge Computing in Video Surveillance with AI

    In the world of video surveillance, a technological revolution is underway, and it’s set to transform how we capture, analyze, and respond to visual data. This transformation is powered by the combination of edge computing and artificial intelligence (AI), and it has the potential to reshape the future of video surveillance technology. Let’s delve into the details of this exciting development and explore how it’s paving the way for safer, more efficient urban environments.

    The Rise of “Edge Computing”

    Before we dive into the world of AI and video surveillance, let’s first understand the concept of “edge computing.” This term refers to a paradigm where devices at the edge of our security networks take on more responsibilities for data processing. In simpler terms, it means that the information processing power is moved closer to the source.

    For video surveillance systems, this translates to a game-changing shift. More actions and analysis can now be carried out directly within the cameras themselves. Artificial intelligence, machine learning, and deep learning are at the forefront of this transformation. These technologies enable cameras to “learn” and become more intuitive in real time. For instance, they can now identify objects, such as vehicles, humans, or animals, and even distinguish between shadows and tangible objects.

    The benefits of this innovation are substantial. It reduces the need for human intervention in data analysis and decision-making, leading to faster response times that can save lives. Furthermore, it provides invaluable insights that can shape the future of our cities, buildings, and transportation systems.

    Transforming Video Surveillance on the Edge

    Traditionally, video surveillance analysis simply detected movement, leaving the interpretation of the nature of that movement to humans. However, with the integration of AI, cameras are “trained” to recognize and classify objects. This opens up a world of possibilities, allowing cameras to differentiate between different object categories and contexts.

    For example, rather than just detecting a vehicle, deep learning takes it a step further. It can identify the type of vehicle, its location, and potential risks associated with it. This enhanced accuracy significantly reduces false alarms, saving time and resources that would otherwise be spent on investigating false positives. Moreover, edge analytics enables immediate and context-aware responses.

    Let’s consider a practical scenario: a motorway. AI analytics on the edge can identify objects and alert drivers. Deep learning, with its ability to distinguish between humans and vehicles, allows for more precise warnings. In emergencies, the system could even automatically activate signage to slow traffic and alert emergency services.

    The insights gained from these analytics aren’t just beneficial for traffic management and smart city planning; they extend to other sectors, such as wildlife conservation. Being able to differentiate between different types of traffic – pedestrians, cyclists, motorists, and commercial vehicles – provides valuable data that urban planners can use to shape the cities of the future.

    Preserving Quality with Edge Analytics

    One key advantage of edge analytics is that it operates on high-quality video footage, preserving the original quality. In contrast, traditional centralized analytics often work with compressed video, which degrades its quality. Additionally, edge analytics minimizes the data transmitted across the network, reducing bandwidth and storage requirements.

    In essence, the fusion of edge computing and AI in video surveillance opens up a world of possibilities for enhancing safety, efficiency, and the development of smarter cities.

    As technology continues to advance, we’re on the cusp of a new era in video surveillance, one that empowers us with more precise insights, faster responses, and safer urban environments. Stay tuned as we explore the limitless potential of AI and edge computing in the world of security and beyond.

    Our Partners Axis, Fibernetix,UniView UNV,Hikvision

    vital ai

    Enhancing Telecommunication with AI: A Guide to OpenAI ChatGPT, Whisper, and Microsoft Azure AI Speech Integration

    Introduction

    In the ever-evolving realm of telecommunication, Asterisk stands as a testament to the power of open-source solutions, offering flexibility and robustness to developers worldwide. As the demand for smarter, more responsive systems grows, the integration of Artificial General Intelligence (AGI) with platforms like Asterisk becomes not just desirable, but essential. An AGI, with its capacity to understand, learn, and make decisions across a broad spectrum of tasks, has the potential to elevate the capabilities of a conventional PBX system to unprecedented heights.

    This technical blog will delve deep into the intricacies of developing an AGI tailored for Asterisk. From establishing the initial interface to optimizing real-time communication processes, we’ll explore the challenges, solutions, and breakthroughs in intertwining these two powerful entities. For developers, telecommunication professionals, or anyone intrigued by the fusion of AI and telephony, this is a journey into the next frontier of communication technology.

    Key Resources for Your AI Agent

    An OpenAI Account: Visit #OpenAI’s Platform.

    A Microsoft Azure Account: Explore Azure’s AI Services for Text-to-Speech.

    VitalPBX 4

    Python and Relevant Dependencies

    Accessing the Source Code

    To access the complete guid you can visit the following link:

    it services

    How IT Services Drive Sustainability in Companies


    Introduction: In a world that’s increasingly focused on environmental sustainability, businesses of all sizes are under pressure to reduce their carbon footprint and operate more responsibly. Information Technology (IT) services have the potential to play a significant role in helping companies achieve their sustainability goals. This blog will explore how IT services can be leveraged to improve sustainability .

    1. Efficient Energy Management:
      • Discuss how IT systems can monitor and optimize energy consumption within a company.
      • Highlight the role of smart building technologies and energy-efficient data centers.
      • Emphasize cost savings and environmental benefits.
    2. Remote Work and Reduced Carbon Footprint:
      • Examine the environmental impact of remote work and reduced commuting.
      • Discuss IT tools that enable remote collaboration and their role in sustainability.
      • Explain how cloud computing reduces the need for on-premises data centers.
    3. Paperless Operations:
      • Explain how IT services facilitate digital documentation and electronic signatures.
      • Discuss the benefits of reducing paper usage for both cost savings and sustainability.
      • Mention the importance of secure document management.
    4. Supply Chain and Inventory Management:
      • Explore how IT services can optimize supply chain operations to reduce waste.
      • Discuss inventory tracking and management systems that minimize excess inventory.
      • Highlight the role of data analytics in improving supply chain sustainability.
    5. Green Data Centers and Cloud Services:
      • Explain the concept of green data centers and their energy-efficient features.
      • Discuss the environmental benefits of using cloud services.
      • Mention how major IT companies are investing in renewable energy for their data centers.
    6. IoT and Environmental Monitoring:
      • Introduce IoT (Internet of Things) and its role in environmental monitoring.
      • Discuss the applications of IoT in tracking air quality, energy consumption, and more.
      • Emphasize how data collected through IoT can inform sustainability strategies.
    7. Data Security and Sustainability:
      • Highlight the importance of IT services in securing sensitive environmental and sustainability data.
      • Discuss the risks of data breaches and the impact on a company’s reputation.
      • Explain the role of IT in ensuring the privacy and integrity of sustainability data.
    8. Employee Awareness and Training:
      • Emphasize the role of IT in delivering sustainability training and awareness programs.
      • Discuss e-learning platforms and how they contribute to sustainability education.
      • Provide examples of companies successfully using IT for sustainability education.

    Conclusion: As the world continues to focus on sustainability, companies need to recognize the pivotal role that IT services can play in helping them achieve their environmental and economic goals. By optimizing energy consumption, embracing remote work, and leveraging the power of green data centers and IoT, organizations can become more environmentally responsible while reaping the benefits of cost savings and enhanced productivity.

    Our Paernters : Cisco ,HPE Aruba ,Fortinet ,SOPHOS ,Kaspersky ,Dell

    forti password

    How to Reset Fortigate Password

    Only 2 minutes to do it after you plug it in to the power

    1. 1.       Download Putty and Start Putty with these Telnet settings
    • Baud 9600
    • Data Bits: 8
    • Stop Bits: 1
    • Parity: None
    • Flow Control: Off
    1.       Connect the Console Cable (RJ45 to DB9 – Serial port)
        1. Open word, then type in the Serial Number of your Fortinet : (for example FG300B3908605531)

         

        1. Login as maintainer

         

        1. Enter Password : bcpbFG300B9998605531 (add bcpb to the beginning of the Serial Number)

         

        1. Execute “factoryreset” and Press “y“

         

        1. Login as admin

         

        1. Set empty password by pressing enter

         

        1. Exit and shutdown – #exit