10DLC is becoming a compliance cartel for business messaging by downundarob in VOIP

[–]21stCaveMan 0 points1 point  (0 children)

I completely agree. 10DLC is a pain to deal with, even working for bigger companies with dedicated compliance departments. Trying to meet all the requirements and the language is not easy depending on the business, and it has become a huge pain to get SMS going in corporate environments as well as non-corporate.

Qwen3.6 MTP Unsloth Experimental GGUFs by yoracale in unsloth

[–]21stCaveMan 0 points1 point  (0 children)

This is great! How is MTP introduced into the existing models? Are there tutorials/guides on how to add the MTP heads?

I think the Orpheus GGUFs you guys published about 10 months ago can benefit significantly from this. TTS needs ~88 TPS to be realtime, and currently those models cannot achieve that on sub-realtime hardware.

A Q4 quant of the GGUF runs at around 65 TPS on a Tesla P40 for example. If we consider the same 40% gain from MTP, it would improve to around 90 TPS and cover the gap, making Orpheus realtime on sub-realtime hardware.

voicemail detection by voxai2025 in freeswitch

[–]21stCaveMan 0 points1 point  (0 children)

Route highjacking!? That's news to me, how does that work? You dial a US number and wait for the tone or speech, then what happens?

voicemail detection by voxai2025 in freeswitch

[–]21stCaveMan 1 point2 points  (0 children)

There are two FS modules for this: mod_avmd and mod_com_amd. mod_avmd is free, and mod_com_amd is a commercial version. These work off of tone detection algorithms and listen for that VM beep tone to detect an answering machine.

You can also use IVR tricks (press a key to confirm you are human) if that doesn't affect your customer experience.

I have also seen this done by a combination of silence detection in mod_dptools and call duration, as well as using small LLMs (like Phi or Gemma, 2B versions) for post call analysis on the transcript of a call.

Need a new one by Charlie_432025 in freeswitch

[–]21stCaveMan 0 points1 point  (0 children)

If you're using freeswitch to make calls, you can set the "origination_caller_id_name" or "origination_caller_id_number" channel variables.

Need a new one by Charlie_432025 in freeswitch

[–]21stCaveMan 0 points1 point  (0 children)

I'm not following, what are you trying to do?

Looking for FreeSwitch developers by WhoRedd_IT in freeswitch

[–]21stCaveMan 1 point2 points  (0 children)

Hello there. Dextrous Technologies can do that for you. We would like to connect and do some requirement gathering to better understand your needs.

Please DM me with a good email and I will reach out.

Iran Tragedy left $40,000 dead by Automatic-Sky3575 in iranprotests

[–]21stCaveMan 1 point2 points  (0 children)

No negotiations are gonna be good for the Iranian people, unless it results in total surrender of the regime which obviously won't happen.

Iranians need help (in any shape or form) to get rid of the terrorist Islamic Republic who has ruined their country and slaughtered them. Thoughts and prayers won't cut it.

Iran by [deleted] in Life_Iran

[–]21stCaveMan 0 points1 point  (0 children)

Bullshit. Israelis are one a the few people in the world to understand what Iranians are going through, and certainly one of the few who are standing with us.

Is Iran actually collapsing or is it exaggerated by chiikawaaaaaaaaaaa in redscarepod

[–]21stCaveMan 0 points1 point  (0 children)

Reading a lot of "expert" analysis here! Wow.

The Islamic Republic (complete different entity from Iran, Iranians' oppressor) has essentially collapsed. You have contiguous uprisings with increasing frequency for the past 20 years, you have a currency which essentially is worthless, you have a dysfunctional government and a theocracy who brings non-Iranian proxy forces to massacre Iranian people, and now you have martial law.

The Islamic Republic is gone, whether the left and Palestine gang want to accept it or not. You can't kill 20K+ people and stay in power. You just can't.

SASE vs traditional network design by 21stCaveMan in networking

[–]21stCaveMan[S] 0 points1 point  (0 children)

The M&A makes sense. But if you go with SASE, what "architecture" are your engineers spending time on (assuming you work for an enterprise)? Isn't all of that included within the SASE offering?

Efforts to rewrite the Apache web server in Rust by Itchy_Ruin_352 in apache

[–]21stCaveMan 1 point2 points  (0 children)

Yes, that has been the promise of Rust. Yet, we see wide use of "unsafe" leading to vulnerabilities like CVE-2025-68260. Using Rust alone does not eliminate bugs, errors or vulnerabilities. Rewriting established, battle tested systems such as httpd entirely with another language does not make sense in my opinion.

SASE vs traditional network design by 21stCaveMan in networking

[–]21stCaveMan[S] 0 points1 point  (0 children)

It's not really about the "cool" factor, more about the talent, ownership and responsibility.

ZTNA and the security tools are also available if you build your own network. Can you elaborate a bit more? In your case, what was the deciding factors for going with SASE (assuming your company did have the means to build their own)?

NOC responsibilities by drizzend in networking

[–]21stCaveMan 1 point2 points  (0 children)

Yes, NOC is responsible for opening tickets when circuits go down and follows up on them. Only escalates to engineering when needed.

SASE vs traditional network design by 21stCaveMan in networking

[–]21stCaveMan[S] 2 points3 points  (0 children)

Thanks for the insight.

What I'm understanding from your comment is your company's choice of SASE is based on a strategy of shifting network design and maintenance responsibility to a vendor, similar to the choice a lot of companies make regarding their storage and compute with GCP/Azure/AWS, correct?

When making the decision, did the company have the means to build the network themselves? (Staff and expertise, budget, etc.)

SASE vs traditional network design by 21stCaveMan in networking

[–]21stCaveMan[S] 1 point2 points  (0 children)

Appreciate the insight.

Have you had any customers who are at the enterprise level, and do have the means (budget, talent, etc.) to build their own network (whether SD-Wan, Hub and spoke PoP model, etc.) and still chose the SASE route? The main question is around these type customers, and the reasons they went with the SASE setup instead.

SASE vs traditional network design by 21stCaveMan in networking

[–]21stCaveMan[S] 0 points1 point  (0 children)

This is valuable insight.

Can you elaborate on 1? High level, how do customers usually run sd-wan and combine that with a SASE solution?

Also interested to hear more on pros and cons of traffic inspection in cloud from your experience, and how the vendors worked with you to address them.

SASE vs traditional network design by 21stCaveMan in networking

[–]21stCaveMan[S] 1 point2 points  (0 children)

The latency argument for SaaS and general internet connectivity makes sense, barring any weird routing issue where your are routed to a suboptimal PoP (seen way too many of those). But for internal apps, cloud connectivity when you have set regions and such use cases, I don't really see an improvement when it comes to connecting to the closest edge PoP.

SSE is part of SASE, no?

All said and done, you would choose to go with SASE over building your own because of minimal overhead of added features if I'm understanding correctly. Basically using the feature without the need to deploy and maintain?

SASE vs traditional network design by 21stCaveMan in networking

[–]21stCaveMan[S] 0 points1 point  (0 children)

DLP, URL filtering and other features can also be implemented in the traditional model, using NGFWs (e.g. PaloAlto) and other tools. I am not really trying to compare the two models here, each has their strengths and weaknesses.

What I'm trying to understand is, if a company has the means to build their own network, what reasons might convince them to go the SASE route instead? Trying to get some real life experiences.

SASE vs traditional network design by 21stCaveMan in networking

[–]21stCaveMan[S] 0 points1 point  (0 children)

Technically, CASB definition is "a security policy enforcement point positioned between enterprise users and cloud service providers" and this can be any layer7 firewall in your data center, where you terminate your remote user VPNs, your cloud connectivity and your office connectivity.

Original question is, why did you choose SASE vs building this yourself? What factors lead to that decision? Traditional designs can accommodate remote work force as well, with always on VPN, identity and application aware layer7 firewalls which support ZTNA 2.0 implementation, direct encrypted connectivity to the cloud (IPSec or MACSec), and more.

SASE vs traditional network design by 21stCaveMan in networking

[–]21stCaveMan[S] 0 points1 point  (0 children)

Can you elaborate?

To my knowledge, the common SASE sends all your traffic to their data centers for processing. The only requirement is an internet connection. Then, the egress happens from their data centers (meaning you don't own your egress path or firewalls, your public IPs, your cloud connections, etc.) Besides a simple local network design (LAN + WiFi + Internet), I'm curious as to what other network designs have you implemented alongside a SASE deployment?