www.fgks.org   »   [go: up one dir, main page]

 WARNING: JavaScript is either disabled or not supported by your browser. You may encounter problems using various features on CircleID. 

VoIP

Blogs

STIR Working Group Officially Formed to Work on Secure Caller ID For VoIP

Interested in working on an open standard for "secure Caller ID" for voice-over-IP (VoIP)? If so, the new "Secure Telephone Identity Revisited (STIR)" working group was just officially chartered within the IETF and the mailing list is open for all to subscribe.  more»

Video: IETF Chair Jari Arkko Summarizes The Activities of IETF 87 In Berlin

The 87th meeting of the Internet Engineering Task Force (IETF) in Berlin, Germany, concluded on August 2, 2013. IETF Chair Jari Arkko recently published his summary of IETF 87 on the IETF Blog highlighting what he felt were some of the more important aspects of what was a very successful IETF meeting. I also had the privilege of interviewing Jari on video about the meeting. more»

Can We Create a Secure Caller ID For VoIP?

Can we create a "secure Caller ID" for IP-based communications, a.k.a. voice-over-IP (VoIP)? And specifically for VoIP based on the Session Initiation Protocol (SIP)? Can we create a way to securely identify the origin of a call that can be used to combat robocalling, phishing and telephony denial-of-service (TDOS) attacks? That is the challenge to be undertaken by the "Secure Telephone Identity Revisited (STIR)" group meeting tomorrow morning, July 30, 2013, at 9:00 am in Berlin, Germany, as part of the 87th meeting of the Internet Engineering Task Force (IETF). more»

Why the Opus Codec Matters - Even if You Don't Care About Audio

What makes the Opus codec so interesting? Why is there such a buzz about Opus right now? If you are not in telecom or doing anything with audio, why should you even remotely care about Opus? In a word... Innovation! And because Opus has the potential to let us communicate with each other across the Internet with a richer and more natural sound. You will be able to hear people or music or presenters with much more clarity and more like you are right there with them. more»

Moving Beyond Telephone Numbers - The Need for a Secure, Ubiquitous Application-Layer Identifier

Do "smart" parking meters really need phone numbers? Does every "smart meter" installed by electric utilities need a telephone number? Does every new car with a built-in navigation system need a phone number? Does every Amazon Kindle (and similar e-readers) really need its own phone number? In the absence of an alternative identifier, the answer seems to be a resounding "yes" to all of the above. more»

SIP Network Operators Conference (SIPNOC) Starts Tonight in Herndon, Virginia

Tonight begins the third annual SIP Network Operators Conference (SIPNOC) in Herndon, Virginia, where technical and operations staff from service providers around the world with gather to share information and learn about the latest trends in IP communications services - and specifically those based on the Session Initiation Protocol (SIP). Produced by the nonprofit SIP Forum, SIPNOC is an educational event sharing best practices, deployment information and technology updates. Attendees range from many traditional telecom carriers to newer VoIP-focused service providers and application developers. more»

An Introduction to Security and Reliability - What Does It Really Mean?

I co-authored a book in 2005, titled "Extreme Exploits: Advanced Defenses Against Hardcore Hacks." My chapters focused on securing routing protocols such as BGP, and securing systems related to DMZs, firewalls, and network connectivity. As I look back over those chapters, I realize that the basic fundamentals of network security really haven't changed much even though technology has advanced at an incredible pace. "Defense in depth" was a hot catch phrase seven years ago, and it still applies today. more»

Follow a Phishing Case in Real Time: postfinances.com / Swiss Post

It is just another phishing case. Why should I care? I happened to receive my own copy of the phishing email message. Most Internet users will just smile bitterly before deleting it. I checked it to see why it had gone through the spam filters. It had no URL in the text but a reply-to address. So it needed a valid domain name, and had one: postfinances.com. PostFinance (without trailing "s") is the payment system of the Swiss Post. It has millions of users. more»

It's Not Paranoia if They Are Really After You!

In the latest development from the World Conference on International Telecommunications, a new "compromise proposal" has been leaked to wcitleaks.org. This proposal is certainly no compromise, as it not only is a bald faced power grab by the sponsors (Russia, UAE, China, Saudi Arabia, Algeria, Sudan at this point), but shows a stunning lack of comprehension of how the Internet works and how it is currently governed. It also shows that the coalition of Civil Society groups and private sector organisations that have focused on WCIT have been correct all along.  more»

IETF 85 Begins Next Week In Atlanta - Here Is How To Follow Along

The 85th meeting of the Internet Engineering Task Force (IETF) begins next week in Atlanta, Georgia, USA. Over 1000 engineers, maybe as many as 1400 or more, from all around the world will gather in various working groups to discuss and debate issues relating to the open standards that define the Internet's infrastructure. more»

Ethiopia's Ban on Skype: An Excessive Stretch

Most international Medias picked the story wrong. And I see it being repeated. It is true that there is some legislative initiative regarding the regulation of VoIP calls and mainly the telecommunication sector in Ethiopia. But the initiative is just a draft, noting more. Besides there is no such a thing as 15 years punishment in the draft law for using Skype. Here are the provisions in the draft law that are stretched in many news headlines to bemoan that the use of Skype in Ethiopia entails 15 years punishment. more»

WebRTC/RTCWEB Congestion Control Workshop on July 28 in Vancouver

As we start moving more real-time communications into web browsers with the upcoming WebRTC/RTCWEB offerings, what do we do about congestion control? How do we ensure that all these browser-based communications sessions share the network fairly? With RTC capabilities now already available in builds for browsers such as Google Chrome and Mozilla Firefox, how do we deal with the expected increase in voice, video, chat and data traffic? more»

A Quick Primer on Internet Peering and Settlements

The business world today features many complex global service activities which involve multiple interconnected service providers. Customers normally expect to execute a single paid transaction with one service provider, but many service providers may assist in the delivery of the service. These contributory service providers seek compensation for their efforts from the initial provider. However, within a system of interdependent providers a service provider may undertake both roles of primary and contributory provider, depending on the context of each individual customer transaction. more»

Number Misuse, Telecommunications Regulations and WCIT

Another twenty five years has just zoomed by, and before you know it, it's all on again. The last time the global communications sector did this was at the WATTC in 1988, when "the Internet" was just a relatively obscure experiment in protocol engineering for data communications. At that time the Rather Grand telephone industry bought their respective government representatives... to the Rather Grandly titled "World Administrative Telegraph and Telephone Conference (WATTC) in November 1988 in Melbourne, Australia and resolved to agree to the Rather Grandly titled "International Telecommunication Regulations." more»

Carriers Skirting Rules on Network Neutrality vs. Free's Innovative Network

From will they ever learn department, we are once again seeing attempts by incumbent carriers to skirt rules around network neutrality. They tried and failed with UBB. Now they are at it again with "speed boost" technologies. The two technologies at question are Verizon's "Turbo" service and Roger's "SpeedBoost". more»

News Briefs

U.S. Telcos to Test IP-Based Calling, FCC Approves Trials

FBI Pushing Plans to Force Surveillance Backdoors on Social Networks, VoIP, and Email Providers

Skype Now Officially Part of Microsoft

Microsoft to Acquire Skype

Skype Targets Developing Markets for Next Phase of Growth

12% of International Calls on Skype, Traffic Soaring According to Study

Cablecos Continue to Gain Telcom Market Share; Now at 15% and Growing

Google CEO Discusses Future of the Web and Enterprise Computing

Annual Global IP Traffic Will Exceed Two-Third of a Zettabyte in 4 Years

Obama to Name Mignon Clyburn as FCC Commissioner

National Domain Registry Nominet Launches UK ENUM

VoIP Services Reshaping the Fixed Line Market in Europe, Uptake Varies Widely

India to Block Close to 39 Foreign VoIP Service Providers

New Internet Study Finds Web and Streaming Higher Than P2P Traffic

Comcast Accused of Degrading VoIP Sound Quality of Competitors, Under FCC Investigation

Lawrence Lessig: FCC Beyond Repair, Should be Abolished

German Court Bans VoIP App for iPhone

Wi-Fi Alliance Now Certifying Devices for Voice Over Wi-Fi Applications

U.S. Bill Grants VoIP Providers Full 911 Access

VoIP Compression Technique Vulnerable to Ease Dropping

Most Viewed

Internet Governance: An Antispam Perspective

Examining Two Well-Known Attacks on VoIP

IPv6: Extinction, Evolution or Revolution?

NAT: Just Say No

Introductory Remarks from Innovation '08

Most Commented

Industry Updates

Participants – Random Selection