Wireless

Wireless / Featured Blogs

Examining Two Well-Known Attacks on VoIP

VoIP is here to stay. In fact many incumbent telecommunication carriers have started offering VoIP service for sometime and several new VoIP service providers have emerged. Aside from issues such as quality of service, the aspect of security, or lack thereof, is misunderstood by some of the VoIP service providers. This purpose of this article is to discuss two of the most well known attacks that can be carried out in current VoIP deployments. more

What If They Simply Made Communications Technology Better?

Rob Hyndman has a pointer to Mark Cuban's latest: Think the Internet Will Replace TV? Think Again. Cuban's post can be summarized as: Today's broadband networks are too slow. The insatiable appetite for on-demand rich media content will soon overwhelm them. Telco's aren't putting in upgraded networks quickly enough to meet that demand. Cuban also provides some facts and figures to back up that claim. In the comments, readers have a number of viewpoints, including the view that Mark has ignored cable, and that cable can provide the required speeds and feeds... more

U.S. VoIP and Broadband Policy: Today’s Debate is Off the Mark!

Despite rather rapid growth in broadband access, the U.S. is falling further and further behind other countries -- we're now ranked #16 in the world. What's slowing the U.S. down? Two threads dominate U.S. broadband policy debate today. The first focuses on traditional telecom regulation -- reciprocal compensation, universal service, e911, and CALEA (wiretap capabilities). The second focuses on "Internet freedoms," i.e., guarantees that your broadband access provider won't block or inhibit specific applications like VoIP. more

Would the Real Network Neutrality Please Stand Up?

I'm sure this is something that's been raked over before, but I don't see a common understanding of what 'Net Neutrality' actually is. Despite many of the Internetorati demanding it by law. There appear to be several different camps, which you could paint as "bottom of IP", "middle" and "top". The bottomistas would see enforced Internet Protocol itself as a premature optimisation and violation of the end-to-end principle. Unhappy that you only get IPv4 or IPv6? Still grumpy that you only have IPv4 and not even IPv6? Really miserable that your VoIP packets are staggering under the poisonous load of IPv6 headers? You're a bottomista. more

Vint Cerf Speaking Out on Internet Neutrality

In a U.S. congress hearing held yesterday November 9th, significant focus was projected on "network neutrality" and a new telecommunications bill affecting the Internet. "This bill could fundamentally alter the fabulously successful end-to-end Internet," says Alan Davidson in the post on Google blog. Vint Cerf was not able to testify because of the Presidential Medal of Freedom award ceremony at the White House, but submitted the following letter to the hearing... more

The Great Internet Transformation? A First Stab

Is it just a coincidence that some of the leading Internet-based application companies are pushing aggressively into network connectivity at exactly the same time the major telephone companies are pushing into content? Or are we witnessing the end of the Internet as we know it? Think back to the online world fifteen years ago. There was AOL, there was Compuserve, there was Prodigy, and there was Apple's eWorld. Sure, there were researchers and students posting to Usenet newsgroups and navigating through Gopher sites, but the Internet was a sideshow for individuals and business users. ...the online world of those days was fragmented and small. Every online service was an island. Are we going back to those days? more

A Balkanized Internet Future?

Joi Ito has an important post [also featured on CircleID] on how the internet is in danger of becoming balkanized into separate "internets". He's not the only person who's concerned. Greg Walton worries about Regime Change on the Internet. My friend Tim Wu, a law professor specializing in international trade and intellectual property, has written an article for Slate: The Filtered Future: China's bid to divide the Internet... more

Identity Theft: Giving Away Your Personal Information

Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. In the past few months, one company after another is being forced to admit customer data has been lost or stolen. In many cases, they have them come forth repeatedly over the next few weeks, or even months revising the estimated number of impacted customers. To date, I don't think any have ever lowered those numbers. ...Let's consider two events that didn't make the front page of C|Net or CNN.  more

ICANN, WSIS and the Making of a Global Civil Society - Part I

This is the first part of a two-part series interview by Geert Lovink with Milton Mueller discussing ICANN, World Summit on the Information Society, and the escalating debates over Internet Governance. Read the second part of this Interview here. Geert Lovink: "Would it make sense to analyse ICANN (and its predecessors) as a test model for some sort of secretive 'world government' that is run by self appointed experts? Could you explain why governments are seen as incapable of running the Internet? This all comes close to a conspiracy theory. I am not at all a fan of such reductionist easy-to-understand explanations. However, the discontent with 'global governance' discourse is widespread and it seems that the International Relations experts have little understanding how the Internet is actually run. Where do you think theorization of Internet governance should start?" more

Convergence: ENUM is a Big Deal

Convergence as a technology concept has been around for decades. Many have predicted the convergence of electronics and entertainment, of PC's and TV's, and more recently of WiFi and cellular. All of these areas are in fact undergoing various degrees of convergence but there is another area that many are not as familiar with. It is called ENUM...The idea can be extremely useful when you consider that most telephones are limited to twelve keys on a keypad. Ever tried to enter your alphanumeric login ID and password to a web site on a cell phone or Personal Digital Assistant? It is next to impossible! The biggest impact of ENUM will probably be for Voice Over IP (VoIP). In fact, it could be the tipping point. ENUM is a really big deal. more