POPULARITY
On the night of December 2, 2024 in London, SSPI and its UK Chapter held their annual Dinner to present Awards to three individuals and organizations that have made the world a far better place through their efforts. In this podcast series, you will hear their stories. The third episode features Dan Losada, Vice President, International Division at Hughes, who joins us to discuss Hughes' role in bringing internet access to some of the most isolated communities in Colombia through Juntas de Internet - Comunidades de Conectividad. Dan Losada, vice president at Hughes, leads the company's international sales team, responsible for satellite broadband systems sales around the globe, and maintaining the company's competitive edge as the world's leading VSAT provider. Prior to assuming leadership of the international sales team, Dan was senior director of the Hughes Defense and Intelligence Systems Division (DISD), supporting the U.S. military during its transition to Internet Protocol (IP)-based broadband systems. Previously, Dan held positions in microwave and RF systems design at Hughes and TRW, Inc. (now part of Northrop Grumman). Earlier in his career, Dan served as a technical consultant for Universidad Antonio Narino in Bogotá, Colombia, overseeing deployment of a point-to-multipoint network and evaluating proposals for the implementation of a city-wide WLAN Wireless Network. A certified Project Management Professional (PMP), Dan holds both a Bachelor and Master of Science in Electrical Engineering from the University of Illinois at Urbana-Champaign. He has published papers on communication systems and design and speaks frequently at industry conferences and panels worldwide. Hughes, with Microsoft and the Colombian government, brought internet access to some of the most isolated communities in Colombia through Juntas de Internet – Comunidades de Conectividad (Internet Connectivity Communities). According to the Wireless Broadband Alliance, more than four billion people globally remain without internet access, including 80% of households in poorer countries and 75% of students in rural areas. The Colombian government laid the groundwork for Juntas de Internet in July 2023 with the backing of the country's Ministry of Information and Communication Technologies (MinTIC). The program was established to both enhance existing networks and build new ones. Internet implementation, connection, and maintenance is a joint effort between connectivity communities and regional internet service providers (ISPs). Connectivity communities are non-profit organizations whose income is exclusively used for the administration, operation, and maintenance of fixed community internet service. Hughes, serving as a regional ISP, partnered with Microsoft on Juntas de Internet. Read more about Hughes, Microsoft and Colombia's MICT – Juntas de Internet: Connectivity Communities.
What are the most essential topics to understand for a new networkers? Ethan Banks and Holly Metlitzky address a listener's question about foundational topics, covering what a network is, the differences between packet-switched and circuit-switched networks, and the nature of the internet as a “network of networks.” They discuss the importance of Internet Protocol (IP),... Read more »
What are the most essential topics to understand for a new networkers? Ethan Banks and Holly Metlitzky address a listener's question about foundational topics, covering what a network is, the differences between packet-switched and circuit-switched networks, and the nature of the internet as a “network of networks.” They discuss the importance of Internet Protocol (IP),... Read more »
Uncover the essentials of BACnet integration in Episode 451 of the Smart Buildings Academy Podcast with Phil Zito. This episode is an invaluable resource for professionals embarking on BACnet integration projects, offering a comprehensive overview of BACnet protocols, communication methodologies, and practical integration strategies. Whether you're tackling a retrofit or adding new components to your building automation system, Phil's expert insights will guide you through the complexities of BACnet integration. Episode Highlights: BACnet Basics: Phil introduces BACnet as the standard protocol for building automation, explaining its role in structuring communication and defining data structures within BAS environments. Understanding BACnet Objects: Delve into the world of BACnet objects, including devices, inputs, outputs, and values. Learn about the significance of discovering device objects and the process of mapping points within a BAS. MSTP vs. IP Integration: Explore the differences between BACnet over Master-Slave/Token-Passing (MSTP) and BACnet over Internet Protocol (IP), including their application scenarios and challenges in integration processes. Integration Fundamentals: Phil provides a step-by-step guide to BACnet integration, covering essential aspects such as wiring, baud rates, MAC addresses, and device IDs, ensuring a smooth integration experience. Real-World Integration Scenarios: Gain insights into practical BACnet integration examples, including troubleshooting tips and strategies for overcoming common integration challenges. Phil Zito's expertise shines in this episode, offering listeners a deep dive into BACnet integration tailored for both novices and seasoned professionals in the building automation field. If you're looking to enhance your understanding of BACnet and improve your integration skills, Episode 451 is a must-listen, equipped with the knowledge and confidence to tackle BACnet integration projects successfully.
- Killucan landscape designer Tom Leavy on how he took home a Silver Gilt medal for his Charlie and the Chocolate Factory The Musical Garden at Bord Bia Bloom. - Athlone's Dead Centre Brewing launches a new brand of craft lemonade. Founder Liam Tutty is the man adding the fizz! - Shena Brien CEO of IP Telecom on What the ‘Big Switch Off' means for small businesses. By the end of December 2025, landlines will be fully-phased out meaning any business and home phone calls will instead be hosted over Internet Protocol (IP). _ Three midlands business owners joined Ronan to reminisce on their time sitting the state exam and to impart advice to the students starting the Leaving Cert this week - with Niamh Dooley of BiaSol, Colin Donnery of FRS Recruitment and Ray Carolan of Lakeland Kayaks.
About three decades ago, computers were limited to government institutions and universities. They were bulky and expensive. Over the years, the advancement in technology has made them small, affordable and obviously ubiquitous. They are in billions now. And their numbers are swelling as we talk. Internet Protocol, or IP in short, manages the huge traffic of information between these billions of devices. It attaches an “electronic return address” to all online requests and activity. This is called the IP address of your connection. Even the websites such as www.business-standard.com is an IP address masked behind Domain Name Service (DNS), which translates numbers into the name for internet users to navigate the web conveniently. In technical terms, Internet Protocol (IP) is the network layer communications protocol for relaying datagrams across network boundaries. Currently we are using the fourth version of Internet Protocol which is known as IPv4. Launched more than three decades ago, it has several limitations -- including its capacity to cater to billions of addresses. IPv4 is a 32 bit numeric address, written as four numbers separated by periods. Each group of numbers is called octet. It has a limit to accommodate 4.3 billion addresses. This number might look huge, but it is not. The Internet is quickly running out of addresses. So the world is now adopting the sixth version of Internet protocol. The main difference between the IP version 4 version 6 is the length of the address. The IPv4 address is a 32-bit numeric address while IPv6 is a 128-bit hexadecimal address. Hexadecimal uses both numbers and the alphabet in the address. IPv6 can produce 340 undecillion -- which is 340 trillion trillion trillion --addresses. So you might have guessed, it is enough for the foreseeable future. The IPv6 also addresses security shortcomings of the IPv4 by enabling end-to-end encryption. Other benefits of the new Internet Protocol include connecting with different networks simultaneously with a unique address on each network, and the ability to combine multiple enterprise networks without readdressing. India is also upgrading to Internet Protocol version 6 (IPv6). In November 2021, the Department of Telecom (DoT) released a circular revising the transition timeline, setting December 2022 as the deadline for internet service providers (ISPs) to make changes to their network as required by the latest internet protocol. The circular has set 30th June 2022 as the last date for government organisations to complete the transition to IPv6. The IPv6 clearly has many advantages over the IPv4, but upgrading to the new Internet Protocol cannot be done in a hurry simply because replacing old IPv4 equipment would be expensive and disruptive. And so, IPv4 is being slowly phased out giving way to gradual adoption of IPv6. Watch video
This episode (#90) brings us up to speed on Next Generation 911 in California. 911.gov explains: “Because most 911 systems were originally built using analog rather than digital technologies, public safety answering points (PSAPs) across the country need to be upgraded to a digital or Internet Protocol (IP)-based 911 system, commonly referred to as Next Generation 911 (NG911). A variety of non-technical resources are available to help explain what NG911 is and how it will help public safety leaders improve the safety of civilians, patients and first responders. Learn more about how the transition to Next Generation 911 will impact EMS, fire and law enforcement communities here. The success and reliability of 911 will be greatly improved with the implementation of NG911, as it will enhance emergency number services to create a faster, more resilient system that allows voice, photos, videos and text messages to flow seamlessly from the public to the 911 network. NG911 will also improve PSAP ability to help manage call overload, natural disasters, and transferring of 911 calls and proper jurisdictional responses based on location tracking. While the technology to implement these new IP-based 911 systems is available now, the transition to NG911 will involve much more than just new computer hardware and software. Implementing NG911 in states and counties nationwide will require the coordination of a variety of emergency communication, public safety, legislative and governing entities.” The California 9-1-1 Emergency Communications Branch at Cal OES remains focused on enabling Public Safety Answering Points (PSAPs) to provide the fastest, most reliable, and cost-effective access to emergency services for any 9-1-1 caller in California from any communications device.. While the existing 9-1-1 system has been a success story for more than 40 years, it has been stretched beyond its limit. The current 9-1-1 system is unable to efficiently integrate with today's newer technologies and lacks the reliability and monitoring capabilities needed to support today's increased disaster environment. Due to the aging technology of today's 9-1-1 system, the number of outages continues to increase and the existing 9-1-1 system is becoming less and less reliable. There is an urgent need to transform California's legacy 9-1-1 system into a Next Generation 9-1-1 (NG9-1-1) system. Modernizing California's outdated 9-1-1 funding formula is crucial to protecting our 9-1-1 system. The CA Legislature approved SB 96 / AB 96 which provides the updated State Emergency Telephone Number Account (SETNA) funding model that will provide the revenue needed to implement NG9-1-1. NG9-1-1 will provide multi-layered redundancy and a common technology platform for alerts and warnings. The advantages of NG9-1-1 include: Allow agencies to re-route 9-1-1 calls to each other during disasters Increase resiliency by hardening the system to withstand natural and human-caused disasters Provide a statewide common technology delivery system for Alerts and Warnings Ensure emergency calls are quickly and accurately delivered – in 3 seconds or less Support text to 9-1-1 delivery into the PSAP Deliver increased location accuracy for wireless calls Allow agencies to utilize state of the art mapping in order to better locate callers Integrate with First Responder Network Authority's nationwide wireless broadband network initiative Reduce 9-1-1 system downtime. 9-1-1 outages are an ongoing problem with the aging infrastructure currently being used in California Since the CA 9-1-1 Branch first published the proposed California NG9-1-1 Roadmap in 2010, significant progress has been made to implement NG9-1-1 in California. The CA 9-1-1 Branch successfully implemented several NG9-1-1 pilot projects; the most significant of these are in Northeast California with 36 PSAPs and the Pasadena RING project in LA County with 8 PSAPs. The CA 9-1-1 Branch also met representatives from nearly every PSAP in the state, the originating service providers, and the vendor community to develop the NG9-1-1 implementation plan. Links Cal OES 911 911.gov Cal OES PSC
On today's show we discuss watching Dune from our home theaters, Seven Alexa commands you are probably not using, and why we think Matter really matters. Plus we have two weeks of emails and news. Dune - Our thoughts 7 Alexa commands you're probably not using (but should be) With Alexa and the range of Echo devices, -- including smart displays and smart speakers -- Amazon has built a robust service that can deliver seemingly endless information and control your home. But, are you actually taking full advantage of all it can do? Full article here… Samsung promises Matter support for SmartThings hubs, Galaxy devices, TVs, and fridges The Matter smart home train is picking up steam. Following Google's commitment to the new standard at its developer conference last week and Apple's addition of Matter support in iOS 15 at WWDC, Samsung is now following suit. The company announced a complete adoption of Matter across Samsung's Galaxy devices, televisions, Family Hub appliances, and SmartThings hubs at SDC21, its virtual developer conference being held this week. Full article here… Matter is the foundation for connected things. This industry–unifying standard is a promise of reliable, secure connectivity—a seal of approval that devices will work seamlessly together, today and tomorrow. Matter is creating more connections between more objects, simplifying development for manufacturers and increasing compatibility for consumers. This collaborative breakthrough is built on proven technologies and guided by the Connectivity Standards Alliance (formerly Zigbee Alliance), whose members come together from across industries to transform the future of connectivity. Companies from across the industry are contributing market-proven technologies and best practices. Matter is built around a shared belief that smart home devices should be secure, reliable, and seamless to use. By building upon Internet Protocol (IP), Matter will enable communication across smart home devices, mobile app and cloud services, and to define a specific set of IP-based networking technologies for device certification. Foundation for connected things: Simplicity - Easy to purchase and use Interoperability - Devices from multiple brands work natively together Reliability - Consistent and responsive local connectivity Security - Robust and streamlined for developers and users An open-source approach Members of the Alliance have taken an open-source approach to the development and implementation of this new, unified connectivity protocol. We are using best-in-class contributions from market-tested smart home technologies, such as those from Amazon, Apple, Google, the Connectivity Standards Alliance (formerly the Zigbee Alliance), and others. By leveraging these technologies' contributions, we have been able to accelerate the development of the protocol and deliver benefits to manufacturers and consumers faster. IP-Based Matter makes it easier for device manufacturers to build devices that are compatible with smart home and voice services such as Amazon's Alexa, Apple's Siri, Google's Assistant, and others. The first specification release of the Matter protocol will run on Wi-Fi and Thread network layers and will use Bluetooth Low Energy for commissioning.
Area law-enforcement agencies have reported the following recent activity: Elmendorf police •Sept. 18, Eric Garcia, 31, of San Antonio was arrested and charged with tampering with evidence, after allegedly using an Internet Protocol (IP) phone number to send harassing messages to his former wife in Elmendorf. When an officer approached him about the allegation, Garcia allegedly tried to destroy the computer tablet he used to send messages. Floresville police •Sept. 13, Caitlin Mills, 23, of Floresville was arrested and charged with criminal mischief valued at ,500-,000. •Sept. 14, Nathan P. Coker, 31, of Floresville was arrested in the 2100 block...Article Link
On today's Quick News Daily, we discuss the latest news about the FDA pre-approving the Pfizer COVID vaccine, as well as the news from the UK about 2 people who had serious allergic reactions to it. Then, I talk about the potentially game-changing antitrust lawsuit against Facebook, as well as an update on the Rebekah Jones raid in Florida.----more----Find Quick News on your favorite podcast platform: rebrand.ly/QuickNewsSources:Lawyers' group calls for disciplining Trump legal team over 'dangerous' fraud allegations Facebook antitrust case: FTC and several states launch lawsuits The antitrust case against Facebook: Here's what you need to know Florida state police release body cam video of raid on ex-Covid data's scientist home Evidence to justify raid on home of Rebekah Jones weak, experts say Pfizer Faces Enormous Task Of Covid Vaccine Distribution After FDA Panel Recommends Urgent Use FDA advisers recommend authorization of Pfizer/BioNTech coronavirus vaccinehttps://www.cnn.com/2020/12/09/health/covid-vaccine-allergies-health-workers-uk-intl-gbr/index.html (Mostly Accurate) Transcript:COVID The big news from yesterday (that I think we all expected) was that vaccine advisers to the FDA voted to recommend emergency use authorization for the Pfizer vaccine. On this panel, the vote was 17-4-1. I thought that this was like the final say, but now the FDA has to decide whether to accept the recommendation, but has signaled that it will issue the EUA for the vaccine. Then, after that, there’s still another step where the CDC Advisory Committee on Immunization Practices must meet to decide whether it recommends that the vaccine be deployed for use. That group has a meeting scheduled for today, and expects to vote during a meeting scheduled for Sunday.Operation Warp Speed officials say they will start shipping the vaccine within 24 hours of FDA authorization. The FDA group is scheduled to meet again December 17 to discuss Moderna's EUA application. This is all good news, and I think when you weigh the amount of testing that has happened with this, I think it’s safe. At the same time, there is some unsettling news about a couple of allergic reactions that happened in the UK. The UK regulators issued new advice to healthcare professionals stating that any person with a significant allergic reaction to a vaccine, medicine or food -- such as previous history of anaphylactoid reaction, or those who have been advised to carry an adrenaline autoinjector -- should not receive the Pfizer vaccine. The two staff members who had that reaction both carried an Epipen and had a history of allergic reactions, and they developed symptoms of anaphylactoid reaction after receiving the vaccine on Tuesday. I think the scariest wording was that this advice also states that vaccines "should only be carried out in facilities where resuscitation measures are available." Finally, this advice recommends that people who carry an EpiPen to delay having a vaccination until the reason for the allergic reaction has been clarified. Again, I want to be careful on this because I think the benefits greatly outweigh the alternatives, and I don’t want to start any unnecessary vaccine panic because these were just two people, and the study alone was 44,000, but it’s definitely something to know. I also read that Pfizer’s trial protocols said that to be in that study, you couldn’t have a history of severe allergic reaction “to any component of the study intervention”. That might explain why this didn’t happen in the trial. Another expert in this CNN article said that until we know what part of the vaccine actually caused these reactions, the general public shouldn’t be worried, which makes sense; maybe it was something that was very rare. Just something to keep in mind though as we get closer and closer to this. FACEBOOK Some other news that I was happy to hear is that both the government and regulators want Facebook to be broken up because they’re a monopoly. Director of the FTC’s Bureau of Competition, Ian Conner, said "Facebook's actions to entrench and maintain its monopoly deny consumers the benefits of competition. Our aim is to roll back Facebook's anticompetitive conduct and restore competition so that innovation and free competition can thrive." The government and regulators are saying Facebook should have to sell off Instagram and WhatsApp. Facebook’s latest argument is that people choose its services not because they have to, but because they want to, which is pretty much a flat out lie. I wouldn’t be on there for this show unless it was absolutely necessary to build a community. For millions of small businesses, Facebook advertising is pretty much their main marketing strategy. You can’t go over to Twitter and get the same visibility. Facebook’s PR narrative is that they welcome regulation, but that cracking down too hard could risk giving other countries like China a competitive edge in the fast-moving technology sector. I’m glad that years and years of having to defend themselves for being a monopoly let them try out a bunch of defenses, and good for them for settling on the one that sounds like it hints at racism. I also don’t think it’s a coincidence that Trump brainwashed his followers into thinking that Biden loves China and calls the coronavirus the “China Plague” and all that, and then suddenly, Facebook uses this to defend itself when they know full well that they survive by letting white supremacist groups thrive on their platform. This all got started when New York Attorney General Letitia James announced in September 2019 that she was leading an investigation into Facebook for anticompetitive practices, which 47 state attorneys general signed on a month later. These types of lawsuits understandably usually take a lot of time to play out. One of the most high-profile cases, a landmark lawsuit against Microsoft in 1998, took almost two years to come to a conclusion (actually, that seems pretty quick to me. When you take on a huge company who likes money and doesn’t like you stepping on their toes, 2 years seems pretty quick). I guess we should temper our expectations a bit, but the fact that this happened while Trump is in office is encouraging, because it’s usually Republicans who are all for business rights and that sort of thing. You know, the crooked capitalism that’s more of an oligopoly. REBEKAH JONESIn our third update of the week on this story, two videos of the raid on Rebekah Jones’ house were released by the FDLE. The videos show that Jones didn't exit her home until about 23 minutes after officers first rang the doorbell, and 15 minutes after they first announced themselves as police. Jones has claimed authorities waited 13 minutes while she got dressed."Police search warrant, open the door!" officers yell several times. "Make sure the whole block hears us," one agent tells his colleagues. Jones has said that officers in the house pointed guns at her 2- and 11-year-old children and her husband, which the department has denied. She released her own video of the raid showing officers inside with guns drawn, but it’s unclear whether those officers were also wearing body cameras. I’m just going to go out on a limb here, but we all know how these stories go: they’re going to find that these super reliable cameras mysteriously turned off on their own or malfunctioned or something, but just on the officers that went inside the home and allegedly pointed guns at her kids. The authorities also said that they seized three computers, two phones, and several memory cards and thumb drives. I hate to say I told you so, but I was kind of right: she wasn’t totally honest, but that doesn’t mean that ol’ Ronny DeSantis is in the clear either. There’s also some crazy stuff in her past with getting arrested 3 times in relation to an affair she was having where she was stalking the guy she was having it with. It’s all true, it’s in court documents she filed. These documents included 342 pages, so basically a full novel, about their affair, which is like the nerd version of 50 Shades. So yeah, maybe she’s not the perfect messenger, but there is some controversy over the actual affidavit that they used to get the search warrant. The FDLE claims to have traced "through the use of investigative resources" the origin of the message to an Internet Protocol (IP) address associated with Jones' Comcast account for her Tallahassee home."It is well known that IP addresses can be spoofed. In other words, I can make an IP or I can make it look as though Internet traffic is coming from somewhere else," said Kevin Butler, associate director of the Florida Institute for Cybersecurity Research and a professor of computer science at the University of Florida.The Electronic Frontier Foundation, the country's leading internet civil liberties and data privacy advocacy group, in 2016 published a 22-page white paper laying out why IP addresses on their own are unreliable personal identifiers, and are commonly misused or misunderstood by police and the courts. A key reason is that information can often relay through multiple IP addresses. "It's a thin read to just use the IP address, and it's one that we really, really discourage," said Cindy Cohn, the EFF's executive director. "An IP address is nothing, is not even remotely like a fingerprint... the reason that we worry about IP addresses is the cops will often pretend like they're a fingerprint."Jason Lewis, an assistant professor of computer science who heads the cyber security program at Florida Southern College and a former law enforcement agent who served as an investigator for the United States Secret Service's Colorado Electronic Crimes Task Force, said the affidavit to his eyes did not sufficiently establish probable cause. Lewis Another professor in this field says that "the use of investigative resources: now, I've used that phrase before, but never like this, that is a jump”, referring to the language in the affidavit that ties the IP address to Jones. "To say that I have an IP address, and then through use of investigative resources, it belongs to Rebekah I would dare say that to me doesn't scream probable cause. I really don't see how, that they're showing to a reasonable person, that the facts support a crime and tying it to her." "It would be like saying 'I found a bullet and through investigative resources Jason shot it'," he said.Lewis said there's no reason for records that would link the IP address to Jones' Comcast account to be confidential. Furthermore, IP addresses change over time and the affidavit does not demonstrate that FDLE proved that it corresponded to Jones at the time the message was sent, Lewis said. "There's no technique or source you need to protect when you say you're tying an IP address to a subscriber, so why not tell me that? To me that's really fishy."Cybersecurity and digital rights experts also said the fact that the emergency system in question relied on a shared username and password further complicates the case. The username and password was shared among "multiple" users, past and present, according to the FDLE affidavit which did not specify the number of users with access. That’s just like rule number one: never share your password. That’s rule 1, and rule 2 is don’t make your password “password”. It was also revealed Wednesday that the username and password for the system are on a document that was publicly available on a Department of Health site, as first reported by Ars Technica. As of Thursday morning that document was still online. That’s wild! How can they claim only she could have hacked in when they had this stuff on the open internet? What’s up with that?"Normally you don't see prosecutors prosecuting for computer crimes something that didn't cause any harm... it seems to be a very sketchy use of discretion to try to use this very serious statute against somebody who didn't cause any harm to your systems." - CohnThe prosecutor that I mentioned a couple of days ago who resigned over this said "I have handled a lot of these kinds of cases in my career, and generally, the way that this statute is used, is to prosecute people who are hacking into other people's systems to steal their identity, to steal their money, to crash their servers, to cause some sort of harm to that person or entity, which is not present here,.”Filipkowski, in his resignation letter, said he reviewed the warrant, and said the raid was "unconscionable." "It's broadened out to allow them to basically seize any of her devices including zip drives, including things that really are wholly unrelated to that criminal statute," he said. "There's no minimization." "I think they intentionally worded it that broadly because they are on a fishing expedition, because they're not just looking at violations of that statute. They're looking for communications that are between state employees and Rebekah," he said.Lewis, the former cybercrimes investigator, also questioned why authorities seized thumb drives and memory cards to investigate accessing an online messaging system. "The only things I think that you would have had probable causes to seize would be the router and the computers" as well as the modem. Jones' router and modem weren't seized.Cohn said the FDLE's actions and the information in the affidavit don't help dispel that perception the raid was politically motivated. "This is way out of proportion, and I think it feeds the argument that this is political and not about law enforcement."Something is very fishy here, and of course it got found out this quickly: if something malicious did happen, Ron DeSantis is no genius. I will keep following this story and updating you. For this info today, it was from a great story in the Florida Today newspaper, which is like the Florida division of USA Today, so go check out that link and give them some traffic; this article was fantastic.
A study has found that data generated from home security cameras can actually compromise one's security. An international team of researchers used data from a security camera manufacturer to find out if anyone can track the cameras' data without seeing the actual video content. The team evaluated a type of security camera called an Internet Protocol (IP) camera. IP cameras connect to the internet and do not require a computer to upload videos online, so their streams can be monitored remotely on the web or via smartphone apps. Only the owner of a particular IP camera can access its video recordings. By hacking, the researchers found that the data traffic generated by the cameras can expose information about a person's activities. They said that the upload rate of an IP camera increases when it detects someone or something moving, like a person running or walking. According to the team, this could let potential burglars know whether or not a house is empty. To reduce privacy risks, the researchers advised users to place IP cameras near objects in the house that create sounds or movements to make it seem like someone is at home. One way to do this is by placing an analog clock or a metronome in front of an IP camera to pick up noise data.
Muneeb Ali is the co-founder and CEO of Blockstack, a decentralized computing network that gives users control of their data. Muneeb talks about the limits of Web 2.0 and how that led to an intrusive ad model, and how web 3.0 changes this model by giving individuals control of their digital sovereignty. Why you should listen: Muneeb explains that over a dinner with Balaji S. Srinivasan in February, Balaji convinced him that COVID-19 was about to crash the world and all precautions should be taken. Balaji was right. The simple but robust protocol design for the Internet Protocol (IP) took the internet to 15B connected devices through the period of the fastest technological change in history. Muneeb says Bitcoin's protocol has the same properties - it is simple and robust - that's why Bitcoin is the ideal narrow waist for Web 3. Key takeaway: Blockstack completed its capital raise six months ago and rebalanced its portfolio in February - leaving them in a strong position to keep building in these turbulent times. Blockstack aims to be simple and powerful - like Bitcoin. Blockstack can be thought of as the inverse of the world computer - or platform blockchains such as Ethereum and EOS. Muneeb says that in trying and uncertain times - it is important for individuals to have a sense of purpose to help them keep pushing forward. Snow Crash is Mnueeb's fav sci-fi novel and it informs his thinking about Web3 and Web4. The Crypto Conversation is proudly sponsored by DeFi leaders NEXO Click here to borrow instantly in 45+ fiat currencies Click here to earn daily interest on your idle assets Supporting links: Blockstack Blocktack Blog Bitcoin as the narrow waist for Web3 Fireside chat with Balaji S. Srinivasan Snow Crash Simulation Theory Why Decentralization Matters Google creepily records you Muneeb on Twitter Andy on Twitter Brave New Coin on Twitter Brave New Coin If you enjoyed the show please subscribe to the Crypto Conversation and give us a 5-star rating and a positive review in whatever podcast app you are using.
Tom Wheeler: Gutenberg, Google, Darwin & Beyond (Ep. 177) Tom Wheeler joined Joe Miller to discuss Mr. Wheeler's new book 'From Gutenberg to Google: The History of Our Future'. Bio Chairman Tom Wheeler is a visiting fellow in Governance Studies at Brookings. Wheeler is a businessman, author, and was Chairman of the Federal Communication Commission (FCC) from 2013 to 2017. For over four decades, Wheeler has been involved with new telecommunications networks and services. At the FCC he led the efforts that resulted in the adoption of Net Neutrality, privacy protections for consumers, and increased cybersecurity, among other policies. His chairmanship has been described as, “The most productive Commission in the history of the agency.” During the Obama-Biden Transition of 2008/09 Mr. Wheeler led activities overseeing the agencies of government dealing with science, technology, space and the arts. As an entrepreneur, he started or helped start multiple companies offering innovative cable, wireless and video communications services. He is the only person to be selected to both the Cable Television Hall of Fame and the Wireless Hall of Fame, a fact President Obama joked made him “the Bo Jackson of telecom.” Prior to being appointed Chairman of the FCC by President Obama, Wheeler was Managing Director at Core Capital Partners, a venture capital firm investing in early stage Internet Protocol (IP)-based companies. He is CEO of the Shiloh Group, a strategy development and private investment company specializing in telecommunications services. He co-founded SmartBrief, the Internet’s largest curated information service for vertical markets. From 1976 to 1984 Wheeler was associated with the National Cable Television Association (NCTA) where he was President and CEO from 1979 to 1984. Following NCTA Wheeler was CEO of several high-tech companies, including the first company to offer high-speed delivery to home computers and the first digital video satellite service. From 1992 to 2004 Wheeler served as President and CEO of the Cellular Telecommunications & Internet Association (CTIA). Mr. Wheeler wrote Take Command: Leadership Lessons from the Civil War (Doubleday, 2000), and Mr. Lincoln’s T-Mails: The Untold Story of How Abraham Lincoln Used the Telegraph to Win the Civil War (HarperCollins, 2006). His commentaries on current events have been published in the New York Times, Washington Post, USA Today, Los Angeles Times, and numerous other leading publications. Mr. Wheeler served on President Obama’s Intelligence Advisory Board prior to being named to the FCC. Presidents Clinton and Bush each appointed him a Trustee of the John F. Kennedy Center for the Performing Arts. He is the former Chairman and President of the National Archives Foundation, and a former board member of the Public Broadcasting Service (PBS). He is a proud graduate of The Ohio State University and the recipient of its Alumni Medal. He resides in Washington, D.C. Resources Brookings Governance Studies From Gutenberg to Google: The History of Our Future by Tom Wheeler (Brookings, 2019) Time to Fix It: Developing Rules for Internet Capitalism (Harvard: Kennedy, 2018) The Root of the Matter: Data & Duty: Rules of the New Digital Economy Should Look to Old Common Law Traditions (Harvard: Kennedy, 2018) The Supreme Court and House Democrats Breathe New Life into Net Neutrality (Brookings, 2018) Who Makes the Rules in the new gilded age? (Brookings, 2018) News Roundup Elizabeth Warren proposes breaking up big tech Senator Elizabeth Warren announced her proposal last week to reign in tech firms like Google, Amazon, and Facebook. The plan calls for potentially breaking up some mergers as well as new legislation. Senator Warren wants to break up Doubleclick and Google, Facebook and its subsidiaries Instagram and Whats App, and the Amazon/Whole Foods merger. Politico reported Monday that Facebook removed ads that Elizabeth Warren placed on the social network which criticized Facebook and called for its breakup. Facebook backtracked after its attempt to silence Warren backfired. Democrats announce net neutrality bill Nancy Pelosi, on behalf of Democrats, introduced a new net neutrality bill last week. The bill is two pages long and would simply reinstate the 2015 Open Internet rules. The bill’s likely to pass the House where Ds hold the majority, but it faces a more uncertain future in the Senate and getting it over the presidents desk. Trump details plan for government-owned 5G Trump’s reelection campaign is proposing a plan that would give the government control of the nation’s 5G airwaves, allowing it to lease them out to carriers on a wholesale basis. Most carriers think the plan’s unworkable. But the plan is seen as an attempt to attract rural voters with spotty internet service. Huawei sues the U.S. Chinese device manufacturer Huawei, which the U.S. government has accused of spying and violating sanctions against Iran, has now sued the U.S. government for banning the company from doing business in the U.S. The company filed in a U.S. District Court in Plano, Texas, where the company has its U.S. headquarters. TMobile spent $195k at Trump hotel TMobile’s expenditures at Trump’s DC hotel rose sharply after the company reported that it would be seeking to acquire Sprint. Since April of last year, when the merger was announced, TMobile has spent $195,000 at the hotel. But before the merger announcement, the company said that only two employees had stayed there. The FCC paused its review of the merger last week. This is the third time the FCC has paused the 180-day shot clock, which is now on day 122. The merger review has been going on for 8 months. It’s not clear why it was paused this time. But the hotel expenditures may have had something to do with it—especially since the White House actually approved the deal. A ‘Greenbook’ for bigots Finally, The Hill reported on Monday on a new app that launched which gives users a listing of MAGA-friendly establishments—places where they’re least likely to be made fun of or harassed for wearing their red MAGA hats, or that let them carry legally-concealed weapons … check it out it’s called 63Red—great way to figure out where not to go other than Cracker Barrel. Events House E&C Committee, Comms & Tech SubComm Hearing on Legislating to Safeguard the Free and Open Internet Tues., 3/12, 11:00AM Rayburn 2322 House E&C Committee, Comms & Tech SubComm The Impact of Broadband Investments in Rural America Tues., 3/12, 2:30PM Hart, Rm. 216 ACT Voters to Policymakers: Bridging the Digital Divide Inlcudes Unlicensed Spetrum Thurs., 3/14, 9:30AM Dirksen, Rm. 562 Federal Communications Commission Monthly Meeting Friday, 3/15, 12:30-2:30 445 12th St., NW Washington, D.C.
On today's IPv6 Buzz we examine the influence of the Internet Engineering Task Force (IETF) in today's technology landscape, particularly around the Internet Protocol (IP). Our guest is Fred Baker, emeritus chair of the IETF.
On today's IPv6 Buzz we examine the influence of the Internet Engineering Task Force (IETF) in today's technology landscape, particularly around the Internet Protocol (IP). Our guest is Fred Baker, emeritus chair of the IETF.
On today's IPv6 Buzz we examine the influence of the Internet Engineering Task Force (IETF) in today's technology landscape, particularly around the Internet Protocol (IP). Our guest is Fred Baker, emeritus chair of the IETF. The post IPv6 Buzz 018: Inside The IETF With Fred Baker appeared first on Packet Pushers.
On today's IPv6 Buzz we examine the influence of the Internet Engineering Task Force (IETF) in today's technology landscape, particularly around the Internet Protocol (IP). Our guest is Fred Baker, emeritus chair of the IETF. The post IPv6 Buzz 018: Inside The IETF With Fred Baker appeared first on Packet Pushers.
Episode 246: ControlTalk NOW — Smart Buildings PodCast for week ending November 19, 2017 features interviews with two of the industry’s most prominent thought leaders, BuildingContext.me’s editor, Therese Sullivan, provides CoreTech coverage and Co-Founder and Partner, John Petze discusses SkyFoundry’s 13 Billion Sq Ft worth of success and the roadmap ahead. Special shout out to Samuel Elkins, Portrait & Commercial Photographer extraordinaire, based in Salt Lake City, UT. More news: Good luck to Phil Zito, who is running full-time with Building Automation Monthly; Project Haystack’s latest update; Belimo releases 6-way electronic pressure independent valve with NFC; Homeland Security Advisory: HIDDEN COBRA; Contemporary Controls announces pre-built CVTRU application now available; and Johnson Controls introduces their VP140 PICV valve series. ControlTalk NOW first guest interview with Therese Sullivan, Principal, BuildingContext.me. Therese does a fabulous job updating the ControlTrends Community on CORE TECH 2017 and what’s new from Silicon Valley. Iot and OT on big campuses have bright futures ahead, drone cleaning crews keep your skyscrapers clean 24/7, UBER says buku city garage space available for re-purposing, Building Therapeutic Center to be the Largest Net Zero project to date, and much more. Visit Therese at BuildingContext. The Easy Way to Make The Internet of Things Device Data Just Work! Data, Data everywhere! As the smart building controls world explodes, and systems become more robust, they consume and need a new type of fuel, DATA! But how do you make this data usable? It is kind of like the problem the United Nations had when they designed the UN. You have all these different participants coming together to work, but they all speak different languages. Nothing gets done until they can understand each other. Without some sort of translator nothing happens. Sign up for Memoori’s Making Internet of Things Device Data Just Work! A Q&A Webinar with Project Haystack. Belimo Releases the new 6-way Electronic Pressure Independent Valve (ePIV) with Near Field Communication (NFC). Now available! Belimo‘s non-spring return 6-way electronic pressure independent valve (ePIV) assemblies with Near Field Communication (NFC) and an ultrasonic flow meter. The ½” offers flow setting to 5.5 GPM and the ¾” with flow setting to 10.3 GPM ideal for ideal for chilled beams and radiant ceilings. The compact valve has the functionality of four 2-way control valves saving space, material and installation time. Homeland Security Advisory TA17-318B: HIDDEN COBRA – North Korean Trojan: Volgmer. Overview: This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. government partners, DHS and FBI identified Internet Protocol (IP) addresses and other indicators of compromise (IOCs) associated with a Trojan malware variant used by the North Korean government—commonly known as Volgmer. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. For more information on HIDDEN COBRA activity, visit https://www.us-cert.gov/hiddencobra. Contemporary Controls Announcement Pre-Built Constant Volume RTU Applications Now Available. re-Built applications make it easy to utilize a Contemporary Controls‘ BASC22 BACnet/IP Sedona Unitary controller in constant volume air-handling (AHU) or constant volume rooftop unit (RTU) applications. Although the BASC22 is a 22-point freely-programmable controller using Sedona as the control language, it can be made into a configurable controller by installing one of five versions (CvRTUv1-CvRTUv5) of constant volume AHU/RTU applications into the controller from the CvRTU Application Series. ControlTalk NOW second guest interview is with SkyFoundry’s Co-Founder and Partner, John Petze. John spells it out — move forward with basic evaluations that are scalable, whether it’s at the edge on a cluster of field buses serving locally, or in the cloud on a huge Amazon server, make your decisions and base your workloads — using proven tools and accurate information. SkyFoundry’s SkySpark deployments have achieved an incredible milestone of ONE BILLION Square Feet worldwide with their Partner Channel, which consists of a network of over 125 authorized systems integrators, specialty engineering firms and OEMs, that implement SkySpark for end users. Read more. The post Episode 246: ControlTalk NOW — Smart Buildings PodCast for Week Ending November 19, 2017 appeared first on ControlTrends.
In this podcast, the panel talks about the devices that are all around us connecting to the Cloud and each other. Many of these devices use a common protocol, the Internet Protocol (IP), to communicate with each other over a network. Other devices that are not IP-enabled must use a controller. As more sensors, actuators, and "things" become connected, IPv6 will provide unique addressing to accommodate the explosive growth of these devices and allow them to connect directly to the Internet. Also, Fog computing is becoming very important because it keeps collected data close to the source for real-time processing.
Fakultät für Mathematik, Informatik und Statistik - Digitale Hochschulschriften der LMU - Teil 02/02
In heutigen Premiumfahrzeugen kommunizieren bis zu 80 Steuergeräte über bis zu sechs verschiedene Vernetzungstechnologien. Dabei öffnet sich die Fahrzeugkommunikation nach außen: Das Fahrzeug kommuniziert auch mit dem Smartphone des Fahrers und dem Internet. Für die Kommunikation über verschiedene Anwendungsdomänen im Fahrzeug müssen heute Gateways eingesetzt werden, die zwischen den nicht-kompatiblen Protokollen übersetzen. Deswegen geht der Trend auch in der Fahrzeugkommunikation zum Internet Protocol (IP), das für technologie- und domänenübergreifende Kommunikation entwickelt wurde. Neben dem durchgängigen Protokoll auf der Vermittlungsschicht ist für die effiziente Entwicklung eines komplexen, verteilten Systems wie einem Fahrzeug auch eine entsprechende Kommunikationsmiddleware notwendig. Die Kommunikation in einem Fahrzeug stellt spezielle Anforderungen an die Kommunikationsmiddleware. Zum einen werden in Fahrzeugen unterschiedliche Kommunikationsparadigmen genutzt, beispielsweise signalbasierte und funktionsbasierte Kommunikation. Zum anderen können sich die Kommunikationspartner in einem Fahrzeug hinsichtlich ihrer Ressourcen und ihrer Komplexität erheblich unterscheiden. Keine existierende IP-basierte Kommunikationsmiddleware erfüllt die in der vorliegenden Arbeit identifizierten Anforderungen für den Einsatz im Fahrzeug. Ziel dieser Arbeit ist es daher, eine Kommunikationsmiddleware zu konzipieren, die für den Einsatz im Fahrzeug geeignet ist. Die vorgestellte Lösung sieht mehrere interoperable Ausprägungen der Middleware vor, die den Konflikt zwischen unterschiedlichen funktionalen Anforderungen einerseits und den sehr heterogenen Kommunikationspartnern andererseits auflösen. Ein weiterer elementarer Teil der Lösung ist die Umsetzung der im Fahrzeug erforderlichen Kommunikationsparadigmen. Das funktionsbasierte Paradigma wird durch einfache Remote Procedure Calls implementiert. Das signalbasierte Paradigma wird durch ein darauf aufbauendes Notification-Konzept implementiert. Somit wird eine stärker am aktuellen Informationsbedarf orientierte Umsetzung ermöglicht, als dies im heutigen Fahrzeugbordnetz durch das einfache Verteilen von Daten der Fall ist. Es wird gezeigt, dass sich prinzipiell beide Kommunikationsparadigmen durch einen einzigen Mechanismus abbilden lassen, der abhängig von den beteiligten Ausprägungen mit dynamischen oder nur statischen Daten operiert. Ein skalierbares Marshalling berücksichtigt darüber hinaus die unterschiedlichen Anforderungen der Anwendungen und die unterschiedliche Leistungsfähigkeit der beteiligten Steuergeräte. Hiermit wird die Kommunikation zwischen allen Anwendungen im IP-basierten Fahrzeugbordnetz durchgängig ermöglicht. Auf dieser Basis wird die Lösung um wichtige Systemdienste erweitert. Diese Dienste implementieren Funktionen, die nur in der Kooperation mehrerer Komponenten erbracht werden können oder kapseln allgemeine Kommunikationsfunktionalität zur einfachen Wiederverwendung. Zwei für die Anwendung im Fahrzeug wichtige Systemdienste werden prototypisch dargestellt: Ein Service-Management ermöglicht die Verwaltung von Diensten in unterschiedlichen Zuständen, ein Security-Management bildet Security-Ziele auf die bestmögliche Kombination von implementierten Security-Protokollen der beteiligten Kommunikationspartner ab. Diese Systemdienste sind selbst skalierbar und lassen sich damit an das Konzept unterschiedlicher Ausprägungen der Kommunikationsmiddleware anpassen. Durch Leistungsmessungen an den im Rahmen dieser Arbeit entstandenen Prototypen wird gezeigt, dass die konzipierte Kommunikationsmiddleware für den Einsatz auf eingebetteten Systemen im Fahrzeug geeignet ist. Der Versuchsaufbau orientiert sich an typischen Anwendungsfällen für die Fahrzeugkommunikation und verwendet Automotive-qualifizierte, eingebettete Rechenplattformen. Insbesondere wird nachgewiesen, dass mit dem beschriebenen Konzept auch leistungsschwache Steuergeräte ins System eingebunden werden können. Die IP-basierte Kommunikationsmiddleware ist damit auf allen relevanten Steuergeräten im Fahrzeug durchgängig einsetzbar.
This lecture offers a historical account of the development of the Internet and Internet Protocol (IP). The ideal case for area networking is presented, followed by the creation of the domain name system (DNS).
Internet Protocol (IP addresses, subnet masks, default gateways), MS Windows support for old OS (Mainstream vs Extended support), selecting Windows default audio devices, purchasing academic software, Profiles in IT (Mary Lou Jepsen, Founding CTO for One Laptop per Child), iPhone4 Antennagate lawsuit settled ($15 bumpter case offered to all users), Google Chrome browser update (faster browsing, more protection for malicious downloads), high tech Valentine gifts (eReaders, iPads, cell phones, digital frames with pics together, MP3 collections of romantic songs, digital photo album), FCC to pull LightSquared approval (too much GPS interference), and OOMA VoIP users must pay telco taxes. This show originally aired on Saturday, February 18, 2012, at 9:00 AM EST on WFED (1500 AM).
Internet Protocol (IP addresses, subnet masks, default gateways), MS Windows support for old OS (Mainstream vs Extended support), selecting Windows default audio devices, purchasing academic software, Profiles in IT (Mary Lou Jepsen, Founding CTO for One Laptop per Child), iPhone4 Antennagate lawsuit settled ($15 bumpter case offered to all users), Google Chrome browser update (faster browsing, more protection for malicious downloads), high tech Valentine gifts (eReaders, iPads, cell phones, digital frames with pics together, MP3 collections of romantic songs, digital photo album), FCC to pull LightSquared approval (too much GPS interference), and OOMA VoIP users must pay telco taxes. This show originally aired on Saturday, February 18, 2012, at 9:00 AM EST on WFED (1500 AM).