VoIP ? Major Trend Number 1 Linux ? Major Trend Number 2 In-Car Spying Limited by Courts 419 Eater Baits the Conmen Number Portability ? Week Three New Spam Bill is a Turkey Real Solution to Spam is Years Away DDoS Rears it Ugly Head Successful Hack of Slot Machines Electronic Voting Machines (continued) This Christmas It is All About Gadgets Stratford News
Purpose to discuss the regulatory framework of VoIP
Agenda included
Opening Remarks by Chairman
Background Presentation by FCC
Panel I ? What is VoIP?
Panel II ? VoIP and Public Policy
Closing Statements by Chairman
FCC Chairman, Michael K Powell, said in his opening remarks ?I believe that IP-based services such as VoIP should evolve in a regulation-free zone.?
John Hodulik, CFA, UBS Investment Research believes the ?The FCC needs to take a leadership position, creating one set of rules that distinguish between different types of VoIP. Until this is completed, investors will remain wary about funding new ventures that provide the service.
Jeffrey Citron, CEO, Vonage Holdings Corp. said, ?VoIP is yet another Internet application and , as such, the mere spector or common carrier regulation opens up a Pandora?s box that has the potential to?? ?slow the growth of VoIP. ?. regulation, will undoutably spread to other applications, perhaps email, instant messaging, Internet conferencing, Internet video, and ?radio? programming.
Pits the Regional Bell Operating Companies (RBOCs) against the VoIP upstarts like Vonage.
Consumers will be the winners.
Career Tip1: Become familiar with VoIP.
Career Tip 2: Learn IPv6 which is mandated for all networks by 2008.
Hundreds of thousands have switched in the last ten days ( around 80,000 a day)
Tens of thousands had to wait a few days
Some had to wait a week
According to the New York Times, the automated systems supposed to fulfill number portability switching requests are failing about 50 percent of the time, forcing employees to transfer customer data manually, which incurs delays.
All proposed protocols would allow the server receiving the message to query the domain that that message purports to be from asking if the server that sent the mail is authorized to send from that domain
The recipient can then choose to accept or reject email from a particular verified domain.
One year from final proposal and test. Expect a solution in a couple of years.
In the meantime, grin and bear it. Use some spam filters that are available.
Nevada to enlist the expertise of the Nevada Gaming Control Board to ensure the machines are secure and accurate
Will evaluate Sequoia Voting Systems and Diebold Election Systems
Voting machine companies should learn from slot companies
Background checks on all programmers
Outside auditors monitor the code
This Christmas It is All About Gadgets
Wi-Fi Networking
802.11 g AP
802.11g Network Cards
Computer/Laptop
Memory (256 MB/5112MB)
Video Card Memory(64M/128M)
Hard Drive (40G/60G)
USB 2.0 or Firewire
DVD+RW and DVD-RW
Processor Options
Intel Celeron/P3/P4/Centrino
AMD Athlon
Displays (Flat Panel)
Stratford News
Next Start January
Masters Degrees e-Business, Telecommunications
Bachelor Degrees in IT, Business Administration, and Hospitality
Associated Degrees in Digital Design and Animation, Web Services and e-Business, Networking and Security, Culinary Arts, Hospitality, and Business Administration