Telecom and networking trends 2013

One of the big trends of 2013 and beyond is the pervasiveness of technology in everything we do – from how we work to how we live and how we consume.

Worldwide IT spending increases were pretty anemic as IT and telecom services spending were seriously curtailed last year. It seems that things are going better. Telecom services spending, which has been curtailed in the past few years, only grew by a tenth of a point in 2012, to $1.661tr, but Gartner projects spending on mobile data services to grow enough to more than compensate for declines in fixed and mobile voice revenues. Infonetics Research Report sees telecom sector growth outpacing GDP growth. Global capital expenditure (capex) by telecommunications service providers is expected to increase at a compounded rate of 1.5% over the next five years, from $207 billion in 2012 to $223.3 billion in 2017, says a new market report from Insight Research Corp.

Europe’s Telco Giants In Talks To Create Pan-European Network. Europe’s largest mobile network operators are considering pooling their resources to create pan-European network infrastructure, the FT is reporting. Mobile network operators are frustrated by a “disjointed European market” that’s making it harder for them to compete.

crystalball

“Internet of Things” gets new push. Ten Companies (Including Logitech) Team Up To Create The Internet Of Things Consortium article tell that your Internet-connected devices may be getting more cooperative, thanks to group of startups and established players who have come together to create a new nonprofit group called the Internet of Things Consortium.

Machine-to-Machine (M2M) communications are more and more used. Machine-to-machine technology made great strides in 2012, and I expect an explosion of applications in 2013. Mobile M2M communication offers developers a basis for countless new applications for all manner of industries. Extreme conditions M2M communication article tells that M2M devices often need to function in extreme conditions. According to market analysts at Berg Insight, the number of communicating machines is set to rise to around 270 million by 2015. The booming M2M market is due to unlimited uses for M2M communications. The more and more areas of life and work will rely on M2M.

Car of the future is M2M-ready and has Ethernet. Ethernet has already been widely accepted by the automotive industry as the preferred interface for on-board-diagnostics (OBD). Many cars already feature also Internet connectivity. Many manufacturers taking an additional step to develop vehicle connectivity. One such example is the European Commission’s emergency eCall system, which is on target for installation in every new car by 2015. There is also aim of Vehicle-to-Vehicle communications and Internet connectivity within vehicles is to detect traffic jams promptly and prevent them from getting any worse.

M2M branches beyond one-to-one links article tells that M2M is no longer a one-to-one connection but has evolved to become a system of networks transmitting data to a growing number of personal devices. Today, sophisticated and wireless M2M data modules boast many features.

The Industrial Internet of Things article tells that one of the biggest stories in automation and control for 2013 could be the continuing emergence of what some have called the Internet of Things, or what GE is now marketing as the Industrial Internet. The big question is whether companies will see the payback on the needed investment. And there are many security issues that needs to be carefully weighted out.

crystalball

Very high speed 60GHz wireless will be talked a lot in 2013. Standards sultan sanctifies 60GHz wireless LAN tech: IEEE blesses WiGig’s HDMI-over-the-air, publishes 802.11ad. WiFi and WiGig Alliances become one, work to promote 60GHz wireless. Wi-Fi, WiGig Alliances to wed, breed 60GHz progeny. WiGig Alliance’s 60GHz “USB/PCI/HDMI/DisplayPort” technology sits on top of the IEEE radio-based communications spec. WiGig’s everything-over-the-air system is expected to deliver up to 7Gbit of data per second, albeit only over a relatively short distance from the wireless access point. Fastest Wi-Fi ever is almost ready for real-world use as WiGig routers, docking stations, laptop, and tablet were shown at CES. It’s possible the next wireless router you buy will use the 60GHz frequency as well as the lower ones typically used in Wi-Fi, allowing for incredibly fast performance when you’re within the same room as the router and normal performance when you’re in a different room.

Communications on power line still gets some interest at least inside house. HomePlug and G.hn are tussling it out to emerge as the de-facto powerline standard, but HomePlug has enjoyed a lot of success as the incumbent.

Silicon photonics ushers in 100G networks article tells that a handful of companies are edging closer to silicon photonics, hoping to enable a future generation of 100 Gbit/s networks.

Now that 100G optical units are entering volume deployment, faster speeds are very clearly on the horizon. The push is on for a 400G Ethernet standard. Looking beyond 100G toward 400G standardization article tells that 400G is very clearly on the horizon. The push is now officially “on” for 400-Gigabit Ethernet standard. The industry is trying to avoid the mistakes made with 40G optics, which lacked any industry standards.

Market for free-space optical wireless systems expanding. Such systems are often positioned as an alternative to fiber-optic cables, particularly when laying such cables would be cost-prohibitive or where permitting presents an insurmountable obstacle. DARPA Begins Work On 100Gbps Wireless Tech With 120-mile Range.

914 Comments

  1. Tomi Engdahl says:

    Cumulus Networks Comes Out of Stealth With Linux for Data-Center Networks
    http://allthingsd.com/20130619/cumulus-networks-comes-out-of-stealth-with-linux-for-data-center-networks/

    Startup Cumulus Networks popped out of stealth mode today to announce that it has created a version of the Linux operating system for building out software-defined networks in the data center.

    While there has been so much talk about software-defined networking, the fact is that the primary piece of networking equipment still has an embedded operating system on it that is closely tied to the company that built it.

    As Levine put it in a blog post this morning, Cumulus Linux is intended to change that. Combine it with other SDN technologies like that of Nicira — a onetime AH-backed startup that’s now part of VMware — and you have a reasonable shot of making proprietary hardware obsolete.

    In this way, networks become a lot more customizable, and more carefully tuned to the applications running in them. They also get cheaper.

    The target, of course, is Cisco Systems, which controls most of the switching market, followed by companies like Hewlett-Packard, Alcatel-Lucent, Juniper and Dell.

    Reply
  2. Tomi Engdahl says:

    10GBase-T gains traction, but still too power hungry
    http://www.eetimes.com/electronics-news/4417069/10GBase-T-gains-traction–but-still-too-power-hungry

    10GBase-T Ethernet switch port shipments surged in 1Q13 to more than 150,000 ports, accounting for four percent of total 10 Gigabit Ethernet port shipments, a record percentage. 10GBase-T growth was driven by products that were announced in 2012, mostly based on 40nm ASIC introductions by component manufacturers such as Broadcom and Aquantia.

    While this twisted-pair copper version of 10GE still consumes more power than other alternatives, the 40nm silicon process has allowed 10GBase-T to better compete on a power consumption basis. The smaller 40nm process also allows for a greater 10G port density on switches.

    At Interop in May 2013, there were significant 10GBase-T product introductions from many vendors, so we anticipate 10GBase-T revenues will ramp in the second half of the year. Low ASPs of less than $200 per 10GBase-T port from many vendors by 4Q13 will also likely drive significant growth.

    Due to Intel’s use of LOMs some of the 10GBase-T ports sold are not connected to 10GBase-T switches yet.

    First, 2013 will not see 10GBase-T LOM installed on many servers. Instead daughter cards will give customers choice.

    Reply
  3. Tomi Engdahl says:

    10GBase-T gains traction, but still too power hungry
    Wireless bolsters busienss networks
    http://www.eetimes.com/electronics-news/4417069/10GBase-T-gains-traction–but-still-too-power-hungry?pageNumber=1

    there has been a shift in the way Ethernet switches and wireless LAN devices are deployed. Leading vendors in this space now deliver a class of devices and software that combine functions that were previously unique to the Ethernet switch and WLAN system.

    So it’s no surprise the majority of the six percent year-over-year growth in the business edge networks has come from the wireless LAN systems

    Reply
  4. Tomi Engdahl says:

    Gigabit Speed & Power Over Ethernet
    http://www.designnews.com/author.asp?section_id=1386&doc_id=264539

    Gigabit and Power over Ethernet (PoE) are two networking technologies moving ahead in tandem as industrial users power remote Ethernet devices such as IP security cameras at 1,000 Mbps over existing CAT5 cable. The move to gigabit performance is also ramping up, in general, as users look for ways to strengthen their network infrastructures.

    “The overall trends in the marketplace are the move to high speeds and Gigabit operation,”

    “Video applications and other network consumers are playing a role in the need for speed and, with the price point of the Gigabit products coming down, it enables users to future-proof their network.”

    B&B Electronics, following its acquisition of IMC Networks in June 2012, has launched the next generation of its PoE and PoE+ media converters featuring gigabit (1,000 Mbps) speed.

    According to Duffy, the 802.3AT PoE+ standard already in the marketplace delivers about 25W of power to the end devices, but there are devices in development that will provide up to 60W.

    With external TV cameras on the top of a pole, many have a wiper element on them to handle harsh conditions, a bottle of water for washing the lens on the camera, and a heater to avoid condensation issues, all of which are drawing more power.

    Reply
  5. Tomi Engdahl says:

    Finnish computer security experts do not like the British spy stir in surprise. United Kingdom has been for decades one of the most significant intelligence giants and signals intelligence pioneers.

    Information British signals intelligence espionage fiber-optic network is a Finnish security authorities, rather than the confirmation of a surprise. Information security to new revelations have been long awaited evidence.

    However, the scope of the inquiry may be security experts toes. Less than fifty fiber optic network means a great slices of the world’s fiber optic lines, and the United Kingdom is one of the world’s telecommunications hubs. European data streams United Kingdom is haarautumispaikka and network traffic congestion.

    Europe, the United States runs the data is scrolled almost inevitably controlled by the British signals intelligence fiber optic cables. Information Society Development Centre of Research and Development, Jyrki Plant points out that the cooperation has a long history in the intelligence world.

    - In fact, I would be surprised if the NSA had stopped cooperation with the United Kingdom, Canada, Australia and New Zealand. They have a long history of signals intelligence. Cooperation extends back decades.

    - Perhaps the most embarrassing was that the United Kingdom was caught. This has been speculation for years, but co-operation (the UK and the U.S.) has not been a continuation of the screen. In particular, it is strange that the British authorities to hand over authority in the United States saw a lot of information.

    British and U.S. intelligence cooperation is Jyrki Plant incompatible with the EU’s security objectives. European security authorities will marvel at the NSA’s activities in UK works in partnership with the United States.

    eputy Director of Communications Office Erka Koivunen says that the optical fibers have replaced the satellites.

    - Optical fiber passes all traffic. There, go to the internet traffic, phone calls, video streams and social media communications. Even twenty years ago, satellite was the most important source of information. Now the optical fiber passes all of data traffic.

    Source: http://yle.fi/uutiset/suomalainen_nettivirta_kulkee_ison-britannian_kautta/6700656

    Reply
  6. Tomi Engdahl says:

    Wireless test platform verifies TD-SCDMA mobile devices
    http://www.edn.com/electronics-products/other/4417043/Wireless-test-platform-verifies-TD-SCDMA-mobile-devices

    Anritsu has added TD-SCDMA signaling test capability to its Rapid Test Designer platform, enabling LTE chipset and device OEMs to test their products for compliance with the TD-SCDMA Chinese mobile communications standard.

    With RTD, LTE product developers can verify that products will work in areas with TD-SCDMA coverage where LTE is not yet available and guarantee continuous service as users move across the boundaries of regions covered by different radio-access technologies.

    Reply
  7. Tomi Engdahl says:

    GCHQ taps fibre-optic cables for secret access to world’s communications
    http://www.guardian.co.uk/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa

    Exclusive: British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal

    Britain’s spy agency GCHQ has secretly gained access to the network of cables which carry the world’s phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).

    One key innovation has been GCHQ’s ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months.

    GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects.

    This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user’s access to websites

    The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden as part of his attempt to expose what he has called “the largest programme of suspicionless surveillance in human history”.

    “It’s not just a US problem. The UK has a huge dog in this fight,” Snowden told the Guardian. “They [GCHQ] are worse than the US.”

    The Guardian understands that a total of 850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.

    The documents reveal that by last year GCHQ was handling 600m “telephone events” each day, had tapped more than 200 fibre-optic cables and was able to process data from at least 46 of them at a time.

    Each of the cables carries data at a rate of 10 gigabits per second, so the tapped cables had the capacity, in theory, to deliver more than 21 petabytes a day – equivalent to sending all the information in all the books in the British Library 192 times every 24 hours.

    For the 2 billion users of the world wide web, Tempora represents a window on to their everyday lives, sucking up every form of communication from the fibre-optic cables that ring the world.

    Reply
  8. Tomi Engdahl says:

    NSA hacked China’s top carriers in hunt for SMS data – report
    Snow joke for NSA as latest revelations point to extensive campaign
    http://www.theregister.co.uk/2013/06/24/snowden_china_carriers_hacked_nsa/

    PRISM snitch Edward Snowden responded to the US government formally charging him with spying on Friday with fresh revelations that the NSA hacked China’s three state-run telcos in a bid to nab SMS data.

    In another carefully-timed disclosure, this time to Hong Kong’s Sunday Morning Post, Snowden handed over confidential documents apparently revealing the extensive attacks against China Mobile, China Telecom and China Unicom.

    The three have a combined subscriber base of over one billion

    US government attackers are also said to have targeted the Hong Kong HQ of submarine cable network giant Pacnet, which counts China’s carriers among its customers and runs an extensive network across the Asia Pacific.

    Reply
  9. Tomi Engdahl says:

    Geographic Ethernet price disparities determined
    http://www.cablinginstall.com/articles/2013/06/ethernet-disparities.html

    New data from TeleGeography’s Ethernet Pricing Service reveals that there are widespread geographic disparities in Ethernet over MPLS (EoMPLS) price levels and structures, as alternative to legacy SDH/SONET technologies.

    According to TeleGeography’s data, the lowest prices for point-to-point EoMPLS circuits are found on routes between major cities in Europe and the US, and on trans-Atlantic links. In Q1 2013, the median monthly price of a 10 Mbps circuit was USD446 between London and Paris, USD896 from Los Angeles to New York, and USD652 from London to New York.

    Trans-Pacific and intra-Asian prices are significantly higher. In Q1 2013, the median price of a 10 Mbps circuit was USD1,706 per month between Los Angeles and Tokyo and USD1,863 per month between Hong Kong and Tokyo.

    Regional differences are also apparent when examining the cost associated with increasing capacity.

    Reply
  10. Tomi Engdahl says:

    400G Internet connections?
    http://www.cablinginstall.com/articles/2013/06/400g-blog.html

    Bell Labs has reportedly boosted Internet connections to 400 Gbps using noise-canceling technology.

    The study’s lead author, Dr. Xiang Liu, told BBC News, “This concept, looking back, is quite easy to understand, but surprisingly, nobody did this before.”

    ” By sending two beams of light rather than just one beam down a cable, the noise from the signals end up canceling each other out when the two beams meet at the other end. As a result, the team was able to push data through 7,954 miles of cable at 400 Gbps”

    Reply
  11. Tomi Engdahl says:

    ZTE transmits 400G over 5000 km
    http://www.cablinginstall.com/articles/2013/06/zte-400g.html

    As reported by our sister site Lightwave, ZTE Corp., a global provider of telecom and network equipment, says it has transmitted 400 Gbps over more than 5000 km.

    The transmission, which reportedly involved what ZTE called “a unique frequency algorithm,” used a WDM system based on 100-GHz channel spacing. The link included 25 ROADM nodes, but no electrical repeaters.

    AT&T delivered a paper at this year’s OFC/NFOEC in which it reported transmitting 400 Gbps over 12,000 km using a time-domain-hybrid modulation format that comprised a mix of 48 QPSK and 77 8QAM symbols on a 100-GHz grid.

    Reply
  12. Tomi Engdahl says:

    Study: Large corporations opting for DAS over small cells, Wi-Fi
    http://www.cablinginstall.com/articles/2013/06/abi-das-large-corp.html

    ABI Research contends that there is “a fierce battle raging” between distributed antenna systems (DAS), Wi-Fi, and licensed small cells for coverage and capacity in enterprise wireless systems.

    Each type of system has its strengths and weaknesses, notes the firm’s new study, with active DAS systems emerging as the clear choice for large corporations (defined in the research as over 100,000 square feet and with more than 100 employees). Small and medium-sized enterprises (SMEs) are generally seen choosing between Wi-Fi and small cells.

    According to ABI, there are two business models at play for DAS in large corporations: neutral-host or carrier-led.

    Reply
  13. Tomi Engdahl says:

    Are intelligent buildings NATO or a go?
    http://www.cablinginstall.com/articles/print/volume-21/issue-6/features/are-intelligent-buildings-nato-or-a-go.html?cmpid=EnlCIMJune242013

    Sometimes derided as a “no-action, talk-only” concept, the intelligent building is creeping ever-closer to fulfilling its long-time promise.

    One of the running jokes that has been told in the structured cabling industry, and others, for a long time is that the “intelligent building” concept has been 18 months away from becoming reality for the past 18 years. And here we remain, with a very slim likelihood that anybody reading this article has ever received a remote alert from their refrigerator that they were running low on mayonnaise. As such, some have derided intelligent buildings as a NATO technology—no action, talk only.

    The current standard, TIA-862-A, permits the use of what is commonly called “direct attach cabling,” a setup in which horizontal cable is terminated to a modular plug that is inserted directly into the network device. Looking at the setup a little more closely, if the cabling layout uses a horizontal connection point, it is not necessary to have an equipment outlet in the link. That equipment outlet becomes optional. The horizontal connection point, which makes the direct-attach an option, is a fundamental part of a zone cabling architecture. This architecture, says The Siemon Company (www.siemon.com), is key to a cabling system truly becoming an enabling technology for IP convergence and building intelligence

    Security applications

    The concept of direct-attach cabling most frequently has been associated with IP security or surveillance cameras, but the ability to direct-attach is not limited to those devices. Bob Allan, intelligent building market manager with Siemon, explains that other security-related devices are also poised to join surveillance devices as IP-enabled equipment. “A next logical application would be card-access systems,” he comments. “There are similarities in layout and other characteristics between card-access and camera systems. They can be integrated.” In explaining how multiple systems can work together, Allan describes this scenario: “When a user swipes in or uses a proximity reader to gain access, a camera zooms in on them. This integration of access-control and surveillance can also be used to detect and take action on unauthorized access.”

    Redwood Systems (www.redwoodsystems.com) has developed an LED-based lighting system that operates over communications cabling. Among the system’s characteristics is the ability to collect usage and environmental data, and put that information to use in order to increase the efficiency of the energy spent lighting a space.

    The Continental Automated Buildings Association (CABA; http://www.caba.org) dedicates its efforts to the advancement of home and building automation. One of its recent projects was a study of intelligent building bid specification.

    “Demand potential for intelligent buildings solutions is further impacted by the perceived price-performance ratio of these products,” the study also found, according to CABA. “Building owners do not have a clear idea of the actual benefits of buying these new products and solutions.”

    Reply
  14. Tomi Engdahl says:

    Specifying splices in a fiber-optic network
    http://www.cablinginstall.com/articles/print/volume-21/issue-6/features/specifying-splices-in-a-fiber-optic-network.html?cmpid=EnlCIMJune242013

    The high-strength, low-loss joints serve a network well, but only when they are properly specified and carried out.

    The process of designing a fiber-optic network is not difficult. It may seem that way, due to the large number of questions that need to be answered to achieve the three goals of accurate transmission, high reliability and low cost

    This article, dealing with fiber splicing, is excerpted from the manual

    The designer chooses between fusion and mechanical splicing. In both types, two prepared fiber ends are aligned to provide low power-loss. Each type has unique characteristics, requirements and advantages.

    The installer requires the same basic toolkit for both fusion and mechanical splicing–cable-end preparation tools and a precision cleaver. Both methods require cleaving of the fiber ends to produce flat and perpendicular endfaces.

    The basic kit costs approximately $2,000 with a precision cleaver. With a low-cost cleaver, the kit costs less than $1,000.

    Fusion splicng

    Fusion splicing requires one additional tool–the fusion splicer.

    Fusion splicing is the process of fusing, or welding together, two fibers. Fusion splicing is used in most initial installations and in restoration. The process requires a fusion splicer. The fusion splicer provides two functions: 1) precise alignment of the fibers to each other prior to splicing; 2) control of the splicing operation.

    After the splicer aligns the fibers, it controls the arc current, arc time and overrun. These parameters determine the power loss and strength of the splice.

    Mechanical splicing

    Mechanical splicing is the process of inserting two prepared fiber ends into a mechanical splice. The mechanical splice provides precise alignment of both fiber ends and serves as a cover.

    Different methods create precise alignment.

    Reply
  15. Tomi says:

    Less porn for you: UK ISPs will enact auto-filtering of adult content by the end of 2013
    http://thenextweb.com/insider/2013/06/17/less-porn-for-you-uk-isps-will-enact-auto-filtering-of-adult-content-by-the-end-of-2013/

    Relax, you can still watch porn in the United Kingdom, but it’s about to become a bit harder. As reported in Wired, Internet service providers (ISPs) in the country will “make filtering a standard option across industry.” If you don’t act, parental filters will come “pre-ticked.”

    ISPs are implementing the filtering system without a legal requirement, so we will not see a law enforcing the new policy.

    The kicker to this is that the system will not only be put in place for new accounts, but for existing accounts as well. This is pervasive.

    “We will have automatic put on, so if you turn the filter off at 9pm, it turns on again at 7am.”

    Here’s what’s going on: In collaboration with their government, UK Internet providers are deciding to filter the Web connections of their customers. Thus, in the UK by 2014, you will no longer have access to the web unfettered; instead you can, with added effort, remove the blinders and access whatever the hell it is you want, but only for a short period of time before the handcuffs are reattached.

    Reply
  16. Tomi Engdahl says:

    New EU rules require ISPs, Telcos to come clean within 24 hours of data breach
    http://paritynews.com/government/item/1160-new-eu-rules-require-isps-telcos-to-come-clean-within-24-hours-of-data-breach

    Under new EU regulations ISPs and Telcos serving European customers will have to come clean in case of a security or data breach within 24 hours.

    Telecom operators or Internet service providers (ISPs) operating in Europe who suffer from data breach that leads to loss of personal data or theft of such data or data is compromised in any way will have to notify national data protection authorities within 24 hours. Companies will have to disclose the nature and size of the breach within the first 24 hours and wherever it’s not possible to submit such data, they must “initial information” within the stipulated time with full details within three days.

    Under the new terms the affected organizations will be required to reveal information such as information that has been compromised and the steps that have been taken or will be taken to resolve the situation. If the breach “is likely to adversely affect” personal information or privacy, affected businesses and consumers will be notified of the breach.

    Reply
  17. tomi says:

    Steelie Neelie eyeballs ENCRYPTION PLAN for telco data breaches
    That way you won’t need to tell subscribers you’ve lost their stuff – EU veep
    http://www.channelregister.co.uk/2013/06/25/neelie_kroes_eu_new_rules_on_isp_data_losses/

    Telcos in Europe are being asked to consider encrypting their subscribers’ personal information as Brussels confirmed new rules on Monday about the industry’s obligation to notify customers about data breaches.

    The European Union’s unelected digital czar, “Steelie” Neelie Kroes, said that if ISPs agreed to shield the data with difficult-to-crack code then companies would not be required to tell the subscriber when a breach of their data has occurred.

    The EC said it would be publishing “an indicative list of technological protection measures, such as encryption techniques, which would render the data unintelligible to any person not authorised to see it.”

    By encrypting the data, the Commission said the “burden” of companies having to inform national authorities about a breach would be lifted, because the subscriber’s personal data would apparently be safeguarded.

    Reply
  18. Tomi Engdahl says:

    Chinese Media Calls For Boycott of Cisco
    http://politics.slashdot.org/story/13/06/25/140232/chinese-media-calls-for-boycott-of-cisco

    “China’s state-run media is calling on the country’s wireless carriers to move away from Cisco products. According to reports, using Cisco products allows the U.S. to ‘attack China almost at will,’ and forms a ‘terrible security threat.’ Chinese officials are urging the companies’ wireless carriers to switch to hardware made by Huawei and ZTE Corp. Citing cybersecurity concerns, the United States has banned the use of equipment from both Huawei and ZTE in its cellular networks.”

    Reply
  19. Tomi Engdahl says:

    Poor countries with satellite internet first part of the rose into orbit

    The project is aimed at providing on-line connection in areas where there is no possibility to drawn normal cables. The company’s name O3b (the Other 3 Billion) refers to the permanent on-line connection of the reach of living in the world’s three billion people. Project is motivated by the big names, such as Google, a satellite group SES World Skies and banking giant HSBC.

    They fired a rocket from Kourou French Guiana to get up first four satellites. The purpose is to obtain the company’s orbit a total of 12 satellites, which operate at a speed broadband Internet connection areas who do not have fixed cable connections. For satellite connection you need a satellite dish.

    Standard Geosynchronous (GEO) satellites operate approximately 36,000km away from Earth. As a result, round-trip data transmission times significantly exceed 500 milliseconds. O3b’s Medium Earth Orbit (MEO) satellites are far closer – approximately 8,000km away from Earth. As a result, round-trip data transmission times are reduced to approximately 130 milliseconds. This virtually eliminates the delay that plagues voice and data communications via GEO satellite systems.

    O3b Networks’ satellites are equipped with steerable antennas, which (like those used on imaging satellites) have the ability to remain locked onto a fixed location on Earth as the satellite passes overhead.

    Equatorial loft above the rotating satellite Internet connection would allow to cover a large part of the globe (except the northernmost and south fourth of globe). The coverage zone between +/- 45 degrees of latitude was defined in order to deliver services to almost all emerging-markets countries, with optimal cost efficiency.

    O3b became fully financed in November 2010 and plans to have eight satellites launched during this year. O3b Networks was founded to provide affordable and high-quality internet connectivity across emerging markets.

    Source:
    http://yle.fi/uutiset/koyhien_maiden_satelliittinetin_ensimmainen_osa_nousi_kiertoradalle/6704823
    http://www.o3bnetworks.com/
    http://www.o3bnetworks.com/welcome-to-o3b/faqs

    Reply
  20. Tomi Engdahl says:

    Reduce warranty costs with Cloud-based analytics
    http://www.edn.com/design/automotive/4416763/Reduce-warranty-costs-with-Cloud-based-analytics

    New vehicle buyers expect generous warranties, especially for new model types of unknown reliability. What then can a manufacturer do to help ensure the warranty program does not adversely impact their bottom line? Why not turn to the cloud?

    This article focuses on use of a high end data analytics solution to determine which component of the vehicle is subjected to maximum wear and tear in the initial few months after launch. Such statistical analysis provides useful information to the manufacturer to look into the product design and manufacturing for the areas where maximum problems are encountered. A proactive detection and technical fix reduces the possibility of further failure and in turn warranty cost.

    Today’s modern vehicles use multiple microcontrollers in ECUs (Electronic Control Units) to control the operation of various features of the car like ABS (Antilock Braking System), fuel/ignition control – MPFI, AC control, car window and seating control, and so on. Embedded software inside the ECUs not only controls the operation, but also provides the fault detection feature of the module.

    Now-a-days all vehicles are fitted with a dedicated OBD-II (Onboard Diagnostics) connector.

    This paper explains the use of a Cloud based system to capture the DTC data from various service stations spread across a geographical area, or even the entire world.

    The vehicle manufacturer can gather the fault records or DTCs from various service centers after the vehicle launch and analyze it periodically to identify any patterns.

    Each DTC or fault code has five-characters.

    the first digit of the DTC code provides the flexibility to design custom fault codes. Manufacturers can add them to monitor the behavior of parts newly introduced into production.

    Vehicle manufacturers can store huge amount of datasets or samples to run failure analyses. Typically, every vehicle generates 100-150kB of useful data from the field every year. This large volume will generate a reliable insight about frequently occurring faults by simple use of the decision tree method. Generated data can be benchmarked against established models for comparison.

    Reply
  21. Tomi Engdahl says:

    ICANN working group seeks to kill WHOIS
    http://www.computerworld.com.au/article/465895/icann_working_group_seeks_kill_whois/

    An ICANN working group is seeking input on a replacement for the current WHOIS system for retrieving details of domain name registrations

    The Expert Working Group on gTLD Directory Services (EWG) has issued a report (PDF) that recommends a radical change from WHOIS. The working group, which had a clean-slate approach to a new domain name information, was formed “to help resolve the nearly decade-long deadlock within the ICANN community on how to replace the current WHOIS system, which is widely regarded as ‘broken.’”

    With the current system, client software can retrieve database records from a WHOIS server run by a registrar or registry that typically list details such as administrative and technical contact details for the owner of a domain name, name servers and details of the registration and expiry dates of a domain.

    The EWG is proposing a shift to an “aggregated RDS [registration data service] (ARDS) model”, whereby most access to domain name registration details would be provided from a central repository.

    Access to the ‘live’ domain records maintained by gTLD registries would also be possible via the ARDS “upon request and subject to controls to deter overuse or abuse of this option”.

    “Requestors” – people who want to query the data maintained by ARDS – would have to apply for the right to access domain information.

    Reply
  22. Tomi Engdahl says:

    Internet daddies win Blighty’s ‘Nobel for engineering’
    Digital pioneers to share £1m prize pot
    http://www.theregister.co.uk/2013/06/26/the_queen_to_salute_godfathers_of_the_internet/

    The men who helped give birth to the internet have been awarded the first Queen Elizabeth Prize for Engineering at Buckingham Palace.

    Brit pioneer Sir Tim Berners-Lee, along with US computer scientists Bob Kahn and Vint Cerf and Frenchman Louis Pouzin will share the £1m spoils that come with the prize.

    The prize, awarded for the first time this year, will reward their part in starting a “communications revolution which has changed the world”.

    “However, these five visionary engineers, never before honoured together as a group, led the key developments that shaped the internet and web as a coherent system and brought them into public use.”

    “The internet and the web are prime examples of this – engineering innovations that have enabled new industries, a huge number of jobs and enabled the world and its people to access education and knowledge as never before.”

    Tim Berners-Lee invented the world wide web, while Robert Kahn and Vint Cerf pioneered the Transmission Control Protocol and the Internet Protocol (TCP/IP). Louis Pouzin designed the early packets communication network CYCLADES and Marc Andreessen is the co-author of Mosaic, the first web browser.

    Reply
  23. Tomi Engdahl says:

    U.S. data center construction market report forecasts to 2016
    http://www.cablinginstall.com/articles/2013/06/data-center-construction-report.html

    Analysts forecast the data center construction market in the U.S. to grow at a CAGR of 7.61 percent over the period 2012-2016. One of the key factors contributing to the market’s growth is the expansion of existing data center facilities, finds the research.

    The data center construction market in the U.S. has also been witnessing the growing adoption of high-density data centers, says the study. However, the research indicates that the growing focus on data center consolidation could pose a challenge to the growth of this market.

    Reply
  24. Tomi Engdahl says:

    IEEE forms 4-pair Power over Ethernet Study Group
    April 1, 2013
    http://www.cablinginstall.com/articles/2013/04/ieee-4pair-poe.html

    The Institute of Electrical and Electronics Engineers (IEEE) announced it has formed a new study group to consider initiating a formal project to standardize four-pair Power over Ethernet (PoE). The 4-pair Power over Ethernet Study Group will consider a four-pair solution’s capability to enhance energy efficiency and provide greater than 25.5 Watts of power in improving PoE.

    Chad Jones, who chairs the study group, said, “PoE has become the dominant powering method in many Ethernet-based products—access points and IP phones, for example—demonstrating that customers will migrate toward convenience. Enabling applications beyond 25.5 Watts will extend this convenience to other products.”

    Reply
  25. Tomi Engdahl says:

    How Cat 8 cable will economically solve data centers’ need for high bandwidth
    http://www.cablinginstall.com/articles/2013/05/how-cat8-will-solve.html

    Reply
  26. Tomi Engdahl says:

    The unequivocal market need for 40-GbE in the data center
    http://www.cablinginstall.com/articles/2013/05/cisco-40g.html

    A recent white paper from Cisco addresses data centers’ impending move to 40 Gigabit Ethernet, how it will change the network’s architecture, and what IT managers can do now to prepare to migrate to the new standard. “The business case for 40 Gigabit Ethernet is becoming inescapably compelling,” writes Cisco’s Gautam Chanda.

    Reply
  27. Tomi Engdahl says:

    Cabling infrastructure developers avow 400G union
    http://www.cablinginstall.com/articles/2013/04/cabling-400g-union.html

    DatacenterDynamicsFOCUS has a good wrap-up noting the committment of several major cabling companies to work with a unified approach toward hammering out the new 400Gbps specifications. Brocade, Avago Technologies, JDS Uniphase, Molex and TE Connectivity have formally joined to advance the new 400G copper cable and fiber-optic transceiver specs to drive data transmission rates.

    Reply
  28. Tomi Engdahl says:

    Partnership and training programs keep contractors on track
    http://www.cablinginstall.com/articles/print/volume-21/issue-6/features/partnership-and-training-programs-keep-contractors-on-track.html

    Whether a system is made of components from partnering vendors or is a single-vendor end-to-end channel, opportunities for education and training on system installation are many.

    Reply
  29. Tomi Engdahl says:

    The hidden costs of low-quality splitters
    http://www.cablinginstall.com/articles/print/volume-21/issue-6/features/the-hidden-costs-of-low-quality-splitters.html?cmpid=EnlContractorJune272013

    The heart of a passive optical LAN, the optical splitter can tempt a procurement officer to gain short-term cost savings, but doing so puts the POL at long-term risk of system failure.

    Reply
  30. Tomi Engdahl says:

    Ethernet demarcation devices offer built-in micro-OTDR
    http://www.cablinginstall.com/articles/2013/06/edd-micro-otdr.html

    , Optical Zonu Corp. (OZC) announced that Metrodata’s advanced Ethernet demarcation devices (EDD) are the first to natively support Optical Zonu’s fault finding optical transceivers with built-in micro-OTDR (uOTDR) capability. Metrodata’s FCM9004 and FCM9002 EDDs will now offer automatic detection, location, and reporting of optical fiber faults when one uses Optical Zonu’s patent-pending iSFC transceivers. Metrodata says the new technology will considerably reduce the time and equipment needed to recover from faults.

    EDDs are used by communication service providers to configure and police a number of connection performance parameters necessary to comply with customer service level agreements (SLAs).

    Reply
  31. Tomi Engdahl says:

    Arduino-based development kits for cloud-based M2M apps include GSM chip and M2M SIM card
    http://www.edn.com/electronics-products/other/4417485/Arduino-based-development-kits-for-cloud-based-M2M-apps-include-GSM-chip-and-M2M-SIM-card

    Deutsche Telekom is officially launching its M2M development kits for programmers looking to develop cloud-based machine-to-machine applications. The development kits consist of an Arduino or a Cinterion board with a GSM chip, a SIM card, and access to the M2M Developer Platform.

    The launch will coincide with the relaunch of the M2M Developer Community, a portal for developing M2M products, solutions, and services. The portal also offers a procedural model illustrating steps during the development of M2M applications – from initial idea, requirements analysis and design to marketing.

    The M2M DevStarter developer kit bundles all the tools required to get started with machine-to-machine communication. It comes with either an Arduino board or the Cinterion EGS5 kit that is designed for developing prototypes in industrial scenarios.

    All sets include a SIM card complete with a six-month M2M data tariff and private access to the cloud-based M2M Developer Platform. The platform is supplied by Deutsche Telekom in cooperation with cloud specialist Cumulocity GmbH.

    Reply
  32. Tomi Engdahl says:

    Data Center Game-Changer: How Will You Be Impacted by Data Center Fabrics?
    http://www.belden.com/blog/datacenters/Data-Center-Game-Changer-How-Will-You-Be-Impacted-by-Data-Center-Fabrics.cfm

    A traditional three-tier switching architecture using core, aggregation and access switches is not ideal for large, virtualized data centers. For one server to communicate with another, the data may need to traverse north from an access switch along a hierarchical path through aggregation switches and a core switch and then south again through more switches before reaching the other server.

    Data center switch fabrics that typically use only one or two tiers of switches are now widely viewed as the optimal architectures to enable east-west traffic. These flattened architectures provide low-latency and high-bandwidth communications between any two points to meet the needs of virtualized networks and ever-increasing application and traffic load.

    In data center switch fabric architectures, any server can communicate with any other server via no more than one interconnection switch path between any two access switches. Data center switch fabric architectures feature switches with large numbers of connections to other switches that are all active

    Reply
  33. Tomi Engdahl says:

    Technological Advancements Enable Easy Back-to-Basic Structured Cabling Design
    http://www.belden.com/blog/datacenters/Technological-Advancements-Enable-Easy-Back-to-Basic-Structured-Cabling-Design.cfm

    In the Data Center, migration to 40 and 100-gigabit infrastructure deployment and flattened architectures are causing optical loss budgets to shrink.

    Unfortunately, the loss values of many pre-terminated fiber solutions have only allowed for two mated pairs in a channel, which has limited the ability to deploy manageable, scalable and secure networks.

    In fact, the current insertion loss of 0.75 dB per mated pair defined by TIA allows for just one mated pair in both 10- and 40-GbE fiber channels

    How many connection points is optimum? Let’s take a look.

    2-Point Topology

    While less expensive in material, two mated pairs requires high-density patching at the core. This can cause difficult, unsecure access to critical switch ports, creating the risk of interrupting live traffic.

    5-Point Topology

    Considered the pinnacle solution, a five-point topology allows for both a cross-connect at the core and ZDAs at each equipment row. This offers low-density, easy-access patching at the core and enables all cabling to be preinstalled from the core to the ZDAs.

    While few vendors’ pre-terminated assemblies can even support four (or even three) mated connections, Belden offers the industry’s lowest loss connectivity (0.2 dB for MPOs and 0.15 dB for LCs) to support a four-point topology in 40 GbE channels using both OM3 and OM4 fiber, or a five-point topology in both 40 GbE and 16 Gb Fibre Channel applications using OM4.

    Reply
  34. Tomi Engdahl says:

    Maintaining Polarity—A Not-So-Simple Necessity
    http://www.belden.com/blog/datacenters/Maintaining-Polarity-A-Not-So-Simple-Necessity.cfm

    In today’s Data Centers, 12-fiber preterminated array cabling is frequently used to establish an optical path between switch tiers. Accomplishing this path in a way that matches the transmit signal (Tx) on one switch port to the corresponding receive signal (Rx) on the other switch port is referred to as polarity.

    In August 2012, TIA published Addendum 2 to the ANSI/TIA 568-C.0 Generic Telecommunications Cabling for Customer Premises Standard that provides three example methods to establish polarity of optical fiber array systems—Connectivity Method A, B and C.

    The systems components deployed for multiple duplex signals includes a breakout cassette at each end that consists of a multi-fiber push-on (MPO) adapter to multiple duplex adapters, typically LC. Preterminated 12-fiber trunk cables (or multiples thereof) connect to the MPO adapter on the back of the two cassettes, and duplex patch cords are used to connect the equipment to the front of the cassettes.

    A simple way to look at these polarity methods is that Method A is the most straight forward but requires a different patch cord at one end. Method B uses the same patch cord at both ends, but the cassettes (circled in red in Figure 1) must be flipped over at one end so that the fiber that originated in position 1 is mapped to position 12. Method C is a variant of Method A, but with the cross-over implemented in the trunk cable instead of the patch cord. Both Method B and Method C have the advantage of using the same patch cords at both ends.

    Reply
  35. Tomi Engdahl says:

    TI targets Internet of Things set-up
    http://www.eetimes.com/electronics-news/4417512/TI-targets-Internet-of-Things-set-up

    Texas Instruments rolled out new hardware and software to help simplify the process of connecting thousands of different types of devices to the Internet of Things.

    The giant electronics manufacturer’s new solution taps into near-field communications (NFC) protocols as a means of making wireless connections between routers and printers, speakers, sensors, switches, and a multitude of other products. “The whole idea is to make the pairing easy,” Dev Pradhan of Texas Instruments told Design News. “With this, your NFC-enabled phone pairs the information from your router to all your devices with a touch.”

    Reply
  36. Tomi says:

    Alcatel-Lucent gives DSL networks a gigabit boost
    http://www.pcworld.com/article/2043483/alcatellucent-gives-dsl-networks-a-gigabit-boost.html

    Alcatel-Lucent and Telekom Austria have completed the world’s first trial of G.fast with vectoring, a combination of technologies enabling gigabit broadband over existing copper networks.

    To help keep DSL a relevant option for the last part of a broadband connection, the so-called “last mile,” vendors are working on a number of technologies to increase the broadband speeds that can be delivered over old telephone lines.

    However, calling G.fast a last-mile technology is somewhat misleading, because the technology is only intended for distances up to 100 meters or 0.06 miles. But at that distance and less it helps copper keep up with fiber. The trial achieved a maximum speed of 1.1Gbps over 70 meters and 800Mbps over 100 meters over a single, good-quality cable, according to Alcatel-Lucent. On older, unshielded cables the trial managed 500Mbps over 100 meters on a single line, it said.

    With the help of vectoring, G.fast also works over multiple copper lines at the same time. Vectoring already improves the performance of VDSL2 to 100Mbps over existing copper connections at up to 400 meters by removing crosstalk interference.

    Alcatel-Lucent isn’t alone in working on G.fast products and will compete with the likes of Huawei Technologies. The plan is to have a standard ready next year, followed by chipsets in 2015 and first-generation commercial products in 2016, which won’t have support for vectoring, according to Stefaan Vanhastel, marketing director for the Fixed Networks business at Alcatel-Lucent.

    Copper remains the dominant technology, but Point Topic believes that a shift in technology is occurring, particularly to fiber and hybrid fiber, as consumers require and are willing to pay for higher speeds from their broadband connections, it said.

    Reply
  37. Tomi says:

    Here’s what an eavesdropper sees when you use an unsecured Wi-Fi hotspot
    http://www.pcworld.com/article/2043095/heres-what-an-eavesdropper-sees-when-you-use-an-unsecured-wi-fi-hotspot.html

    You’ve probably read at least one story with warnings about using unsecure public Wi-Fi hotspots, so you know that eavesdroppers can capture information traveling over those networks. But nothing gets the point across as effectively as seeing the snooping in action.

    It’s similar to listening in on someone’s CB or walkie-talkie radio conversation. Like CBs and walkie-talkies, Wi-Fi networks operate on public airwaves that anyone nearby can tune into.

    As you’ll see, it’s relatively easy to capture sensitive communication at the vast majority of public hotspots—locations like cafes, restaurants, airports, hotels, and other public places. You can snag emails, passwords, and unencrypted instant messages, and you can hijack unsecured logins to popular websites. Fortunately, ways exist to protect your online activity while you’re out-and-about with your laptop, tablet, and other Wi-Fi gadgets. I’ll touch on those, too.

    I opened my laptop at the coffee shop and began capturing Wi-Fi signals, technically called 802.11 packets, with the help of a free trial of a wireless network analyzer. The packets appeared on screen in real time as they were captured

    I first searched for packets containing HTML code, to see which websites other hotspot users were browsing.

    the trial network analyzer I used reassembled the packets and displayed them as a regular webpage view.

    Since I use an app to connect to my email service via POP3 without encryption, you could have seen my login credentials along with the message

    If you still use FTP (File Transfer Protocol) to download, upload, or share files, you should avoid connecting to them over unsecured hotspots. Most FTP servers use unencrypted connections, so both login credentials and content are sent in plain text, where any eavesdropper can easily capture them.

    app called DroidSheep
    app can be used to gain access to private accounts on popular Web services, such as Gmail, LinkedIn, Yahoo, and Facebook.

    DroidSheep looks for and lists any unsecure logins to popular websites.

    DroidSheep detected Google, LinkedIn, and Yahoo logins from other people

    I could magically access my Facebook account on that rooted Android phone
    without ever providing my username or password from that device.

    here’s how you can use a public hotspot with some degree of security:

    Every time you log in to a website, make sure that your connection is encrypted.

    You also need to make sure that the connection stays encrypted for all of your online session. Some websites, including Facebook, will encrypt your log-in and then return you to an unsecured session—leaving you vulnerable to hijacking

    Many sites give you the option of encrypting your entire session. You can do this with Facebook by enabling Secure Browsing in the Security settings.

    When you check your email, try to login via the Web browser and ensure that your connection is encrypted

    Never use FTP or other services that aren’t encrypted.

    To encrypt your Web browsing and all other online activity, use a VPN

    Keep in mind that private networks have similar vulnerabilities: Anyone nearby can eavesdrop on the network. Enabling WPA or WPA2 security will encrypt the Wi-Fi traffic

    Reply
  38. car transport|vehicle transport|car carriers|moving a car|car transport services|auto carriers|vehicle carriers says:

    Pretty nice post. I simply stumbled upon your blog and wished to say that I’ve truly loved browsing your weblog posts. After all I will be subscribing on your feed and I am hoping you write again very soon!

    Reply
  39. Tomi says:

    Antitrust: Commission confirms unannounced inspections in Internet connectivity services
    http://europa.eu/rapid/press-release_MEMO-13-681_en.htm?locale=en

    The European Commission can confirm that on 9 July 2013 Commission officials initiated unannounced inspections at the premises of a number of telecommunications companies active in the provision of Internet connectivity in several Member States. The Commission has concerns that the companies concerned may have violated EU antitrust rules that prohibit the abuse of a dominant market position (Article 102 of the Treaty on the Functioning of the European Union – TFEU).

    Unannounced inspections are a preliminary step into suspected anticompetitive practices.

    Reply
  40. time management courses says:

    perhaps there is any training that teaches us occasion management?

    Reply
  41. Tomi says:

    The internet of things may drive you nuts before it makes things better
    http://gigaom.com/2013/07/11/the-internet-of-things-may-drive-you-nuts-before-it-makes-things-better/

    Summary:
    The people applying the internet of things at big companies are often marketers not the engineers. So some products might be amazing, while others could be simply annoying.

    The scariest thing anyone has ever said to me about the internet of things wasn’t about the NSA spying on my gadgets or that someone might hack my connected door locks. Instead, it came from Bob Dahlberg, VP business development at Arrayent, who told me last week, “Right now big appliance makers only have contact with a buyer once every ten years or so, but with connected devices they could make that three to four times a week.”

    The idea of my fridge, my dryer and my dishwasher all conspiring to provide me updates several times a week in some attempt to keep in touch on behalf of Samsung, Bosch or Whirlpool makes me want to run screaming from the internet. But in some ways this might be the near-future of the internet of things at big companies, because the budget and ideas for connectivity are mostly driven by marketing budgets.

    Yet, it’s equally clear that for manufacturers, connecting devices isn’t just beneficial on the sales side: it could have profound impacts on making devices easier to service. Imagine if your dryer could tell the manufacturer that a ball bearing had come loose in the drum, as well as provide information about how people use the product and therefore suggest product improvements. This is already happening in some areas and will just increase in time.

    Reply
  42. Tomi says:

    Internet pioneer Vint Cerf talks online privacy, Google Glass and the future of libraries
    http://thenextweb.com/insider/2013/07/12/vint-cerf/

    Reply
  43. Tomi says:

    In India, the Dot Dash Is Done
    http://tech.slashdot.org/story/13/07/15/0215237/in-india-the-dot-dash-is-done

    “Only 7 years behind the US. From Forbes: ‘… in India, where I’m now sojourning, telegraph service has survived as a basic means of communication since the British East India Company sent the first telegram from Calcutta to nearby Diamond Harbor in 1850… As of July 15, the state company that runs the telegraph service is shutting it down. … “For long, the telegraph was eyed with suspicion as an emblem of imperial rule,” editorialized The Indian Express”

    “The Victorian Internet” writes, the early telegraph networks were responsible for “hype, skepticism, hackers, on-line romances and weddings, chat-rooms, flame wars, information overload, predictions of imminent world peace.”‘

    Reply
  44. Tomi says:

    Finland certainly can not boast of fiber networks exploitation of telecommunication networks. A recent OECD statistics show that the optical fiber of Finland’s fixed broadband network is only a few percent. For example, our neighboring country, Sweden, the fiber network accounts for over 30 per cent.

    Source: http://www.tietoviikko.fi/kaikki_uutiset/miksi+suomessa+ei+rakenneta+enempaa+kuituverkkoja/a915633

    Reply
  45. Tomi says:

    OECD Broadband Portal
    http://www.oecd.org/internet/broadband/oecdbroadbandportal.htm

    The OECD broadband portal provides access to a range of broadband-related statistics gathered by the OECD.

    Reply
  46. Florencio Wyman says:

    Hey, please check out my NEW iPhone 5 review – youtu.be/6ADTuymE8k0

    Reply
  47. betting says:

    Hello to every one, because I am actually keen of reading this blog’s post to be updated daily. It contains nice stuff.

    Reply
  48. Tomi says:

    UK ISP Filter Will Censor More Than Porn
    http://yro.slashdot.org/story/13/07/27/0051224/uk-isp-filter-will-censor-more-than-porn

    “The Open Rights Group spoke with several ISPs and found that in addition to pornography, users will also be required to opt in for any content tagged as violent material, extremist and terrorist related content, anorexia and eating disorder websites, suicide related websites, alcohol, smoking, web forums, esoteric material and web blocking circumvention tools.”

    Reply
  49. Tomi says:

    UK Porn Filter: Censorship Extends Beyond Pornography, But One ISP Is Fighting Back
    http://www.ibtimes.com/uk-porn-filter-censorship-extends-beyond-pornography-one-isp-fighting-back-1361379

    U.K. Prime Minister David Cameron announced Monday that British Internet service providers (ISPs) must install porn filters and require customers to opt-in for adult content. Cameron said the policy is aimed at combating child porn and the “corroding influences” of sexual content in the U.K., but several people are unhappy with the plan. Reports have linked the filters to controversial Chinese company Huawei, and others have found that the filters will block much more than just porn. Some ISPs have publicly refused to force the filters on their users.

    The Open Rights Group spoke with several ISPs and found that in addition to pornography, users will also be required to opt in for any content tagged as violent, extremist, terrorist, anorexia and eating disorders, suicide, alcohol, smoking, web forums, esoteric material and web-blocking circumvention tools. These will all be filtered by default, and the majority of users never change default settings with online services.

    One U.K. ISP, TalkTalk, already has “The HomeSafe System,” which was singled out for praise by David Cameron when announcing the new policy.

    More troubling is the revelation that HomeSafe is actually operated by Huawei, a Chinese company that both the U.K. and the U.S. accused of having close ties with the Chinese government. Huawei’s founder, Ren Zhengfei, is a former officer of China’s People’s Liberation Army

    ISPs will be able to use whatever filter system they like, so many may not choose to be associated with Huawei. Others are refusing to take place in the filters at all.

    Reply

Leave a Reply to time management courses Cancel reply

Your email address will not be published. Required fields are marked *

*

*