For your convenience in reading: Subject lines are printed in RED and
Moderator replies when issued appear in BROWN.
Previous Issue (just one)
TD Extra News
TELECOM Digest Fri, 15 Apr 2005 21:20:00 EDT Volume 24 : Issue 166 Inside This Issue: Editor: Patrick A. Townson South Korea Cracks Down on Online Porn (Lisa Minter) AS5350, TCL and DTMF Tone (Victor Cappuccio) VoicePulse Lowers Startup Costs and Drops Tax (Jack Decker) Internet Pioneer: VoIP is NOT Telephony (Jack Decker) Mitigating Identity Theft (Dave Garland) Re: Texting is Slower Than Morse (Pete Romfh) Re: Texting is Slower Than Morse (Wesrock@aol.com) Re: Cellular Phone Harassment from '555-555-1212' (spam trap) Re: Getting Serious About the War on Spam (John Levine) Re: Spam Hits Us Hard Today - Message Losses (Lisa Hancock) Re: Walkie Talkie (Wesrock@aol.com) Re: Clearwire May Block VoIP Competitors (cphipps@gmail.com) Telecom and VOIP (Voice over Internet Protocol) Digest for the Internet. All contents here are copyrighted by Patrick Townson and the individual writers/correspondents. Articles may be used in other journals or newsgroups, provided the writer's name and the Digest are included in the fair use quote. By using -any name or email address- included herein for -any- reason other than responding to an article herein, you agree to pay a hundred dollars to the recipients of the email. =========================== Addresses herein are not to be added to any mailing list, nor to be sold or given away without explicit written consent. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome. We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. Geoffrey Welsh =========================== See the bottom of this issue for subscription and archive details and the name of our lawyer; other stuff of interest. ---------------------------------------------------------------------- Date: 15 Apr 2005 16:42:41 -0700 From: Lisa Minter <lisa_minter2001@yahoo.com> Subject: South Korea Cracks Down on Online Porn South Korea Cracks Down on Online Porn By BURT HERMAN, Associated Press Writer The world's most wired country is raiding cyberspace's red-light district in a campaign pitting Confucian morals against modern technology. Since January, the main prosecutor's office in Seoul has issued arrest warrants for about 100 people charged with spreading obscene material under South Korea's telecommunications law, a crime carrying penalties of up to a year in jail or a nearly $10,000 fine. In a highly publicized case last month, police in the southern city of Busan arrested the operator of a Web site that offers a forum to arrange swaps of sex partners. The 36-year-old man, whose name hasn't been released, is charged with spreading obscene material and remains jailed while the investigation continues, said Busan police officer Lee Nam-sik, who is heading the probe. The campaign comes amid a wider moral crackdown starting last year, when penalties for prostitution-related crimes also were doubled. Korea has an active sex trade both online and off. According to the Korean Institute of Criminology, the amount spent on prostitution alone amounted to $23.6 billion in 2002, the last year for which figures were available. At a recent Cabinet meeting, where the campaign against prostitution was discussed, President Roh Moo-hyun stressed the need for establishing a "healthy consumption culture," implying money should be spent on things other than the sex trade. In a country where more than 70 percent of homes have high-speed Internet connections, access to cyberporn is easy. That means traditional taboos in Korea's conservative, Confucian-based society have quickly shattered, said Lee Mee-sook, a sociology professor at Paichai University in the central city of Daejeon. "The code of ethics became weak, and people started satisfying their sexual desires through the Internet anonymously," she said. On a busy street in the center of the South Korean capital Seoul, "adult" Internet cafes aren't hard to find. In the cafes, customers can surf the Web in private booths, as opposed to the open rows of computers found in typical cybercafes. Authorities "can't really control it because it's the Internet, it's impossible," said Lee, 28, a worker at the Red Box adult Internet cafe, who gave only his last name. "We should have the freedom to see whatever we want." Web operators insist that adult content appearing on mainstream sites has been rated by the Korea Media Rating Board, the agency responsible for setting age recommendations for everything from films to computer games, and complain that prosecutors have overstepped their authority. "The portal sites are being accused for what they thought was legal," said Lee Yeun-woo of Kinternet, an organization that represents popular portals such Yahoo Korea, Daum and Naver. "The fine actually isn't that much. But we want to prove what those sites did wasn't illegal and want the prosecutors to prove what was wrong." To get around laws regulating Web site content, some sex sites are based on Web servers outside South Korea. The Ministry of Information and Communications is asking Internet providers to block access to them as well. Many Korean Web sites require users to enter their national identification card numbers to confirm their age to access adult content. But tech-savvy children can use programs to create false numbers or simply use their parents' IDs instead. South Korea's constitution guarantees freedom of speech, but contains the caveat that such expression should neither "violate the honor or rights of other persons nor undermine public morals or social ethics." The law doesn't define obscenity, but Jun Ji-yun, a law professor at Seoul's Yonsei University, said it was understood to be something that "brings sexual disgrace to people." Given the sheer volume of Internet pornography, prosecutors realize they face an uphill battle. They are focusing on larger Web portals and other well-known sites first, in hopes that their investigation will draw attention to the issue and serve as a warning, said Kim Dae-hyun, a Seoul prosecutor. "There are so many crimes and so many pornography sites out there," he said. "We cannot deal with all of them with such a limited amount of people here." AP reporter In-young Bang contributed to this report. NOTE: For more telecom/internet/networking/computer news from the daily media, check out our feature 'Telecom Digest Extra' each day at http://telecom-digest.org/td-extra/more-news.html . Hundreds of new articles daily. *** FAIR USE NOTICE. This message contains copyrighted material the use of which has not been specifically authorized by the copyright owner. This Internet discussion group is making it available without profit to group members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of literary, educational, political, and economic issues, for non-profit research and educational purposes only. I believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner, in this instance, Associated Press. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml [TELECOM Digest Editor's Note: Well, take the word of someone who knows what pornographic spam is all about: I get literally tons of it everyday from South Korea, always in those ascii-attempts-to-translate Korean into English, you know, the '@@@@@@@@' characters. But I have installed a Korean language pack from Microsoft I think, and been able to see the _real thing_ as they put it out, and some of it will indeed curl your hair. They are downright weird, even in their porn. Now, an issue or two ago, I suggest a 'good neighbor policy' where we Americans route all our email/Usenet stuff through China for handling and I suggest we include South Korea in that. Now you know how the Chinese government feels about South Korea; they won't listen for a minute to any of that stuff; they'd just as soon nuke them and be done with it. Imagine the Chinese government having to hire a couple million more censors to sit there and trash that stuff all day before they sent our email and news back to us here in the USA. PAT] ------------------------------ From: vcappuccio@gmail.com (Victor Cappuccio) Subject: AS5350, TCL and DTMF Tone. Date: 15 Apr 2005 14:07:22 -0700 Hola a todos, I was wondering if I can do this: Can a AS5350 running a TCL Script, detect when the call is completed and generate a DTMF Tone (like a #) and send it to a Billing Call Control System? Thanks in advance, Saludos, Victor ------------------------------ From: Jack Decker <jack-yahoogroups@withheld_on_request> Date: Fri, 15 Apr 2005 18:31:57 -0400 Subject: VoicePulse Lowers Startup Costs and Drops Tax A VoicePulse press release some of you might find interesting. VoicePulse offers service in as many or more Michigan ratecenters than any of the other major VoIP providers, and seems to receive far more positive comments than other providers on the BroadbandReports.com VoIP forum. Note, if any members of the press are reading this, an e-mail that came to me with this release said that Ravi Sakaria, the President & CEO of VoicePulse, is available for comment - contact Chris Liu, VoicePulse Public Relations, at 732-339-5106 to arrange an interview. Personally, I'd like to see the VoIP companies that actually offer numbers in all of Michigan's area codes (rather than just rateceters in the Detroit and Grand Rapids areas) get some publicity in the major media, and VoicePulse is in my opinion the top company in that regard, especially after this announcement. http://www.primezone.com/newsroom/?d=76351 VoicePulse Lowers Startup Costs and Drops Tax Company lowers first month cost by $50 and drops unwanted tax JAMESBURG, NJ (April 15, 2005) - VoicePulse Inc. announced today a promotion that reduces the startup costs of their most popular nationwide calling plan, the America Unlimited Special Offer, by $50. The America Unlimited Special Offer allows consumers to make the jump to Voice-over-IP (VoIP) for only $24.99/month for unlimited local & US long distance calling. "We've been able to build and maintain an efficient operation without sacrificing customer satisfaction or service quality," says Ravi Sakaria, VoicePulse President & CEO. "Combined with our increased scale, this translates into lower costs for VoicePulse and savings for our customers." In addition, VoicePulse has stopped charging Federal Excise Tax (FET), saving customers an additional 3% each month. VoicePulse is now the only broadband phone service provider that does not charge any unnecessary taxes or regulatory fees other than common sales tax. "There is no clarity regarding whether or not the Federal Excise Tax applies to VoIP service, so we have decided to err in favor of the consumer," says Sakaria. VoicePulse continues to pay Federal Excise Tax to its underlying telecommunications providers, as those services are still regulated and subject to taxes and tariffs. VoicePulse has won awards from highly regarded technical journals and trade magazines such as PC Magazine, PC World, and DesignTechnica. VoicePulse also boasts having the top award from Broadband Reports, which is based solely on customer reviews. ABOUT VOICEPULSE VoicePulse is a New Jersey based communications company that uses its VoIP network to deliver advanced features and high-quality phone service to residential and small-business consumers. The company leads the industry in delivering innovative features and excellent customer service. For more information about VoicePulse, please contact: Rima Vaghasiya 732-339-5100 rima @ voicepulse.com How to Distribute VoIP Throughout a Home: http://michigantelephone.mi.org/distribute.html If you live in Michigan, subscribe to the MI-Telecom group: http://groups.yahoo.com/group/MI-Telecom/ ------------------------------ From: Jack Decker <jack-yahoogroups@withheld_on_request> Date: Fri, 15 Apr 2005 18:28:16 -0400 Subject: Internet Pioneer: VoIP is NOT Telephony http://blogs.zdnet.com/ip-telephony/?p=354 4/15/2005 Internet pioneer: VoIP is NOT telephony -Posted by Russell Shaw @ 2:32 am My colleague Renai LeMay at ZDNet Australia has just had the professional privilege of hearing remarks by one of the technology world's smartest men. Vint Cerf. The Vint Cerf that developed the TCP/IP protocol that makes the Internet work. And more than 30 years after that singular (hey, I just realized how Cingular got its name) feat of innovation, there Cerf was yesterday, addressing an Internet governance forum in Sydney. Vint Cerf does not want VoIP to be regulated. His fear, though -- one that I share, is because VoIP "looks like telephony," regulatory bodies all over the world will knee-jerk assume that it needs to be governed. "My concern here is the fact that VoIP looks like, and sounds like telephony," Cerf told the group. "This is horribly misleading. To leap to that conclusion is extremely dangerous. VoIP is really just another application on the Internet. Nothing special about it." Oh, boy. This is a fitting statement for April 15, but how I wish that revenue-hungry state and local governments in the U.S. got it. But they haven't. Here in the U.S., too many jurisdictions are going to keep longingly looking at VoIP as a cash cow -- and will keep trying to figure out ways to glean money from it. The above is from: http://blogs.zdnet.com/ip-telephony/?p=354 ------------------------------ From: Dave Garland <dave.garland@wizinfo.com> Subject: Mitigating Identity Theft Date: Fri, 15 Apr 2005 19:50:27 -0500 Organization: Wizard Information excerpted from Bruce Schneir's CryptoGram http://www.schneier.com/crypto-gram-0504.html Bruce Schneir is an important figure in the field of computer and systems security. Mitigating Identity Theft Unfortunately, the solutions being proposed in Congress won't help. To see why, we need to start with the basics. The very term "identity theft" is an oxymoron. Identity is not a possession that can be acquired or lost; it's not a thing at all. Someone's identity is the one thing about a person that cannot be stolen. The real crime here is fraud; more specifically, impersonation leading to fraud. Impersonation is an ancient crime, but the rise of information-based credentials gives it a modern spin ... The crime involves two very separate issues. The first is the privacy of personal data. Personal privacy is important for many reasons, one of which is impersonation and fraud ... The second issue is the ease with which a criminal can use personal data to commit fraud. It doesn't take much personal information to apply for a credit card in someone else's name. It doesn't take much to submit fraudulent bank transactions in someone else's name. It's surprisingly easy to get an identification card in someone else's name. Our current culture, where identity is verified simply and sloppily, makes it easier for a criminal to impersonate his victim. Proposed fixes tend to concentrate on the first issue -- making personal data harder to steal -- whereas the real problem is the second. If we're ever going to manage the risks and effects of electronic impersonation, we must concentrate on preventing and detecting fraudulent transactions. Fraudulent transactions have nothing to do with the legitimate account holders. Criminals impersonate legitimate users to financial institutions. That means that any solution can't involve the account holders. That leaves only one reasonable answer: financial institutions need to be liable for fraudulent transactions. They need to be liable for sending erroneous information to credit bureaus based on fraudulent transactions. They can't claim that the user must keep his password secure or his machine virus free. They can't require the user to monitor his accounts for fraudulent activity, or his credit reports for fraudulently obtained credit cards. Those aren't reasonable requirements for most users. The bank must be made responsible, regardless of what the user does. If you think this won't work, look at credit cards. Credit card companies are liable for all but the first $50 of fraudulent transactions. They're not hurting for business; and they're not drowning in fraud, either. They've developed and fielded an array of security technologies designed to detect and prevent fraudulent transactions. They've pushed most of the actual costs onto the merchants. And almost no security centers around trying to authenticate the cardholder ... That's an important lesson. Identity theft solutions focus much too much on authenticating the person ... once you understand that the problem is fraudulent transactions, you quickly realize that authenticating the person isn't the way to proceed. Again, think about credit cards. Store clerks barely verify signatures when people use cards. People can use credit cards to buy things by mail, phone, or Internet, where no one verifies the signature or even that you have possession of the card. Even worse, no credit card company mandates secure storage requirements for credit cards. They don't demand that cardholders secure their wallets in any particular way. Credit card companies simply don't worry about verifying the cardholder or putting requirements on what he does. They concentrate on verifying the transaction. This same sort of thinking needs to be applied to other areas where criminals use impersonation to commit fraud. I don't know what the final solutions will look like, but I do know that once financial institutions are liable for losses due to these types of fraud, they will find solutions ... Right now, the economic incentives result in financial institutions that are so eager to allow transactions -- new credit cards, cash transfers, whatever -- that they're not paying enough attention to fraudulent transactions. They've pushed the costs for fraud onto the merchants. But if they're liable for losses and damages to legitimate users, they'll pay more attention. And they'll mitigate the risks. Security can do all sorts of things, once the economic incentives to apply them are there ... Doing anything less simply won't work. ------------------------------ From: Pete Romfh <promfhTAKE@OUThal-pc.org.invalid> Subject: Re: Texting is Slower Than Morse Date: Fri, 15 Apr 2005 17:17:10 -0500 Organization: Not Organized Colin wrote: > The Sydney Morning Herald reports on a challenge between > 93 year old telegraph operator transmitting morse code to > an 82 year old with a manual typewriter, and youngsters > sending a text message. The text message was received 18 > seconds after the message was already on paper. > http://smh.com.au/articles/2005/04/14/1113251739401.html > Regards, > Colin Sutton And telegraph operators can spell also. No silly abbreviations. I'm forwarding this (by email not morse code) to all the young whippersnappers around the office. They probably say I'm a crochety old fart. And they're exactly correct. =;) Pete Romfh, Telecom Geek & Amateur Gourmet. promfh at hal dash pc dot org ------------------------------ From: Wesrock@aol.com Date: Fri, 15 Apr 2005 19:40:14 EDT Subject: Re: Texting is Slower Than Morse In a message dated Fri, 15 Apr 2005 23:33:07 +1000, Colin <colin@sutton.wow.aust.com> writes: > The Sydney Morning Herald reports on a challenge between 93 year old > telegraph operator transmitting morse code to an 82 year old with a > manual typewriter, and youngsters sending a text message. The text > message was received 18 seconds after the message was already on > paper. > http://smh.com.au/articles/2005/04/14/1113251739401.html > Regards, > Colin Sutton This is not surprising to anyone who has worked with capable Morse operators. My first experience with them when I was writing the play-by-play for University of Oklahoma football games with a Morse operator beside me sending the copy as I wrote it. (Newspapers carried play-by-play accounts in their early editions up to the deadline for that edition in the days before there was television coverage of everything. Later editions, of course, would carry a regular story.) Later, when I was a newsman for United Press in Dallas, which had responsibility for many college football games throughout the Southwest, we were always delighted when a Morse operator showed up with this key and sounder. For most of the games Western Union used teletypewriters with just ordinary key punchers, not usually very skilled. But the Morse operators they sometimes sent were always skilled press operators -- even at that time, in the early and middle 1950s, declining in numbers. In the very competitive news business, their usuable output was well ahead of Western Union teletypewriter operators. Wes Leatherock wesrock@aol.com ------------------------------ From: spam trap <strap@hanh-ct.org> Subject: Re: Cellular Phone Harassment from '555-555-1212' Date: Fri, 15 Apr 2005 17:07:05 -0400 Organization: Posted via Supernews, http://www.supernews.com Lisa Hancock wrote: > T. Sean Weintz wrote: >> This is almost definitely a scofflaw telemarketer calling from a PRI >> line. By using a PRI line, can set the caller ID to be whatever he wants. > Could you explain what is a "PRI" line, and characteristicss give it the > power to change caller ID? PRI = Primary Rate Interface. It's a standard High Capacity ISDN line, with 23 B channels and 1 D channel. Generally attached to a PBX system. The "B" channels function as phone lines, while the D channel is iused for signalling. The caller ID info is (I believe) passed back to the CO via the D channel. > Why would any subscriber have access to such a line? Well, where I work we have it beacuse a) it's cheaper than 23 individual business lines, and 2) Much more flexible. I have about 50 or so DID numbers pointed at our two PRI lines -- when someone calls in, the CO passes the DNIS info (eg - what number did the person dial to get us?) to our PBX, and it uses that info to route the call to the correct extension. I also set the outgoing caller ID for calls made to individual extensions to whatever number I have set up to be the DID for that extension. When an outgoing call is made, the system grabs whatever of the 46 B channels I have happens to be free - the caller ID will always be set to the DID number of the extension making the call. I depend on our ability to set the outgoing caller ID. >> You answer and get no-one on the other end because he is using a >> predictive dialer -- a computer dials the numbers, and connects the calls >> to people in the telemarketing call center only when the call is >> answered on your end. If no one is available in the call center to take >> the call, when you answer you get the classic "no one there when I >> answer" effect -- you just hear dead air. > I don't understand that when the fellow answers the call, why someone > doesn't come on on the other end and make their sales pitch. There is > usually a brief 1-2 second, but someone does come on. Obviously they > don't want live people to miss their sales pitches. Yes, but it would seem they have more outgoing lines than they have salespeople to answer them. Common enough -- we all get those hang up sales calls from time to time I think. > [TELECOM Digest Editor's Note: The hassle is the 'predictive dialer' > (which is what they call the device which 'dials ahead' and gets > suckers on the line works too fast for the human beings doing the > talking/selling. It thinks, based on formulas built in, that by the > time it gets a sucker on the phone, an agent will be ready to talk to > them. That's when the predictive dialer plays a pre-recorded message > saying 'please hold, we have an important message for you' or > something similar. That's when I usually hang up, and you should also. > PAT] ------------------------------ Date: 15 Apr 2005 21:09:10 -0000 From: John Levine <johnl@iecc.com> Subject: Re: Getting Serious About the War on Spam Organization: I.E.C.C., Trumansburg NY USA > Ok, this guy contracted for high speed internet connectivity from > someone or another. That would be MCI. > Why did anyone else accept any packets from this organization? Good question. They're consistently #1 on the Spamhaus hit parade. R's, John [TELECOM Digest Editor's Note: Then why are they not getting cut off from the rest of the world until they make an effort to get rid of their spam traffic? Is it possibly because your superiors at ICANN and their mouthpiece Vint Cerf are so well funded by MCI that they do not allow (by heavy pressure or otherwise) anyone to put a permanent halt on MCI's traffic? Why is ICANN so silent on the volumes of spam the rest of the net has to endure day after day? Is it because ICANN and Vint Cerf are actually more interested in appeasing the spammers and commercial interests rather than the vast majority of the netizens? John, instead of answering a question with the statement 'good question' why is no one (in authority on the net) actuall, physically cutting off MCI by refusing to accept any or all of their traffic until the spam stops? PAT] ------------------------------ From: hancock4@bbs.cpcn.com Subject: Re: Spam Hits Us Hard Today - Message Losses Date: 15 Apr 2005 14:10:55 -0700 Organization: http://groups.google.com > [TELECOM Digest Editor's Note: ... Have you seen those various > commercials playing on TVLand? As an aside, I don't watch TV Land much anymore. I liked them and Nick originally when they showed a lot of classics from the 1950s and early 1960s -- great shows that hadn't been seen for years. But now it's mostly 1980s/1990s stuff and just another station running syndicated reruns. I don't need a specialty cable network to watch "Cheers". > Now the first part of your message, summed up thusly: Can't *they* do > anything about it? I can tell you that much of the software used in > email was constructed thirty years ago when spam was unheard of; it is > not easily adaptable for modern times. IMHO, that is a major weakness of the Internet. I don't know the technical details, but the idea of "anonymous" relay sites is foolish on a public network. When the Internet was a tightly closed community, it could get away with no security (although I'm surprised college kids didn't try pranks with it even way back.) But what works in a closed community simply will not work in an open one. It is ridiculous to me that we spend so much money on anti-virus software and other protections when the network itself should be hardened to protect the bad stuff from getting out on it. Despite all the protection and savvy people, my employer was knocked out of commission on several occasions from 'worms' and the like that flooded the emails. That kind of weakness is scary. Adding locks on the door will not prevent crime in the streets from entering -- we must clean up the crime in the first place. > I can also tell you there was a time many years ago when the very > notion of censoring email and/or Usenet messages was unthinkable. I remember that controversy well. Again, once the Internet became a public network rather than a private one the rules needed to change. I never bought into that early "anything goes" philosophy -- because that philosophy never existed anywhere else. Contrary to myth, college campus conversation never was as freewheeling, open, or as wideranging as educators want us to believe -- there was always some sort of constraint AND moderation of them. In the 1960s it was trendy in some places to use foul language or explicit sex talk on campus. Most kids participated because it was fun to break the rules and they enjoyed doing something in class that they're parents would freak out over. But such talk also made a lot of people uncomfortable (even if they didn't say so at the time), and such people avoided from such discussions. So, what was supposedly a _wider_ discourse was actually a _narrower_ one. In normal society, there are social and legal rules that normally prevent things from getting out of hand. Freedom of speech is protected, but someone who attempts to monopolize it and prevent others from speaking will eventually get knocked day. The overall society isn't perfect but it usually works out. On the other hand, the Internet being technical rather than face-to-face presents a completely different set of challenges. The old social norms and enforceability don't work. I have seen several Usenet groups become worthless because of high volume abusive postings that drown out legitimate discourse. Further, there's something about email that lets people say nasty things they otherwise wouldn't say in other media. Maybe because it's so easy to type it fast and send it without proofing as we once did when we typed or handwrote letters, or when speaking to someone face to face. And then of course there's anonymous email that is often used to harass and intimidate or worse. > So Lisa, to further elaborate on your question "can't anything be > done", there are some politics involved with spam even today. There > are still some netters, that though they bitch and moan about all the > spam still don't want to get down to the real business of putting them > all to sleep once and for all. Thankfully, more and more people on the > net are getting to the point of 'thinking' about it. PAT] Is it still the pioneer "netters" who fight efforts to block spam, or are corporate interests involved somewhat? IIRC, some spam fighting techiques were opposed by mainstream corporations because they can send out mass emails, too. (Sears fought against automated computer phone messages because it uses them to set up service call appts. I think they should spring to hire real people to do that.) Thanks for your observations. What scares me is that the pendulum might swing far in the other direction and draconian steps will be taken to "protect us". [TELECOM Digest Editor's Note: What you term 'pioneer netters' are the only ones who know anything about the system at all. Corporate interests don't know beans about it. All they know is that when Gore invented the internet, he included 'cheap email' with it. If the 'pioneer netters' decided to shut the whole thing down -- bring it all to a sreaming halt for a couple days -- my feeling is ICANN and their mouthpiece Vint Cerf would soil their pants, right, John??? They take our registration money (paid for the domain names) and went off to Argentina in South America last week for a convention, where they could kiss each other's backsides and compliment each other on the fine job they are doing on the net. As has been said many times in the past, ICANN hopes to rip off the net entirely from most of us and give it to commercial interests, and MCI is one of the principals in the scheme. What I do not understand is why ICANN does not cut to the chase and declare this to be all one big SpamNet, where the rest of us innocent bystanders is 'allowed to send messages if we wish'. Instead of using Spam Assassin and the like, the rule will just just toss it all out except for persons X, Y and Z provided _we_ have paid fees to use it. PAT] ------------------------------ From: Wesrock@aol.com Date: Fri, 15 Apr 2005 19:54:18 EDT Subject: Re: Walkie Talkie In a message dated 4/15/05 2:37:59 PM Central Daylight Time, editor@telecom-digest.org writes: > [TELECOM Digest Editor's Note: Chances are likely that the radio you > refer to by its generic name 'walkie talkie' was actually a UHF radio > operating in something other than the traditional citizen's band > frequency. My clue is your reference to 'private company' and 'within > the company itself'. Maybe like a radio a security service would use > in its work. Those will typically have two or four 'channels' which > is all they seem to need. I don't know why they don't have more channels > in them; probably they don't need more, and more would make the unit > too cumbersome. Any other ideas, anyone? PAT] The General Mobile Radio Service (GMRS) and Family Radio Service (FRS) have many, many channels,some of them shared and interoperable between the two services, and multiple identifying tones available on each channel to mute the receiver unless its tones are received to avoid having to listen to all the other transmissions on that channel. There are also many business services, some for itinerant use, some for fixed use, some designated for particular types of business, that all serve as walkie talkies. Not only security people, but many store people (stockers, managers, checkers, the cleaning and maintenance staffs and many other store employees) use to communicate with each other, usually with the receive volume turned up so high that all the customers are annoyed as they shop. Many people find it interesting to monitor all the walkie talkie communications at athletic events, car races, parades, etc., as part of their enjoyment of the sport. Wes Leatherock wesrock@aol.com ------------------------------ From: cphipps@gmail.com Subject: Re: Clearwire May Block VoIP Competitors Date: 15 Apr 2005 16:54:23 -0700 Organization: http://groups.google.com Jack Decker wrote: http://www.crn.com/sections/breakingnews/dailyarchives.jhtml?articleId=159905955 > Clearwire May Block VoIP Competitors > Vonage says it's been blocked; Company's terms of service "prohibits" > use of certain high-bandwidth applications. > By Paul Kapustka, > Advanced IP Pipeline 2:32 AM EST Fri. Mar. 25, 2005 > Someday, customers of wireless broadband provider Clearwire Corp. may > be able to use Voice over IP services. But right now, Craig McCaw's > newest company is giving its customers the silent treatment by > apparently blocking outside VoIP providers from its network. > In what the company claims is an effort to preserve the performance of > its pre-standard WiMAX network, Clearwire says it reserves the right > to prohibit the use of a wide range of bandwidth-hungry applications, > a list that apparently includes VoIP as well as the uploading or > downloading of streaming video or audio, and high-traffic Web site > hosting. According to the company's terms of service, Clearwire > reserves the right to restrict access or terminate service to > customers who don't comply with its rules. > While a company executive claimed the restrictions were necessary to > ensure network performance reliability, Clearwire could not explain > how that issue would be resolved when it offers its own VoIP services > in the near future. Earlier this month, Clearwire signed an agreement > with Bell Canada under which Bell Canada will provide VoIP systems and > services for Clearwire, at a date and price yet to be announced. > Full story at: http://www.crn.com/sections/breakingnews/dailyarchives.jhtml?articleId=159905955 > [TELECOM Digest Editor's Note: Aren't there, in most communities a > choice of other highspeed data services, such as AOL? PAT] ------------------------------ TELECOM Digest is an electronic journal devoted mostly but not exclusively to telecommunications topics. It is circulated anywhere there is email, in addition to various telecom forums on a variety of networks such as Compuserve and America On Line, Yahoo Groups, and other forums. It is also gatewayed to Usenet where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Patrick Townson. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. Contact information: Patrick Townson/TELECOM Digest Post Office Box 50 Independence, KS 67301 Phone: 620-402-0134 Fax 1: 775-255-9970 Fax 2: 530-309-7234 Fax 3: 208-692-5145 Email: editor@telecom-digest.org Subscribe: telecom-subscribe@telecom-digest.org Unsubscribe:telecom-unsubscribe@telecom-digest.org This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives/ (or use our mirror site: ftp.epix.net/pub/telecom-archives) Email <==> FTP: telecom-archives@telecom-digest.org Send a simple, one line note to that automated address for a help file on how to use the automatic retrieval system for archives files. You can get desired files in email. ************************************************************************* * TELECOM Digest is partially funded by a grant from * * Judith Oppenheimer, President of ICB Inc. and purveyor of accurate * * 800 & Dot Com News, Intelligence, Analysis, and Consulting. * * http://ICBTollFree.com, http://1800TheExpert.com * * Views expressed herein should not be construed as representing * * views of Judith Oppenheimer or ICB Inc. * ************************************************************************* ICB Toll Free News. Contact information is not sold, rented or leased. One click a day feeds a person a meal. Go to http://www.thehungersite.com Copyright 2004 ICB, Inc. and TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA. ************************ DIRECTORY ASSISTANCE JUST 65 CENTS ONE OR TWO INQUIRIES CHARGED TO YOUR CREDIT CARD! REAL TIME, UP TO DATE! SPONSORED BY TELECOM DIGEST AND EASY411.COM SIGN UP AT http://www.easy411.com/telecomdigest ! ************************ Visit http://www.mstm.okstate.edu and take the next step in your career with a Master of Science in Telecommunications Management (MSTM) degree from Oklahoma State University (OSU). This 35 credit-hour interdisciplinary program is designed to give you the skills necessary to manage telecommunications networks, including data, video, and voice networks. The MSTM degree draws on the expertise of the OSU's College of Business Administration; the College of Arts and Sciences; and the College of Engineering, Architecture and Technology. The program has state-of-the-art lab facilities on the Stillwater and Tulsa campus offering hands-on learning to enhance the program curriculum. Classes are available in Stillwater, Tulsa, or through distance learning. Please contact Jay Boyington for additional information at 405-744-9000, mstm-osu@okstate.edu, or visit the MSTM web site at http://www.mstm.okstate.edu ************************ --------------------------------------------------------------- Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization. End of TELECOM Digest V24 #166 ****************************** | |