Dr. Henning Schulzrinne, current CTO of the Federal Communications Commission. Dr Schulzrinne co-developed the key protocols that enable Voice over Internet Protocol (VoIP) and other multimedia applications, including RTP which enables real-time transmission of multimedia across the Internet and SIP, which sets up and configures VoIP telephony communications.
VoIP phones are implemented in every major organization and they are providing an attack surface for every malicious user that's knows the basics of hacking. If there is no encryption in the communication media then an ...
THV 11 Girl's Galaxy S4 Smartphone Burns Under Her Pillow as She Sleeps Yahoo Tech When she got up and searched around for the source of the stench, she realized that she had wedged her charging phone under her pillow.
Some in cybersec keep claiming that open-source is inherently more secure or trustworthy than closed-source. This is demonstrably false. Firstly, there is the problem of usability. Unusable crypto isn't a valid option for most users.
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it. Amazon Web Services (AWS) cloud division is coming under attack from competitors who are using Bezos' own cost-cutting tactics against it, and it's starting to show in Amazon's financial results.
IP Communications & VoIP's insight:
Consumers do win. I'm not rushing to change lanes just yet, under the assumption that AWS will catch up. But then we only use a few dollars a month from AWS.
The new anti-surveillance technologies recently called for by former National Security Agency contractor Edward Snowden is much needed to ensure individuals' privacy and protection from government, Yan Zhu, a San-Francisco based staff technologist at Electronic Frontier Foundation, told RIA-Novosti Tuesday.