Mehrwerte Via IP Videokonferenztechnik Hält Einzug in Voip-Systeme

Total Page:16

File Type:pdf, Size:1020Kb

Mehrwerte Via IP Videokonferenztechnik Hält Einzug in Voip-Systeme KOMMUNIKATIONSMANAGEMENT Mehrwerte via IP Videokonferenztechnik hält Einzug in VoIP-Systeme Kai-Oliver Detken VoIP-Systeme (Voice over IP) werden von Microsoft übernommen, eroberte normalerweise dazu genutzt, Telefon- als kostenloser Chat-Dienst die Welt. gespräche über IP-basierte Infrastruk- Nach und nach kamen Funktionen wie Nach wie vor tut sich in Deutschland turen zu führen. Dabei steht die Tele- Telefonie, Videounterstützung und fonie klar im Vordergrund. Videokon- Mehrpunktkonferenzen hinzu. Skype die Videokonferenztechnik schwer, ferenzsysteme entwickelten sich un- lässt sich mittels einer Applikation wenn es um Einsatz und Verbreitung abhängig von VoIP und werden oft nutzen, die inzwischen auf vielen Be- parallel dazu eingesetzt. triebssystemen erhältlich ist. Aller- geht. Allerdings haben inzwischen Aufgrund der Sicherheitsproblematik dings basiert die Datenübertragung – kein externer Anrufer darf direkt auf auf einem proprietären Protokoll. Sky- auch die IP-Telefonhersteller diese einen internen Rechner von außen zu- pe konnte sich maßgeblich durchset- Möglichkeit zur Kommunikation greifen – konnten sich Desktop-Video- zen, weil die Anwendung einfach ge- konferenzsysteme bislang nicht eta- nutzt werden kann und sich automa- entdeckt und setzen vermehrt blieren. Sie fristeten ein Nischendasein tisiert den Weg zum Zielrechner im Low-Budget-Bereich (wie z.B. Net- bahnt, d.h., die Software arbeitet hin- Bildtelefonie auf ihren Systemen ein. Meeting von Microsoft). Hinzu kam, ter den meisten Firewalls und NAT- Zudem kommt aus dem Instant- dass zentrale Server im Internet po- Routern problemlos. tenzielle Videoteilnehmer zwecks Na- Das damit vorhandene systemimma- Messaging-Lager eine mens- und IP-Adressenauflösung spei- nente Sicherheitsproblem scheint aber chern mussten, damit ein entspre- vielen Unternehmen nichts auszuma- Wiederbelebung des Themas. NET chender Videokonferenzanruf über- chen – sie nutzen Skype aufgrund der zeigt, welche Möglichkeiten es gibt, haupt abgesetzt werden konnte. Das einfachen Handhabung trotzdem. Die barg weitere Sicherheitsrisiken durch Anwendung muss sich halt immer mit solche Systeme einzusetzen, welche die direkte und ständige Verbindung einem öffentlichen Skype-Server ver- Vorteile sie bringen und welche mit einem öffentlichen Server. Zudem binden, damit eine Kommunikation war es umständlich, da beim Einsatz mit anderen Teilnehmern aufgebaut Hersteller Videokonferenzen im VoIP- unterschiedlicher Videokonferenz- werden kann. Da der Kommunikati- Tools kein gemeinsamer Server zur onsaufbau von intern nach extern Umfeld unterstützen. Verfügung stand. normalerweise in einem Unterneh- Daher entwickelten sich Videokonfe- men nicht verboten wird, stellt dies renzraumsysteme, die Punkt-zu-Punkt- erst einmal kein Problem dar. Dadurch Verbindungen zu festen Standorten ist auch der Rückweg für den Server über ein separates Netz erlaubten – leicht zu ermitteln, um mit dem Client auch schon in sehr hoher Video- in Verbindung zu bleiben. Falls es (H.264 für HDTV) und Audioqualität mehr Einschränkungen an der Firewall (G.711, Breitbandaudio). Es blieb aber gibt, probiert Skype einfach automa- bei zwei unterschiedlichen Systemen, tisch alle offenen Ports aus, die für die die sich nur selten kombinieren lie- kommunikation freigeschaltet sind. ßen. Dies wird sich nun ändern, da so- Zwar wird die Kommunikation zwi- wohl VoIP als auch Videokonferenzsys- schen Client und Server mit AES256 teme auf dem Internetprotokoll (IP) verschlüsselt, aber die Kommunikati- basieren und eine Videointegration on auf dem Server ist unverschlüsselt, für Unternehmen neue Mehrwerte so dass der Anbieter die Gespräche schaffen kann. bei Bedarf mithören kann. Zudem werden verschiedene RC4-Varianten Desktop-Videosysteme verwendet, die nicht mehr als sicher gelten. Und es wurde nachgewiesen, Prof. Dr.-Ing. Kai-Oliver Detken ist Dozent an Erst durch Skype kam Bewegung in dass Skype durch Ermittlungsbehör- der Hochschule Bremen im Fachbereich Infor- die Verbreitung von Desktop-Videosys- den bereits abgehört wurde. Die AES- matik sowie Geschäftsführer der Decoit GmbH temen. Der Skype-Dienst, inzwischen Implementierung bei Skype kann da- 10 NET 7-8/15 Mehrwerte via IP her als nicht optimal angesehen wer- Die meisten kommen dabei aus dem lich sorgt der Audiocodec SILK für ei- den. Bereich des Instant Messaging (IM). ne gute Sprachqualitätt. Verschiedene Trotzdem hat Skype einen großen An- Als gute Alternative zu Skype kann H.264-Optimierungen ermöglichen teil daran, dass Desktop-Videosyste- dabei das Open-Source-Tool Ekiga darüber hinaus eine gute Bildübertra- me eine stärkere Verbreitung erfahren verwendet werden, das verschiedene gung. haben. Eine Brücke in die VoIP-Welt, Betriebssysteme unterstützt. Neben die über Asterisk bereits einmal exis- der Audio- und Videotelefonie sind so VoIP-Systeme mit tierte, wurde durch die Übernahme Konferenzschaltungen, Anrufweiter- Videofunktionen von Microsoft leider wieder abgebro- leitungen, Präsenzbenachrichtigun- chen. Hierbei war es möglich, über gen und Anruferlisten möglich (Bild Während im IM-Umfeld immer mehr Skype mit seiner SIP-Telefonanlage in 1). Mithilfe von Session Traversal Utili- Sprach- und Videofunktionen inte- beide Richtungen zu kommunizieren. ties for NAT (STUN) können auch NAT- griert werden, setzen auch die IP-Tele- Tabelle 1 zeigt die Software-Clients, Systeme überwunden werden, ähn- fonhersteller auf mehr Videoleis- die Videotechnik mit unterstützen. lich der Skype-Funktionalität. Zusätz- tungsmerkmale. Durch die SIP-Ver- Programm Betriebssystem Lizenzen Funktionen Brosix Windows, Mac OS, Freeware: geschlos- Text, Sprach- und Videonachrichten, Linux, Android, iOS, sen, proprietär Whiteboard, Desktop-Sharing Webclient Ekiga Windows, Linux GPL-freie Software Sofortnachrichten (POSIX) Global IP, Windows Freeware, Lizenzver- Freisprechen, Anrufbeantworter, Konfe- Ninja sion (Pro, CTI, renz, Chat, Präsenzanzeige, Gruppen CRYPT, Enterprise) Goober Windows, Linux, Freeware Sofortnachrichten, Telefonie, SMS, Mac OS X, iPhone Dateiaustausch Homer Windows, Linux, Freeware P2P Video/Audio/Chat, Streaming, Conferencing Mac OS X Präsentation Bild 1: Ekiga-Oberfläche mit Videocall iVisit Windows, Mac OS Freeware: geschlos- Konferenz ( acht Teilnehmer), sen, proprietär Dateiübertragung, Aufnahmen mittlung (SIP – Session Initiation Pro- kapanga.net Windows, Windows geschlossen, pro- Telefonie tocol) eines VoIP-Servers werden An- Mobile 5 prietär rufe zwischen zwei Endgeräten ver- KPhone Linux (KDE) GPL-freie Software Sofortnachrichten mittelt, so dass auch Punkt-zu-Punkt- Linphone Windows, Linux, GPL-freie Software Sofortnachrichten, IPv6 Mac OS X, iOS Videoübertragungen aufgebaut wer- Minisip Windows, Linux GPL/LGPL-freie Soft- Sofortnachrichtenkonferenz den können. Allerdings ist der Markt ware noch sehr überschaubar (Tabelle 2). Miral Windows geschlossen, pro- Anrufliste, Kontaktmanagement, MS- Bisher haben nur fünf Hersteller eine (DyLogic) prietär Office-Unterstützung, integrierter Videotelefoniefunktion im Portfolio. Anrufbeantworter Vier davon kommen aus dem typi- Nadiz Phon Windows Freeware Anrufliste QuteCom Windows, Linux, GPL-freie Software Sofortnachrichten, Voicemail, QuteCom schen VoIP-Umfeld, während Polycom Mac OS X, zu Telefon sich vom Bereich der Videokonferenz- SmartPhone, systeme nähert. Aber der Markt Windows Mobile wächst stetig und ermöglicht die Ver- SightSpeed Windows, Mac OS X Freeware Voicemail, Konferenzen, Aufnahme, wendung immer besserer Codecs für Sofortnachrichten, SIP-Hardwareunter- stützung Audio- und Videofunktionen. Skype Windows, Mac OS X, Freeware, proprietär Dateiübertragung, Voicemail, SkypeOut, Bei den Endgeräten fällt auf, dass hier iOS, Linux, Android, Mehrpunktkonferenzen oftmals Touchscreens und das mobile Symbian, Windows Betriebssystem Android verwendet Phone SwyxIt! Windows geschlossen, pro- Aufnahme, Voicemail, Home-Office- und werden. So kombiniert z.B. Grand- prietär Mobilfunkintegration, Präsenzinformatio- stream die Funktionen eines Android- nen, Outlook- und CRM-Unterstützung, Smartphones mit denen eines klassi- Anrufliste schen SIP-Telefons. Alle Funktionstas- Tivi Windows, viele Handys, Freeware Tivi zu Festnetz Nokia Smartphones ten werden dabei über die Oberfläche Windows Live Windows Freeware Sofortnachrichten, PC zu Telefon zur Verfügung gestellt – feste Tasten Messenger sucht man vergebens. Durch die Nut- Yahoo! Windows, Mac OS X Freeware Dateiübertragung, PC zu Telefon, Telefon zung von Android, können an dem Messenger zu PC Telefon diverse Apps installiert und XMeeting Mac OS X BSD-freie Software Aufnahme genutzt werden. Ein Webbrowser ist Tabelle 1: VoIP-Clients mit Videofunktionalität (GPL – General Public License, LGPL – Lesser General integriert, so dass auch Webseiten Public License, BSD – Berkeley Software Distribution) aufgerufen oder webbasierte Anwen- NET 7-8/15 11 Mehrwerte via IP Endgeräte Betriebssystem Funktionen handen. Drei Lautsprecher sorgen für Grandstream Android 4.2.2 7"-Touchscreen, HD-Audio/Video, integrierter Webbrowser, eine gute Sprachqualität auch ohne GXV3275 CMOS-Kamera, SIP, Bluetooth Hörer. Grandstream Android 4.2.2 4,3"-Touchscreen, HD-Audio/Video, integrierter Webbrowser, GXV3240 CMOS-Kamera, Skype, Microsoft Lync, SIP, Bluetooth Polycom VVX 500 proprietär Farb-Touchscreen, HD-Audio, HD-Videowiedergabe und -Inte- Fazit and VVX Camera gration in Geschäftsanwendungen, integrierte Webanwen- Bundle dungen Videosysteme halten endgültig in Polycom VVX 600 proprietär Farb-Touchscreen, HD-Audio,
Recommended publications
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Using Voip Midtveisrapport
    INF5261 Using VoIP Midtveisrapport Thomas Bekkeheien, Magnus Lange og Mathias Hagen Innholdsfortegnelse 1 Innledning ............................................................................................................................................. 4 2 Analyse av eksisterende VoIP tilbud .................................................................................................... 4 2.1 Begreper ........................................................................................................................................ 4 2.1.1 VoIP......................................................................................................................................... 4 2.1.2 SIP ........................................................................................................................................... 4 2.1.3 SoftPhone ............................................................................................................................... 5 2.2 Oversikt over tilbydere .................................................................................................................. 5 2.2.1 Shape Services ........................................................................................................................ 5 2.2.2 Barablu ................................................................................................................................... 5 2.2.3 Nimbuzz! ................................................................................................................................
    [Show full text]
  • Exinda Applications List
    Application List Exinda ExOS Version 6.4 © 2014 Exinda Networks, Inc. 2 Copyright © 2014 Exinda Networks, Inc. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Document Built on Tuesday, October 14, 2014 at 5:10 PM Documentation conventions n bold - Interface element such as buttons or menus. For example: Select the Enable checkbox. n italics - Reference to other documents. For example: Refer to the Exinda Application List. n > - Separates navigation elements. For example: Select File > Save. n monospace text - Command line text. n <variable> - Command line arguments. n [x] - An optional CLI keyword or argument. n {x} - A required CLI element. n | - Separates choices within an optional or required element. © 2014 Exinda Networks, Inc.
    [Show full text]
  • Full Circle Magazine #28 1 Contents ^ Full Circle Program in Python - Pt2 P.07 Ubuntu Women P.30
    full circle ISSUE #28 - August 2009 LINUX, APACHE, MYSQL & PHP SERVER (LAMP) PART 1 full circle magazine #28 1 contents ^ full circle Program In Python - Pt2 p.07 Ubuntu Women p.30 LAMP - Part 1 p.12 Ubuntu Games p.32 My Opinion p.21 MOTU Interview p.27 Allmyapps Networking With SSHFS p.15 Command & Conquer p.05 Fast Internet With Squid p.17 Review p.25 Letters p.28 Top 5 p.36 The articles contained in this magazine are released under the Creative Commons Attribution-Share Alike 3.0 Unported license. This means you can adapt, copy, distribute and transmit the articles but only under the following conditions: You must attribute the work to the original author in some way (at least a name, email or URL) and to this magazine by name ('full circle magazine') and the URL www.fullcirclemagazine.org (but not attribute the article(s) in any way that suggests that they endorse you or your use of the work). If you alter, transform, or build upon this work, you must distribute the resulting work under the same, similar or a compatible license. full circle magazine #28 2 contents ^ EDITORIAL This magazine was created using : Welcome to another issue of Full Circle magazine. nd welcome to another new series! I promised you LAMP, and here it is: creating your own LAMP server. LAMP stands for Linux, Apache, MySQL and PHP (sometimes Python) and is the foundation upon which many an Internet server sits, so it is very widely used. In part one (this month) ARichard Bosomworth discusses the installation and administration of a LAMP server and, next month, will touch on FTP and Firewalls, so stay tuned! Also this month, Greg has a small correction to his Python Part 1 series, so make sure you check that out, and he goes on to talk more about variables.
    [Show full text]
  • Best Free Im Server
    Best free im server click here to download Solution: OpenFire for your server with Spark for the clients. OpenFire Program (open source): Hey guys,. I need a strictly internal and completely free instant messenger. Suggestions? . I wish I could convince management that internal IM is an invaluable communication tool. We rolled an IM system out. Good for getting the attention of your work colleagues quickly, you can even set a message so that it needs to be 'acknowledged' before it can be deleted off Opensource, free, easy to set up and manage and AD aware. You get an enterprise level IM server, with an enterprise IM client as well (Spark). In this edition of Five Apps, we take a look at five instant messaging systems that are designed to be used within a private corporate network. These systems are generally client-server based (with one exception), have various feature sets, and are priced by client, by server, both, or - in one case - free. best pc and mac im chat client alternatives l Plus, it's free. There are also no ads, or limits on how many users you can have. There are paid plans, and they provide a more robust experience and added storage space, Need another reason why Slack is the best chat app on the market today? In any collaborative environment, it's important to have good tools for communication. What tools work best for you depends a bit on your situation, but might include anything from mailing lists for email communication, Git or Subversion for version control, a wiki or Etherpad for collaborative authoring.
    [Show full text]
  • Wiretapping End-To-End Encrypted Voip Calls: Real-World Attacks on ZRTP
    Preprint Version, Accepted for Publication in PoPETS 2017; 2017 (3):1–17 Dominik Schürmann*, Fabian Kabus, Gregor Hildermeier, and Lars Wolf Wiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on ZRTP Abstract: Voice calls are still one of the most com- saging apps, such as WhatsApp and Facebook Messen- mon use cases for smartphones. Often, sensitive personal ger [10, 36]. As a result, mobile messaging, the most information but also confidential business information popular smartphone feature, finally includes end-to-end is shared. End-to-end security is required to protect encryption for average users. Comparing their security against wiretapping of voice calls. For such real-time features with that of voice calls shows a major imbal- communication, the ZRTP key-agreement protocol has ance. While making voice calls is the second most popu- been proposed. By verbally comparing a small number lar smartphone feature with 93% popularity [25], its se- of on-screen characters or words, called Short Authenti- curity is often neglected. It is difficult to retrofit the tra- cation Strings, the participants can be sure that no one ditional Public Switched Telephone Network with end- is wiretapping the call. Since 2011, ZRTP is an IETF to-end security, but it is feasible to protect users of mod- standard implemented in several VoIP clients. ern Voice over IP (VoIP) apps. In this paper, we analyzed attacks on real-world VoIP To protect real-time communication channels, the systems, in particular those implementing the ZRTP ZRTP key agreement protocol has been proposed. Based standard. We evaluate the protocol compliance, er- on the Diffie-Hellmann (DH) key exchange, it has been ror handling, and user interfaces of the most common standardized in 2011 as RFC 6189 [38].
    [Show full text]
  • * His Is the Original Ubuntuguide. You Are Free to Copy This Guide but Not to Sell It Or Any Derivative of It. Copyright Of
    * his is the original Ubuntuguide. You are free to copy this guide but not to sell it or any derivative of it. Copyright of the names Ubuntuguide and Ubuntu Guide reside solely with this site. This guide is neither sold nor distributed in any other medium. Beware of copies that are for sale or are similarly named; they are neither endorsed nor sanctioned by this guide. Ubuntuguide is not associated with Canonical Ltd nor with any commercial enterprise. * Ubuntu allows a user to accomplish tasks from either a menu-driven Graphical User Interface (GUI) or from a text-based command-line interface (CLI). In Ubuntu, the command-line-interface terminal is called Terminal, which is started: Applications -> Accessories -> Terminal. Text inside the grey dotted box like this should be put into the command-line Terminal. * Many changes to the operating system can only be done by a User with Administrative privileges. 'sudo' elevates a User's privileges to the Administrator level temporarily (i.e. when installing programs or making changes to the system). Example: sudo bash * 'gksudo' should be used instead of 'sudo' when opening a Graphical Application through the "Run Command" dialog box. Example: gksudo gedit /etc/apt/sources.list * "man" command can be used to find help manual for a command. For example, "man sudo" will display the manual page for the "sudo" command: man sudo * While "apt-get" and "aptitude" are fast ways of installing programs/packages, you can also use the Synaptic Package Manager, a GUI method for installing programs/packages. Most (but not all) programs/packages available with apt-get install will also be available from the Synaptic Package Manager.
    [Show full text]
  • Open Source Software – Breaking the Commercial Myths Abstract Where
    Open Source Software – Breaking the IJoAT Commercial Myths Volume 3, No 1 International Journal of Advancements in Technology - ISSN : 0976-4860 (Online) Guest Editorial Article Atul Sharma, Ph. D. Abstract Open source technologies need no formal introduction. In a technological era where major giants like Microsoft are coming up with new versions of their software in each quarter, there are open source players like Ubuntu, which are gaining popularity at amazingly crazy rates. Global community consisting of thousands of best brains in this world are coming up together to build up robust Open Source technologies which are in no way lesser in features when compared to their commercial counterparts. In fact if we go out and ask Open Source enthusiast, we find that they are far more efficient, reliable, and over all customizable. From IBM to Google, Firefox to Wikipedia – some of today's best software is based on an open-source model [1]. Open Source communities like Ubuntu share the principle of “Shared efforts. Shared principles. No cost.”, that’s why what we get is a world class “free” software. Where do we find Open Source Look into any technological field, and we find a reliable Open source available at our disposal. Talk about Web-Servers, and we have a big name of Apache HTTP Server [3] probably outshining [4] its commercial counterpart “Microsoft IIS”. For ecommerce, initiating a new branch of the economy, even in small company is nowadays not so hard, all credited to OSS like osCommerece, Magento and OpenCart [5]. We have OSS in internet browsers like Mozilla Firefox [6], VoIP applications like Asterisk (PBX) [7], and office suite of inter-related desktop applications in form of OpenOffice [8].
    [Show full text]
  • URL Categories
    URL Categories PacketShaper 11.6 Third Party Copyright Notices © 2016 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9, DRTR, MACH5, PACKETWISE, POLICYCENTER, PROXYAV, PROXYCLIENT, SGOS, WEBPULSE, SOLERA NETWORKS, DEEPSEE, DS APPLIANCE, SEE EVERYTHING. KNOW EVERYTHING., SECURITY EMPOWERS BUSINESS, BLUETOUCH, the Blue Coat shield, K9, and Solera Networks logos and other Blue Coat logos are registered trademarks or trademarks of Blue Coat Systems, Inc. or its affiliates in the U.S. and certain other countries. This list may not be complete, and the absence of a trademark from this list does not mean it is not a trademark of Blue Coat or that Blue Coat has stopped using the trade- mark. All other trademarks mentioned in this document owned by third parties are the property of their respective owners. This document is for informational purposes only. BLUE COAT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. BLUE COAT PRODUCTS, TECHNICAL SERVICES, AND ANY OTHER TECHNICAL DATA REFERENCED IN THIS DOCUMENT ARE SUBJECT TO U.S. EXPORT CONTROL AND SANCTIONS LAWS, REGULATIONS AND REQUIREMENTS, AND MAY BE SUBJECT TO EXPORT OR IMPORT REGULATIONS IN OTHER COUNTRIES. YOU AGREE TO COMPLY STRICTLY WITH THESE LAWS, REGULATIONS AND REQUIREMENTS, AND ACKNOWLEDGE THAT YOU HAVE THE RESPONSIBILITY TO OBTAIN ANY LICENSES, PERMITS OR OTHER APPROVALS THAT MAY BE REQUIRED IN ORDER TO EXPORT, RE-EXPORT, TRANSFER IN COUNTRY OR IMPORT AFTER DELIVERY TO YOU. Americas: Blue Coat Systems, Inc. 384 Santa Trinita Avenue Sunnyvale, CA 94085 Rest of the World: Blue Coat Systems International SARL 3a Route des Arsenaux 1700 Fribourg, Switzerland 6/28/2016 URL Categories URL Categories Overview Web URLs can be grouped into various categories, such as social networking, gambling, pornography, news media, and shopping.
    [Show full text]
  • Ubuntu: Powerful Hacks and Customizations
    Hacks, tips, and tricks to Krawetz put your OS into overdrive ubuntu Whether it’s speed, glitz, sounds, or security, you want to get the most out of your Ubuntu Linux system. This book shows you how to do just that. You’ll fi nd out how to customize the user interface, implement networking tools, optimize video, and more. You’ll then be able to build on these hacks to further tune, tweak, and customize Ubuntu to meet all your needs. The basic Ubuntu system is good, but with a few modifi cations, it can be made great. This book is packed with techniques that will help you: • Choose the right options when installing Ubuntu onto a Netbook, server, or other system • Install fi les for interoperability and collaborate with non-Linux systems • Tune the operating system for optimal performance ® • Enhance your graphics to take them to the next level Powerful Hacks and Customizations Powerful • Navigate the desktop, manage windows, and multitask between applications • Check for vulnerabilities and prevent undesirable access • Learn tricks to safely opening up the system with external network services Neal Krawetz, PhD, is a computer security professional with experience in computer forensics, ® profi ling, cryptography and cryptanalysis, artifi cial intelligence, and software solutions. Dr. Krawetz’s company, Hacker Factor, specializes in uncommon forensic techniques and anti-anonymity technologies. He has confi gured Ubuntu on everything from personal workstations to mission-critical servers. ubuntu Visit our Web site at www.wiley.com/compbooks $39.99 US/$47.99 CAN Powerful Hacks and Customizations ISBN 978-0-470-58988-5 Neal Krawetz Operating Systems / Linux Ubuntu® Powerful Hacks and Customizations Dr.
    [Show full text]
  • Measurement of Video Conferencing Libraries Using a Test Framework Based on Profiling
    Computer Engineering 2013 Mekelweg 4, 2628 CD Delft The Netherlands http://ce.et.tudelft.nl/ MSc THESIS Measurement of Video Conferencing Libraries using a Test Framework based on Profiling Maulik Prabhudesai Abstract Video Conferencing systems have become highly popular with the explosion of bandwidth and computing power. This has made high quality video conference possible on embedded hand held devices. This has created an ecosystem of companies developing applications which are powered by video conferencing libraries and a parallel ecosystem of companies who make those video conferencing libraries. An application developer has to design his system in a way that the video conferencing library (which is the backbone of the applica- tion) is efficiently integrated and is performing optimally. In order to do that, the developer must be acutely aware of features such CE-MS-2013-18 as platform compatibility, resource usage, performance boundaries and bottlenecks of the library in order to make an informed deci- sion. Hence the developer needs a test-bench which can evaluate the above mentioned features. This thesis mainly discusses the need to arrive at one such test framework followed by the framework itself. The framework designed in this thesis consists of a network emulator which is combined with a popular network protocol analyser. It pro- files the library and monitors variables essential to Quality of Service (QoS) like bandwidth usage, frame rates, frame/packet sizes and au- dio/video delay under varying network conditions. By observing the change in these variables, the QoS offered by the library can be determined. This information can also be extrapolated to understand the challenges in guaranteeing a minimum quality of experience (QoE).
    [Show full text]