Public Consultation on the Telecommunication Regulatory
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
E-Commerce Web Application Using Paypal Payment Gate- Way
AKM Mahfuzul Haque E-COMMERCE WEB APPLICATION USING PAYPAL PAYMENT GATE- WAY Technology and Communication 2017 ACKNOWLEDGEMENT I would like to thank God for showing me the way of my success. I am indebted to my parents (Mr. Karam Ali and Mrs. Khaleda Akhter) for their significant effort to support me all the way from my childhood until now. Their happiness is my suc- cess. My deepest gratitude goes to my thesis supervisor Dr. Ghodrat Moghadam- pour who has given his best to help me to complete my thesis. His guidance is excellent, and without his assistance, it would be quite difficult to fulfill my thesis. It is an honor to thank the Head of Degree Programme Dr. Seppo Mäkinen who is always friendly and helpful to me. It is my pleasure to thank all the teachers and staffs of Vaasa University of Applied Sciences who has made a great support for my whole study period. Haque AKM Mahfuzul May 2017 VAASAN AMMATTIKORKEAKOULU UNIVERSITY OF APPLIED SCIENCES INFORMATION TECHNOLOGY ABSTRACT Author AKM Mahfuzul Haque Title E-commerce Web Application Using PayPal Payment Gateway Year 2017 Language English Pages 82 Name of Supervisor Dr. Ghodrat Moghadampour The main idea of the thesis was to develop an E-commerce Web Application by using payment gateway (PayPal payment technology) for an online shop which was developed by ASP.NET framework (version 4.6.2) and Microsoft SQL server management studio, where a seller (Owner of the Web shop) will be able to put all the products in the online shop, and a customer who is a buyer will be able to buy items through online payment.This application has two different views: Public view and Administrator (in short Admin) view. -
Economic Factors in the Allocation of IP Addresses
Economic factors in the allocation of IP addresses Dr. Milton Mueller, Syracuse University School of Information Studies, USA and XS4All Professor, Technische Universiteit Delft, Netherlands. With the assistance of Youngseek Kim, Ph.D. candidate, Syracuse University School of Information Studies 1 SUMMARY This study reviews the economic rationale for IP allocation policies and argues that conservation is still a valid concern for IPv6 due to the large basic unit of IPv6 allocation. According to the study, current RIR policies provide few incentives to reclaim unused or under-utilized resources. The study concludes that it is possible to have a much more liberal policy for the initial stage of IPv6 allocation, provided it is associated with efficient reclamation policies and incentives, which incentives should be economic. After analysis of the IPv6 fee structure charged by the RIRs and brief discussion of the routing scalability issue of IPv6, the paper proposes a Transferable Address Block Lease (TABL) model as a market-oriented allocation mechanism. The TABL model employs two economic techniques: (1) fees related to the size of the IPv6 address blocks and (2) transferability. TABLs would be an additional option, not a replacement for needs-based allocations, and confined to the mid range of IP address blocks (/48 - /32). The paper discusses auctions as a method of making initial allocations and concludes that they would not be advisable. The chief advantage of TABL is that it makes addresses available to anyone who wants them in the quantity they need, thus increases end users’ control over their own network destiny and reduce their switching costs to change providers. -
Modeling User Reputation in Wikipedia
Modeling User Reputation in Wikis Sara Javanmardi, Cristina Lopes and Pierre Baldi Bren School of Information and Computer Sciences, University of California, Irvine, USA {sjavanma,lopes,pfbaldi}@ics.uci.edu Abstract Collaborative systems available on the Web allow millions of users to share information through a growing collection of tools and platforms such as wikis, blogs, and shared forums. By their very nature, these systems contain resources and information with different quality levels. The open na- ture of these systems, however, makes it difficult for users to determine the quality of the available information and the reputation of its providers. Here, we first parse and mine the entire English Wikipedia history pages in order to extract detailed user edit patterns and statistics. We then use these patterns and statistics to derive three computational models of a user’s reputation. Finally, we validate these models using ground–truth Wikipedia data associated with vandals and adminis- trators. When used as a classifier, the best model produces an area under the ROC curve of 0.98. Furthermore, we assess the reputation predictions generated by the models on other users, and show that all three models can be used efficiently for predicting user behavior in Wikipedia. Keywords: Wiki, Reputation, Reliability, Wiki Mining, Wikipedia, Web 2.0 1 Introduction The last few years have seen a substantial growth in user–generated Web content. Simple editing interfaces encourage users to create and maintain repositories of shared content. Online information repositories such as wikis, forums and blogs have increased the participation of the general public in the production of web content through the notion of social software [1, 2, 3]. -
(12) United States Patent (10) Patent No.: US 8,630,855 B2 Oddo (45) Date of Patent: Jan
USOO8630855B2 (12) United States Patent (10) Patent No.: US 8,630,855 B2 Oddo (45) Date of Patent: Jan. 14, 2014 (54) CALL SYSTEMAND METHOD 6,658.414 B2* 12/2003 Bryan et al. .......................... 1.1 6,681,008 B2 * 1/2004 Bolduc et al. .. ... 379,222 Inventor: 7,408,922 B2 * 8/2008 Klaghofer ...... 370,352 (76) Anthony Oddo, Lake Ozark, MO (US) 7,710,950 B2 * 5/2010 Buckley et al. 370/354 7,830,868 B2 * 1 1/2010 Buckley ............. 370,353 (*) Notice: Subject to any disclaimer, the term of this 8,051.369 B2 * 1 1/2011 Zirngiblet al. ... T15, 201 patent is extended or adjusted under 35 2001/0023400 A1* 9/2001 Kurganov et al. ......... TO4/270.1 U.S.C. 154(b) by 1269 days. 2002/0004721 A1 1/2002 Cha et al. ........... TO4/270.1 2002fOO16174 A1 2/2002 Gibson et al. ................. 455,464 2004/O120480 A1* 6/2004 Didcock et al. ............ 379.88.22 (21) Appl. No.: 12/005,025 2004/0172254 A1* 9, 2004 Sharma et al. TO4/270.1 2004/0174864 A1* 9/2004 Klaghofer ...... 370,352 (22) Filed: Dec. 21, 2007 2005, 0141482 A1* 6/2005 Kleiner .......... 370,352 2006, O168.095 A1* 7, 2006 Sharma et al. ..... 709/217 (65) Prior Publication Data 2007,0005570 A1* 1/2007 Hurst-Hiller et al. ............. 707/3 2007/0201441 A1* 8/2007 Buckley ............. 370,356 US 2008/O1546O3 A1 Jun. 26, 2008 2009/0019061 A1* 1/2009 Scannell, Jr. .................... 707/10 Related U.S. Application Data * cited by examiner (60) Provisional application No. -
Media Release
Media Release Mumbai, 17th October 2018 CROSSED 250 MILLION SUBSCRIBERS WITHIN 25 MONTHS FROM COMMENCEMENT OF SERVICES ACCELERATED GROWTH IN SUBSCRIBER BASE TO 252.3 MILLION DATA CONSUMPTION AT RECORD 771 CRORE GB DURING THE QUARTER; 11 GB PER USER PER MONTH, GROWING RAPIDLY STRONG DEMAND FOR FTTH ACROSS 1,100 CITIES IN EARLY PHASE OF REGISTRATIONS ROBUST FINANCIAL PERFORMANCE WITH EBITDA GROWTH OF 14% QOQ AND 148% YOY TO ₹3,573 CRORE IN Q2 FY 2018-19 HIGHLIGHTS OF QUARTER’S (Q2 – FY 2018-19) PERFORMANCE Standalone Financials QoQ YoY 2Q’ 18-19 1Q’ 18-19 2Q’ 17-18 (₹ crore) Growth Growth Value of Services 10,901 9,567 7,197 13.9% 51.5% Operating revenue 9,240 8,109 6,147 13.9% 50.3% EBITDA 3,573 3,147 1,443 13.5% 147.6% EBITDA margin 38.7% 38.8% 23.5% (12bps) 1521bps EBIT 2,042 1,708 260 19.6% 685.4% Net Profit 681 612 (271) 11.3% NM Standalone revenue from operations of ₹9,240 crore (13.9% QoQ growth) Standalone EBITDA of ₹3,573 crore (13.5% QoQ growth) and EBITDA margin of 38.7% Standalone Net Profit of ₹681 crore Subscriber base as on 30th Sep-18 of 252.3 million Lowest churn in the industry at 0.66% per month ARPU during the quarter of ₹131.7 per subscriber per month Total wireless data traffic during the quarter of 771 crore GB Total voice traffic during the quarter of 53,379 crore minutes Registered Office: Corporate Communications Telephone : (+91 22) 6255 5000 Maker Chambers IV Maker Chambers IV Telefax : (+91 22) 6255 5185 9th Floor, 222, Nariman Point 9th Floor, 222, Nariman Point CIN : U72900MH2007PLC234712 Mumbai 400 021, India Mumbai 400 021, India Website : www.jio.com and www.ril.com Page 1 of 10 Media Release Commenting on the results, Shri Mukesh D. -
BRANDING to the RIGHT of the DOT: New Generic Top-Level Domain Names Are About to Change the Face of the Internet
Internet Law Alert July 2011 BRANDING TO THE RIGHT OF THE DOT: New Generic Top-Level Domain Names Are About To Change The Face Of The Internet. Is Your Company Ready? On June 20, 2011, the Internet Corporation for Assigned Names and Numbers (ICANN) gave its final approval to dramatically expand generic top-level domain names (gTLDs). For the first time ever, organizations will be able to obtain their own customized gTLDs such as .bank, .music, or .hotel. Additionally, along with the generic terms, organizations will be able to obtain top-level domain names (TLDs) that are geographic locations (.Paris) or brands (.pepsi or .norrismclaughlinandmarcus). While this can lead to many opportunities for marketing and branding, it can also lead to potential cybersquatting and trademark infringement. Thus, even if companies do not intend to apply for new gTLDs, they must be ready to enforce their rights on the Internet against those of “cybersquatters” who steal their brands to use in these new gTLDs (as in .insertyourcompanyname). Additionally, the new gTLDs also pose a risk of infringement of company brands to the left of the dot (e.g. insertyourcompanyname.newgTLD). A gTLD is an Internet extension which appears to the right of the dot in a domain name such as .com, .org or .net. Currently, there are 22 gTLDs. Today, individuals or organizations who want their own Internet space must register second-level domains within an existing top-level domain – for example, nmmlaw.com. Individuals and organizations can customize only what is to the left of the dot. However, parties will soon be able to control what is to the right of the dot. -
RPKI Tutorial
RPKI Resource Public Key Infrastructure SANOG XXV | 16-24 January, 2015 | Kandy, Sri Lanka Fakrul Alam [email protected] http://bd.linkedin.com/in/fakrulalam https://twitter.com/rapappu Target Audience • Knowledge of Internet Routing(specially BGP) • Familiar with any IRR Database • No need to know Cryptography • Basic knowledge of PKI(Public Key Infrastructure) XXV Agenda • BGP / RPKI • Configuration • Hands-on Lab (Juniper) XXV BGP BGP (AS) Send a packet to 2001:DB8::1 I have 2001:DB8::/32 XXV AS Path 2001:DB8::/32 100 200 300 i Send a packet to 2001:DB8::1 AS 100 AS 200 AS 300 I have 2001:DB8::/32 XXV AS Path 2001:DB8::/32 100 200 300 i 2001:DB8::/48 100 200 420 i Send a packet to 2001:DB8::1 AS 100 AS 200 AS 300 I have 2001:DB8::/32 AS 420 I have 2001:DB8::/48 XXV Historical Incident • April 1997: The "AS 7007 incident" UU/Sprint for 2 days • February 24, 2008: Pakistan's attempt to block YouTube access within their country takes down YouTube entirely.[6] • November 11, 2008: The Brazilian ISP CTBC - Companhia de Telecomunicações do Brasil Central leaked their internal table into the global BGP table. • April 8, 2010: China Telecom originated 37,000 prefixes not belonging to them in 15 minutes, causing massive outage of services globally. source : http://en.wikipedia.org/wiki/IP_hijacking XXV Historical Incident • For theory of positivity lets call all these as Mis-Origination • Traffic Hijacking or Prefix Hijacking assumes Negative intent XXV Current Trend • Filtering limited to the edges facing the customer • Filters on peering and transit -
GLOBAL CENSORSHIP Shifting Modes, Persisting Paradigms
ACCESS TO KNOWLEDGE RESEARCH GLOBAL CENSORSHIP Shifting Modes, Persisting Paradigms edited by Pranesh Prakash Nagla Rizk Carlos Affonso Souza GLOBAL CENSORSHIP Shifting Modes, Persisting Paradigms edited by Pranesh Pra ash Nag!a Ri" Car!os Affonso So$"a ACCESS %O KNO'LE(GE RESEARCH SERIES COPYRIGHT PAGE © 2015 Information Society Project, Yale Law School; Access to Knowle !e for "e#elo$ment %entre, American Uni#ersity, %airo; an Instituto de Technolo!ia & Socie a e do Rio+ (his wor, is $'-lishe s'-ject to a %reati#e %ommons Attri-'tion./on%ommercial 0%%.1Y./%2 3+0 In. ternational P'-lic Licence+ %o$yri!ht in each cha$ter of this -oo, -elon!s to its res$ecti#e a'thor0s2+ Yo' are enco'ra!e to re$ro 'ce, share, an a a$t this wor,, in whole or in part, incl' in! in the form of creat . in! translations, as lon! as yo' attri-'te the wor, an the a$$ro$riate a'thor0s2, or, if for the whole -oo,, the e itors+ Te4t of the licence is a#aila-le at <https677creati#ecommons+or!7licenses7-y.nc73+07le!alco e8+ 9or $ermission to $'-lish commercial #ersions of s'ch cha$ter on a stan .alone -asis, $lease contact the a'thor, or the Information Society Project at Yale Law School for assistance in contactin! the a'thor+ 9ront co#er ima!e6 :"oc'ments sei;e from the U+S+ <m-assy in (ehran=, a $'-lic omain wor, create by em$loyees of the Central Intelli!ence A!ency / em-assy of the &nite States of America in Tehran, de$ict. -
Liquidfeedback in Large-Scale Civic Contexts: Framing Multiple Styles of Online Participation
Journal of LiquidFeedback in Large- scale Civic Contexts: Framing Social Multiple Styles of Online Media for Participation Giulia Bertone, Fiorella De Cindio, Organizations Stefano Stortone Volume 2, Number 1 Published by the MITRE Corporation Journal of Social Media for Organizations ____________________________________________________________________________________________ LiquidFeedback in Large-scale Civic Contexts: Framing Multiple Styles of Online Participation Giulia Bertone, [email protected] Fiorella De Cindio, [email protected] Stefano Stortone, [email protected] ABSTRACT Growing distrust in government is accompanied by new opportunities for civic involvement through online technological platforms. LiquidFeedback is one of the most interesting, as it embeds innovative features to support online deliberative processes. Designed as an intranet tool for closed, homogeneous groups, the software has also been used in large civic contexts involving citizens at large. This paper presents and analyses two large-scale deliberation projects where thousands of Italian citizens used the LiquidFeedback platform. The analysis aims to understand how well this software serves as a platform for people to gather ideas, draft proposals collaboratively, and then rate them by degree of consensus. We consider the political context for these field cases and their socio-technical design choices, look at how LiquidFeedback enables citizen participation, discuss politicians’ accountability in terms of online activity, and report participants’ assessment of the two projects. Our analysis adapts existing frameworks that match different participation styles to profiles of activity in online communities. KEYWORDS LiquidFeedback, large-scale ideation and deliberation, online deliberation, democracy, civic participation. INTRODUCTION Manuel Castells, the well-known sociologist and author of The Rise of the Network Society (Castells, 1996), recently studied protest movements worldwide that arose in the wake of dramatic economic crisis. -
Proximax: a Measurement Based System for Proxies Dissemination
Proximax: A Measurement Based System for Proxies Dissemination Damon McCoy1 and Jose Andre Morales2 and Kirill Levchenko1 1 University of California at San Diego {dlmccoy,klevchen}@cs.ucsd.edu 2 Institute for Cyber Security, University of Texas at San Antonio [email protected] Abstract. Many people currently use proxies to circumvent government censorship that blocks access to content on the Internet. Unfortunately, the dissemination channels used to distribute proxy server locations are increasingly being monitored to discover and quickly block these proxies. This has given rise to a large number of ad hoc dissemination channels that leverage trust networks to reach legitimate users and at the same time prevent proxy server addresses from falling into the hands of cen- sors. To address this problem in a more principled manner, we present Proximax, a robust system that continuously distributes pools of proxies to a large number of channels. The key research challenge in Proximax is to distribute the proxies among the different channels in a way that maximizes the usage of these proxies while minimizing the risk of hav- ing them blocked. This is challenging because of two conflicting goals: widely disseminating the location of the proxies to fully utilize their ca- pacity and preventing (or at least delaying) their discovery by censors. We present a practical system that lays out a design and analytical model that balances these factors. 1 Introduction Internet censorship is a fact of life for most of the world’s population. While the stated purpose of such censorship is to protect users from harmful content, political news and commentary are often blocked as well. -
Media Release
Media Release Mumbai, 30th July 2020 JIO PLATFORMS HAS RAISED ₹ 152,056 CRORES TO BOLSTER JIO’S INITIATIVES TOWARDS DELIVERING BREAKTHROUGH TECHNOLOGIES AND BUILDING WORLD’S LEADING DIGITAL SERVICES PLATFORM CUSTOMER ADDITION OF 9.9 MILLION DESPITE COVID RELATED IMPACTS; GROSS ADDITION IN EXCESS OF 15 MILLION DURING THE QUARTER DATA TRAFFIC UP 30% YOY TO 14.2 EXABYTES WITH STRONG CUSTOMER ENGAGEMENT AND BEST-IN-CLASS NETWORK PERFORMANCE STRONG ARPU UPLIFT TO ₹ 140, ALONGWITH LOWEST INDUSTRY CHURN REINFORCES JIO’S PREFERRED POSITIONING ROBUST FINANCIAL PERFORMANCE WITH 33.7% YOY REVENUE GROWTH AND 55.4% YOY EBITDA GROWTH HIGHLIGHTS OF QUARTER’S (Q1 – FY 2020-21) PERFORMANCE OF RJIL Standalone Financials YoY 1Q’ 20-21 1Q’ 19-20 (₹ crore) Growth Value of Services 19,513 14,593 33.7% Operating revenue 16,557 12,383 33.7% EBITDA 7,281 4,686 55.4% EBITDA margin 44.0% 37.8% 613bps EBIT 4,543 3,029 50.0% Net Profit 2,520 891 182.8% ➢ Standalone revenue from operations, including access revenues, of ₹ 16,557 crore ➢ Standalone EBITDA of ₹ 7,281 crore and EBITDA margin of 44.0%, up from 37.8% in 1Q FY19-20 ➢ Standalone Net Profit of ₹ 2,520 crore (182.8% YoY growth) ➢ Total Customer base as on 30th June 2020 of 398.3 million ➢ ARPU during the quarter of ₹ 140.3 per subscriber per month ➢ Total wireless data traffic during the quarter of 1,420 crore GB (30.2% YoY growth) ➢ Total voice traffic during the quarter of 88,944 crore minutes (13.2% YoY growth) Registered Office: Corporate Communications Telephone : (+91 79) 3503 1200 Office 101, Saffron, Nr. -
The US-India Strategic Relations: a Brief Report by Dr
The US-India Strategic Relations: A Brief Report By Dr. Sohail Mahmood Tensions between India and China increased after skirmishes in the contested Pangong Lake region of eastern Ladakh in the Kashmir region bordering the two countries in the Himalayas. On June 15 there occurred a border clash between the two countries in the contested Galwan valley in the Ladakh region in which 20 Indian soldiers were killed, and several Chinese casualties but it is yet to give out details. According to a US intelligence report, the number of casualties on the Chinese side was 35.i The fighting was the first-time soldiers were killed over the border dispute since 1967. China and India went to war over their disputed border issues in a 1962 conflict that spilled into Ladakh and ended with an uneasy truce. Since then, troops from opposing sides have guarded the undefined, mountainous 2,200-mile border area, occasionally clashing. Today, Indian and Chinese officials are holding talks to try to resolve a months-long standoff along their disputed frontier, where the two countries have deployed tens of thousands of soldiers. There was a wave of nationalism sweeping India, the likes of which has not been seen before. After the Galwan Valley border clash between the two countries, there was a popular call for a boycott of Chinese products. Although there is a stalemate on the border, tensions between the two countries continue to escalate, resultantly. The Indian- controlled territory runs along the Line of Actual Control (LAC), a loose demarcation line created after the 1962 China-Indian War and now the de facto border between the two countries.