Webrtc: Web, Meet Communications Webrtc Global Summit

Total Page:16

File Type:pdf, Size:1020Kb

Webrtc: Web, Meet Communications Webrtc Global Summit WebRTC: Web, meet Communications WebRTC Global Summit Dominique Hazaël-Massieux [email protected] @dontcallmeDOM A NEW WAVEof TRANSFORMATIONS 3 Just as the Web has transformed everything… …It will transform everything again Wide-scale interoperability • Platform for 2+billion devices • Royalty-Free standards for innovation • Beyond OS and shapes • Open to all to contribute and use • Ease of development and deployment Role of W3C • Setting Web standards enabling interop • 400 Member orgs • Web ecosystem: users, developers, browsers, telcos, etc. • 80 staff in US, Europe, China, Japan • Technologies built by Member engineers in dedicated Working Groups WebRTC Standardization WebRTC Working Group Participants Alcatel-Lucent Apple AT&T Avaya Baidu Bistri Cable Labs China Unicom Chinese Acad. Cisco Of Sciences ETRI Ericsson Genesys Lab Google Hookflash Huawei Microsoft Mitrae Web Mitsubishi Mozilla MStar NICTA Nokia Nuance Opera Orange Qihoo 360 Samsung Shenzhen Smart Comm. Coolpad Square Enix Telecom Italia Temasys Tencent Unify Verisign Vodafone Voxeo Zingaya WebRTC Status • Protocol: stable core, but lots of optimizations still in flux • Codecs: audio done, video tabled for now • Camera access: mostly stable • P2P Audio / Video: stabilizing • P2P Data: stabilizing • Identity management: unstable • Rest: TBD WebRTC Implementations Commoditizing audio/video transmission • Disruptive to traditional communication players • More competition for OTT players (incl. From TelcOTT) • Many usages beyond conversational: customer care, citizen journalists, e-health, e-learning, … • Making communications a mean, not an end Commoditizing P2P • P2P and Web: two big sources of innovation and disruption • WebRTC brings them together • Blurring client / server distinction • Watch for sparkles! An evolving set of technologies • Focus on finalizing core APIs and protocols • Many extensions, additions and evolutions already under consideration • Join W3C to be part of the conversation! Dominique Hazaël-Massieux [email protected] @dontcallmeDOM W3.org.
Recommended publications
  • What the Floc?
    Security Now! Transcript of Episode #811 Page 1 of 30 Transcript of Episode #811 What the FLoC? Description: This week we briefly, I promise, catch up with ProxyLogon news regarding Windows Defender and the Black Kingdom. We look at Firefox's next release which will be changing its Referer header policy for the better. We look at this week's most recent RCE disaster, a critical vulnerability in the open source MyBB forum software, and China's new CAID (China Anonymization ID). We then conclude by taking a good look at Google's plan to replace tracking with explicit recent browsing history profiling, which is probably the best way to understand FLoC (Federated Learning of Cohorts). And as a special bonus we almost certainly figure out why they named it something so awful. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-811.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-811-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. We've got a new fix for the Microsoft Exchange Server flaw. This one's automatic, thanks to Microsoft. We'll also take a look at some nice new features in Firefox 87. You can get it right now. And then, what the FLoC? We'll take a look at Google's proposal for replacing third-party cookies. Is it better? It's all coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 811, recorded Tuesday, March 23rd, 2021: What the FLoC? It's time for Security Now!, the show where we cover your privacy, your security, your safety online with this guy right here, Steve Gibson from GRC.com.
    [Show full text]
  • Wechat About China's Tencent
    We Build Connections QQ Weixin For Enterprises: For Users: For Tencent: • Access to vast user base • Always connected • Deepen user stickiness via broadened • Unified user log-in enables CRM and • Enjoy a wide range of integrated social product offerings targeted advertising entertainment and content offerings, built • Increase traffic conversion through • Online payment facilitates transactions upon IPs and tech innovations transactions and advertising • Integrate capabilities across different • Access to rich mix of services and • Tap into new opportunities as the products to facilitate digital upgrades, e.g., transact at fingertips economy digitizes Weixin, WeChat Work, Tencent Meeting WeChat about 2 China’s Tencent Chris Wheldon, co-Portfolio Manager of the Magellan High Conviction strategy, and Ryan Joyce, co-Head of Magellan’s Technology team, explain why Tencent is a high-quality business, why the strategy invested in the company recently, what risks the investment poses and why Tencent performed well during the pandemic’s Chris Wheldon Ryan Joyce initial stages. Tencent is one of the High Conviction Q1. strategy’s top five positions. Can you please tell us about the company? A: Tencent was founded in 1998 as a Chinese instant-messaging service and web portal named QQ and subsequently built itself into a PC-based social network similar to today’s Facebook. In 2011, Tencent launched the WeChat mobile app, now China’s leading social “WeChat’s 1.2 network and communications platform and core to the company’s billion users average success. WeChat’s 1.2 billion users average nearly 100 minutes per day, every day, on the app.
    [Show full text]
  • Mobile Internet Business Models in China: Vertical Hierarchies, Horizontal Conglomerates, Or Business Groups?
    BERKELEY ROUNDTABLE ON THE INTERNATIONAL ECONOMY BRIE Working Paper 2016-6 MOBILE INTERNET BUSINESS MODELS IN CHINA: VERTICAL HIERARCHIES, HORIZONTAL CONGLOMERATES, OR BUSINESS GROUPS? Kai Jia and Martin Kenney Mobile Internet Platform Business Models in China: Vertical Hierarchies, Horizontal Conglomerates, or Business Groups? July 27, 2016 Kai Jia Ph.D. Student Tsinghua University Beijing, China And Martin Kenney Community and Regional Development University of California, Davis [email protected] Acknowledgments: The authors thank Roger Bohn and John Zysman for helpful comments. The authors remain responsible for all remaining errors. 2 ABSTRACT The current understanding of the dynamics of digital platforms and strategy for their concomitant ecosystems has emerged from an analysis of firms in Western market economies. Our contribution arises from a detailed study of the business strategies of the current leaders in the Chinese mobile internet industry—Tencent, Alibaba, and Baidu. We find that they have developed business models significantly different from those of US firms. We argue that these Chinese firms are developing a “platform business group” strategy predicated upon horizontal expansion through organic growth, acquisition, and the purchase of significant equity positions in vertical industries, such as ride sharing, online-to-offline commerce, and travel. As a generalization, their western counterparts were much more oriented toward vertical expansion integrating either upwards or downwards in their respective software stacks. A central component of the business group is an online payment system that operates with its other platforms to cross-feed traffic and use internal cross-platform personal data to customize its offerings to users. We show that the different environmental conditions in China versus Western market economies allow firms there to pursue different business strategies.
    [Show full text]
  • ESG CASE STUDY, Tencent
    ESG CASE STUDY FEDERATED HERMES INTERNATIONAL GROWTH EQUITY TEAM Tencent A multinational consumer technology conglomerate Founded in 1998 89,228 employees Headquarters: Shenzhen, China Martin Schulz Hanah Chang Portfolio manager EOS engager How Federated Hermes’ International Growth Equity team incorporates ESG The Federated Hermes International Growth Equity team’s investment approach integrates top-down country allocation and bottom-up stock selection. Rather than focusing purely on short-term cyclical opportunities, our top-down country analysis recognizes the importance of how markets and investment performance may be impacted over time by variables such as economic growth, liquidity, currencies, regulatory issues, fiscal and monetary policy and overall market sentiment. Likewise, we concentrate on a company’s growth rate with the goal of identifying securities capable of delivering improving and sustainable earnings growth over the mid to long term. We take that same long-range view when it comes to integrating environmental, social and governance factors into our investment process. We incorporate ESG factors holistically as part of both our top-down and bottom-up analysis. Integrating analysis of ESG factors offers a complementary stream of information to identify opportunities and potential risks at the country and security level that may not ordinarily be uncovered with traditional fundamental analysis. Investment thesis: Tencent Since 2010, Tencent has grown earnings-per-share by more than 28% (compounded annual growth rate) and is a leader in accelerating future Although not a household name to many Americans, Tencent is a social growth areas noted earlier. Continuing to demonstrate resilient funda- networking, e-commerce, cloud computing, music, fi ntech, internet mentals, Tencent’s powerful brand, low production costs and diversifi ed services, artifi cial intelligence and multiplayer online gaming jugger- revenue sources have enabled it to survive—and even thrive—during naut—as well as one of the world’s leading venture capital fi rms.
    [Show full text]
  • Tencent Kubernetes Engine API Documentation
    Tencent Kubernetes Engine Tencent Kubernetes Engine API Documentation Product Documentation ©2013-2019 Tencent Cloud. All rights reserved. Page 1 of 350 Tencent Kubernetes Engine Copyright Notice ©2013-2019 Tencent Cloud. All rights reserved. Copyright in this document is exclusively owned by Tencent Cloud. You must not reproduce, modify, copy or distribute in any way, in whole or in part, the contents of this document without Tencent Cloud's the prior written consent. Trademark Notice All trademarks associated with Tencent Cloud and its services are owned by Tencent Cloud Computing (Beijing) Company Limited and its affiliated companies. Trademarks of third parties referred to in this document are owned by their respective proprietors. Service Statement This document is intended to provide users with general information about Tencent Cloud's products and services only and does not form part of Tencent Cloud's terms and conditions. Tencent Cloud's products or services are subject to change. Specific products and services and the standards applicable to them are exclusively provided for in Tencent Cloud's applicable terms and conditions. ©2013-2019 Tencent Cloud. All rights reserved. Page 2 of 350 Tencent Kubernetes Engine Contents API Documentation History Introduction API Category Making API Requests Request Structure Common Params Signature v3 Signature Responses Cluster APIs DescribeClusterKubeconfig DescribeClusters CreateCluster DescribeClusterSecurity DeleteCluster ModifyClusterEndpointSP DescribeClusterEndpointVipStatus DescribeClusterEndpointStatus
    [Show full text]
  • Tencent Cloud Comunication Solutions for China
    Tencent Cloud Comunication Solutions for China 28.10.2020 © 2020 Tencent Cloud, LLC. All rights reserved. AGENDA • Tencent: “A Chinese Digital Dragon” • The Chinese opportunity • Who is Tencent? • Globalization strategy • Public Cloud • Cloud Communication Solutions • Tencent VooV Meeting • WeChat Work • Tencent Cloud Conference & Exhibition © 2020 Tencent Cloud, LLC. All rights reserved. - Tencent, “A Chinese Digital Dragon” 4 Founded in 1998 and headquartered in Tencent by the numbers: Shenzhen, Tencent is one of the largest • 550+ billion USD market capitalization** technology companies in the world and a global leader in messaging, social media, gaming, • 1.203+ billion monthly active Weixin/WeChat mobile payment, music streaming, digital users* literature, video and other digital content services. • 112 million video subscriptions* • #1 Mobile Payment in China by monthly active users and daily active users* • 62,000+ employees* *As of March 2020 **As of June 10, 2020 © 2020 Tencent Cloud, LLC. All rights reserved. Tencent - User Centric 360-Degree Ecosystem 6 TEG PCG IEG WXG CSIG CDG Technical Platform & Content Interactive Weixin (WeChat) Cloud & Smart Industries Corporate & Engineering Group Group Entertainment Group Group Group Development Group Tencent QQ Tencent Games WeChat Tencent Cloud Tencent Fintech Big Data Tencent YouTu QQ zone Tencent Tencent Tencent e-Sports Marketing WeChat Pay Transit QR Code AI Lab Tencent App Store Solution Tencent Maps WeiShi Timi Studio Tencent Security WeChat Work Platform Smart Retail Tencent News Lightspeed & Mr. Translator Tencent Quantum Studio QQ Mail Data Center QQ Browser Tencent Mobile Manager Tencent Animation Tencent PC Manager Aurora Studio WeRead Tencent Pictures Tencent Miying Next Studio Auto intelligence Penguin Pictures Mini Program Tencent HealthCare Tencent Video MOREFUN Official Tencent Autonomous Studio Account Driving Kuai Bao Tencent Classroom © 2020 Tencent Cloud, LLC.
    [Show full text]
  • Tencent Announces 2021 Second Quarter and Interim Results
    For Immediate Release TENCENT ANNOUNCES 2021 SECOND QUARTER AND INTERIM RESULTS Hong Kong, August 18, 2021 – Tencent Holdings Limited (“Tencent” or the “Company”, 00700.HK), a leading provider of Internet value added services in China, today announced the unaudited consolidated results for the second quarter (“2Q2021”) and first half year of 2021 (“1H2021”) ended June 30, 2021. 1H2021 Key Highlights Revenues: +23% YoY, non-IFRS1 profit attributable to equity holders of the Company: +17% YoY ▪ Total revenues were RMB273.6 billion (USD42.3 billion2), an increase of 23% over the first half year of 2020 (“YoY”). ▪ On a non-IFRS basis, which is intended to reflect core earnings by excluding certain one-time and/or non-cash items: - Operating profit was RMB85.6 billion (USD13.2 billion), an increase of 17% YoY. Operating margin decreased to 31% from 33% last year. - Profit for the period was RMB69.6 billion (USD10.8 billion), an increase of 18% YoY. Net margin decreased to 25% from 27% last year. - Profit attributable to equity holders of the Company for the period was RMB67.2 billion (USD10.4 billion), an increase of 17% YoY. - Basic earnings per share were RMB7.055. Diluted earnings per share were RMB6.916. ▪ On an IFRS basis: - Operating profit was RMB108.8 billion (USD16.8 billion), an increase of 42% YoY. Operating margin increased to 40% from 34% last year. - Profit for the period was RMB92.0 billion (USD14.2 billion), an increase of 49% YoY. Net margin increased to 34% from 28% last year. - Profit attributable to equity holders of the Company for the period was RMB90.4 billion (USD14.0 billion), an increase of 46% YoY.
    [Show full text]
  • Free-Fall: Hacking Tesla from Wireless to Can Bus
    FREE-FALL: HACKING TESLA FROM WIRELESS TO CAN BUS Sen Nie, Ling Liu, Yuefeng Du Keen Security Lab of Tencent {snie, dlingliu, davendu}@tencent.com ABSTRACT In today's world of connected cars, security is of vital importance. The security of these cars is not only a technological issue, but also an issue of human safety. In our research, we focused on perhaps the most famous connected car model: Tesla. In September 2016, our team (Keen Security Lab of Tencent) successfully implemented a remote attack on the Tesla Model S in both Parking and Driving mode. [1-3] This remote attack utilized a complex chain of vulnerabilities. We have proved that we can gain entrance from wireless (Wi-Fi/Cellular), compromise many in-vehicle systems like IC, CID, and Gateway, and then inject malicious CAN messages into the CAN Bus. Just 10 days after we submitted our research to Tesla, Tesla responded with an update using their OTA mechanism and introduced the code signing protection into Tesla cars. Our paper will be in three parts: our research, Tesla's response, and the follow-up. We will, for the first time, share the details of the whole attack chain on the Tesla, and then reveal the implementation of Tesla's OTA and Code Signing features. Furthermore, we'll explore the new mitigation on Tesla and share our thoughts on them. TARGET VERSION We have successfully tested our vulnerabilities on Tesla Model S P85 and P75, the latest version at that time was as follows. Version Model S gw:/firmware.rc (Build Number) P85 v7.1(2.28.60) fileCrc 502224ba P75 v7.1(2.32.23) fileCrc e3deeaab Table 1 Tested version REMOTE ATTACK SURFACE The truth is that we found our browser exploit first, then we think a contactless approach should be achieved.
    [Show full text]
  • Live Video Broadcasting FAQ
    FAQ Product Introduction Live Video Broadcasting FAQ Product Introduction ©2013-2018 Tencent Cloud. All rights reserved. Page 1 of 35 FAQ Product Introduction Copyright Notice ©2013-2018 Tencent Cloud. All rights reserved. Copyright in this document is exclusively owned by Tencent Cloud. You must not reproduce, modify, copy or distribute in any way, in whole or in part, the contents of this document without Tencent Cloud's the prior written consent. Trademark Notice All trademarks associated with Tencent Cloud and its services are owned by Tencent Cloud Computing (Beijing) Company Limited and its affiliated companies. Trademarks of third parties referred to in this document are owned by their respective proprietors. Service Statement This document is intended to provide users with general information about Tencent Cloud's products and services only and does not form part of Tencent Cloud's terms and conditions. Tencent Cloud's products or services are subject to change. Specific products and services and the standards applicable to them are exclusively provided for in Tencent Cloud's applicable terms and conditions. ©2013-2018 Tencent Cloud. All rights reserved. Page 2 of 35 FAQ Product Introduction Contents FAQ Basics of LVB Video Stutter Instant Broadcasting Reduce Latency Pushing Failure Watching LVB Failure Increase Definition Compatibility with Apple ATS Delete IDs of Channel Hosting Mode & LVB Code Access Mode Difference Between Stream Interruption and Stream Suspension ©2013-2018 Tencent Cloud. All rights reserved. Page 3 of 35 FAQ Product Introduction FAQ Basics of LVB Last updated:2018-07-24 16:09:24 1. What are Push, LVB and VOD? Push: This refers to the process in which VJs push local video and audio sources to Tencent Video Cloud servers.
    [Show full text]
  • Tencent Holdings Limited (SEHK: 700)
    Initiation Company Report Internet E INDUSTRY NAM INDUSTRY INDUSTRYME Tencent vs. Alibaba: Why matter and who wins? 5 April, 2016 INVESTMENT SUMMARY ● We initiate Tencent with a BUY rating and a TP of HK$187 because we believe Research Team Tencent has an upper hand in the competition against Alibaba (BABA US, BUY, TP: US$84) to be the top Internet ecosystem in China; Tianli Wen ● Weixin has given Tencent three mandates, in our view: (1) a mobile display Head of Research interface, (2) an online-to-offline bridge and (3) a closed loop business platform. We believe the impact will result in great expansion of Tencent’s business scope; ● In the near term, we expect conversion of PC-based e-sports game to mobile, and +852 21856112 rolling out of Weixin advertising to drive growth. We project top line growth of [email protected] 39% and 26% and non-GAAP operating profit growth of 34% and 25% in 2016/17. See the last page of the report for important disclosures Blue Lotus Capital Advisors Limited 1 China|Asia ●Initiation Internet ● Multi-business Tencent Holdings Limited (SEHK: 700) Realistic imaginations: Initiate with BUY BUY HOLD SELL ● Despite being at the interlude of its growth phases, we believe Tencent’s grasp Target Price: HK$ 187 Current Price: 158.50 Initiation of the mobile Internet ecosystem warrants a BUY. RIC: (SEHK:700) BBG: 700:HK Market cap (US$ mn) 186,069 ● The potential of Weixin as an ecosystem orchestrator is still at the early stage. Average daily volume (US$ mn) 4,722 China’s entertainment spending per GDP still has big room to improve.
    [Show full text]
  • Data Privacy, Power, and Trust Emerging Risks for Internet Platforms
    Investment Research Data Privacy, Power, and Trust Emerging Risks for Internet Platforms Bret Miller, CFA, Senior Vice President, Research Analyst Jenny Hardy, Vice President, Research Analyst The extraordinary amount of data generated by individuals throughout their digital lives is today concentrated on the leading internet platforms. The market valuations and data-driven business models of these companies are highly dependent on the trust they have built with users. As more and more of people’s lives move online, this concentration of data and the implicit trust users have given these companies raise questions about privacy rights, government regulations, and the balance between corporate interests and social responsibility. The broad scope and importance of this issue has led us to characterize it as an ESG (Environmental, Social, and Governance) consideration. Data and the companies that traffic in it are playing a larger role in society, its norms, and the direction of the digital economy. Given this complexity, we believe it is essential that ESG is fully integrated into the investment process. Data risks can be challenging to quantify and often have implications that cut across traditional approaches to equity analysis. In our view, a fully integrated ESG investment process allows investors a more nuanced view of data privacy issues and enables more sophisticated analysis of individual companies. 2 Challenges in a Data-Driven World For example, should Google use highway traffic data and your behavior history to wake your alarm 15 minutes early if it knows The rapid adoption of smartphones over the past decade has your commute to work is going to take longer today because of enabled virtually continuous connectivity to the internet for three road construction? Or should Microsoft use your calendar content billion people, with mobile devices rarely farther away than a and LinkedIn network to alert you that your husband went to pocket, purse, or bedside.
    [Show full text]
  • Top Five Facts You Didn't Know About the World Wide Web
    Structuring for Success TOP FIVE FACTS You didn’T KNOW ABOUT THE WORLD WIDE WEB. INTERNET USAGE AND ITS FUNCTION VARIES ACROSS BORDERS. HERE ARE SOME INTRIGUING INSIGHTS ABOUT HOW DIFFERENT PARTS OF THE GLOBE ARE ENGAGING IN THE DIGITAL WORLD. 1. SOUTH KOREA has the fastest and most developed broadband network in the world . It’s also the cheapest. South Korea was the first to convert dial-up to broadband in 2005 and Seoul has been called the bandwidth capital of the world. In summer 2012, they became the first country to hit 100 percent penetration for wireless broadband, according to a report by the Organization for Economic Cooperation and Development. They’re also experimenting with speeds of one gigabit per second. 2. 92.9 percent of SWEDEN has access to the Internet – the U.S. trails at 78 percent. Ninety percent of Swedish women and 91 percent of Swedish men have used the Internet is the past three months. On average, they are spending 20 hours per week online and have had a 13 percent increase in online shopping from last year. Sweden has also been named number one on Tim Berners-Lee’s Web Index, meaning they are the best in world at utilizing the web. 3. INDIA has over 121 million Internet users, yet only 10.2 percent of the population have access. The number of broadband users has increased from 0.18 million in 2005 to 13.45 million as of February 2012 – a cumulative annual growth of 117 percent. Facebook also saw an increase in Indian users with a 167 percent user increase from last year.
    [Show full text]