SA8T2 Internal Deliverable Distributed Rendez-Vous Service with Jitsi Software Suite

Total Page:16

File Type:pdf, Size:1020Kb

SA8T2 Internal Deliverable Distributed Rendez-Vous Service with Jitsi Software Suite 30-04-2016 SA8T2 Internal Deliverable Distributed RENdez-Vous service with Jitsi software suite SA8T2 Internal Deliverable Contractual Date: 30-04-2016 Actual Date: 30-04-2016 Grant Agreement No.: 691567 Activity: 12/SA8 Task Item: Task 2 — WebRTC Nature of Deliverable: R (Report) Dissemination Level: PU (Public) Lead Partner: NORDUnet (UNINETT) Authors: Frédéric Loui (RENATER) © GEANT Limited on behalf of the GN4 Phase 1 project. The research leading to these results has received funding from the European Union’s Horizon 2020 research and innovation programme under Grant Agreement No. 691567 (GN4-1). Abstract This document reports on results and findings from a technical investigation into potential deployment configurations of a federated RENdez-Vous service distributed across several NREN domains and scalable at the European level. The technology scout was conducted by the Service Activity 8 (SA8, Real Time Communication and Media), Task 2 (WebRTC) team as part of the GN4-1 project. This report should, as such, be read in context of the related work produced by GN4-1 SA8-T2. Table of Contents Executive Summary 1 1 Introduction 1 1.1 About this document 1 1.1.1 Target audience 1 1.1.2 Responsible task members 1 1.2 Background 1 1.3 Rationale 2 1.4 Technology scout objectives and methodology 2 2 Technology introduction 1 2.1 History 1 2.2 Enter WebRTC 1 2.3 About Jitsi 2 3 Why Jitsi? 3 4 Proof of Concept 4 4.1 PoC plan 4 4.2 Jitsi technology overview 4 4.3 POC set up 5 4.3.1 Jitsi Meet 5 4.3.2 Jicofo 6 4.3.3 Jitsi Videobridge 6 4.3.4 Jitsi POC configuration 6 4.4 WebRTC Technology & architectures consideration 8 4.5 Technical options for distributed Jitsi 10 4.6 Technology shortcomings in Jitsi 11 4.7 Validation of basic distributed Jitsi 14 5 Conclusions 15 Deliverable SA8T2 Internal Deliverable Distributed RENdez-Vous service with Jitsi i software suite Document Code: WebRTC Contents Table of Figures Figure 1: RENdez-Vous User Interface 5 Figure 2: Jitsi environment deployment 7 Figure 3: WebRTC full-mesh model 8 Figure 4: WebRTC MCU model 9 Figure 5: WebRTC SFU model 10 Figure 6: Approach #1 12 Figure 7: Approach #2 13 Figure 8: Approach #3 14 SA8T2 Internal Deliverable Distributed RENdez-Vous service with Jitsi ii software suite Executive Summary RENdez-Vous is a multi-party web conference service deployed by the French NREN, RENATER. The service is based on Jitsi; an open source software suite powered by WebRTC. This technology scouting report investigates potential deployment configurations of a federated RENdez-Vous service distributed across several NREN domains and scalable at the European level. The Jitsi suite is made up of three main components: Jitsi Meet — the front end user interface, e.g. where users meet via a common URL. Jitsi Videobridge — acts as a central component that relays participants’ audio, video and data streams to the other peers. Jicofo — a component between Jitsi Meet and Jitsi Videobridge responsible for room creation requests and to tie users to a room. Further investigations identify that multiple video bridges can be deployed for a Jitsi instance. A key role of Jicofo is to balance the load of the whole system by distributing rooms among available video bridges. This is how unlimited scalability can be achieved in theory. Jitsi Meet can delegate authentication to SAMLv2 IDP and thus integrate with eduGAIN so that only people belonging to this federation can spawn a virtual conference room. Jitsi Meet also provides an API that, although not yet fully mature, can be used to integrate (embed) and control meeting rooms inside other applications (in-context). Although scalability is ensured by deploying more than one video bridge, Jitsi Meet and Jicofo can be identified as single point of failure components. Jitsi Meet runs behind a web server and may thus achieve high availability. This does not apply to Jicofo, where additional development efforts are required. Blue Jimp, the company behind Jitsi, has not yet committed to development in this area. A RENdez-Vous instance constructed with one Jitsi Meet, one Jicofo and a set of Jitsi Videobridges is self contained. It cannot interact with Jitsi Meet or Jicofo components from a different instance. A number of architectures were proposed for a European R&E global context. However, after further investigation and discussions with Blue Jimp, the current 3-tier structure inherently restricts the number of possible architectures. One alternative is to deploy a global instance across Europe; i.e. one Jitsi Meet, one Jicofo and distribute video bridges across NRENs’ IaaS infrastructures. The second alternative involves building a self-contained instance within each national domains infrastructure, either managed by GEANT or the NREN. SA8T2 Internal Deliverable Distributed RENdez-Vous service with Jitsi software suite 1 Introduction A potential scenario combines 3 deployment considerations: - One single GEANT RENdez-Vous be deployed for e-infrastructure that needs multi-party video conference turn key solution from the GEANT catalogue; - GEANT creates and manages a RENdez-Vous instance for each NREN wanting to benefit from the service, but can not handle the operations themselves and do not have the adequate infrastructure to host the service; - For each NREN willing to host and operate their own service instance; re-use the service delivery model elaborated in the frame of GN4-1, GN4-2. A variant of this solution would be to have GEANT create an instance of RENdez-Vous for each NREN within each NREN’s infrastructure. SA8T2 Internal Deliverable Distributed RENdez-Vous service with Jitsi 2 software suite 1 Introduction 1.1 About this document This report documents the investigation into the technical and practical feasibility of various deployment configurations to realise a scalable multi-party web conference service based on Jitsi software. The technology scout was undertaken as part of the Geant4 Phase 1 project by the WebRTC Task 2(T2); one of three tasks of the Real Time Communication and Media activity (SA8). This report should, as such, be read in context of the related work produced by GN4-1 SA8-T2. The WebRTC task ran from 1 May 2015 to 30 April 2016. 1.1.1 Target audience This document targets technical management and specialists, in particular those working in the fields of real time communications, eLearning and eResearch. 1.1.2 Responsible task members Fréderic Loui (RENATER) had the lead on this tech scout. Jan Meijer (UNINETT) and Simon Skrødal (UNINETT) were the document editors. 1.2 Background The French NREN, RENATER, was the first NREN to provide a native WebRTC-based online desktop audio/videoconferencing service to its community. The RENdez-Vous service (https://rendez- vous.renater.fr) was set up as a pilot in the fall of 2014 and announced as a production service in March 2015. eduGAIN authentication (http://services.geant.net/edugain/Pages/Home.aspx) was added as part of RENATER's national WebRTC effort during 2015 to allow harvesting experiences from a wider user community. The service builds on the open source software product Jitsi, and is currently the only known example of a Selective Forwarding Unit system. Based on the technologies underpinning RENdez-Vous, this technology scout sought to investigate their potential in realising a larger-scale distributed service to facilitate more users in the wider GÉANT community. SA8T2 Internal Deliverable Distributed RENdez-Vous service with Jitsi software suite 1 Introduction 1.3 Rationale The RENdez-Vous service utilises the Jitsi open source software, using a Selective Forwarding Unit (SFU) as a central server component rather than routing media traffic peer-to-peer. Experiences with R&E web conferencing services show online meetings of eLearners and researchers often reach a group size of 10–15 people, which is too challenging for the peer-to-peer technology used by most commercial native WebRTC solutions. It made sense to investigate the technical potential for a scalable GÉANT desktop videoconference service based on Jitsi: a distributed RENdez-Vous. 1.4 Technology scout objectives and methodology The key objectives of this technology scout were to assess whether the Jitsi software could be used to scale out to a distributed deployment supporting all of EU R&E. This would create a single distributed WebRTC desktop video conference service for all NRENs with minimal effort. Based on an assessment of various Jitsi technology options, an architecture for a distributed Jitsi deployment was defined and implemented as a PoC. The concept was (manually) validated with 2 nodes in 2 countries. Unfortunately, the project staff member undertaking the work left for a new job and there was not enough time available to replace his unique expertise in the project. As such, the automation of the process could not be validated, or tested on an even larger scale. SA8T2 Internal Deliverable Distributed RENdez-Vous service with Jitsi 2 software suite 2 Technology introduction Innovation and, more widely, open innovation are enabled by research projects involving people from different countries. These projects become de facto “global” in the geographical sense. An array of telescopes can be located in Chile or Australia, while the datacenters in charge of computing an unmatched 3D resolution representation of the galaxy is located in the NCSA (Illinois University/US) or CCIN2P3 (Lyon/France) and the astrophysicists are based in Paris or Stanford University. On the same token, open source projects such as OpenStreetMap is an iconic example of an open innovation success enabled by developers and crowds working all around the globe. 2.1 History In this context, audio/video conferencing is key for researchers participating in global projects.
Recommended publications
  • Course 5 Lesson 2
    This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author (s) and do not necessarily reflect the views of the National Science Foundation C5L3S1 With the advent of the Internet, social networking, and open communication, a vast amount of information is readily available on the Internet for anyone to access. Despite this trend, computer users need to ensure private or personal communications remain confidential and are viewed only by the intended party. Private information such as a social security numbers, school transcripts, medical histories, tax records, banking, and legal documents should be secure when transmitted online or stored locally. One way to keep data confidential is to encrypt it. Militaries,U the governments, industries, and any organization having a desire to maintain privacy have used encryption techniques to secure information. Encryption helps to boost confidence in the security of online commerce and is necessary for secure transactions. In this lesson, you will review encryption and examine several tools used to encrypt data. You will also learn to encrypt and decrypt data. Anyone who desires to administer computer networks and work with private data must have some familiarity with basic encryption protocols and techniques. C5L3S2 You should know what will be expected of you when you complete this lesson. These expectations are presented as objectives. Objectives are short statements of expectations that tell you what you must be able to do, perform, learn, or adjust after reviewing the lesson.
    [Show full text]
  • Software Catalog for Patch Management and Software Deployment 
    Software Catalog for Patch Management and Software Deployment Find all supported 3rd party applications that can be patched and deployed in Monitoring & Asset Management below. Click on a software to get a more detailed view of the respective versions. (Last Update: 2021/03/23) Vendors # Citrix 4 7-Zip 4 Code4ward.net 5 A CoreFTP 5 Acro 4 Corel 5 Adobe 4 CrowdStrike, Inc 5 AdoptOpenJDK 4 D AIMP Dev Team 4 dotPDN LLC 5 Amazon Services LLC 4 Dropbox 5 Apache Software Foundation 4 E Apple 4 Evernote Corporation 5 Atlassian 4 F Audacity 4 FileZilla 5 Azul Systems, Inc 4 Foxit Corporation 5 B G Bandicam Company 4 GIT 5 Barco, Inc 4 GIMP.org 5 BlueJeans Network, Inc. 4 Glavsoft 5 Botkind, Inc. 4 Google 5 Box.com 4 Gretech Corp 5 C Inkscape 5 CDBurnerXP 4 IrfanView 5 Cisco 4 Software Catalog for Patch Management and Software Deployment J P Jabra 5 PeaZip 10 JAM Software 5 Pidgin 10 Juraj Simlovic 5 Piriform 11 K Plantronics, Inc. 11 KeePass 5 Plex, Inc 11 L Prezi Inc 11 LibreOffice 5 Programmer‘s Notepad 11 Lightning UK 5 PSPad 11 LogMeIn, Inc. 5 Q M QSR International 11 Malwarebytes Corporation 5 Quest Software, Inc 11 Microsoft 6 R MIT 10 R Foundation 11 Morphisec 10 RarLab 11 Mozilla Foundation 10 Real 11 N RealVNC 11 Neevia Technology 10 RingCentral, Inc. 11 NextCloud GmbH 10 S Nitro Software, Inc. 10 Scooter Software, Inc 11 Nmap Project 10 Siber Systems 11 Node.js Foundation 10 Simon Tatham 11 Notepad++ 10 Skype Technologies S.A.
    [Show full text]
  • Webrtc and XMPP
    webRTC and XMPP Philipp Hancke, XMPP Summit 2013 What is this webRTC thing … …and why should XMPP developers care? . I assume you know what XMPP is… . … you might have heard of Jingle . the XMPP framework for establishing P2P sessions . used for VoIP, filesharing, … . … you might have also heard about this webRTC thing . doing VoIP in the browser . without plugins . „no more flash“ . Do you want to know how it relates to XMPP ? Philipp Hancke © ESTOS GmbH 2013 2 What is webRTC? . P2P sessions between browsers . no servers involved in media transfer . using open standards . Javascript API in the browser . also an BSD-licensed C++ library from Google . Want to know more? . Listen to the evangelists! . Justin Uberti http://www.youtube.com/watch?v=E8C8ouiXHHk . Jose de Castro http://vimeo.com/52510068 . Cullen Jennings http://vimeo.com/cullenfluffyjennings/rtcwebexplained Philipp Hancke © ESTOS GmbH 2013 3 Initiating P2P sessions . initiate a P2P session between two browsers . negotiate media codecs, NAT traversal, etc . media is sent P2P . you need a session initiation protocol . SIP? . JSEP? . H.323? . Jingle! . webRTC does not mandate a signalling protocol . WG decision Philipp Hancke © ESTOS GmbH 2013 4 Call Flow - JSEP Philipp Hancke © ESTOS GmbH 2013 5 Jingle . You can use Jingle as signalling protocol . together with BOSH or XMPP over websockets in the browser . Demo later . But… . webRTC uses the Session Description Protocol as an API . Jingle does not use SDP . You need a mapping SDP -> Jingle -> SDP . Complicated, but doable . Topic for breakout Philipp Hancke © ESTOS GmbH 2013 6 Call Flow - Jingle Philipp Hancke © ESTOS GmbH 2013 7 webRTC-Jingle usecases .
    [Show full text]
  • A Framework for Real-Time Communications
    Anton is a leading experts on Real Time Anton Venema Communications solutions, and the 1 Chief Technology Officer visionary lead architect behind IceLink, WebSync and LiveSwitch. iRTC Internet-Based Real Time Communications Introduction What’s the first thought that comes into your mind when you think about real-time communications? Is it a phone call you had a few minutes ago? A text message sent to your mobile? Maybe something more modern, like a tweet or video broadcast? All of these fall under the umbrella of what we like to call Internet-based real time communications, or iRTC for short. Real-time communications have been a part of our lives for a long time. From public telephone networks to radios all the way back to the telegraph, humanity has a history of seeking out new and better ways to use technology to improve communication. In the past decade, technology has arguably advanced more than the past century before it. Smartphones have stormed the market, mobile processors are advancing in line with Moore’s law, LTE rollouts are delivering unprecedented Internet speeds across the world, and WiFi hotspots are becoming ubiquitous. iRTC Includes Many Applications The availability of high-speed Internet services just about everywhere is causing a fundamental shift in the way people want to communicate and consume media. Cable networks are finding it more difficult to distinguish between their Internet and TV services, especially when companies like Netflix and HBO are able to publish their content directly to consumers over the Internet. Even live broadcasts, TV’s last stronghold, are being slowly replaced as platforms like YouTube allow content to be broadcast live to millions of users simultaneously over the Internet.
    [Show full text]
  • ULTIMA X Series 3 EC Declaration of Conformity MSA
    Operating Manual ULTIMAX-Series Gas Monitors Order No. 10046690/09 MSA AUER GmbH Thiemannstrasse 1 D-12059 Berlin Germany © MSA AUER GmbH. All rights reserved MSA EC Declaration of Conformity EC Declaration of Conformity Manufactured by: Mine Safety Appliances Company 1000 Cranberry Woods Drive Cranberry Township, PA 16066 USA The manufacturer or the European Authorized Representative: MSA AUER GmbH, Thiemannstrasse 1, D-12059 Berlin declares that the ULTIMA XE Main product ULTIMA XE Main with HART Module based on the EC-Type Examination Certificate: DMT 02 ATEX E 202 X complies with the ATEX directive 94/9/EC, Annex III. Quality Assurance Notification complying with Annex IV of the ATEX Directive 94/9/EC has been issued by Ineris of France, Notified Body number: 0080. The product is in conformance with the EMC directive 2004 / 108/ EC, EN 50270 :2006 Type 2 *, EN 61000 - 6 - 4 : 2007 * EN 61000-4-6 : Ultima XE MAIN HART MODULE : occasional transmission error can appear at the 2-wire version. A fault check has to be used at the receiver unit. The product complies with the directive 96/98 / EC (MarED), based on the EC-Type Examination Certificate : SEE BG 213.038 The quality survaillance is under the control of SEE BG, Notified Body number: 0736 We further declare that the product complies with the provisions of LVD Directive 2006 / 95/ EC, with the following harmonised standard: EN 61010-1 :2002 MSA AUER GmbH Berlin, October 2008 Dr. Axel Schubert R&D Instruments ® GB ULTIMA X Series 3 EC Declaration of Conformity MSA EC Declaration of Conformity Manufactured by: Mine Safety Appliances Company 1000 Cranberry Woods Drive Cranberry Township, PA 16066 USA The manufacturer or the European Authorized Representative: MSA AUER GmbH, Thiemannstrasse 1, D-12059 Berlin declares that the product ULTIMA SENSOR XE based on the EC-Type Examination Certificate: DMT 02 ATEX E 202 X complies with the ATEX directive 94/9/EC, Annex III.
    [Show full text]
  • CCIA Comments in ITU CWG-Internet OTT Open Consultation.Pdf
    CCIA Response to the Open Consultation of the ITU Council Working Group on International Internet-related Public Policy Issues (CWG-Internet) on the “Public Policy considerations for OTTs” Summary. The Computer & Communications Industry Association welcomes this opportunity to present the views of the tech sector to the ITU’s Open Consultation of the CWG-Internet on the “Public Policy considerations for OTTs”.1 CCIA acknowledges the ITU’s expertise in the areas of international, technical standards development and spectrum coordination and its ambition to help improve access to ICTs to underserved communities worldwide. We remain supporters of the ITU’s important work within its current mandate and remit; however, we strongly oppose expanding the ITU’s work program to include Internet and content-related issues and Internet-enabled applications that are well beyond its mandate and core competencies. Furthermore, such an expansion would regrettably divert the ITU’s resources away from its globally-recognized core competencies. The Internet is an unparalleled engine of economic growth enabling commerce, social development and freedom of expression. Recent research notes the vast economic and societal benefits from Rich Interaction Applications (RIAs), a term that refers to applications that facilitate “rich interaction” such as photo/video sharing, money transferring, in-app gaming, location sharing, translation, and chat among individuals, groups and enterprises.2 Global GDP has increased US$5.6 trillion for every ten percent increase in the usage of RIAs across 164 countries over 16 years (2000 to 2015).3 However, these economic and societal benefits are at risk if RIAs are subjected to sweeping regulations.
    [Show full text]
  • Download Windows Live Messenger for Linux Ubuntu
    Download windows live messenger for linux ubuntu But installing applications in Ubuntu that were originally made for I found emescene to be the best Msn Messenger for Ubuntu Linux so far. It really gives you the feel as if you are using Windows Live Messenger. Its builds are available for Archlinux, Debian, Ubuntu, Fedora, Mandriva and Windows. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger and Google Talk. While finding MSN Messenger for Linux / Ubuntu, I found different emesene is also available and could be downloaded and installed for. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger. A simple & beautiful app for Facebook Messenger. OS X, Windows & Linux By downloading Messenger for Desktop, you acknowledge that it is not an. An alternative MSN Messenger chat client for Linux. It allows Linux users to chat with friends who use MSN Messenger in Windows or Mac OS. The strength of. Windows Live Messenger is an instant messenger application that For more information on installing applications, see InstallingSoftware. sudo apt-get install chromium-browser. 2. After the installation is Windows Live Messenger running in LinuxMint / Ubuntu. You can close the. Linux / X LAN Messenger for Debian/Ubuntu LAN Messenger for Fedora/openSUSE Download LAN Messenger for Windows. Windows installer A MSN Messenger / Live Messenger client for Linux, aiming at integration with the KDE desktop Ubuntu: Ubuntu has KMess in its default repositories.
    [Show full text]
  • FOSDEM 2017 Schedule
    FOSDEM 2017 - Saturday 2017-02-04 (1/9) Janson K.1.105 (La H.2215 (Ferrer) H.1301 (Cornil) H.1302 (Depage) H.1308 (Rolin) H.1309 (Van Rijn) H.2111 H.2213 H.2214 H.3227 H.3228 Fontaine)… 09:30 Welcome to FOSDEM 2017 09:45 10:00 Kubernetes on the road to GIFEE 10:15 10:30 Welcome to the Legal Python Winding Itself MySQL & Friends Opening Intro to Graph … Around Datacubes Devroom databases Free/open source Portability of containers software and drones Optimizing MySQL across diverse HPC 10:45 without SQL or touching resources with my.cnf Singularity Welcome! 11:00 Software Heritage The Veripeditus AR Let's talk about The State of OpenJDK MSS - Software for The birth of HPC Cuba Game Framework hardware: The POWER Make your Corporate planning research Applying profilers to of open. CLA easy to use, aircraft missions MySQL Using graph databases please! 11:15 in popular open source CMSs 11:30 Jockeying the Jigsaw The power of duck Instrumenting plugins Optimized and Mixed License FOSS typing and linear for Performance reproducible HPC Projects algrebra Schema Software deployment 11:45 Incremental Graph Queries with 12:00 CloudABI LoRaWAN for exploring Open J9 - The Next Free It's time for datetime Reproducible HPC openCypher the Internet of Things Java VM sysbench 1.0: teaching Software Installation on an old dog new tricks Cray Systems with EasyBuild 12:15 Making License 12:30 Compliance Easy: Step Diagnosing Issues in Webpush notifications Putting Your Jobs Under Twitter Streaming by Open Source Step. Java Apps using for Kinto Introducing gh-ost the Microscope using Graph with Gephi Thermostat and OGRT Byteman.
    [Show full text]
  • Download Resume
    Oji Udezue http://www.linkedin.com/in/ojiudezue . +1 425-829-9520 SUMMARY: EXPERIENCED PRODUCT, DESIGN & TECHNOLOGY EXECUTIVE I’m a product-led growth expert. A multi-disciplinary tech exec with strong product, design and engineering leadership skills. I have had stints in marketing and sales which provide a well - rounded experience of key business functions. In addition, I have startup experience and a track record advising several great startups. I have a talent for new product strategy and the practical leadership to innovate and execute with conviction. I am passionate about early stage product development and entrepreneurship in organizations. My strongest skill sets are product vision, lean product management; strategy & planning, people management and talent development. Professional Experience CALENDLY VP of Product (2018 – Present) Lead Technology, Product, Design and Content Strategy • Under my tenure, Calendly is sustaining 100% year on year growth in ARR and MAU • Drive key engineering investments and a high-performance engineering culture • Set product vision, mission and goals for business • Drive ongoing, high velocity innovation • Manage overall user experience and delivery of value to customers • Manage team health, product craft excellence and talent acquisition • Drive clear and actionable business metrics and management of business to those metrics • Drive acquisition strategy; review and approve potential acquisition deals • Manage growth program and virality initiatives to increase audience share ATLASSIAN Head
    [Show full text]
  • Copyrighted Material
    Stichwortverzeichnis A B Abstreitbarkeit 167 Bequemlichkeit 30 Adblocker 96 Bitcoin 110 – Adblock Plus 96 Blackberry 215 – Disconnect 96 Bookmarks siehe Favoriten – Ghostery 96 Browser 68, 75 – Privacy Badger 96 – Add-on 87, 90 – uBlock 97 – Apple Safari 77 Add-on – Cache 88 – Browser 87, 90 – Chromium 78 – E-Mail-Client 126 – Chronik 87 – Enigmail siehe Enigmail – Fingerprinting 85, 98 – GpgOL 137 – Google Chrome 77 – Mailvelope 130, 132 – HTML-Engine 80 – Thunderbird 139 – Hygiene 88 Adium 170 – Iceweasel 78 Advanced Programming Interface (API) 90, – Inkognito-Modus 86 182 – integrierte Suche 84 Android – Internet Explorer 77 – Android Privacy Guard (App) 156 – Konqueror 78 – K9 Mail (E-Mail-Client) 156 – Microsoft Edge 92 – OpenKeychain (App) 156 – Midori 78 – PGP 156 – Mosaic 68 – R2Mail2 (E-Mail-Client) 158 – Mozilla Firefox 68, 76 – S/MIME 156 – Netscape Navigator 68 Anonymität 206 COPYRIGHTED– Opera 77MATERIAL AOL Instant Messenger (AIM) 164 – Plug-in 87 Apple Mail – Prole (Identitäten) 87 – PGP 145 – Synchronisation von Einstellungen – S/MIME 155 86 Authentizierung 167, 169, 176, 179 – Web (Epiphany) 78 – Adium 172 Buffer Overow 82 – Multifaktor- 201 Bugs 82 – Pidgin 169 Bundesamt für Sicherheit in der Informations- Authentizität 29, 54, 56 technik (BSI) 215 233 Stichwortverzeichnis C – E-Mail-Adresse 119 Caesar-Chiffre 36 – Header 121 Certicate Authority siehe Zertizierungsstelle – Provider 129, 131, 139 Chain of Trust siehe Web of Trust – Server 122 Chaos Computer Club (CCC) 133 Eingangsverschüsselung 125 Chat 161 Electronic
    [Show full text]
  • Toxic Potency Measurement for Fire Hazard Analysis
    United States Department of Commerce National Institute of Standards and Technology NIST Special Publication 827 Toxic Potency Measurement for Fire Hazard Analysis Vytenis Babrauskas, Barbara C. Levin, Richard G. Gann, Maya Paabo, Richard H. Harris, Jr., Richard D. Peacock, and Shyuitsu Yusa NATIONAL INSTITUTE OF STANDARDS & TECHNOLOGY Research Information Center Gaithersburg, MD 20899 DATE DUE Demco, Inc. 38-293 MP NIST Special Publication 827 m Toxic Potency Measurement for Fire Hazard Analysis Vytenis Babrauskas, Barbara C. Levin, Richard G. Gann, Maya Paabo, Richard H. Harris, Jr., Richard D. Peacock, and Shyuitsu Yusa Building and Fire Research Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 December 1991 U.S. Department of Commerce Robert A. Mosbacher, Secretary National Institute of Standards and Technology John W. Lyons, Director National Institute of Standards U.S. Government Printing Office For sale by the Superintendent and Technology Washington: 1991 of Documents Special Publication 827 U.S. Government Printing Office Natl. Inst. Stand. Technol. Washington, DC 20402 Spec. Publ. 827 119 pages (Dec. 1991) CODEN: NSPUE2 Table of Contents Page List of Figures v List of Tables vi Executive Summary vii Abstract 1 1 Introduction 1 2 Computations of fire hazard 4 2.1 Quantifying hazard in fires 4 2.1.1 Hand calculations 4 2.1.2 Computer models 5 2.2 Definitions of terms 6 2.3 Fire scenarios and toxic potency data 6 3 Types of fires 9 4 Toxic potency measurements 13 5 Criteria for bench-scale toxic
    [Show full text]
  • Communication and Security Survey Results from US, UK and German Business Leaders
    The most secure collaboration platform. Communication and Security Survey results from US, UK and German business leaders Communication and Security Survey | wire.com | February 2019 1 An introduction Every year we ask executives about key topics - this year we chose to focus on communication, security, privacy, and regulation as these have been hot topics in 2018. We asked more than 300 executives from US and Europe about their views on these topics. In addition, please find at the end of this presentation my personal predictions for 2019. We trust you will enjoy the report. Morten Brøgger · CEO Best regards, Morten Brøgger Chief Executive Officer at Wire Communication and Security Survey | wire.com | February 2019 2 Are we still secure? Many organizations have been a …. want their organization to be more proactive victim of a cyberattack and not a 81% in the ways it protects its sensitive information, single respondent disagreed that communication, and/or data. cybersecurity is a major challenge for businesses. Yet while the challenges posed by cybersecurity are understood …. believe security and compliance are key by businesses, some organizations 79% parameters when selecting cloud business aren’t doing enough to prepare. In crisis solutions. situations, in particular, businesses have gaps in their ability to communicate internally and externally in a safe and secure way. …. of organizations don’t have or are unsure if they 38% have, a plan in case of a security breach. …. of respondents said it would be useful to be 83% able to extend a company's secure communication infrastructure to business partners and customers Communication and Security Survey | wire.com | February 2019 3 Emails are popular, Email remains a popular communication to changes in instant messaging but are they tool yet business leaders spend too technology, an overwhelming number much of their time using it.
    [Show full text]