The Public Interest in Open Communications Networks

Total Page:16

File Type:pdf, Size:1020Kb

The Public Interest in Open Communications Networks THE PUBLIC INTEREST IN OPEN COMMUNICATIONS NETWORKS Mark Cooper July 2004 TABLE OF CONTENTS I. SUMMARY ...........................................................................................................................1 A CRITICAL POLICY DECISION ................................................................................................1 OPEN COMMUNICATIONS AND THE DIGITAL INFORMATION REVOLUTION...............................2 ROBUST NETWORKS AND TECHNOLOGICAL CHANGE..............................................................4 THREATS TO OPEN COMMUNICATIONS NETWORKS.................................................................5 THE IMPORTANCE OF ISPS IN THE COMMERCIAL SUCCESS OF THE INTERNET .........................6 INTERNET PROTOCOL-ENABLED SERVICES ..............................................................................8 CONCLUSION .........................................................................................................................11 II. OPEN COMMUNICATIONS AND..................................................................................13 THE DIGITAL INFORMATION REVOLUTION .................................................................13 PUBLIC POLICY AND THE INFORMATION REVOLUTION.........................................................13 THE STRUCTURE OF THE DIGITAL COMMUNICATIONS PLATFORM........................................15 THE BROADER IMPACT ..........................................................................................................18 OPEN COMMERCE AND COMMUNICATIONS NETWORKS:A CORNERSTONE OF CAPITALISM .23 CONSTANCY OF THE PRINCIPLE, EVOLUTION OF ITS IMPLEMENTATION...............................25 III. NETWORK THEORY......................................................................................................29 COMPLEX NETWORKS ...........................................................................................................29 Network Elements............................................................................................................29 The Architecture of Ultrarobust Networks.......................................................................33 INNOVATION IN HIGH TECHNOLOGY INDUSTRIES ..................................................................35 The Technology of Technical Change .............................................................................35 A Broad-Based, Transformative Revolution....................................................................39 Pinpointing the Key Technologies and Interfaces............................................................40 CONCLUSION .........................................................................................................................43 IV. THREATS TO OPEN COMMUNICATIONS NETWORKS..........................................44 THE THREAT OF MARKET POWER .........................................................................................44 FROM THEORY TO PRACTICE ................................................................................................48 CONCLUSION .........................................................................................................................54 V. INTERNET SERVICE PROVIDERS..............................................................................55 THE ROLE OF INTERNET SERVICE PROVIDERS IN THE COMMERCIAL SUCCESS OF THE INTERNET ..............................................................................................................................55 THE MONOPOLIZATION OF THE HIGH-SPEED INTERNET .......................................................63 SQUEEZING INTERNET SERVICE PROVIDERS OUT OF THE MARKET ......................................67 CONCLUSION .........................................................................................................................71 i VI. THE LAYERED APPROACH TO DEFINING SERVICES UNDER THE TELECOMMUNICATIONS ACT OF 1996...........................................................................73 TELECOMMUNICATIONS AND INFORMATION SERVICES UNDER THE 1996 ACT ....................73 Legal Definitions ..............................................................................................................73 Characteristics Of Services That Indicate How They Should Be Categorized .................76 REMOVING REGULATION UNDER THE 1996 ACT ..................................................................80 Legal Criteria ....................................................................................................................80 Forbearance at the Physical and Code Layers..................................................................81 CONCLUSION .........................................................................................................................85 VII. CONCLUSION................................................................................................................87 ENDNOTES .............................................................................................................................88 LIST OF EXHIBITS Exhibit II-1: Layers of the Digital Communications Platform................................................16 Exhibit II-2: The Internet As A Bearer Service........................................................................21 Exhibit III-1: Network Configurations .....................................................................................32 Exhibit III-2: The Original Proposal For The World Wide Web .............................................36 Exhibit IV-1: Unique Characteristics Of Communications Platforms.....................................45 That Raise Special Market Power Concerns ............................................................................45 Exhibit IV- 2: Anti-Consumer/ Anticompetitive Elements Of TheCable Industry Communications Platform................................................................................................51 Exhibit V-1: ISPS, Internet Subscription And Home PC Penetration......................................56 Exhibit V-2: Density Of Internet Service Providers By Date ..................................................57 Exhibit V-3: A Map Of The Internet, Mid-1999......................................................................59 Exhibit V-4: The Internet And The Web Were ‘Killer Apps” For The PC .............................61 Exhibit V-5:Average Price Of Home Personal Computers......................................................62 Exhibit V-6: Restrictive Conditions In High Speed Internet Consumer Contracts..................65 Exhibit V-7: Density Of Dial-Up And High-Speed ISP By Date ............................................68 Exhibit V-8: Density Of Dial-Up And High Speed ISPs By National Market Size ................69 Exhibit VI-1: Layers of the Digital Communications Platform Compared to the Definitions in the Telecommunications Act of 1996...............................................................................74 Exhibit VI-2: Indicia of Distinction between Telecommunications & Information Service Across Layers of the Digital Communications Platform .................................................77 Exhibit VI-3: Forbearance Determinations in Relation to the Layers of the Digital Communications Platform................................................................................................79 Exhibit VI-4: Indicia of the Type of Service: AT&T v. Pulver ...............................................82 Exhibit VI-5: Indicia of the Type of Service: Vonage .............................................................83 ii THE PUBLIC INTEREST IN OPEN COMMUNICATIONS NETWORKS I. SUMMARY For almost two decades, consumer advocates have been among the leading proponents of open communications networks. Unlike most consumer issues, where price is the advocates’ central concern, in the matter of communications and the Internet, their primary focus has been on another aspect of market performance: innovation. They view open communications networks as an environment friendly to innovation driven by consumer choice and decentralized decision-making. Their analyses have demonstrated the benefits of open communications networks in terms of core Internet services, computer development, and broad spillovers into the economy. This Issue Brief summarizes the public interest in open communications networks by providing an analytic framework for evaluating the impact of open communications. It applies the framework to two critical public policy issues currently being considered by the Federal Communications Commission (FCC or the Commission) and the courts – nondiscriminatory access to telecommunications networks and oversight of services delivered by Internet protocols (IP-enabled services). A CRITICAL POLICY DECISION In the last quarter of the twentieth century, the convergence of computers, communications, and the Internet, all deployed under design principles of open architecture, created a digital communications platform that became a uniquely important platform or “bearer service.” It supports a broad range of economic activities in the 21st century digital economy and revolutionized the environment for innovation. Nations, regions, industries, and firms that seized the opportunity presented by the open digital communications platform have enjoyed much more vigorous economic growth than those that did not. Policy choices that required open architecture and nondiscrimination in access to communications
Recommended publications
  • Internet Invariants: What Really Matters an Internet Society Public Policy Briefing
    Internet Invariants: What Really Matters An Internet Society Public Policy Briefing 26 September 2016 Introduction Today’s Internet has We place an enormous amount of faith in the Internet, largely because it facilitates our transformed how more than two billion people connect and everyday lives. We instinctively trust that when we send an email, it will be received by communicate. And it will the intended recipient. When we type a domain name into a browser, we presume that continue to transform our economy, infrastructure, and the results will be what we are looking for. We can make these assumptions because social lives as cloud computing, Internet invariants ensure that if we send data, it arrives; and if we seek content, it will the Internet of Things, and be located. mobile devices evolve in ways we cannot yet imagine. We don’t often talk about how the Starting in the 1970s, a variety of protocols and network architectures were developed, network behind this technology works, just as most of us don’t but none became the driver of economic and social development that the Internet did. concern ourselves with where IBM’s Systems Network Architecture, for example, failed to take off because it could only electricity comes from, so long connect with hardware manufactured by IBM. The technical system that proliferated as our lights turn on. But as the Internet becomes an instead, and which remains at the foundation of the Internet, was TCP/IP because of its increasingly more pervasive and decentralized nature and underlying values of interoperability, flexibility, resilience, and critical piece of infrastructure, we need to understand both global reach.
    [Show full text]
  • A FACULTY PERSPECTIVES and PRACTICES of SOCIAL PRESENCE in ONLINE POST-SECONDARY LEARNING ENVIRONMENTS a Dissertation SUBMITTED
    FACULTY PERSPECTIVES AND PRACTICES OF SOCIAL PRESENCE IN ONLINE POST-SECONDARY LEARNING ENVIRONMENTS A Dissertation SUBMITTED TO THE FACULTY OF THE UNIVERSITY OF MINNESOTA BY Julie Ann Smith IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF EDUCATION Joyce Strand, Ph.D., Adviser April 2018 a Julie Ann Smith 2018 © b Acknowledgements This dissertation would not have been able without my patient adviser, Dr. Joyce Strand, who continued to support me throughout the years and help me to finally finish this research project. The last three years of trying to finish my dissertation included the caregiving to my mother and father. My father spent over two years in assistive care at the end of battling a long war with Alzheimer’s. He needed my mother’s help and she needed mine. This, and a concurrent divorce to my husband of 23 years, prolonged my ability to complete the writing of this dissertation, thus a long time had passed since the literature review. Many thanks go to my committee and doctoral chair who patiently provided me excellent advice in educational theory, interview and survey questionnaire revisions and/or dissertation guidance: Drs. Helen Mongan-Rallis, Craig Stroupe, Terrie Shannon, and Linda Deneen, and Chair Dr. Frank Guldbrandsen. Acknowledgements also go out to the faculty survey respondents and interviewees. Without their volunteer time, participation, and input, I would not have results to advance the study of social presence in the Community of Inquiry model. Additional thanks go to the faculty and staff and my cohort of the Education Doctorate in Teaching and Learning program at the University of Minnesota Duluth in the College of Education and Human Service Professions.
    [Show full text]
  • Digital Image Steganalysis Techniques
    ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 4, October 2013 A Review on Digital Image Steganalysis Techniques Categorised by Features Extracted Rita Chhikara, Latika Singh ITM University, Gurgaon, Haryana, India presence or absence of embedded message. Images are Abstract- The overwhelming growth in communication often used as a carrier because of their extensive technology and usage of public domain channels (i.e. availability with high resolution of pixels. Data Internet) has greatly facilitated transfer of data. However, embedding in a multimedia carrier like image may such open communication channels have greater vulnerability involve varying parameters such as different image to security threats causing unauthorized information access. Steganography is the art of hiding and transmitting data formats, different embedding algorithms and various through apparently innocuous carriers such as text, image, steganographic keys. This has made steganalysis a more audio or video in an effort to conceal the existence of the difficult and challenging task. Earliest work on secret data and the fact that communication is even taking steganalysis was reported by Johnson and Jajodia [9] and place. Steganalysis is an attack on steganography. Both Chandramouli et al.[10]. It has gained prominence in steganography and steganalysis have received a great deal of national security and forensic sciences as detection of attention from law enforcement and the media. In the past hidden messages can lead to the prevention of disastrous years many powerful and robust methods of steganography security incidents. Algorithms for Steganalysis are and steganalysis have been reported in the literature.
    [Show full text]
  • Use of Mobile Technology by Adults Who Use Augmentative and Alternative Communication: Voices from Two Countries
    Volume 11, Summer 2017 Assistive Technology Outcomes and Benefits Volume 11, Summer 2017, pp. 66-81 Copyright ATIA 2017 ISSN 1938-7261 Available online: www.atia.org/atob Use of Mobile Technology by Adults Who Use Augmentative and Alternative Communication: Voices from Two Countries Diane Nelson Bryen, PhD Professor Emerita, Temple Univeristy – USA Juan Bornman, PhD Professor and Director, Center for Augmentative and Alternative Communication, University of Pretoria – South Africa John Morris, PhD Clinical Research Scientist, Shepherd Center – USA Enid Moolman Lecturer, Center for Augmentative and Alternative Communication, University of Pretoria – South Africa F. Mark Sweatman, PhD Data Analyst, Shepherd Center – USA Abstract are important, but some Find it diFFicult to use requiring a variety of modifications. More than 50% Mobile technology – cell phones, smartphones and of participants From each country used their mobile tablets – has expanded communication and social devices For text-messaging, web browsing, keeping interaction, commerce, and access to inFormation a directory oF contacts, voice calling, sharing photos for many people with disabilities. Little is known or videos online, listening to music, and social about the use of these mainstream technologies by networking. Recommendations are made For adults who use augmentative and alternative industry and people who rely on AAC. communication (AAC). InFormation comparing their use by adults who rely on AAC From both high- Keywords: augmentative and alternative income and low or middle-income countries is communication, AAC, cell phones, mobile technol- nonexistent. This article presents data on the use oF ogy mobile technology by 38 adults From the United States and 30 adults From South AFrica who use AAC.
    [Show full text]
  • The Effect of Social Control Models on Motivation and Use in Electronic Communication Infrastructures
    THE EFFECT OF SOCIAL CONTROL MODELS ON MOTIVATION 103 The Effect Of Social Control Models On Motivation and Use In Electronic Communication Infrastructures Dan Manson Computer Information Systems Electronic communication can restrict organizational communication, or open communication channels to all employees regardless of status and personality. The purpose of this paper is to explore the relationships between social control patterns and electronic communication infrastructure use. Political, administrative, and computing infrastructure examples are used to provide initial understanding of infrastructure use. Social control models are used to provide insight into employee use of an electronic communication infrastructure. Case data from electronic communication systems is mapped to social control models to illustrate the effect of social control types on electronic communication use. Introduction A communications infrastructure provides an enabling platform for employees to share information to be used for decision-making, problem-definition, and coordination of organiza- tional behaviors. A functioning infrastructure enables the delivery of products and services facilitating human and cognitive processes adding value through information and knowledge exchange. In discussing the role of computing infrastructures, it is important to define infrastructure characteristics being considered. Computing infrastructure refers to the set of human and organizational resources that help make it simpler and faster for skilled people to use computerized systems (Kling, 1993). A computing infrastructure can consist of physical, technological and social characteristics. Physical characteristics can affect the ability to access the system. Technological characteristics involve issues of quality and reliability. Social characteristics address issues of information access and accountability. Physical and technological issues are driven by economic and technical issues, while social issues involve organizational issues.
    [Show full text]
  • Honeywell's Next Generation Plcs Powerful, Compact, Versatile, Open Network
    Programmable Logic Controllers MasterLogic-200 Honeywell's next generation PLCs Powerful, compact, versatile, open network Programmable Logic Controllers MasterLogic-200 · Powerful & versatile · Scalable & modular · Compact pocket-size modules · CPU redundancy, power supply redundancy, network redundancy · Range of I/O modules-digital (source/sink,transistor/relay),analog (voltage/current) · Special modules-High Speed Counter, Position Control, RTD, Thermocouple · Open network-Profibus-DP, DeviceNet, Fast Ethernet, Modbus · Dedicated peer-to-peer networking of PLCs · Large I/O capacity and Remote I/O Contents Overview 4 Overview Introduction System Architecture 8 CPU & System configuration General Specifications CPU Specifications Highlights Introduction Network Fast Ethernet(FEnet) 15 Serial Communication(Snet) Profibus-DP(Pnet) DeviceNet(Dnet) Digital I/O Modules Input/Output Modules 20 Position Control Modules Analog I/O Modules Smart I/O(s) Thermocouple Module RTD Module High Speed Counter Modules Key Features Software 29 Project Management Online Functions Maintenance & Troubleshooting Monitoring PLC Event History Program Navigation & Editing Program Ease Simulation System Requirements SoftMaster-NM (Network setup & diagnostics) Special Interface Special Interface with Experion 37 PKS & Experion Vista MasterLogic-50 Other Related Products Master Panel 38 HCiX Series Product List 39 Product List Overview Introduction Key Features · Powerful & versatile processors - High speed i.e. (28ns/step, flash memory, hot-swapping) · CPU redundancy
    [Show full text]
  • Executive Summary ¾ Electricity Report ¾ Natural Gas Report ¾ Communications Report ¾ Water/Wastewater Report ¾ Acronyms ¾ Glossary
    Indiana Utility Regulatory Commission 2007 Regulatory Flexibility Report to the Indiana General Assembly Links to Major Sections of the Regulatory Flexibility Report Click on Links Below to Navigate to Major Sections of the Regulatory Flexibility Report ¾ Executive Summary ¾ Electricity Report ¾ Natural Gas Report ¾ Communications Report ¾ Water/Wastewater Report ¾ Acronyms ¾ Glossary Executive Summary EXECUTIVE SUMMARY This 2007 Indiana Utility Regulatory Commission Report to the Regulatory Flexibility Committee of the Indiana General Assembly highlights key issues that confront Indiana Electric, Gas, Communications, and Water/Wastewater industries, as well as the role of the Indiana Utility Regulatory Commission (IURC, Commission) in addressing these issues. For the first time, and while not required by statute, a section on the Water/Wastewater industry is included in this Report in response to concerns raised during the most recent session of the legislature. While each industry has unique issues, several issues discussed in this Report cut across multiple industries. This Executive Summary contains a brief overview of these cross-industry and industry-specific issues which are more fully addressed in the body of the Report. For your convenience there is a list of acronyms and a glossary in the back of the Report. CROSS-INDUSTRY ISSUES Aging infrastructure is a concern for many Indiana utilities. The Electric, Gas, and Water/Wastewater sections of this Report specifically discuss aging infrastructure and the potential problems and costs associated with repairing or replacing old facilities. Coupled with aging facilities is increasing consumer demand for electric, gas, telecommunications, and water services. Increased consumer demand can accelerate the deterioration of equipment and limit periods in which facilities can be conveniently removed from service for maintenance or replacement.
    [Show full text]
  • Verizon Wireless Vision Statement
    Verizon Wireless Vision Statement Invocatory Thurston eavesdrop viciously while Gardener always pillories his succory forbears interim, he sky so puristically. RomeoAlastair alwaysusually meristicregrades and optionally binocular or whenrepurifies bosom unwholesomely some Atlantic when very zooplasticincorrigibly Waine and always? swish ostensibly and tumidly. Is The form and vision statement Primary investigation suggests that during peak hours the demand is quite higher than the volume of the manpower resulting in severe delay in service times. Media launches new content and initiatives aimed to amplify and empower Black communities. Today, as it was not a revenue producing department. Data communications process: secure wireless verizon wireless vision statement is our portfolio manager was in a potentially suitable habitat for its annual meeting customers with customers have a unique combination of. Actively pursue your company mission and vision statement sets the website. City of Sacramento through public records requests. Mobile Edge Compute in order to serve our customers. Verizon launched its Fios Internet service, we plan to open additional destination stores in high traffic locations across the country. Verizon Wireless that are directly served and managed by Verizon Wireless and use its branded services. The service is excellent, they have centered their objective around remaining and affordable, JP Morgan research said in a July note to clients. We respect and trust one another, the purchase price can be applied to the cost of an annual subscription, advances the capacity of the company to serve its client with products that meets their needs. We also utilize backup generators at a majority of our cell sites and at every switch location.
    [Show full text]
  • Hiding in the Open: How Tech Network Policies Can Inform Openness by Design (And Vice Versa)
    GEORGETOWN LAW TECHNOLOGY REVIEW HIDING IN THE OPEN: HOW TECH NETWORK POLICIES CAN INFORM OPENNESS BY DESIGN (AND VICE VERSA) Richard S. Whitt* CITE AS: 3 GEO. L. TECH. REV. 28 (2018) “The economic lesson is timeless: if you control a key interface or bottleneck, you should open it up, but on your own terms and conditions.” ~ Carl Shapiro and Hal Varian INTRODUCTION This paper seeks to establish how human-designed networks and different flavors of openness—institutional, organizational, informational, and resource-based—can and do coexist meaningfully. As part of that examination, this paper surveys fifty years of openness in the telecommunications and information technologies networking space. The focus is on how the term “openness” has been employed by regulators and others in the United States and what motivations appear to lie behind its use. Four relevant industry sectors are reviewed. First, the paper examines the basis for the open Internet in the processes and resources of its "Middle Layers" architecture. These include the functional design elements of the end-to-end principle, network interconnection, agnostic * Fellow with the Georgetown Institute for Technology Law and Policy and fellow in residence with the Mozilla Foundation. Mr. Whitt has spent eleven-plus years with Google, most recently as Corporate Director for Strategic Initiatives in its Mountain View headquarters. His current project, GLIAnet, seeks to build a more trustworthy and accountable Web ecosystem. Mr. Whitt thanks Vint Cerf for his ever-present intellectual influence and abiding friendship. 2018 GEORGETOWN LAW TECHNOLOGY REVIEW 29 bearer protocols, and modularity. Second, the paper explores access to local telephone networks in the FCC’s Part 68 Carterfone rules, the Computer II basic telecommunications/enhanced information services dichotomy, the Computer III concepts of Open Network Architecture, the Telecommunications Act of 1996 requirement of unbundling basic telephony network elements, and wireless spectrum.
    [Show full text]
  • TX-NR636 AV RECEIVER Advanced Manual
    TX-NR636 AV RECEIVER Advanced Manual CONTENTS AM/FM Radio Receiving Function 2 Using Remote Controller for Playing Music Files 15 TV operation 42 Tuning into a Radio Station 2 About the Remote Controller 15 Blu-ray Disc player/DVD player/DVD recorder Presetting an AM/FM Radio Station 2 Remote Controller Buttons 15 operation 42 Using RDS (European, Australian and Asian models) 3 Icons Displayed during Playback 15 VCR/PVR operation 43 Playing Content from a USB Storage Device 4 Using the Listening Modes 16 Satellite receiver / Cable receiver operation 43 CD player operation 44 Listening to Internet Radio 5 Selecting Listening Mode 16 Cassette tape deck operation 44 About Internet Radio 5 Contents of Listening Modes 17 To operate CEC-compatible components 44 TuneIn 5 Checking the Input Format 19 Pandora®–Getting Started (U.S., Australia and Advanced Settings 20 Advanced Speaker Connection 45 New Zealand only) 6 How to Set 20 Bi-Amping 45 SiriusXM Internet Radio (North American only) 7 1.Input/Output Assign 21 Connecting and Operating Onkyo RI Components 46 Slacker Personal Radio (North American only) 8 2.Speaker Setup 24 About RI Function 46 Registering Other Internet Radios 9 3.Audio Adjust 28 RI Connection and Setting 46 DLNA Music Streaming 11 4.Source Setup 29 iPod/iPhone Operation 47 About DLNA 11 5.Listening Mode Preset 32 Firmware Update 48 Configuring the Windows Media® Player 11 6.Miscellaneous 32 About Firmware Update 48 DLNA Playback 11 7.Hardware Setup 33 Updating the Firmware via Network 48 Controlling Remote Playback from a PC 12 8.Remote Controller Setup 39 Updating the Firmware via USB 49 9.Lock Setup 39 Music Streaming from a Shared Folder 13 Troubleshooting 51 Operating Other Components Using Remote About Shared Folder 13 Reference Information 57 Setting PC 13 Controller 40 Playing from a Shared Folder 13 Functions of REMOTE MODE Buttons 40 Programming Remote Control Codes 40 En AM/FM Radio Receiving Function Tuning into stations manually 2.
    [Show full text]
  • ONN 6 Eng Codelist Only Webversion.Indd
    6-DEVICE UNIVERSAL REMOTE Model: 100020904 CODELIST Need help? We’re here for you every day 7 a.m. – 9 p.m. CST. Give us a call at 1-888-516-2630 Please visit the website “www.onn-support.com” to get more information. 1 TABLE OF CONTENTS CODELIST TV 3 STREAM 5 STB 5 AUDIO SOUNDBAR 21 BLURAY DVD 22 2 CODELIST TV TV EQD 2014, 2087, 2277 EQD Auria 2014, 2087, 2277 Acer 4143 ESA 1595, 1963 Admiral 3879 eTec 2397 Affinity 3717, 3870, 3577, Exorvision 3953 3716 Favi 3382 Aiwa 1362 Fisher 1362 Akai 1675 Fluid 2964 Akura 1687 Fujimaro 1687 AOC 3720, 2691, 1365, Funai 1595, 1864, 1394, 2014, 2087 1963 Apex Digital 2397, 4347, 4350 Furrion 3332, 4093 Ario 2397 Gateway 1755, 1756 Asus 3340 GE 1447 Asustek 3340 General Electric 1447 Atvio 3638, 3636, 3879 GFM 1886, 1963, 1864 Atyme 2746 GPX 3980, 3977 Audiosonic 1675 Haier 2309, 1749, 1748, Audiovox 1564, 1276, 1769, 3382, 1753, 3429, 2121 2293, 4398, 2214 Auria 4748, 2087, 2014, Hannspree 1348, 2786 2277 Hisense 3519, 4740, 4618, Avera 2397, 2049 2183, 5185, 1660, Avol 2735, 4367, 3382, 3382, 4398 3118, 1709 Hitachi 1643, 4398, 5102, Axen 1709 4455, 3382, 0679 Axess 3593 Hiteker 3118 BenQ 1756 HKPro 3879, 2434 Blu:sens 2735 Hyundai 4618 Bolva 2397 iLo 1463, 1394 Broksonic 1892 Insignia 2049, 1780, 4487, Calypso 4748 3227, 1564, 1641, Champion 1362 2184, 1892, 1423, Changhong 4629 1660, 1963, 1463 Coby 3627 iSymphony 3382, 3429, 3118, Commercial Solutions 1447 3094 Conia 1687 JVC 1774, 1601, 3393, Contex 4053, 4280 2321, 2271, 4107, Craig 3423 4398, 5182, 4105, Crosley 3115 4053, 1670, 1892, Curtis
    [Show full text]
  • Wireless Communications Improved Communications Enhance Customer Satisfaction
    ™ Wireless Communications Improved communications enhance customer satisfaction Vol 4, No 5, June 1999 Communication Protocol Gains Worldwide Acceptance North American utilities and IED manufacturers join forces to develop a “next generation” common protocol. By Mark Adamiak he worldwide acceptance of a “next generation” universal communications standard is an initiative that is coming none too soon for many utilities, as economic, political and technological forces converge to place increasing pressure on the industry to pro- vide more open, cost-effective solutions. In order to achieve those productivity gains, Tit has been imperative to find a means to agree upon open communication standards. Utilities have long realized that the benefits of having a universal communications protocol for the industry are considerable. With an open systems solution, the industry could potentially save millions of dollars in development costs, protocol conversions, inter-device control wiring and other areas. Utilities can improve operating and business decisions based on real-time availability of data, combine different local and wide area media, as well as reduce implementation time and cost through using standardized devices. From a communications The road to establishing a universal standard has been a long and difficult one. standpoint, deregulation has Although it has been slow, the industry is beginning to see some progress and has taken significant strides in moving forward in this area. With such tangible broken utilities into commu- gains, some significant technology developments that promise to revolutionize nication islands of users, the substation environment as it is now known are being witnessed. each with their own functions Although there has been speculation for some time as to which protocol will to perform.
    [Show full text]