Secure Communications: Creating an Internet Out of Secure Islands

Presented at the 7th Annual Real-Time Communications Conference and Expo 2011 at Illinois Institute of Technology, October 5, 2011 In DC, and throughout the nation, there are silos of secure communications. For example, it has been a value proposition for vendors of secure communications devices and software that those endpoints could only communicate with endpoints… Continue reading Secure Communications: Creating an Internet Out of Secure Islands

POTS in Transition: What is Voice Service?

Even VoIP users are played a dial tone file. As over the top voice services become more common and embedded in other aspects of the communications experience, like gaming and social networking, end users will have to understand the transition.  Where is the opportunity to highlight these changes and what is the impact on traditional… Continue reading POTS in Transition: What is Voice Service?

Internet 201: The DNS and IPR

Invited talk to the American Bar Association Special Committee on Copyrights and New Technology, February 7, 2011 (Washington, DC) This presentation is targeted for lawyers with some experience with Internet technology. It focuses on how the Domain Name System works, both technically and administratively; just what an Internet application is; how current methods and proposals… Continue reading Internet 201: The DNS and IPR

Peer-to-Peer Work in the IETF: ALTO

Invited talk, Internet Society’s Internet ON event, December 8, 2010 (San Francisco, CA) This presentation looks at peer-to-peer work in the IETF, with a focus on ALTO, the application level transport optimization protocol. ALTO represents the embodiment of what can happen when different communities work together towards a common goal. In the case of ALTO,… Continue reading Peer-to-Peer Work in the IETF: ALTO

Public Policy – What it Means to the Technologist: Network Traffic Management

Invited talk, IIT VoIP, October 13, 2010 (Chicago) There seems to be a chasm between the policy makers, such as administration personnel, lobbyists, and lawyers and the engineers that create the technologies that have policy imposed upon them. Quite often, the policy people have a limited understanding of the impact of their proposed policies. Likewise,… Continue reading Public Policy – What it Means to the Technologist: Network Traffic Management

The Future of the Internet and Open Research Questions

Colloquia at City University Hong Kong, November 16, 2009 The Internet has grown from a medium for researching networking protocols, through an academic publication network, to an ecommerce platform, to becoming today’s key medium for people to communicate. As the uses of the Internet have evolved, the requirements for availability have dramatically changed. At the… Continue reading The Future of the Internet and Open Research Questions

Making SIP Real: Filling the Gaps

Presentation at IIT VoIP, October 24, 2008 The IETF SIP specifications over the last decade have surpassed an astonishing 1,000 pages of text in well over a hundred documents. Within those documents are many optional protocol elements. From a computer science perspective the number of options results in a combinatorial explosion of option handling code, resulting in… Continue reading Making SIP Real: Filling the Gaps

New Ventures: How to Get Started and Involved

IEEE New Hampshire Computer Society Seminar at Southern New Hampshire University, October 14, 2008 (Manchester, NH) This seminar will describe the local venture community, with a focus on both IT startups and IT at startups. This seminar will be of interest if you are thinking about starting your own company, working at a startup, getting… Continue reading New Ventures: How to Get Started and Involved