Freedom to Connect 2012 speaker MIke Marcus on the history of wireless. The video for this presentation is here:
http://youtu.be/H41zqtyxLW4
Marcus is introduced by Dewayne Hendricks.
Although the slides are from 1999, Mike O'Connor presented it to the Minnesota Broadband Task Force on Cot 24, 2008. Fun to see what remains salient. Also, great explanation of the layers of technology involved in providing Internet access.
Although the slides are from 1999, Mike O'Connor presented it to the Minnesota Broadband Task Force on Cot 24, 2008. Fun to see what remains salient. Also, great explanation of the layers of technology involved in providing Internet access.
The project manages to derive the range of operation of a user in interference based scenarios between Femtocells and Macrocells, in terms of Signal to Noise and Interference ratios. The simulation was carried out for both the uplink and the downlink scenario. It could be successfully concluded that the environment that the user is in plays an important part in performance evaluation of the user.
Vint Cerf speaking at the Freedom to Connect 2012 conference. The video of this presentation is here:
https://www.youtube.com/watch?v=dwtTUMXpxLk
and other presentations are at:
http://freedom-to-connect.net/videos/
The project manages to derive the range of operation of a user in interference based scenarios between Femtocells and Macrocells, in terms of Signal to Noise and Interference ratios. The simulation was carried out for both the uplink and the downlink scenario. It could be successfully concluded that the environment that the user is in plays an important part in performance evaluation of the user.
Vint Cerf speaking at the Freedom to Connect 2012 conference. The video of this presentation is here:
https://www.youtube.com/watch?v=dwtTUMXpxLk
and other presentations are at:
http://freedom-to-connect.net/videos/
Speaker Ken Johnson, from panel called Big Enough to Succeed: small carriers at the leading edge — entrepreneurial (non-Municipal) carriers show a fourth way (after Telco, Cable and Muni) to the future of connectivity. Video of panel is here: http://youtu.be/YSeXinuwBgU
Freedom to Connect 2012
Terry Huval is Director of Lafayette (LA) Utility System's FTTH Project. He spoke on Session 5: Muni Fiber Super-Session at the Freedom to Connect 2009 conference.
If you'd like more info about the conference, see
http://freedom-to-connect.net/
Ken Biba is Co-founder and CTO of Novarum. He spoke on Session 3: What We Can Learn from Muni Networks at the Freedom to Connect 2009 conference.
If you'd like more info about the conference, see
http://freedom-to-connect.net/
Benoit Felton is a Senior Analyst with Yankee Group Europe. He spoke on Session 6: Networks Here and There at the Freedom to Connect 2009 conference.
If you'd like more info about the conference, see
http://freedom-to-connect.net/
Chris Savage is a Partner, Telecom & Media Group, with law firm Davis Wright Tremaine. He spoke in Session 4: The Politics of Regulation panel.
For more info about the F2C09 Conference, see http://freedom-to-connect.net/
Herman Wagter is with GNA (Citynet Amsterdam). He spoke on Session 6: Networks here and there at the Freedom to Connect 2009 conference.
If you'd like more info about the conference, see
http://freedom-to-connect.net/
L. Aaron Kaplan works in Vienna Austria. He spoke on Session 3: What We Can Learn from Muni Networks at the Freedom to Connect 2009 conference.
If you'd like more info about the conference, see
http://freedom-to-connect.net/
Tim Denton is the Commissioner of the CRTC (Canadian FCC). He spoke on Session 5: Muni Fiber Super Session at the Freedom to Connect 2009 conference.
If you'd like more info about the conference, see
http://freedom-to-connect.net/
Jon Peha is Chief Technologist at the FCC. He spoke on Session 4: The Politics of Regulation at the Freedom to Connect 2009 conference.
If you'd like more info about the conference, see
http://freedom-to-connect.net/
Bill St. Arnaud is the Director of Network Projects for CANARIE. He spoke on Session 7: The Internet and The Planet We Call Home at the Freedom to Connect 2009 conference.
If you'd like more info about the conference, see
http://freedom-to-connect.net/
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GridMate - End to end testing is a critical piece to ensure quality and avoid...
F2C 2012: Mike Marcus
1. www.marcus-spectrum.com
Michael J. Marcus, Sc.D., F-IEEE
Former Associate Chief for Technology
FCC Office of Engineering and Technology
Director, Marcus Spectrum Solutions, LLC
Cabin John, MD, USA
www.marcus-spectrum.com
Adjunct Professor
Department of Electrical & Computer Engineering
Virginia Tech
N3JMM/
7J1AKO
Technology Regulation
2. Overview
Will review interaction of regulation and technology in wireless
technology
How a bipartisan political movement for deregulation
unexpectedly removed roadblocks that kept a promising
wireless technology & underutilized bands locked in “Pandora’s
box”
Serendipity and (generally good) unexpected consequences
Today’s ubiquitous Wi-Fi and Bluetooth and other useful
niche applications
Technology Regulation
3. Why Is Wireless Different than Other
Technologies?
Basic spectrum policy concepts were formed in
aftermath of Titanic sinking 100 years ago
Many regulators resemble Soviet economic planners,
projecting demands and allocating resources
Classically, entrepreneurs, “disruptive innovation” and
niche applications get little attention
Wi-Fi started as a niche application!
Technology Regulation
4. 4
Birth of Unlicensed in US
US legislation does not provide
explicitly for unlicensed use
1st system was a Philco remote control
system for radio receivers in late 30s
FCC ruled that since it was unlikely to
cause interference license was not
needed
Subsequent legislation has noted
unlicensed but never explicitly
authorized it
ARRL claims FCC has no legal basis for
unlicensed
Technology Regulation
5. The Strange Case of iTrip: 5
T
The Classic Problem for Unlicensed in Some Countries
Prescriptive nature of spectrum
regulation in many countries held
back unlicensed innovation, e.g.
iTrip is a low power FM transmitter
user to connect iPod music to
nearby FM broadcast receivers
In US, FCC has allowed such low
power systems for decades
http://www.ofcom.org.uk/
media/news/2006/11/nr_2
0061123b
But were banned in Europe for
several years because of lack of
rules in this area
Technology Regulation
6. Traditional Spectrum Policy
Prioritize uses of spectrum
Controls interference and market entry
Pick technological winners and losers
GSM was extremely successful and came from
such a policy environment
Only GSM equipment can be sold in Europe and
some other countries (prior to 3G)
Technology Regulation
7. But Wi-Fi and Bluetooth can from a Very
Different Background than GSM!
Rest of presentation will explore technical and regulatory
roots of of Wi-Fi
If traditional spectrum management is similar to Soviet
economic policy, the origins here are based
Госплан on Field of Dreams concepts
“If you believe the impossible,
the incredible can come true.”
Technology Regulation
8. Roots of Wi-Fi (and Bluetooth)
Wi-Fi came about as a result of spectrum deregulation
creating a “blank slate” for innovators
Spread spectrum (SS) was the basis for creation of
spectrum that became the home of Wi-Fi and Bluetooth
Prior to FCC 1981-1985 action, SS was implicitly banned in
general
Carter-era FCC sought to remove barriers from technology to
stimulate economy
SS was selected as initial area
SS was the core technology of Wi-Fi until 802.11(g)
and continues as Bluetooth core
Technology Regulation
9. Hedy Lamarr:
Legendary Inventor of Spread Spectrum
As is often reported in popular press, Hedy Lamarr
was awarded an early frequency hopping spread
spectrum* patent during WWII
But invention was not reduced to practice
Like with the computer, it is probably impossible to
identify a single inventor of spread spectrum
• Spread spectrum comes in 2 “flavors”: direct
sequence/pseudonoise and frequency hopping.
Wi-Fi started as DS/PN, Bluetooth is FH
Technology Regulation
10. 1953 MIT Lincoln Lab System
Developed by Paul Green
(later of IBM) as a thesis
project
One of earliest SS/PN
systems
More related to early Wi-Fi
and Qualcomm CDMA than
Lamarr concept
Technology of the day
required large size
Technology Regulation
11. Early Literature
In the 1950-1970’s spread spectrum generally remained a
classified technology with only occasional references in the
open literature.
My first exposure was at a classified 1972 conference
Only textbook-like discussion was a classified Sylvania
report for NSA
Technology Regulation
12. Dixon’s Book 1975
First comprehensive, though
mathematically inelegant, unclassified
treatment of spread spectrum
Introduced a generation of designers to the
technology
Technology Regulation
13. Commercial Spread Spectrum
c. 1979
Magnavox produces a
“civil” version of
AN/ARC-50/90
Unit shown is modem,
separate transceiver
needed
Japan MPT purchases
and tests for possible civil
applications
Concludes no practical
value for civil use!
Technology Regulation
14. Setting the Stage for Wi-Fi:
Prophets of Deregulation
Pres. Carter Alfred Kahn Pres. Reagan
Cornell University Professor
Former Chairman of
New York PUC
US Civil Aeronautics Board
Technology Regulation
15. FCC Chairman Ferris (1977-81)
Makes Deregulation FCC Focus
Translates Kahn’s concepts and Carter’s mandate into more
specific program:
Identify technologies that are being held back by anachronistic
regulations and “liberate” them - so they can sink or swim
under their own merits
Hires former (D)ARPA Director Steve Lukasik to implement
program
Spread spectrum identified as a candidate technology
Technology Regulation
16. FCC Chairman Fowler (1981-87)
Makes Spread Spectrum Deregulation Part of “Reagan Agenda”
Chmn. Fowler replaces Chmn. Ferris after the Reagan election
While disagreeing with predecessor on many issues, he
embraces the spread spectrum initiative seeing its connection to
Reagan’s deregulatory agenda – despite mainstream industry
opposition
“Looking back, it is clear that adoption of these rules was one of the
significant achievements of the Reagan FCC —though I doubt if anyone
thought so at the time.” 4/08
Technology Regulation
17. Early FCC Action
1980 MITRE Corp. report to
study options for civil use of
spread spectrum
Best 70K FCC ever spent!!
Raises unlicensed option
Available from NTIS as PB81-165284
and on MITRE site
Technology Regulation
18. Early FCC Action
1981 2 initiative begun:
Docket 81-413 – General use
Docket 81-414 – Amateur radio use
While H-P (now Agilent) was supportive, most industry
opposed
IEEE IT Society filed support
Technology Regulation
19. 1985
May 9, 1985 FCC adopts spread spectrum
rules in ISM bands
1 W limit
PN or FH
Almost any application
But no explicit mention of Wi-Fi-like RLANs
Same basic rules until 2002
incorporated July 1985
CDMA becomes major cellular player
Key part of most 3G mobile systems
Technology Regulation
20. “First Light”
In 1988 the first real commercial
spread spectrum product
appeared – a LAN
“Spontaneous generation” –
developer was a Canadian
startup aiming at using new
FCC rules!
Technology Regulation
21. Creation of IEEE 802.11
5 years after 81-413 decision - after several
proprietary products tested the market and
explored technologies - 3 pioneering firms joined
in IEEE 802.11 to explore 2 niche applications:
Wireless cash registers
Warehouse mobile bar codescanners
(building on supermarket scanners)
Vic Hayes of NCR’s lab in Holland
leads standardization discussions
22. 1991 Snapshot
Many key players went to Quebec
woods to discuss the future of
spread spectrum
“Myth or Reality”
Future was still not clear
Technology Regulation
24. Unexpected Uses of Wi-Fi
& Related Systems
Municipal Wi-Fi
Supermarket
Public system at marina customer product
scanning while
shopping
Bathtub with Wi-Fi iPod music link §15.249 Equipment – Cousin of ISM Band rules
Technology Regulation
25. The FCC Team That Lead ISM Band
Policy 1979-1985
From left: Robert Powers, Stephen Lukasik, Elliot Maxwell, MM, Marjorie "Peggy" Reed Greene
May 2010
26. Are “Unlicensed” or “802” Magic
Elixirs of Success?
“.com” once seen as magic elixir
Some other unlicensed initiatives, some with broad
industry support, have had little success:
U-PCS, U-NII, UWB, HiperLan
Unlicensed with detailed regulations may not be able
to adapt to meet demand
802 efforts to standardize UWB were unsuccessful
802.16 (WiMax) has had mixed success
Today’s 802 is very different than 1990
27. Conclusions “If you believe the impossible,
the incredible can come true.”
Wi-Fi and Bluetooth had their roots in White House-directed deregulation to stimulate
economic growth
A major break from previous “Soviet style” planning of radio spectrum where bureaucrats
tried to predict markets, technologies, and demands years in advance
Deregulatory concepts grew into a new worldwide market serving unanticipated needs
for mobility
Synergy of unlicensed and regulatory flexibility is powerful approach to facilitate wireless
innovation and economic growth
Technology Regulation
28. ns ?
s tio
ue
Q
More details and other sources at:
http://www.marcus-spectrum.com/SSHistory.htm
Technology Regulation