I would like to know more about the decision process involving
censorship on the IETF list.
About October 5th I sent a reply to a message from Cel
http://ietf.org/mail-archive/ietf/Current/msg13899.html
which specifically asked for any ideas to stop the solicitation
from the DEPARTMENT OF
I would like to have some info about the current Internet technologies
that the IETF is working on, specific to the networking field.
There is an IETF working group using networks to send voicemail messages.
It is called Voice Profile for Internet Messages, or VPIM, and you can
learn more at:
Date: Tue, 31 Jul 2001 16:32:45 -0400
From: David P. Reed [EMAIL PROTECTED]
... I suspect that there are as many *possible* exploits that
don't need to execute code in the stack as there are not
So, Microsoft engineers, if half of all possible exploits might be
eliminated by changing
What is more important, figuring out who first exploited a vulnerability,
or preventing the vulnerability from being exploited?
The former is base quibbling, unsuited for thinking human beings.
But then again, the popularly (mayby even legally) elected President
of the U.S. is teaching a
A patch has been available that would fix SirCam *and* most other
address-book viruses for a *year*, and we're still getting hosed by it.
I'm told SirCam doesn't look directly in the address book; instead it
searches for email addresses in stored messages and web cache files.
That is why the
Those of you with IIS servers might want to keep a close eye on
them and their traffic to 198.137.240.92...
Sorry, the worm is attacking port 80 of 198.137.240.91, not .92 --
the target address apparently had a short enough time-to-live in
its DNS cache settings, and they swaped the address
Robert G. Ferrell writes:
... The U.S. government has decided that my Internet Report site, where I
summarized the drafts and RFCs issued each week in tabular format, was
inappropriate and even a political embarrassment because it had
no direct bearing on the mission of my agency
Untrue.
Who owns the J1 standard ?
That is J.1 by the ITU-T
... get some more detail information about J1.
See: http://www.itu.int/itudoc/itu-t/rec/j/index.html
Cheers,
James
are sure of that. What I mean is the notation E1/T1/J1
Sorry; those are time-division telephone trunk lines.
J1 is the Japanese version of T1, with 23 telephone channels.
I am sure it is cited in SS7, and belongs in ITU-T's Q-series,
but there is a good chance that NTT Japan hasn't gone
It seems like a good idea to repeat this URL with a slightly more
apropos subject line:
http://www.pulver.com/hr1542
It looks like the ghost of Ma Bell, the U.S. Telecomm Association,
is going after IP telephony with a vengance, and politics that
probably include most of their annual
... Do I calculate return using an exponential curve or the S-shaped
logistics curve?
Since the number of respondents is not infinite at present, but is
theoretically unbounded over time, you have to use a sigmoid curve,
but not this logistical sigmoid:
Y = a + b / (1 + exp(-c*(X - d)))
... The only way to check
if a request is completed is to call the ldap_result() function for the
messageId of each outstanding request, in a waiting or polling mode
If you are compiling in an envionment that supports threads, make a
new thread to call ldap_result() in waiting (blocking)
Congratulations. You are lucky
I get plenty of spam, sometimes more than 20 per day, but seriously,
it only takes me about 20 seconds to ignore it all.
Sometimes when I see particularly obnoxious mail, I respond to it in
a way that might prevent it in the future, but that usually
Speaking of ietf-all, where is it archived?
Cheers,
James
P.S. It is not the list that grenville armitage [EMAIL PROTECTED]
modestly proposed.
what type of media do you propose to run ISBP over?
Sailor-to-Sailor Relay
Relay? Sounds like a synchronous protocol, requiring heavy use of
real-time techniques such as semaphores --
http://www.anbg.gov.au/flags/semaphore.html
If it were truly carrier class it would have large
For that matter, is anyboy using 'ST Datagram', or is v5 also
recoverable for re-use?
According to IEN 119 -- ftp://ftp.isi.edu/in-notes/ien/ien-119.txt.1
-- of 7 September 1979:
] The state of the protocol is such that, while there are
] still details to be worked out,
Michael,
Thank you for your twenty-two octet reply:
see www.ietf-opes.org
Clearly, I already did see that, as evidenced in the message to which
you were replying:
At 07:43 PM 4/13/2001 -0700, you wrote:
... tell us what OPES and BCDF are...
In http://www.ietf-opes.org/Default.htm :
... tell us what OPES and BCDF are...
In http://www.ietf-opes.org/Default.htm :
]
] The Open Pluggable Edge Services architecture (OPES) is defines how
] participating transit intermediaries can be extended to incorporate
] services executed on application data. The services are written to
]
Dave,
Your reply confuses me:
... a public standards forum ... has explicit rules against such
lines of discussion
Which rules are you referring to?
Cheers,
James
John,
Thank you for your thoughtful reply:
... You can ask anyone, WG chair or not, about their product plans
and they would be very foolish to answer with anything other than a
qualified (evasive, if you will) manner. You can not and probably
should not get a definitive answer unless
:33 2001
To: "James P. Salsman" [EMAIL PROTECTED], [EMAIL PROTECTED]
cc: [EMAIL PROTECTED]
Subject: Re: allowable questions (was Re www...)
--On 01-04-08 03.08 -0700 "James P. Salsman" [EMAIL PROTECTED] wrote:
Suppose XYZ corporation makes popular softw
Valdis,
There is an easy way around your problem.
... even though I made *no* source changes, I asked (and was told)
that just pointing at ftp.gnu.org for the source wasn't acceptable)
Here is what the GPL says:
| ... Accompany it with a written offer, valid for at least three
|
so, my conclusion? ... problems ... can be ... traced to the ...
cell phone
Those studying the use of cell phones for education have come to
similar yet entirely sincere conclusions:
http://sll.stanford.edu/projects/mobilelearning
Live UDP audio has the same kinds of problems as
Scott,
Thanks for your message:
From slawrence virata.com Tue Mar 13 07:38:11 2001
If you think that there is a reason to tell the MUA about the source
(personally, I don't see what I would do with such a thing), then
argue for a new header that does that (and get mired in the
perhaps a more useful mode of discussion would be to determine what criteria
should be used for the rfc publication process and whether incremental
improvements are possible, independent of encoding changes.
When someone submits a new Content-disposition value or parameter
registration --
Ned,
Thanks for your message in reply:
When someone submits a new Content-disposition value or parameter
registration -- http://xml.resource.org/public/rfc/html/rfc2183.html --
the Area Directors and IESG would be best served to refrain from deferring
the registration decision to secretive
Valdis,
Thanks for your reply:
First off, "directly from my microphone" is *highly* unlikely to be
incredibly factual.
No more or less so than the creation timestamp, which is almost always
the first time a file was saved, sometime after it was created.
It's *conceivable* that your MUA
Which U.S. data-enabled cellular telephones have a voice recorder with
memory capable of being read by the data transceiver's CPU, if any?
Also again, where is the appropriate forum for this question? (Not
including industry consortia
Yesterday an electronics sales, um, individual
Who are these people?
Perhaps they are from the majority of humans who use languages
written with glyphs absent from ASCII (and I don't mean Smalltalk-79.)
Or maybe they have a pressing need to use the International
Phonetic Alphabet entities because the "new economy" synchronous
telephony
Patrick,
Thank you for your most helpful pointer:
I recently had my first experience using the setup described by
Marshall Rose in rfc2629 (Writing I-Ds and RFCs using XML) and was
very pleased. You should be able to create the XML base in Word (or
whatever) and use the referenced tools to
So transport layer should somehow enhance
the error check and/or correction mechanism.
actually, I would put it in the application layer. I would have the
application include some form of checksum (PGP signature, file CRC,
whatever) to ensure for itself that what was sent was what was
... curious as to what happened to NECP.
http://www.ietf.org/html.charters/wrec-charter.html
http://www.netapp.com/necp
http://www.circlemud.org/~jelson/writings/draft-cerpa-necp-03.txt
http://www.circlemud.org/~jelson/writings/necp-ietf
Found in two minutes with Google.
Cheers,
... To reach 10 Gbps, you will need a BER of 1.E-14
There are very many ways to not achieve that
Are there any limits to what error correcting codes can provide?
If you have 15 Gbps with a natural error rate of 1 in 100,
I think you can still get better than 1 in 1e14 bit errors
at
Slashdot has an interesting thread on the 128 kbps wide-area wireless
internet service offered by Ricochet/Metricom:
http://slashdot.org/articles/01/02/09/1559221.shtml
Since I last reported on this list, they have apparently reduced their
round-trip times from 1/2 s to about 1/5 s.
So,
Lloyd,
I second your request:
... unless you have a specific request for a ... IESG statement,
I'd like a statement that RFC2418 will be adhered to by mailing lists.
So would I. I use multiple email addresses: [local-subaddr]@bovik.org,
[EMAIL PROTECTED], etc. -- like thousands of other
Jim,
Thanks for your comments:
Your suggestion to automate the detection of "persistent and excessive"
could work for people and would help "throttle down" those discussions
that need it from time to time, but it would not protect an elist from
spam.
Neither does non-subscriber moderation.
It was ... peer-to-peer things that made the Internet popular.
Yes. Before there was the web (back in the days of HOSTS.TXT and
ftp clients on so few platforms that one's best efforts to convert
carriage returns were often foiled), email-based file servers were
popular, and they still are.
[PPP over TCP through NATs] doesn't provide any more global address space
Why create more supply when it can be so easy to reduce demand?
This reminds me of California's electricity crisis. It seems the internet
administration community can easily do their part for this very fundamental
Keith,
You are certainly correct:
We are accustomed to thinking of conservation as a Good Thing,
but an effective conservation plan can actually make a system
less able to cope with fluctuations in load.
That reminds me of another economic analogy to a contempoary
internet engineering
If you want to be part of the global address space and you are
behind a NAT box, get a PPP account outside your NAT box and
connect to it with TCP or SSH or SSL or UDP or HTTP or whatever
(see for example the use of PPP over telnet, in the www.ora.com
Turtle PPP book.)
What IPv4 NAT issue
There seems to be a lot of evidence that voting anonymously
(the privacy constraint) and free from fraud or accidental
errors (the authenticity constraint) might not be possible to
do online any better than can be done with paper ballots or
specialized, auditable electronic voting machines.
Was the ICANN election by Instant Runoff Voting or Condorcet?
The terms are defined at: http://www.fairvote.org/irv/
and: http://www.vision25.demon.co.uk/pol/votefaq.txt
It is great it was by were choice ballots. As there seems to
be a renewed commercial interest in election equipment, would
If ACE wanted to be liberal with what it accepts, it would not
insist that applications "MUST" stop with an error when it finds
that the encoded string has an ASCII representation. Political
decisions about uniqueness should not require everyone to have
to upgrade their servers to software
Masataka Ohta and Vernon Schryver make excellent points in favor
of the domain name status quo. I agree that IDN should be frozen
for at least a few years to see what local domain admins and
application vendors tend to do, especially since the pieces of
the likely solutions (such as the
Given that audio recording and production is less expensive than
video production, and audio takes less bandwidth, how about audio
recordings as an alternative?
Whether we use GSM 06.10 or MP3 format, it makes economic sense.
Lincoln D. Stein suggests MP3:
Jutta,
Thanks for the information:
The patent I've seen investigated in connection with GSM 06.10
and Philips is the older 4,932,061 (1990)
Interesting. The priority date of that one is 22 March 1985.
The practice of quantizing residual exitation in LPC vocoders was
not novel in 1985.
Contrary to what people at VPIM meetings, lists, and on web pages
have suggested, nobody owns any IPR on the GSM 06.10 vocodec format,
or on any routines for encoding or decoding it. It was developed
from published code by people who took care to publish it before it
could be monopolized.
Does anyone know if Active Voice supports Internet standards?
This quote is interesting:
"... future versions of Unity will support Audio Messaging
Interchange Specification (AMIS) as well as Voice Profile for
Internet Mail (VPIM)"
--
"With respect to Media APIs, these are expected to be pursued as devices
become more capable"
-- http://developer.java.sun.com/developer/community/chat/JavaLive/2000/jl1024.html
I wonder how long Sun thinks it will be before handheld wireless devices
"become more capable" with speakers
The consensus so far is that the maximum CDPD half-duplex data
transfer rate is maximum 19.2 kbps.
Cheers,
James
Does anyone know what data dransfer rates (in both directions) are
typical with the Verizon/Airtouch CDPD wireless IP service?
http://www.app.airtouch.com/mobile_ip/index.html
Cheers,
James
Ned,
Thanks for your message. One part is very interesting:
there's no substitute for F2F meetings in order to accomplish some tasks.
I agree, but I would like to know which of the IESG tasks most require
face-to-face meetings. If they were listed, maybe some solutions would
be engineered
Ned,
Thanks for your reply:
The IESG of managing and assisting Working Groups
is one of the most important tasks IESG members perform,
and it cannot be done effectively from a remote location.
I'm interested in the specific reasons why this is the case.
You listed one:
additional
Is there anything in the IESG governing rules that requires any
physical presence at a particular location in order to accomplish
any IESG tasks?
I think the IETF took a wrong turn when the first PostScript RFC
was published, because that is sort of hard on those blind persons
who might want
Mohsen,
Thanks for your pointer:
All of this and a great deal more is discussed in various old books,
such as:
- Internetwork Mobility - The CDPD Approach
Taylor, Waung and Banan
Prentice Hall
1996
ISBN: 0-13-209693-5
I can't find any store that seems to stock your book.
What
The prevailing view seems to be that wide-area wireless
devices need to be "mobile" in the sense that they are
able to move from one network to another. This is not
the case, and maybe not even desirable. I believe that
this view has led to easily avoidable delays in wireless
internet
... There should also be a standard mechanism for multiple searches and
complex searches
"ANSI/NISO Z39.58-1992 Common Command Language for On-Line Interactive
Information Retrieval."
ANSI documents are generally not available for free; major university
libraries often have trouble
This is interesting:
http://www.whitehouse.gov/library/hot_releases/October_13_2000_2.html
Cheers,
James
In the U.S., the revenues of the telephone industries are about 25
times the size of those of the television and movie industries combined.
In addition, when people are asked to rank the importance of their
internet applications, e-mail almost always tops all the others,
and syncronous
In the U.S., the revenues of the telephone industries are about 25
times the size of those of the television and movie
industries combined.
Uh? According to the (US) Bureau of Economic Analysis figures for 1998, the
"Telephone and telegraph" revenues represented about 2.3% of GDP, the
For such information, ask Docomo, not IETF.
There is no Docomo service in my area.
Or, are you spamming IETF acting as a sales agent of Docomo?
No, I'm not affiliated with any part of the cellphone business.
I ask because my employer and I have multiple, specific applications
for
If IPSec adds any latency beyond startup negotiation
The encryption takes some time. Some $olutions will have
hardware for it, but straightforward implementations mean
lots of bit-field operations, which most C compilers don't
optimize very well, and some compilers on certain platforms
Mark,
Thank you for your message:
... how does the end host figure out which situation (congestion
or outage) it is in?
There are two end hosts. Only one of them has a good chance of
knowing, and the other doesn't usually care these days.
I agree that a well-designed signaling method
Mark,
Thanks for your message:
... It is my opinion that it is a mistake to reduce the maximum
RTO too low
Absolutly; I'm worried that even mentioning the RTO maximum will
detract attention from the maximum retransmition timeout which is
the REAL problem with TCP over wireless, more
Patrik,
Thank you for your reply:
... guidelines for TCP operation during
indefinite wireless link downtime
I think this must be syncronized with the work of the PILC wg. See
http://www.ietf.org/html.charters/pilc-charter.html
Yes, the next document milestone from PLIC seems to have
Mohsen,
Thank you for your message:
A large body of work exists which addresses the Mobile Messaging
area
LEAP: Lightweight and Efficient Application Protocol.
...
Those who want to build good things and move forward fast, can evaluate
the merits of LEAP and participate in
Here are some questions about the plic minutes:
http://pilc.grc.nasa.gov/pilc/list/archive/0967.html
TCP over Wireless draft. The working group charter specifies that
PILC will produce a 'TCP over Wireless' RFC that is a meta list of
the existing PILC recommendations. This was
Reiner,
Thanks for your reply:
... There seems to be a lack of understanding about the
parameters involved, and most if not all of the important ones are
at least touched on in the DoCoMo I-D and the documents it cites.
You need to be more precise. Which parameters are you talking about?
If there has been no charter proposed for a MMMS working group, I
intend to propose one as follows. I would like to know how the
Area Directors feel about the following ideas, many of which are
informed by the comments of Patrik, Ned, and others in the Apps
Discussion archives --
At the November meeting, about 90 people attended the Mobile
Multimedia Messaging Service BOF:
http://www.ietf.org/proceedings/99nov/46th-99nov-ietf-42.html
But the mailing list has been dead:
http://www.imc.org/ietf-mmms/mail-archive/threads.html
MMMS-related topics seem to be fairly
Masataka,
Seriously, I would like to get a pair of Simple Internet Phone
prototype terminal adapters. You said they can be purchased. I
have not been able to find any other references to them. Please
explain how they can be obtained.
Brijesh,
In answer to your questions:
What makes you
Apparently WAP is collapsing, both in terms of the general opinion
of engineers and pundits, and now customer revenues. The Invisible
Hand needs to slap some sense into the overly-greedy WAP Forum and
their all-too-pervasive accomplices.
Imode is far more widely used in Japan, as it is a
... breaks the end-to-end model of IP (as Imode and WAP do as they are
implemented today).
WAP does, but apparently i-Mode does not. The i-Mode vendors claim
that you can plug your laptop into your i-Mode phone in Japan (and get
speeds far faster than 9600 bps on newer phones), and someone
... Does anybody know the default codepage in URIs of HTTP?
US-ASCII. Don't count on high-bit-set bytes resembling Latin-1 or
even working at all on some platforms. However, there is a proposal
to incorporate non-ASCII UTF-8 as (multi-)bytes as %xx :
Anyone know whether Opera has microphone upload yet?
More to the point, does anyone care?
Well, sure, Opera probably cares whether they have a feature that
Tim Berners-Lee claims is an integral part of the HTML standard,
but hasn't yet been implemented by any of their competitors:
Aditya,
Thank you for your Internet message:
... why are you segregating these voice features with web/email/WAP?
I do not understand that question. My problem stems from the use of
the verb "segregating" modified by "with" -- those two do not work
well together.
... using WAP, we can
Where, and by whom, is wireless service with the following features offered?
1. An option for incoming telephone calls to go directly to voicemail,
transmitting spoken messages asynchronously to a buffer inside the telephone
transceiver, using a reliable transport of high quality audio.
The asynchronous audio conferencing applet at www.wimba.com
uses TCP ports 4382 and 5644.
Sites wishing to explore Wimba will need to allow access for
TCP transmissions on those ports. Those concerned regarding
security issues should note that the signed applet has been
ranked in the top 1%
Matt,
Thanks for your message:
As a linguistic exercise, you might reconcile this message, which you
get when you refuse to grant their applets read/write/delete/execute
access to all your files:
In order to run the Wimba forums application, you will need to
grant our applet a
This page describes the Outlook patch in development:
http://officeupdate.microsoft.com/2000/articles/out2ksecarticle.htm
The access timer ("Provide access for {1,2,5,10...} minutes") is a
great idea. I wonder where they came up with that one. :)
However, their restriction on the Send
MS Makes E-mail Virus Patch
By MICHAEL J MARTINEZ
AP Business Writer
05/15/00
SEATTLE (AP) -- Charged with enabling easy access for computer
viruses like the Love Bug, Microsoft is altering its popular
Outlook e-mail software to prevent users from running any
"executable'' program
From: Jim Busse [EMAIL PROTECTED]
Date: Fri, 12 May 2000 10:11:36 -0700
I get 240 emails/day.
about 15% have executable attachments, because that's the way developers use
mail, we attach self-expanding zip files.
My organization has about 100 people that fall into this category.
First
Harald,
Thank you for your reply to my message:
These sorts of things are less common on the more heterogeneous
Unix world, but Unix mailers are just as culpable. If I wanted to
be consistent, I would demand that anything I run on Unix (without
a special permitted shell) which connects to
"spyder" wrote:
...
set regedit=CreateObject("WScript.Shell")
set out=WScript.CreateObject("Outlook.Application")
set mapi=out.GetNameSpace("MAPI")
...
set male=out.CreateItem(0)
male.Recipients.Add(malead)
male.Subject = "ILOVEYOU"
male.Body = vbcrlf"kindly check the attached LOVELETTER
Stephanos,
Thanks for your message:
... You need detailed definitions, changes to DTDs, and more.
If you have these details, it would be nice to point us all to a
proposal so we know how "DEVICE" and "MAXTIME" would work.
Sorry about not pointing to this document:
Valdis,
Thank you for your reply:
When was the last time you bought a microphone/audio card for
a system that didn't include at least basic software to do
[recording to files]?
Not too many months. Try any Linux on any of IBM's PCs with one
of their soundcard/modem combinations; you'll
Jony,
Thanks for your message:
In my experience, the proper way to develop standards is to
begin with a private implementation.
Private? Anyone is welcome to my Mozilla mods if they will
try to port them to Gecko. Most browsers already implement
file upload. The only difficulty is in
Harald,
Thanks for your message:
There is no procedure to "suspend control of aspects" of a specification,
The proposal would involve ammending the registration of the
text/html media type, incorporating the W3C standards extended
with two attributes of the INPUT element, DEVICE and MAXTIME.
Valdis,
Thank you for your reply to my message:
... The W3C... constrains meaningful debate to those willing and able
to pay US$50,000 per year. I agree that there was a point in
the early development of web standards when that constraint was
beneficial
Why was it beneficial then?
Some educational software advocates and I are considering
asking the IETF to suspend control of certain aspects of
HTML forms from the W3C until microphone upload issues are
addressed.
I am very interested in any public comments and private
opinions on this matter. Please follow up or reply
The addendum claims that input devices "shouldn't be visible in
the markup" -- a position that would require the user of a web-based
OCR application to select a scanner over a camera for each page of
text, while a user of a teleconferencing application would need to
select a camera over
Dear Dr. Pemberton,
Thank you for your reply:
I am sure we both want to resolve this. Would you please list all
the flaws of which you are aware -- with as little or as much detail
as you have time for -- along with, when available, how they could
be fixed? I promise you I will devote my
Dear Dr. Pemberton,
Thanks for your message:
There is nothing in HTML 4 that excludes any platform.
Just look at Opera, which is being implemented on BeOs, Epoc, Linux,
Mac Os, OS/2 and Windows.
Device upload -- of any kind -- has not yet been implemented in Opera.
You know that the CTO
Paul,
Thanks for your message:
Why is this thread being run on the IETF mailing list?
Some messages to the W3C lists described as "public" did not appear
until my request for endorsements of the device upload draft
appeared here. The W3C filters out messages from non-subscribers,
but as
Dear Dr. Pemberton,
Thank you for your message. I hope this one gets through. Some
of my email to W3C lists (e.g., www-forms) has not appeared in
the archives.
You state that there are comments regarding how the device upload
proposal can be improved. Please publish them, with my replies
My heartfelt thanks go out to the great number of IETF participants who
have endorsed the device upload proposal. Sadly, my W3C sources tell me
that there is still insufficient support for the device upload proposal
within the W3C HTML Working Group. The most substantial objection to
device
96 matches
Mail list logo