101 research outputs found

    Q-Map Application for Enrichment of a Mobile Directory Assistance Service

    Get PDF
    The project described in this paper involves designing and developing a mobile map application, called the Qatar Map (Q-Map), which supports a telephone directory assistance service that runs over the terrestrial cellular network. The application uses WAP Push technology for extending the features available for a conventional directory assistance service. The Q-Map enables the network agent to respond to the subscriber with supplementary information when requesting a telephone number for a business. In addition to the telephone number, the information also includes a web address (URL) through which the subscriber can access a Google map covering the business’s area and any marketing content (e.g., advertising) uploaded earlier by that business. This service is also offered on-line through the Internet. In this regard, the subscriber can access the Q-Map website using a web browser, via either a PC, or a mobile handset

    Deceptive directories and “vulnerable” logs:a honeypot study of the LDAP and log4j attack landscape

    Get PDF

    Worldcom- complaint, consent, summary

    Get PDF

    MCI Worldcom Communications - Complaints & Consent Order

    Get PDF

    The Silent Witness, February 1992

    Get PDF
    A newsletter published for Deaf Catholics in Washington, D.C

    The Bulletin, November 1978

    Get PDF
    A newsletter published for Deaf Catholics in Green Bay, WI The Bulletin Finding Ai

    Critical Infrastructures You Can Trust: Where Telecommunications Fits

    Full text link
    This paper discusses two NISs: the public telephone network (PTN) and the Internet. Being themselves large and complex NISs, they not only merit study in their own right but can help us to understand some of the technical problems faced by the developers and operators of other NISs. In addition, the high cost of building a global communications infrastructure from the ground up implies that one or both of these two networks is likely to furnish communications services for most other NISs. Therefore, an understanding of the vulnerabilties of the PTN and Internet informs the assessment of the trustworthiness of other NISs. Ideas for improving the trustworthiness of the PTN and Internet are also proposed, both for the short-term (by improved use of existing technologies and procedures) and for the long-term (by identifying some areas where the state-of-the-art is inadequate and research is therefore needed). Finally, some observations are offered about Internet telephony and the use of the Internet for critical infrastructures
    corecore