Post Syndicated from jake original https://lwn.net/Articles/748081/rss
License violations are generally not done by malice, but simply by
mistake. But correcting those mistakes can be messy, so it would be better
for large (and small) organizations not to make them in the first place. To
try to head off license problems, Andreas Schreiber and his
colleagues at Germany’s aeronautics and space research center, DLR, have
put together educational materials and worked on training. Schreiber spoke
work at FOSDEM 2018.
Subscribers can read on for a report on the talk by guest author Tom Yates.
Post Syndicated from jake original https://lwn.net/Articles/747563/rss
Some days it seems that wherever two or more free-software enthusiasts
gather together, there also shall be licensing discussions. One such,
which can get quite heated, is the question of whether a given
free-software license is a license, or whether it is really a contract.
This distinction is important, because most legal systems treat the two
differently. I know from personal experience that that discussion can go
on, unresolved, for long periods, but it had not previously occurred to
me to wonder whether this might be due to the answer being different in
different jurisdictions. Fortunately, it has occurred to some lawyers
to wonder just that, and three of them came together at FOSDEM 2018 to
present their conclusions.
Subscribers can read on for a report on the talk by guest author Tom Yates.
Post Syndicated from jake original https://lwn.net/Articles/747098/rss
Much as some of us would love never to have to deal with Windows,
it exists. It wants to authenticate its users and share
resources like files and printers over the network. Although many
enterprises use Microsoft tools to do this, there is a free alternative,
in the form of Samba. While Samba 3 has been happily providing
authentication along with file and print sharing to Windows clients for
the Microsoft world has been slowly moving toward Active Directory (AD).
Meanwhile, Samba 4, which adds a free reimplementation of AD on Linux, has
been increasingly ready for deployment. Three short talks at FOSDEM 2018
provided three different views of Samba 4, also known as Samba-AD,
and left behind a pretty clear picture that Samba 4 is truly
ready for use.
Subscribers can read on for a report from guest author Tom Yates on the first two of those talks; stay tuned for another on the third soon.
Post Syndicated from jake original https://lwn.net/Articles/735840/rss
The GNU Privacy Guard (GnuPG) is one of the
fundamental tools that allows a distributed group to
have trust in its communications. Werner Koch, lead developer of GnuPG,
spoke about it
at Kernel Recipes: what’s in the new 2.2 version, when older versions
will reach their end of life, and how development will proceed going forward.
He also spoke at some length on the issue of best-practice key management
and how GnuPG is evolving to assist. Subscribers can click below for a
report on the talk by guest author Tom Yates.
Post Syndicated from jake original https://lwn.net/Articles/735275/rss
Jens Axboe is the
maintainer of the block layer of the kernel. In this capacity,
he spoke at Kernel Recipes
2017 on what’s new in the storage world for
Linux, with a particular focus on the new block-multiqueue subsystem:
the degree to which it’s been adopted, a number of optimizations that
have recently been made, and a bit of speculation about
how it will further improve in the future.
Subscribers can click below for a report from the Kernel Recipes talk by
guest author Tom Yates.
Post Syndicated from jake original https://lwn.net/Articles/734766/rss
As the Internet of Things (IoT) becomes
ever more populous, there is no shortage of people warning us that the
continual infusion into our lives of hard-to-patch
proprietary devices running hard-to-maintain proprietary code is a bit
of a problem. It is an act of faith for some, myself included,
that open devices running free software (whether IoT devices or not) are
proprietary, closed ones. So it’s always of interest when freedom (or
something close to it) makes
its way into a class of devices that were not previously so blessed.
Subscribers can click below for a look at the NumWorks graphing calculator
by guest author Tom Yates.
Post Syndicated from Yate Team original https://blog.yate.ro/2017/05/08/ss7ware-insights-from-the-mvnos-world-congress/
We just got back from the MVNOs World Congress, in Nice, where we did quite a good impression with our YateHSS/HLR and YateUCN solutions for MVNOs. The “not so shocking” conclusion that we came to was that our public pricing policy impacts the MVNO market at its core.
Post Syndicated from jake original https://lwn.net/Articles/715082/rss
Issues of when and how to enforce free-software licenses, and who
should do it, have been on
some people’s minds recently, and Richard Fontana from Red Hat decided
to continue the discussion at FOSDEM. This was a fairly lawyerly talk;
phrases like “alleged violation” and “I think that…” were scattered
throughout it to a degree not normally found in talks by developers.
This is because Fontana is a lawyer at Red Hat, and he was talking about
ideas which, while they are not official Red Hat positions, were developed
discussions between him and other members of the legal team at Red Hat.
Subscribers can click below for the full report of the talk by guest author Tom Yates.
Post Syndicated from jake original https://lwn.net/Articles/714524/rss
Tom Callaway seems to be a very nice person who has been
overclocked to about 140% normal human speed. In only 20 minutes he gave
an interesting and highly-amusing talk that could have filled a 45-minute
slot on the
legal principles that underpin Fedora, how they got that way, and how
they work out in practice.
Subscribers can click below for the full report from FOSDEM by guest author Tom Yates.
Post Syndicated from Bruce Schneier original https://www.schneier.com/blog/archives/2016/12/international_p.html
This article outlines two different types of international phone fraud. The first can happen when you call an expensive country like Cuba:
My phone call never actually made it to Cuba. The fraudsters make money because the last carrier simply pretends that it connected to Cuba when it actually connected me to the audiobook recording. So it charges Cuban rates to the previous carrier, which charges the preceding carrier, which charges the preceding carrier, and the costs flow upstream to my telecom carrier. The fraudsters siphoning money from the telecommunications system could be anywhere in the world.
The second happens when phones are forced to dial international premium-rate numbers:
The crime ring wasn’t interested in reselling the actual [stolen] phone hardware so much as exploiting the SIM cards. By using all the phones to call international premium numbers, similar to 900 numbers in the U.S. that charge extra, they were making hundreds of thousands of dollars. Elsewhere — Pakistan and the Philippines being two common locations — organized crime rings have hacked into phone systems to get those phones to constantly dial either international premium numbers or high-rate countries like Cuba, Latvia, or Somalia.
Why is this kind of thing so hard to stop?
Stamping out international revenue share fraud is a collective action problem. “The only way to prevent IRFS fraud is to stop the money. If everyone agrees, if no one pays for IRFS, that disrupts it,” says Yates. That would mean, for example, the second-to-last carrier would refuse to pay the last carrier that routed my call to the audiobooks and the third-to-last would refuse to pay the second-to-last, and so on, all the way back up the chain to my phone company. But when has it been easy to get so many companies to do the same thing? It costs money to investigate fraud cases too, and some companies won’t think it’s worth the trade off. “Some operators take a very positive approach toward fraud management. Others see it as cost of business and don’t put a lot of resources or systems in to manage it,” says Yates.
Post Syndicated from Yate Team original https://blog.yate.ro/2016/11/21/yatehsshlr-breaks-the-barriers-to-entry-into-the-mvno-and-iot-markets/
YateHSS/HLR delivers failover cluster, load-balancing and scalability features inside a cluster at an affordable price, breaking the barriers to entry the market for MVNOs and IoT products manufacturers, leading to a positive ROI from an early stage of the business.
Post Syndicated from Yate Team original https://blog.yate.ro/2016/05/30/ditch-the-online-charging-system/
YateUCN removes the need for an Online Charging System for new LTE operators by providing a minimum Guaranteed Bit Rate (GBR) for all subscribers. In a typical mobile network, the Online Charging System (OCS) sets a maximum allowed bit rate based on available credit to prevent high demand users from congesting the network. The OCS […]
Post Syndicated from Yate Team original https://blog.yate.ro/2016/05/30/guaranteed-bit-rate-per-ue-with-yateucn/
A minimum Guaranteed Bit Rate for the default bearer of an UE may sound unusual, but YateUCN is able to do just that. Through its MME/PGW components, YateUCN allows operators to set the Guaranteed Bit Rate, therefore the bandwidth can be divided fairly to the connected subscribers supported by the same eNodeB. This is beneficial […]
Post Syndicated from Yate Team original http://blog.yate.ro/2016/01/21/busy-2016-for-yate-sdmn-products/
Stepping into 2016, we have exciting news. Through 2015 we continued to develop the GSM/GPRS SatSite base station, as well as our main core network products: the 2G/2.5G/4G YateUCN core network and the 2G/3G/4G YateHSS/HLR. We start 2016 with the release of the LTE SatSite Model 142, with software-selectable LTE or GSM/GPRS operation, generating 10-20 […]
Post Syndicated from Yate Team original http://blog.yate.ro/2015/11/19/yateucn-the-epc-cloud/
The YateUCN is an LTE EPC that unifies all the functions of a conventional LTE core network into a single server. A single YateUCN unit combines the MME, SGW, PGW, PCEF and PCRF functions. A pool of YateUCN servers provide seamless horizontal redundancy, scalability and load balancing in the LTE core network. The YateUCN also […]
Post Syndicated from Yate Team original http://blog.yate.ro/2015/11/10/yateucn-the-redundant-mscvlr/
Traditionally, the redundancy of the Mobile Switching Center / Visitor Location Register (MSC/VLR) is obtained through redundant dedicated hardware and software. The problem lies in the Abis + A interfaces (BSSAP protocol) which do not allow a base station to move easily to another MSC/VLR. To overcome this problem, we decided to use the SIP protocol (with […]
Post Syndicated from Yate Team original http://blog.yate.ro/2015/11/02/yateucn-the-solution-for-mvno-networks/
With mobile consumers’ expectations on the rise, new business models proliferate. Mobile Virtual Network Operator solutions must differentiate to stay competitive and maximize their offerings. MVNOs wishing to offer subscribers high quality voice and/or data services can use YateUCN as a GMSC (voice), a GGSN (GPRS), or a PGW (LTE data). YateUCN supports billing integration […]
Post Syndicated from Yate Team original http://blog.yate.ro/2015/10/13/increasing-the-security-of-volte-with-yateucn/
The emergence of VoLTE-capable devices is raising new security concerns for mobile network operators, as existing IMS deployments expose vulnerabilities in VoLTE handsets to other devices in the network. YateUCN unified core network brings a solution to these concerns by isolating SIP and RTP call legs between handsets. LTE uses an IMS network to deliver […]
Post Syndicated from Yate Team original http://blog.yate.ro/2015/10/06/gsm-and-lte-2-technologies-in-1-base-station/
LTE for bandwidth and GSM for voice are a match made in heaven for subscribers. The roll-out however, not so much. Running them both from the same radio equipment (BTS) can be the answer. SatSite can run both YateBTS (GSM) and YateENB (LTE) at the same time, in the same spectrum, using the same radio […]