For your convenience in reading: Subject lines are printed in RED and
Moderator replies when issued appear in BROWN.
Previous Issue (just one)
TD Extra News
Add this Digest to your personal
or  
TELECOM Digest Tue, 24 May 2005 15:55:00 EDT Volume 24 : Issue 230 Inside This Issue: Editor: Patrick A. Townson More News on our RSS Syndication (TELECOM Digest Editor) Virus Infection Holds Computer Files Hostage (Lisa Minter) Banks Notify Customers of Data Theft (Lisa Minter) Congress Passes Law Banning Computer Spyware (Lisa Minter) Publishers Protest Google Library Project (Lisa Minter) Spammers Cannot Hide Behind Affiliates (Lisa Minter) Television Reloaded (Monty Solomon) Tangled up Over DSL - Some Cell Phone Users Demand (Jack Decker) Vonage's Jeffrey Citron on E911 and SBC's Reluctance (Jack Decker) Re: Verizon Wireless Ringback Tones Reach New England (Joseph) Re: Verizon Wireless Ringback Tones Reach New England (Danny Burstein) Re: Very Early Modems (Scott Dorsey) Re: Corporate Identify -- Verizon vs. "Bell Telephone" (Steve Sobol) Re: Packet8 DTMF Tones Sound "Clipped" (PrinceGunter) Re: ACLU Pizza (William Warren) Re: Why Does it Take So Long? (John R. Levine) Re: Very Early Modems (Scott Dorsey) Re: Looking for a Model 15 or 19 (Kenneth P. Stox) Last Laugh! Your House at P.O. Box 4621 (Customer Service) Telecom and VOIP (Voice over Internet Protocol) Digest for the Internet. All contents here are copyrighted by Patrick Townson and the individual writers/correspondents. Articles may be used in other journals or newsgroups, provided the writer's name and the Digest are included in the fair use quote. By using -any name or email address- included herein for -any- reason other than responding to an article herein, you agree to pay a hundred dollars to the recipients of the email. =========================== Addresses herein are not to be added to any mailing list, nor to be sold or given away without explicit written consent. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome. We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. Geoffrey Welsh =========================== See the bottom of this issue for subscription and archive details and the name of our lawyer; other stuff of interest. ---------------------------------------------------------------------- Subject: More News on our RSS Syndication Date: Tue, 24 May 2005 13:28:31 EDT From: ptownson@massis.lcs.mit.edu (TELECOM Digest Editor) I mentioned here the other day that Telecom Digest/comp.dcom.telecom is now syndicated. This means we now have an RSS feed in addition to the more standard and somewhat obsolete methods of newsgroup distribution we have enjoyed for many years, including NNTP for Usenet. RSS is a method by which many publications share syndicated news and other articles. We started using RSS a few months ago, with 'modules' from other sources sprinkled through our web site, http://telecom-digest.org and now Telecom Digest is also available as a 'module' for use on other people's web sites as well. For instance, if you happen to like reading news mainly from a single source such as Yahoo or MSN News, our module each day is now displayed on those web sites as well. In both cases, the Telecom Digest / c.d.t. newsgroup module is an optional addition. In both cases, it is not automatically displayed on their web sites; you have to 'subscribe to the module' to have it included. Where some readers like going around the net from one URL to another to check for news of interest, other readers prefer to see as many headlines as they can at one single location. I do that here, for example, by providing NY Times, NPR news, Christian Science Monitor, AP News, Reuters and other news reports in the section of our daily Telecom Digest called http://telecom-digest.org/td-extra. The intent is if you wish to make telecom-digest.org your 'home page' or starting point on your computer each day -- and I hope you would -- you will find news and features from _many different sources_ each day. But just as some of you wish to start out _here_ and use the 'modules' other sites have provided, there are some readers who prefer to start, for example, with Yahoo or MSN and do the same kind of thing, and get their Telecom Digest news in the form of a 'module' on that _other_ site. I of course stress telecommunications news first, with the other modules optional for whoever wants them. Every URL on the net stresses its own area of interest _first_ then allows for optional modules, as called for by readers, to other modules, including, as requested, TELECOM Digest. Really, its your choice. http://telecom-digest.org/TELECOM_Digest_Online/atom.xml is where you will find our RSS feed, for use in your own RSS reader. http://telecom-digest.org/rss.html is where you will find a javascript interpretation of our feed, to place Telecom Digest headlines on your own site. (No reason you have to come here to the Digest each day; we can come to you also in this manner.) http://telecom-digest.org/archives/back.issues/recent.single.issues/latest-issue.html is where you go to not only read the latest issue but where you can also go to 'subscribe' (or place the telecom news module) on your 'My Yahoo' or 'My MSN' home pages if you wish to go that way. As other sites come on line with home pages readers themselves construct, telecom will be available to read there also. I hope you are as enthusiastic about this new delivery method for news as I am. Patrick Townson ------------------------------ From: Lisa Minter <lisa_minter2001@yahoo.com> Subject: Virus Infection Holds Computer Files Hostage Date: Tue, 24 May 2005 02:11:27 -0500 Web Infection Holds Computer Files Hostage By TED BRIDIS, AP Technology Writer 11 minutes ago Computer users already anxious about viruses and identity theft have new reason to worry: Hackers have found a way to lock up the electronic documents on your computer and then demand $200 over the Internet to get them back. Security researchers at San Diego-based Websense Inc. uncovered the unusual extortion plot when a corporate customer they would not identify fell victim to the infection, which encrypted files that included documents, photographs and spreadsheets. A ransom note left behind included an e-mail address, and the attacker using the address later demanded $200 for the digital keys to unlock the files. "This is equivalent to someone coming into your home, putting your valuables in a safe and not telling you the combination," said Oliver Friedrichs, a security manager for Symantec Corp. The FBI said the scheme, which appears isolated, was unlike other Internet extortion crimes. Leading security and antivirus firms this week were updating protective software for companies and consumers to guard against this type of attack, which experts dubbed "ransom-ware." "This seems fully malicious," said Joe Stewart, a researcher at Chicago-based Lurqh Corp. who studied the attack software. Stewart managed to unlock the infected computer files without paying the extortion, but he worries that improved versions might be more difficult to overcome. Internet attacks commonly become more effective as they evolve over time as hackers learn to avoid the mistakes of earlier infections. "You would have to pay the guy, or law enforcement would have to get his key to unencrypt the files," Stewart said. The latest danger adds to the risks facing beleaguered Internet users, who must increasingly deal with categories of threats that include spyware, viruses, worms, phishing e-mail fraud and denial of service attacks. In the recent case, computer users could be infected by viewing a vandalized Web site with vulnerable Internet browser software. The infection locked up at least 15 types of data files and left behind a note with instructions to send e-mail to a particular address to purchase unlocking keys. In an e-mail reply, the hacker demanded $200 be wired to an Internet banking account. "I send programm to your email," the hacker wrote. There was no reply to e-mails sent to that address Monday by The Associated Press. FBI spokesman Paul Bresson said more familiar Internet extortion schemes involve hackers demanding tens of thousands of dollars and threatening to attack commercial Web sites, interfering with sales or stealing customer data. Experts said there were no widespread reports the new threat was spreading, and the Web site was already shut down where the infection originally spread. They also said the hacker's demand for payment might be his weakness, since bank transactions can be traced easily. "The problem is getting away with it - you've got to send the money somewhere," Stewart said. "If it involves some sort of monetary transaction, it's far easier to trace than an e-mail account." Details: http://www.websensesecuritylabs.com/alerts/alert.php?AlertID194 Copyright 2005 The Associated Press. NOTE: For more telecom/internet/networking/computer news from the daily media, check out our feature 'Telecom Digest Extra' each day at http://telecom-digest.org/td-extra/more-news.html . Hundreds of new articles daily. [TELECOM Digest Editor's Note: But, as some of our Bright young readers would explain, "on internet there is no consensus on what is, and is not malicious." Or as another reader would explain, "there is no such thing as an internet; just a collection of sites, and we cannot tell another site how to operate." And the Bright young reader concurs, "nor does anyone on the net want things any different". PAT] ------------------------------ From: Lisa Minter <lisa_minter2001@yahoo.com> Subject: Banks Notify Customers of Data Theft Date: Tue, 24 May 2005 02:17:46 -0500 By PAUL NOWELL, AP Business WriterMon May 23,11:06 PM ET More than 100,000 customers of Wachovia Corp. and Bank of America Corp. have been notified that their financial records may have been stolen by bank employees and sold to collection agencies. In all, nearly 700,000 customers of four banks may be affected, according to police in Hackensack, N.J., where the investigation was centered. So far, Bank of America has alerted about 60,000 customers whose names were included on computer disks discovered by police, bank spokeswoman Alex Liftman said Monday. "We are trying to communicate with our customers as promptly as possible," she said. "So far, we have no evidence that any of our customer information has been used for account fraud or identity theft." Wachovia said it has identified 48,000 current and former account holders whose accounts may have been breached. "The numbers have increased as we continue to receive additional names from police," Wachovia spokeswoman Christy Phillips said Monday. Both banks are providing the affected customers with free credit reporting services. In a separate case with the potential for identity theft, a laptop containing the names and Social Security numbers of 16,500 current and former MCI Inc. employees was stolen last month from the car of an MCI financial analyst in Colorado, said company spokeswoman Linda Laughlin. The car was parked in the analyst's home garage and the computer was password-protected, she said. MCI would not comment on whether the data was encrypted. The bank record theft was exposed April 28 when police in Hackensack charged nine people, including seven bank workers, in an alleged plot to steal financial records of thousands of bank customers. The bank employees accessed records for customers of Cherry Hill, N.J.-based Commerce Bank, PNC Bank of Pittsburgh, and Charlotte-based banks Wachovia and Bank of America, according to Hackensack Police Chief Ken Zisa. Repeated calls seeking comment were not returned by Commerce Bank officials, while PNC officials declined to estimate how many of their customers' accounts may have been breached. "We have no evidence that any of these accounts have been compromised at all. We continue to work with law enforcement officials," said Pat McMahon, a spokesman for PNC. New Jersey authorities found 12 names and Social Security numbers belonging to PNC customers but the bank found no suspicious activity in the accounts, he said. Collection agent Orazio Lembo Jr., 35, of Hackensack made millions of dollars through the scheme, Zisa has said. Authorities said they discovered the plot after they executed a search warrant at Lembo's apartment in February as part of a separate investigation. They seized 13 computers which contained details about the plan, Zisa said. Lembo received lists of people sought for debt collection and turned that information over to the seven bank workers, who would compare those names to their client lists. The bank workers were paid $10 for each account they turned over to Lembo, Zisa said. In New Jersey, continued scrutiny of computer discs seized from Lembo's offices was yielding more names. Investigators have now identified nearly 700,000 potential victims, Hackensack police Capt. Frank Lomia said Monday. Copyright 2005 The Associated Press. NOTE: For more telecom/internet/networking/computer news from the daily media, check out our feature 'Telecom Digest Extra' each day at http://telecom-digest.org/td-extra/more-news.html . Hundreds of new articles daily. [TELECOM Digest Editor's Note: Geeze, I can remember back in the 1970's when the worst thing you had to worry about with the banks was when one of them (First National Bank of Chicago comes to mind) would commit _postal fraud_ by riffling through mail not addressed to themselves, open the mail and pocket any cash money they found. I was forced to file a Small Claims case against First National Bank in Chicago when this _snot_ of a customer service lady refused to return money to me their mailroom employees had pilfered. (circa 1974- 1975). If you want more details, just ask. PAT] ------------------------------ From: Lisa Minter <lisa_minter2001@yahoo.com> Subject: Congress Votes to Outlaw Computer Spyware Date: Tue, 24 May 2005 02:23:53 -0500 By Andy Sullivan The U.S. House of Representatives on Monday voted to establish new penalties for purveyors of Internet "spyware" that disables users' computers and secretly monitors their activities. By overwhelming majorities, the House passed two bills that stiffen jail sentences and establish multimillion-dollar fines for those who use secret surveillance programs to steal credit-card numbers, sell software or commit other crimes. Spyware has emerged as a major headache for computer users over the last several years. It can sap computing power, crash machines and bury users under a blizzard of unwanted ads. Scam artists use spyware to capture passwords, account numbers and other sensitive data. Spyware can end up on users' computers through a virus or when they download games or other free programs off the Internet. "Consumers have a right to know and have a right to decide who has access to their highly personal information that spyware can collect," said California Republican Rep. Mary Bono (news, bio, voting record), who sponsored one of the bills. The bills prohibit a number of practices often associated with spyware, such as reprograming the start page on a user's Web browser, logging keystrokes to capture passwords and other sensitive data, or launching pop-up ads that can't be closed without shutting down the computer. The practice known as "phishing" -- in which scam artists pose as banks or other businesses in an attempt to trick consumers into divulging account information -- would also be outlawed. The House voted 395 to 1 to impose jail sentences of up to 2 years. Violators could face fines up to $3 million per incident. Those who use spyware to commit other crimes, such as identity theft, could have an additional 5 years tacked on to their sentences. Both bills passed the House last year but the Senate adjourned before taking action. Similar legislation has been introduced in the Senate this year. Most spyware practices are already illegal under deceptive-business laws but federal and state law enforcers have only sued two spyware purveyors so far, one expert said. "We know that there are literally hundreds of these cases out there. Unless nthere's a push for enforcement, passing a new law is really only going to help after the fact," said Ari Schwartz, associate director at the Center for Democracy and Technology, a consumer-advocacy group. The bill gives the Justice Department an additional $10 million per year through 2009 to fight spyware. Copyright 2005 Reuters Limited. NOTE: For more telecom/internet/networking/computer news from the daily media, check out our feature 'Telecom Digest Extra' each day at http://telecom-digest.org/td-extra/more-news.html . Hundreds of new articles daily. ------------------------------ From: Lisa Minter <lisa_minter2001@yahoo.com> Subject: Publishers Protest Google Library Project Date: Tue, 24 May 2005 02:15:33 -0500 By MICHAEL LIEDTKE, AP Business Writer A group of academic publishers called Google Inc.'s plan to scan millions of library books into its Internet search engine index a troubling financial threat to its membership. The Association of American University Presses said in a letter that was to be sent to Google on Monday that the online search engine's library project "appears to involve systematic infringement of copyright on a massive scale." The association, which represents 125 nonprofit publishers of academic journals and scholarly books, asked Google to respond to a list of 16 questions seeking more information about how the company plans to protect copyrights. Two unidentified publishers already asked Google to withhold its copyrighted material from the scanners, but the company hasn't complied with the requests, Peter Givler, the executive director for the New York-based trade group, wrote in the letter. Google, based in Mountain View, Calif., did not return phone and e-mail messages left Monday. The association of nonprofit publishers is upset because Google has indicated it will scan copyright-protected books from three university libraries -- Harvard, Michigan and Stanford. Those three universities also operate publishing arms represented by the group complaining about Google's 5-month-old "Libraries for Print" project. That means the chances of the association suing Google are "extremely remote," Givler said in an interview Monday. Still, Givler said the association is very worried about Google's scanning project. "The more we talked about it with our lawyers, the more questions bubbled up," he said. "And so far Google hasn't provided us with any good answers." Google also is scanning books stored in the New York Public Library and Oxford in England, but those two libraries so far are only providing Google with "public domain" works -- material no longer protected by copyrights because of its age, or its author's intentions. Federal law considers the free distribution of some copyrighted material to be permissible "fair use." The company has told the nonprofit publishers that its library program meets this criteria. Some for-profit publishers also are taking a closer look at Google's library-scanning project. "We are exploring issues and opportunities with Google, including the potential impact of this program on our authors, our customers and our business," said John Wiley & Sons Inc. spokeswoman Susan Spilka. Copyright concerns aren't the only issue casting a cloud over Google's library-scanning project. The project also has drawn criticism in Europe for placing too much emphasis on material from the United States. One of Google's most popular features -- a section that compiles news stories posted on thousands of Web sites -- already has triggered claims of copyright infringement. Agence France-Presse, a French news agency, is suing for damages of at least $17.5 million, alleging "Google News" is illegally capitalizing on its copyrighted material. The latest complaints about Google are being driven by university- backed publishers who fear there will be little reason to buy their books if Google succeeds in its effort to create a virtual reading room. The university presses depend on books sales and other licensing agreements for most of their revenue, making copyright protections essential to their survival. Google has turned its search engine into a moneymaking machine, generating a $369 million profit during the first three months of this year alone. The company is counting on its library scanning project to attract even more visitors to its site so it can display more ads and potentially boost its earnings even more. Investors already adore Google. The company's shares surged $13.84, or 5.7 percent, to close Monday at $255.45 on the Nasdaq Stock Market. Earlier in the session, the shares traded as high as $258.10 - a new peak since the company went public nine months ago at $85. Copyright 2005 The Associated Press. NOTE: For more telecom/internet/networking/computer news from the daily media, check out our feature 'Telecom Digest Extra' each day at http://telecom-digest.org/td-extra/more-news.html . Hundreds of new articles daily. ------------------------------ From: Lisa Minter <lisa_minter2001@yahoo.com> Subject: Spammers Cannot Hide Behind Affiliates Date: Tue, 24 May 2005 23:39:58 -0500 Originally published on O'Reilly Network http://www.oreillynet.com/ http://www.oreillynet.com/pub/a/network/2005/04/29/spamkings.html Spammers Can't Hide Behind Affiliates by Brian McWilliams, author of Spam Kings In a case that tests a key provision of the U.S. CAN-SPAM law, Microsoft has scored a legal victory against a Washington man alleged to be one of the top ten spammers in the world. A King County (Washington) superior court judge ruled that Robert Soloway, operator of Newport Internet Marketing (NIM), was in default on the spam lawsuit originally filed by Microsoft on December 18, 2003, against NIM and 20 "John Doe" defendants. Soloway, 25, is ranked the world's eighth largest spammer by the Spamhaus spam tracking and blocking service. Soloway and NIM have been listed on the Spamhaus Register of Known Spam Operations (ROKSO) since the list's inception in October 2000. Soloway had argued that NIM's subcontractors -- otherwise known as spam affiliates -- and not his company, were responsible for waves of illegal spam cited in Microsoft's complaint. The messages included "from" lines forged to make the messages appear as though they were sent via Microsoft's MSN and Hotmail services. Besides asserting that he was unaware that the subcontractors were operating illegally, Soloway also claimed he didn't know their actual identities, since his dealings with affiliates were conducted exclusively over the ICQ chat service. Microsoft filed a request for a default judgment against Soloway on March 31, 2005, complaining that Soloway was playing "a shell game" during the protracted, 15-month discovery process. Microsoft said Soloway had failed to produce documents and other information regarding NIM's dealings with subcontractors. Soloway turned over a list of 67 ICQ numbers used by his affiliates, but he provided no names, addresses, phones, or email addresses, according to Microsoft. "The evidence withheld by defendants ... goes to the heart of Microsoft's case ... the only witnesses who can corroborate or contradict Soloway's testimony are the subcontractors," stated Microsoft in its filing. Also read: Spam Kings The Real Story behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements By Brian McWilliams Table of Contents Sample Chapter Under the rules of civil procedure, a court can order a default judgment against a party who fails to appear in court or to respond to charges against him. Judge William Downing agreed to Microsoft's request on April 8. "The only issue that remains is the amount of damages Plaintiff Microsoft is entitled to," stated the default judgment. Microsoft's head anti-spam attorney, Aaron Kornblum, said Tuesday that Microsoft is "finalizing our pleadings to include the damages amount." But in an online interview this week, Soloway brushed off Microsoft's apparent courtroom win. "The fact is, they have no case, and I can honestly say with the utmost confidence that there will not be a monetary damage awarded," said Soloway. He declined to elaborate on why he was so confident of his position versus Microsoft. Soloway claimed that he has always removed any MSN.com and Hotmail.com addresses from his mailing lists and that he instructed affiliates to do the same. "One of my subcontractors ... clearly did not do what I hired them to do. They broke the rules, and violated my policy," said Soloway. "Should I be responsible for the actions of someone that didn't follow the rules I gave to my advertisers?" he asked. Under both federal and Washington State anti-spam statutes, the answer apparently is _yes_; companies are liable for illegal spam sent on their behalf by third parties. In the case of CAN-SPAM, a firm is responsible if it "procured the transmission" of the unlawful email. Under Washington's Commercial Electronic Mail Act, companies are liable if they "assist the transmission" of the illegal messages. Many large spam operations rely heavily on affiliates, who are typically paid a commission for any sales leads or purchases they generate on behalf of the "sponsor." Soloway testified to Microsoft that he has fired all his subcontractors and now sends email himself using the Dark Mailer spam program and proxies. Soloway declined to comment on a recent bout of spam from his firm that offered, "we email your web site to 2,500,000 opt-in email addresses for free." A disclaimer in the spams stated, "the above emailing is only free if you are a nonprofit organization that aids child abuse victims." Soloway disputed Spamhaus' appraisal of NIM as a top source of spam, and he noted that Spamhaus director Steve Linford has publicly admitted to assisting Microsoft in its litigation. "Steve is making plenty of money from certain large corporations in relation to PR," asserted Soloway, "so Microsoft could go 'look, we've won a judgment against the top [spammer].'" ---- In October 2004, O'Reilly Media, Inc., released Spam Kings. a.. Sample chapter 1, "Birth of a Spam King" (PDF), is available free online. b.. You can also look at the Table of Contents (PDF) and the full description of the book. c.. For more information, or to order the book, go to our site. Brian McWilliams is the author of Spam Kings and is an investigative journalist who has covered business and technology for web magazines including Wired News and Salon, as well as the Washington Post and PC World, Computerworld, and Inc. magazines. Copyright 2005 O'Reilly Media, Inc. ------------------------------ Date: Tue, 24 May 2005 07:39:18 -0400 From: Monty Solomon <monty@roscom.com> Subject: Television Reloaded It's a transformation as significant as when we went from black-and-white to color-and it's already underway. The promise is that you'll be able to watch anything you want, anywhere-on a huge high-def screen or on your phone. By Steven Levy Newsweek Updated: 6:25 a.m. ET May 23, 2005 http://www.msnbc.msn.com/id/7935915/site/newsweek/ ------------------------------ From: Jack Decker <jack-yahoogroups@withheld_on_request> Date: Tue, 24 May 2005 09:58:32 -0400 Subject: Tangled up Over DSL - Some Cell Phone Users Demand to Stand http://www.chron.com/cs/CDA/ssistory.mpl/business/3195270 Some Cell Phone Users Demand to Stand Alone By JOHN C. ROPER Copyright 2005 Houston Chronicle A growing number of U.S. consumers are cutting the cord on traditional home telephone service, choosing instead to exclusively use cell phones. But many of these consumers have found ditching their land-line phone service, and its accompanying cost, isn't possible if they want speedy DSL, or digital subscriber line, Internet service in their homes. Providers such as SBC Communications require customers to buy residential phone service to have access to their broadband lines, a tactic consumer advocacy groups say is unfair. Full story at: http://www.chron.com/cs/CDA/ssistory.mpl/business/3195270 How to Distribute VoIP Throughout a Home: http://michigantelephone.mi.org/distribute.html If you live in Michigan, subscribe to the MI-Telecom group: http://groups.yahoo.com/group/MI-Telecom/ [TELECOM Digest Editor's Note: I think I read somewhere -- maybe here in the Digest -- where SBC was going to bite the bullet also and begin offering 'naked DSL'. Fact or fiction? Personally, I would say that _whenever possible_ people just ditch telco and go with cable internet. PAT] ------------------------------ From: Jack Decker <jack-yahoogroups@withheld_on_request> Date: Tue, 24 May 2005 11:37:01 -0400 Subject: Vonage's Jeffrey Citron on E911 and SBC's Reluctance to Help http://www.engadget.com/entry/1234000040044246/ The Engadget Interview: Jeffrey Citron, chairman and CEO of Vonage Posted by Peter Rojas We recently sat down with Jeffrey Citron, the chairman and CEO of Vonage, to talk about the future of Voice over IP, whether or not Skype is their number one competitor, Vonage's wireless strategy, and how they're responding to the recent controversy over VoIP and E911 calling. Oh, and for all the Treo fans out there, we also asked them how much longer we're going to have to wait until we see a version of Vonage's softphone client for the Palm OS. [Regarding E911:] It's the Baby Bells that generally control that infrastructure? They control about 90% or 80% of it. Are they reluctant to grant Vonage access? Do they say it's a cost issue and that they want you to share the cost with them? No, no. It's interesting. Every Bell will make a different excuse. Verizon is the one that is to be most commended. Verizon says, "Let's put all this crap to the side and let's figure out a way to make this work." And Verizon actually has multiple solutions, depending on the market. And they work really well, and our goal is now to roll it out territory-wide. Verizon makes available to us the same things it makes available to a combination of wireline entities and wireless entities. So we've gone to the other RBOCs and said we want these same things. With Qwest we have an agreement in principle, but we're still working on details. Bell South and SBC have been very reluctant for every reason under the sun. Bell South's made some progress and they're starting to come around, but still not there yet. SBC keeps issuing press release after press release of how they're going to offer this, but they don't offer us the complete solution to do all the pieces like the wireless guys have so we can do it all real and right. SBC finds that E911 is a competitive advantage over Vonage and they want to extort that competitive advantage. I've got to tell you, the last thing anyone should be doing in this country is using E911 as a competitive advantage and risking people's lives. It's not the right thing to do. Remember, these Bells were given 911 as a public trust. Originally given by Congress to AT&T and then by AT&T through divestiture to the Baby Bells. And they should really honor their public trust commitment. Verizon has. We're very pleased about that. Full story at: http://www.engadget.com/entry/1234000040044246/ How to Distribute VoIP Throughout a Home: http://michigantelephone.mi.org/distribute.html If you live in Michigan, subscribe to the MI-Telecom group: http://groups.yahoo.com/group/MI-Telecom/ ------------------------------ From: Joseph <JoeOfSeattle@yahoo.com> Subject: Re: Verizon Wireless Ringback Tones Reach New England Date: Tue, 24 May 2005 05:26:22 -0700 Reply-To: JoeOfSeattle@yahoo.com On Tue, 24 May 2005 01:26:15 -0400, Monty Solomon <monty@roscom.com> wrote: > WOBURN, Mass., May 23 /PRNewswire/ -- Verizon Wireless, the first > national carrier to launch Ringback Tones, today announced the arrival > of its Ringback Tones service in New England. Verizon Wireless > customers throughout the region can now find the perfect Ringback Tone > to replace the standard ring callers hear while they wait for their > call to be answered. The only trouble with this story is that it's not true. T-Mobile USA launched this service many months before Verizon in the USA after launching the same service in the UK several months prior to that. ------------------------------ From: Danny Burstein <dannyb@panix.com> Subject: Re: Verizon Wireless Ringback Tones Reach New England Date: Tue, 24 May 2005 06:13:24 UTC Organization: PANIX Public Access Internet and UNIX, NYC In <telecom24.229.3@telecom-digest.org> Monty Solomon <monty@roscom.com> writes: > Greet Wireless Callers With a Song Instead of a Ring; Numerous Artists > and Music Genres Available > WOBURN, Mass., May 23 /PRNewswire/ -- Verizon Wireless, the first > national carrier to launch Ringback Tones, today announced the arrival > of its Ringback Tones service in New England. [ snip ] T-Mobile has had this quite a bit longer. No doubt Verizon will use the "national carrier" line to claim the distinction ... That being said, an obvious question comes to mind (which, alas, I'm not in a position to check on) : Since the ringback is specially generated, does the call get "supervised" as soon as the caller first hears the ringing? Similarly, what happens if the recipient doesn't answer but just lets the ringing continue (most specifically _not_ counting a kickover to voice-mail). Anyone know? I don't have any friends who've signed up for this sillines so can't check things myself. Thanks. ( minor disclosure: shareholder in Omnipoint) _____________________________________________________ Knowledge may be power, but communications is the key dannyb@panix.com [to foil spammers, my address has been double rot-13 encoded] ------------------------------ From: kludge@panix.com (Scott Dorsey) Subject: Re: Very Early Modems Date: 24 May 2005 11:47:58 -0400 Organization: Former users of Netcom shell (1989-2000) Brad Houser <bradDOThouser@intel.com> wrote: > Here is a picture of a 1958 AT&T modem (not sure if this is the first > commercial modem, the Bell 103. If so it was 300 baud): > http://www.att.com/history/milestone_1958.html No, the Bell 103 is a little plastic box only a little bit larger than a Hayes external modem. This appears to be a photograph of an encrypted data system using a carrier key tape. --scott "C'est un Nagra. C'est suisse, et tres, tres precis." ------------------------------ From: Steve Sobol <sjsobol@JustThe.net> Subject: Re: Corporate Identify -- Verizon vs. "Bell Telephone" Date: Mon, 23 May 2005 23:56:03 -0700 Organization: Glorb Internet Services, http://www.glorb.com Al Gillis wrote: > On a slow day a few years ago I was looking at some US West (now > Qwest) tariffs at the Oregon PUC. Most of the documents had wording > that went something like "...Pacifc Northwest Bell, dba US West...", > with dba standing for "doing business as". I don't know this for > sure, but I'm guessing changing the name of a big company might be > really expensive but using another name for the business might be as > easy as filing a form with a state's corporation commission. This > same syndrome afflicts many railroads; One road buys another, paints > new logos all over everything but retains the old name on deeds to > properties, operating authorities and the like. In addition to being > expensive this tactic might shield the new owner from misdeeds of the > former company. Who knows? Not just a railroad and telecom issue, either. Look how many companies Clear Channel bought, and a ton of them still have the original licensee's name on the license, like Clear Channel Victor Valley, which owns most of our local radio outlets that are still licensed to Capstar ... Capstar sold out to Clear Channel long before I moved here. JustThe.net - Apple Valley, CA - http://JustThe.net/ - 888.480.4NET (4638) Steven J. Sobol, Geek In Charge / sjsobol@JustThe.net / PGP: 0xE3AE35ED "The wisdom of a fool won't set you free" --New Order, "Bizarre Love Triangle" ------------------------------ From: PrinceGunter <slippymississippi@yahoo.com> Subject: Re: Packet8 DTMF Tones Sound "Clipped" Date: 24 May 2005 06:41:47 -0700 > I seem to recall that the old Bell System spec for tone duration was > 20ms, or 1/5th of a second. Some switches allowed you to go as fast as > 10ms, which put the speed in speedial. :) > Don't know how P8 generates tones, but is it possible they are right > at the lower spec limit and your system isn't capable of decoding at > that rate? I had a T-Berd on the line, and it didn't recognize any DTMF either. But after another couple of tests, I think I can definitely state that there is no difference in tone between keypresses ... for some reason his device or Packet8 is translating those keypresses to a monotone "blip" on inbound calls. ------------------------------ Date: Tue, 24 May 2005 11:03:33 -0400 From: William Warren <william_warren_nonoise@comcast.net> Subject: Re: ACLU Pizza Monty Solomon wrote: > http://www.aclu.org/pizza/ > http://www.aclu.org/pizza/images/screen.swf Interesting, but they left out a few things: 1. The change in your life insurance; 2. The notice sent to your boss; 3. The reevaluation of your children's sat scores in light of the new profile information. William ------------------------------ From: johnl@iecc.com (John R. Levine) Subject: Re: Why Does it Take So Long? Date: 24 May 2005 11:12:59 -0400 Organization: I.E.C.C., Trumansburg NY USA > But I just ordered a major American magazine subscription, and a > major American weekly book review journal subscription through > amazon, and been told to be patient: it may take CLOSE TO THREE > MONTHS before either of these start arriving. For some reason, magazines print up their mailing labels way in advance, and it sounds like they'll add you to the next list they print. They probably also batch up their subscription updates, so it might be a couple of weeks until they add your name to the list. If the magazine is a monthly, you get up to one month of delay if you happen to subscribe the day after the current issue comes out, then another month for the label nonsense, and the third month for the leisurely process of printing and mailing. I'll be interested to hear if the weekly takes as long to start up, since their cycle is presumably a week rather than a month. Remember that Amazon say three months to everyone, for every magazine, so that's the worst case number. R's, John ------------------------------ From: kludge@panix.com (Scott Dorsey) Subject: Re: Very Early Modems Date: 24 May 2005 11:49:49 -0400 Organization: Former users of Netcom shell (1989-2000) Tony P. <kd1s@nospamplease.cox.reallynospam.net> wrote: >> http://www.att.com/history/milestone_1958.html > So the carrier was on tape. How interesting. > I guess at that point it was hard to stabilize a tube based > oscillator. It is much easier to stabilize a tube oscillator than it is to stabilize a mechanical device like a tape machine. The old HP 200CD bench oscillator from the fifties is nearly as stable as the modern bench gadgets once it warms up. The tape in this device is almost certainly being used to store a varying carrier, for encryption purposes. --scott "C'est un Nagra. C'est suisse, et tres, tres precis." ------------------------------ From: Kenneth P. Stox <ken@stox.org> Organization: Ministry of Silly Walks Subject: Re: Looking for a Model 15 or 19 Date: Tue, 24 May 2005 16:22:09 GMT moody1951@aol.com wrote: > Looking for a Model 15 or 19 in good cosmetic condition and operating > order. Teletype?? ------------------------------ From: Customer Service <customerservice@mortgagequotenetwork.net> Subject: Last Laugh! Your House at P.O. Box 4621 Date: Tue, 24 May 2005 12:16:48 -0400 [TELECOM Digest Editor's Note: Fished (or do you say 'phished') out of my ever-full, always overflowing spam bucket this morning, on my way to put out this issue of the Digest. As we can see by a cursory glance through the binary code below, it is a spam-thingy. PAT] MThlIE1vcnRnYWelIFF1b3RlIE5ldHdvcmsNCkEgUGVyc29uYWwgQXBwcm9hY2ggdG8gT25saW5l IEJvcnJvd2luZw0KDQpHZXQgYSBGcmVlIE1vcnRnYWdlIFF1b3RlIQ0KaHR0cDovL3d3dy5tb3J0 (and several _hundred_ more lines like the above). I bashed the rest of it, and altered the above just enough to cause it to lose its punch so none of _you_ would possibly 'inherit' it in your travels around the net today. That's how I say 'Thank you for visiting our web site today'; I spam you and perchance hand you a virus 'souvenier' to take home and show or give to your friends. Of course many netters would contend it is impossible to define 'offensive' or 'malicious' and still others would contend the 'internet does not exist; it is only a collection of sites, etc'. But my observation is this: Note the original subject line, 'Your House at P.O. Box 4621'. I would like you to know (a) 'Box 4621' in Skokie, Illinois is a very old snail- mail address I used when I lived in Skokie (metro Chicago area) about _ten years ago_; that is the age and quality of the mailing lists these spammers often times use. I'll bet whoever he bought the mailing list from told him 'a new, fresh list with x-gazillion email names and addresses' on it. From what I can gather, its another of those 'you have qualified to receive a mortgage loan' things. My second observation, (b) is the guy does not seem to be very bright. He could not or did not even think it through and use an _actual house address_ (such as 'Your House on Niles Center Road') or something similar to at least try to make it a message worth reading. I hope that at least occassionally, some of these spammers who sincerely bought their lists, etc thinking there was money to be made on the internet grow discouraged, and give up their efforts voluntarily and find other uses for their computers. Or is that too much to ask? PAT ------------------------------ TELECOM Digest is an electronic journal devoted mostly but not exclusively to telecommunications topics. It is circulated anywhere there is email, in addition to various telecom forums on a variety of networks such as Compuserve and America On Line, Yahoo Groups, and other forums. It is also gatewayed to Usenet where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Patrick Townson. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. Contact information: Patrick Townson/TELECOM Digest Post Office Box 50 Independence, KS 67301 Phone: 620-402-0134 Fax 1: 775-255-9970 Fax 2: 530-309-7234 Fax 3: 208-692-5145 Email: editor@telecom-digest.org Subscribe: telecom-subscribe@telecom-digest.org Unsubscribe:telecom-unsubscribe@telecom-digest.org This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives/ (or use our mirror site: ftp.epix.net/pub/telecom-archives) RSS Syndication of TELECOM Digest: http://telecom-digest.org/rss.html For syndication examples see http://www.feedroll.com/syndicate.php?id=308 and also http://feeds.feedburner.com/telecom ************************************************************************* * TELECOM Digest is partially funded by a grant from * * Judith Oppenheimer, President of ICB Inc. and purveyor of accurate * * 800 & Dot Com News, Intelligence, Analysis, and Consulting. * * http://ICBTollFree.com, http://1800TheExpert.com * * Views expressed herein should not be construed as representing * * views of Judith Oppenheimer or ICB Inc. * ************************************************************************* ICB Toll Free News. Contact information is not sold, rented or leased. One click a day feeds a person a meal. Go to http://www.thehungersite.com Copyright 2004 ICB, Inc. and TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA. ************************ DIRECTORY ASSISTANCE JUST 65 CENTS ONE OR TWO INQUIRIES CHARGED TO YOUR CREDIT CARD! REAL TIME, UP TO DATE! SPONSORED BY TELECOM DIGEST AND EASY411.COM SIGN UP AT http://www.easy411.com/telecomdigest ! ************************ Visit http://www.mstm.okstate.edu and take the next step in your career with a Master of Science in Telecommunications Management (MSTM) degree from Oklahoma State University (OSU). This 35 credit-hour interdisciplinary program is designed to give you the skills necessary to manage telecommunications networks, including data, video, and voice networks. The MSTM degree draws on the expertise of the OSU's College of Business Administration; the College of Arts and Sciences; and the College of Engineering, Architecture and Technology. The program has state-of-the-art lab facilities on the Stillwater and Tulsa campus offering hands-on learning to enhance the program curriculum. Classes are available in Stillwater, Tulsa, or through distance learning. Please contact Jay Boyington for additional information at 405-744-9000, mstm-osu@okstate.edu, or visit the MSTM web site at http://www.mstm.okstate.edu ************************ In addition, gifts from Mike Sandman, Chicago's Telecom Expert have enabled me to replace some obsolete computer equipment and enter the 21st century sort of on schedule. His mail order telephone parts/supplies service based in the Chicago area has been widely recognized by Digest readers as a reliable and very inexpensive source of telecom-related equipment. Please request a free catalog today at http://www.sandman.com --------------------------------------------------------------- Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization. End of TELECOM Digest V24 #230 ****************************** | |