Development of An Online PTT Voice Transmission System Between Cell Phones, Computers and Embedded Systems Over the Internet

Author(s):  
Alexander Diaz Maldonado
2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


2012 ◽  
Vol 55 (1) ◽  
pp. 161-190 ◽  
Author(s):  
Dillon Mahoney

Abstract:This article explores recent changes in Kenya's curio or handicrafts industry. In addition to a crisis in access to raw materials and a diversifying tourist market, the rise in the use of cell phones and the Internet during the early 2000s present unique challenges. Nonetheless, innovative Kenyan entrepreneurs are using these challenges to market and brand products in new ways—by representing modern global interconnectedness as “fair trade” or creatively promoting the authenticity of their products in other ways. Kenya's artisans and traders have also adapted to diverse and complex tastes beyond the desire for an invented tradition of ethnic and “tribal” art.


Author(s):  
Harol Heder García Quiceno ◽  
Vícter Alejandro García Zapata

Resumen El crecimiento de firmware en Linux, ha llegado a desarrollar varias herramientas que permitan adaptar equipos inalámbricos a las necesidades de sus compradores. Así mismo la facilidad de acceder a la documentación y soporte que se prestan en Internet con referente a estos sistemas es suficiente, para las personas que tengan poco conocimiento y deseen implementar estas herramientas. Por lo anterior se inicia con la actividad de consultar en la región, sobre implementaciones de sistemas embebidos en Linux para router inalámbricos, pero los resultados fueron negativos, Eso da paso a que surja una investigación en Internet de sistemas embebidos para Linux y por ende innovar con la instalación del DD-WRT y algunos servicios de red en un dispositivo Linksys WRT54GL. Con los pasos anteriores, de este artículo, se espera que sea el inicio para que otras personas hagan uso de estas herramientas, que no solo están en el área de las comunicaciones, sino incursionando en los hogares, y que buscan beneficios de tipo: económico, colaborativo, y una adecuada utilización recursos. Palabras ClaveLinksys, router, Linux, Firmware, Wireless, Wifi   AbstractThe growth of firmware in Linux, has come to develop several tools that enable wireless devices to adapt to the needs of their buyers. Also the ease of access to documentation and support that are provided on the internet with regards to these systems is sufficient for people who have some knowledge and want to deploy these tools.‪It starts with the previous consultation activity in the region, embedded systems implementations on Linux wireless router, but the results were negative, That leads to the emergence of a research on the Internet for Linux embedded systems and innovate with the installation of DD-WRT and some network services on a device Linksys WRT54GL.With the previous steps in this article, expected for that is the beginning for others to use these tools, which are not only in the area of communications, but making inroads into our homes, and who seek such benefits: economic, collaborative, and appropriate resource utilization It’s a text with a longitude between 60 and 300 words, that it guides the reader to identify the basic content and its relevance, because it presents in a clear and brief way the reach of the article, the main discoveries and the conclusions. Keywords Linksys, router, Linux, Firmware, Wireless, Wifi


Author(s):  
Ya-Wen Lei

This introductory chapter reveals that a nationwide contentious public sphere has emerged in China. It is an unruly sphere capable of generating issues and agendas not set by the Chinese state, as opposed to a sphere mostly orchestrated and constrained by said state. Over time, China's contentious public sphere has been increasingly recognized by the Chinese state as a force to be reckoned and negotiated with. Starting around 2010, official media of the Chinese Communist Party (CCP), such as the People's Daily, began to warn of a threatening public sphere mediated by cell phones, the Internet, and even some unruly voices within state-controlled media. The state's awareness of these developments, however, means that one must not overstate the stability or permanence of the newly emerged contentious public sphere. Indeed, this provocative public arena has encountered serious opposition and setbacks, particularly since 2013. Seeing the rise of such a sphere as a threat to national security and an indication of ideological struggle between the West and China, the Chinese state has taken comprehensive and combative measures to contain it.


2012 ◽  
pp. 911-917 ◽  
Author(s):  
Adam M. Bossler ◽  
Thomas J. Holt

The development of computers, cell phones, and the Internet allows individuals to connect with one another with ease in a variety of ways in near real time. The beneficial impact of these resources, however, has been adulterated by some to engage in abusive communications while online. Specifically, individuals now use email, text messaging, and social networking sites to spread hurtful or malicious information about others. This entry summarizes the problem of online abuse via cyberbullying, online harassment, and stalking by discussing the prevalence of these phenomena as well as the prospective predictors of victimization.


Author(s):  
Jerry Pournelle

There are two basic categories of Internet lies: frauds, where the object is to get your money, and hoaxes, where the primary object is just to pull your chain, but there can be far-reaching consequences as well. Hoaxes give the perpetrators ego gratification as they watch their creation spread throughout the Internet. Frauds may give the perpetrators your life savings, and give you months—maybe years—of hassle as you try to repair your credit record and retrieve your very identity. Hoaxes—Hoaxes are spread by e-mail and come in an endless variety of guises. There are, for example, fake virus warnings, chain letters promising riches if you follow their instructions (or threatening dire consequences if you don’t); urban myths about women in peril, dogs in microwaves, and hypodermic needles on theater seats; letters that tug at your heart strings or appeal to your greedy side; Internet petitions (often based on false information); and letters claiming that Bill Gates wants to give you money. Yeah, right. Even the most “innocent” hoaxes are harmful. At the very least, they take up your time, and they try to get you to forward them to other people as well. If you forward a letter to just 40 people, and each of them does the same, and so on, then after just four steps, more than two and a half million copies will have been sent out. That’s a lot of wasted time and wasted bandwidth. These letters can also contain dangerous misinformation and bad advice. One example is a common letter advising women not to stop when pulled over by the highway patrol, but instead to dial #77 on their cell phones to talk to the police—a wrong number in 48 of the 50 states! Perhaps the most common example is the virus hoax—typically a letter forwarded by someone you know warning you that if you find a certain file on your computer it means you are infected with a virus.


Sign in / Sign up

Export Citation Format

Share Document