|
|
|
|
| John S. (Jack) Edwards’ experience in the telecommunications field includes design, analysis, and business planning. He successfully created several design groups and founded four companies, one of which is now a billion dollar subsidiary of a large corporation. He held senior level management positions at small and large companies. He began his career at Bell Labs, where he was engaged in the design of the central processing unit (CPU) for the #2ESS switching system. He was with Nortel for several years, and retired in 1993. He is currently active in private consultancy as the President of Digicom, Incorporated. At Digicom, he has worked in the telecommunications security field. He studied the security of the SS7 networks as they relate to the area of number portability and its relationship to the competition envisioned by the Telecommunications Regulation Act of 1996. The application of encryption and its export has been a topic of consideration as well. He has participated in three government advisory committees: - The Industry Executive Subcommittee (IES) of the National Security Technical Advisory Committee (NSTAC), under the direction of Nortel’s NSTAC principal. (NSTAC is a Presidential Federal Advisory Committee of senior executives rendering telecommunications security related advice to the President.) He has chaired several task forces for the IES.
- The Department of Commerce Information Systems Technical Advisory Committee, which advises on export control issues.
- The Technical Advisory Committee to Develop a Federal Information Processing Standard for Key Management Infrastructure (TACDFIPSKMI).
He has also studied the vulnerabilities of telecommunications networks and their behavior under stress; developed a taxonomy of vulnerabilities in telecommunications systems; and modeled vulnerabilities of a classic digital central office and characterized their consequences upon failure, including a deeper analysis of a typical line card. He serves as the Vice Chair of the Information Systems Technical Working Group in support of the Military Critical Technology List (MCTL). In addition, he has participated in a telecommunications vulnerability report, and a study of the effects of chemical attacks upon a large US city. Edwards has also designed an architecture and call processing plan for a wireless local loop system intended for the export market, and created a business plan and founded a telecommunications company to develop new wireless voice and data telecommunications equipment for sale to third-world countries. Edwards is a Senior Member of the IEEE and a longtime member of the ACM.He has been a reviewer for Computing Reviews since 1967. |
|
|
|
Date Reviewed |
|
|
1 - 10 of 74
reviews
|
|
|
|
|
|
|
|
Three bits suffice: explicit support for passive measurement of Internet latency in QUIC and TCP De Vaere P., Bühler T., Kühlewind M., Trammell B. IMC 2018 (Proceedings of the Internet Measurement Conference 2018, Boston, MA, 22-28, 2018. Type: Proceedings
The Internet measurement of round-trip time (RTT) is important as an indication of performance and latency. While the Ping utility can and does measure RTT, widespread use increases overhead. This paper describes a low overhead method ...
|
Jun 17 2019 |
|
|
|
|
|
|
Heads-up limit hold’em poker is solved Bowling M., Burch N., Johanson M., Tammelin O. Communications of the ACM 60(11): 81-88, 2017. Type: Article
First of all, the title is at least misleading. Heads-up limit hold’em (HULHE) poker, a two-person Texas hold’em game with limitations, is a small subset of the Texas hold’em universe. When the article was...
|
Jul 2 2018 |
|
|
|
|
|
|
Embedded system design: embedded systems, foundations of cyber-physical systems, and the Internet of Things (3rd ed.) Marwedel P., Springer International Publishing, New York, NY, 2017. 423 pp. Type: Book (978-3-319560-43-4)
This is a difficult book to approach. It is either an encyclopedia, a tour de force, or an ultra-graduate-level textbook. On page 17, the author lists 12 detailed prerequisites and 22 recommended additional follow-up courses. I cannot ...
|
Mar 8 2018 |
|
|
|
|
|
|
Enabling the Internet of Things: from integrated circuits to integrated systems Alioto M., Springer International Publishing, New York, NY, 2017. 520 pp. Type: Book (978-3-319514-80-2)
In 18 chapters, this book presents an interesting view of the future: a world filled with an uncountable number of “things” defined as often minute and semiautonomous objects, each connected to the Internet of Thing...
|
Aug 9 2017 |
|
|
|
|
|
|
A SISO register circuit tailored for input data with low transition probability Napoli E., Castellano G., De Caro D., Esposito D., Petra N., Strollo A. IEEE Transactions on Computers 66(1): 45-51, 2017. Type: Article
There are occasions when a delay of several clock cycles is required for a serial data stream. If the “density” of transitions is low, meaning the probability of transitions with respect to the clock is small, and t...
|
May 31 2017 |
|
|
|
|
|
|
Proactive demand participation of smart buildings in smart grid Wei T., Zhu Q., Yu N. IEEE Transactions on Computers 65(5): 1392-1406, 2016. Type: Article
This paper describes a technique for increasing energy efficiencies in the demand profile of smart buildings and a smart grid, thus reducing the overall cost and resulting in savings resources. The authors claim a ten percent reduction...
|
Apr 4 2017 |
|
|
|
|
|
|
Content distribution for mobile Internet: a cloud-based approach Li Z., Dai Y., Chen G., Liu Y., Springer International Publishing, New York, NY, 2016. 224 pp. Type: Book
The distribution of content in a mobile Internet, with emphasis on the emergence of cloud-based technology, is the basis of a collection of articles by the main author, Zhenhua Li, written during his PhD and post-doctoral work. (The ot...
|
Mar 30 2017 |
|
|
|
|
|
|
A survey on wireless indoor localization from the device perspective Xiao J., Zhou Z., Yi Y., Ni L. ACM Computing Surveys 49(2): 1-31, 2016. Type: Article
This long survey considers the problems related to wirelessly localizing objects in an indoor setting. For the purpose of dividing the problem, the authors consider two categories: device based and device free. Device-based localizatio...
|
Oct 28 2016 |
|
|
|
|
|
|
Management of cyber physical objects in the future Internet of Things: methods, architectures and applications Guerrieri A., Loscri V., Rovella A., Fortino G., Springer International Publishing, New York, NY, 2016. 174 pp. Type: Book (978-3-319268-67-5)
Today, and increasingly in the future, physical objects from the mundane to the esoteric will be tied to the Internet. From thermostats, fire alarms, and TVs to automobiles and mass transit, society will be dependent upon this intercon...
|
Jul 13 2016 |
|
|
|
|
|
|
User-centric adaptation analysis of multi-tenant services García-Galán J., Pasquale L., Trinidad P., Ruiz-Cortés A. ACM Transactions on Autonomous and Adaptive Systems 10(4): 1-26, 2016. Type: Article
A method to arrive at configuration consensus in a multitenant shared-service cloud environment is presented in this paper. Section 1 discusses the multitenant cloud. The authors are interested in such systems where each member of the ...
|
Apr 21 2016 |
|
|
|
|
|
|
|
|
|
|
|