{"id":39,"date":"2019-09-19T14:48:46","date_gmt":"2019-09-19T11:48:46","guid":{"rendered":"http:\/\/trueconf.com/blog\/?p=39"},"modified":"2026-02-13T08:46:52","modified_gmt":"2026-02-13T05:46:52","slug":"the-birth-of-cloud-technologies-a-long-way-from-the-text-to-multimedia","status":"publish","type":"post","link":"https:\/\/trueconf.com/blog\/reviews-comparisons\/the-birth-of-cloud-technologies-a-long-way-from-the-text-to-multimedia","title":{"rendered":"The Birth of Cloud Technologies: A Long Way from the Text to Multimedia"},"content":{"rendered":"<p class=\"primary-medium-text ui-mb-sm-1\"><b>How to organize a video conference?<\/b> As for the modern man, changes in all aspects of life have become the norm, especially in the field of IT. Nowadays the Internet is being modified for the fourth time in last 40-50 years. A new, interactive face of computer communication is being born. And an important role here is played by multimedia technologies, and in many ways by the cloud ones. You don\u2019t believe it? Judge for yourself!<\/p>\n<p><!--more--><\/p>\n<p class=\"primary-medium-text ui-mb-sm-1\">Since its birth, the Internet has passed a long way from a purely textual mode of communication to the realm of multimedia technologies. Old protocols that came down to us from the early 1970s \u2014 mail and ftp \u2014 did not have any built-in interface for the transmission of binary files (including images). The emergence of WWW, Hypertext Markup Language (HTML) and tools, able to handle the relevant constructions \u2014 web-pages. HTTP servers and browsers allowed to embed images in HTML, and later \u2014 the sound and video. The emergence of Skype and webinars have given the worldwide web an opportunity to move to the familiar to us third stage of development, multimedia and interactive: with 3G and Wi-Fi access, built-in webcams, video chat in Google, \u201cshare to web\u201d in the camera or phone and a YouTube channel on TV\/IPTV.<\/p>\n<p class=\"primary-medium-text ui-mb-sm-1\">Shifting the gravity center of executable programs to the server allowed to relieve the client\u2019s hardware. That\u2019s how the \u201cone-to-any\u201d principle of communication was replaced by \u201call-to-any\u201d principle. Which is very significant for multimedia technologies in general, and for the cloud \u2014 in particular.<\/p>\n<p class=\"primary-medium-text ui-mb-sm-1\">It is still early to talk about \u201ccloud era\u201d, first the appropriate standards and principles of data exchange must be established. Text commands should be replaced by if not voice ones, then at least some common commands of management and response for all the multi-media streams.<\/p>\n<h2 class=\"h4--main h4--thick black-text ui-mb-xs-3 ui-mt-md-1\">Technical Components or \u201cIngredients for Success\u201d<\/h2>\n<p class=\"primary-medium-text ui-mb-sm-1\">Let\u2019s try to peep on \u201cthe day after tomorrow\u201d of cloud-based videoconferencing and imagine what should the technologies of nearest future be. On the one hand, they have to keep the focus on the client-server communication: a lot of good stuff was born by client-server technologies, at least in context of secure corporate solutions. The client application must be able to transfer a full-fledged multimedia content and at the same time to receive another one, synchronized with the time of a transfer. This means that the client\u2019s hardware, along with communication channels have to become more powerful. All the necessary components for that already exist today, you only need to integrate them together and achieve a \u201ctransformation of quantity into quality.\u201d<\/p>\n<p class=\"primary-medium-text ui-mb-sm-1\">On the \u201cserver side\u201d, we\u2019ll need not only the \u201ccloud\u201d, but \u201ccloud, smeared between the servers\u201d, perhaps similar to modern torrent-networks, as opposed to large enterprise solutions such as Google: in the case of using torrent-like networks, the request processing is performed by any available resource that can handle it, thus the performance of each element of the exchange increases severely, but the work load of each of the torrent network participants will not increase much.<\/p>\n<p class=\"primary-medium-text ui-mb-sm-1\">At the same time, technologies for the corporate and mass user should be different. Many large corporations have a strong tradition of \u201cno intruders allowed inside the local network, all the resources available for the public are submitted to demilitary zone\u00bb.<\/p>\n<p class=\"primary-medium-text ui-mb-sm-1\">Obviously, \u201clogins and passwords\u201d thing will vanish in the past: If now any user is identified by the computer through the \u201ctext label\u00bb \u2014 login when you log into a computer, e-mail for access to mail, etc., and the password simply confirms that on the other side of the screen is exactly the user who he claims to be, there is an identifier that is way more natural for videoconferencing system \u2014 not the username, but the face, which is much more unique than a username or a nickname, as well as the voice that helps us to identify the person in real life.<\/p>\n<p class=\"primary-medium-text ui-mb-sm-1\">On the other hand, with a qualitative change of communication channels (the transition to media content orientation, rather than text one), it is obvious that the amount of transferred and processed data will be multiplied. Chances are, that the changes will affect even such familiar things as digital communication protocols. And we cannot even try to guess what they will be and the usual TCP\/IP be able to stand its ground.<\/p>\n<h2 class=\"h4--main h4--thick black-text ui-mb-xs-3 ui-mt-md-1\">Informational Security of a Newborn Videoconferencing System<\/h2>\n<p class=\"primary-medium-text ui-mb-sm-1\">The problem of security associated with the method of access to the resource runs into the problem of financing: the better the communication channel, the more checks and protections he will \u201cget on\u201d with, but the problem of practicability often leads to the use of text encryptions and protocols, which, frankly speaking, have holes inside. This is a purely technological threat that exists and will be, it does not depend on the service or the place of its location. If the protocol is \u201cfull of holes and vulnerable,\u201d then it is vulnerable in the cloud, and in the corporate network, and during the personal use too.<\/p>\n<p class=\"primary-medium-text ui-mb-sm-1\">An important role is played by the question of user comfort. The complexity of full-scale integration of videoconferencing systems forces integrators and specialists to carry videoconferencing systems out of a secure perimeter even in the protected corporate networks. Many of us are familiar with Mr. Moore\u2019s (head of security at Rapid7) famous experiment, in which he decided to \u201ctest the mettle\u201d out of the security of a number of companies, and with the help of a cable network could look into offices, conference rooms and meeting rooms of over a dozen of companies. The emergence of \u201choles\u201d in the security system was caused by people\u2019s negligence, who have left the auto answer and automatic video broadcasting features enabled despite the fact that they knew that videoconferencing system was outside the secure perimeter.<\/p>\n<p class=\"primary-medium-text ui-mb-sm-1\">A similar situation occurs with users of cloud videoconferencing systems. When the client application starts to \u201cslow down\u201d, a user often closes unnecessary applications: disables the anti-virus and data encryption.<\/p>\n<p class=\"primary-medium-text ui-mb-sm-1\">In contrast to the corporate networks in which there are \u201ctrusted connections from the local network\u201d, there is no local network in \u201cclouds\u201d, that is why all connections in the system are untrusted. The moment you connect to a cloud server, there may also be a trespasser hacking the administrator access, and after \u2014 and all the users on the server.<\/p>\n<p class=\"primary-medium-text ui-mb-sm-1\"><a href=\"https:\/\/trueconf.com\/products\/online\/video-conferencing-service.html\" target=\"_blank\" rel=\"noopener\">Cloud service<\/a> is always collective, and the vulnerability of a single user could spread on the rest. For example, if in a video conference via the cloud 5 people are involved, 2 of them are using super-protected channel, 2 use normal one, and one \u2014 very weak and completely without protection (say, he uses phone 3G), then \u201cvery weak and very without protection\u201d attribute is suitable for all five participants. That is, any user of the cloud can be recommended to choose their friends carefully, even the pen-friends. In some ways, <a href=\"https:\/\/www.future-processing.com\/blog\/a-brief-guide-to-cloud-computing\/\" target=\"_blank\" rel=\"noopener\">cloud computing<\/a> is like \u201ca revolving door\u201d, and in order to avoid unpleasant consequences, until authorization is not made with face and speech recognition, but a login-password-encryption key, feel free to change them more often.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to organize a video conference? As for the modern man, changes in all aspects of life have become the norm, especially in the field of IT. Nowadays the Internet is being modified for the fourth time in last 40-50 years. A new, interactive face of computer communication is being born. And an important role [&hellip;]<\/p>\n","protected":false},"author":22,"featured_media":37609,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[32],"tags":[390,387],"class_list":["post-39","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-reviews-comparisons","tag-technology","tag-video-conferencing","wpautop"],"_links":{"self":[{"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/posts\/39","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/comments?post=39"}],"version-history":[{"count":29,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/posts\/39\/revisions"}],"predecessor-version":[{"id":42939,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/posts\/39\/revisions\/42939"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/media\/37609"}],"wp:attachment":[{"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/media?parent=39"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/categories?post=39"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/tags?post=39"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}