Merken

XMPP 2015 - challenges of modern day instant messaging

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
OK hi I'm Daniel on and I'm not talk to you about it it's simply be a topic of which I spent the last 2 a half years digging to all let's go to the beginning in the year 2005 for about 10 years ago so I I started to use of a transition to ICQ called example p and then I all I got my 1st like real
or mobile phone all running Symbian and 60 and I discovered that all I could even using extremely pure my mobile phone and so on this was a time window text messages was still like my consensus on noises and so on well this could save me a lot of money
and by the way that's on 2 years before what that came around and they can of years later
I got my 1st Android phone at a time when little had already did suffer design code for the UI whatever and is the only
available in some the lines for that well they held like this would to be honest but very nice and they also on annoying prominent quantification by default and so I wondered of a little bit of season fueled and of that using Google Hangouts which also did this nice on some so with the brothel things that you can switch stimulus between on your the mobile phone and desktop and and so thought to wonder what it would take to well nice looking on chat clients for Android on which doesn't use you know from a notification and so only to
so and 5 where this is you I'm walk up more or less on which has very strong resemblance to hang out at the time of I I I can't basic that have never did not development for and what so it's just from the perspective a basically copied hangouts like it's but it's like taking swing shorts and measuring distances to get there is a ride and and using the color pink and so on but benchmark was on if I can't tell us what parts of the 2 the apart and the reason that overview but when I could confuse which 1 to the left the negative right and will yeah by basically goes to the point where models this you I and then I wondered well all hearken to be to teachers have to accuse and method so end of this was slides off on this when I started to dig into his extended Extensible Messaging and Presence Protocol which is what what accepted means and what discovered is that it's wrong well basically streams trust them 1 incoming and 1 outgoing and so on it basically on 2 types of an
XML elements of each was was up a lot of 1 group of them is called the sunsets which is basically like message present of that you elements but which which deliver the actual content q stands for a info and Korean and it's basically on the wikis response protocol is a mix of pp all right you messages we require it was once but and so on by IQ elements also have to have an attribute but it is so I can identify the on this once when I was your and there's another group of element
of which recently got related to nonsense because they're not stands as before that they didn't have an and all of which basically to stream control like like authentication or all enable compression if you want us and we will get to that later in the talk of yeah bands it's a previous extendable the CTC's extensions are also defined in so-called except which means that was the simple extension protocol but well yeah but a simple piece of federated protocol the which means not only class of about also so it was over communication all sensor remember what like presences messages and accused of routable they usually have to and from as so and entities was in of the network are identified by only general ideas which is a constant like it study username that domain that's something or just domain and clients can also have a lot of multiple resources it is useful if you want to connect with multiple plans of the same time and then you know it is a resource string attached as well as the flesh bond yeah those resources or meanings those difference clients can set different priorities of usually integer values between my nose 128 and 1 3 8 and on so if I send a Stanford to the to just see digits so just just idea meaning user name several very all get routed to the resource was the highest priority that the except of course when resources has the same priority than so the well just picks 1 of them and there some exceptions for negative resources which all of this is a little bit confusing and you but you really don't want to teach a lot about and like how priorities work and why the message is centered on that as a mobile phone but in the wrath of the DB amices but as a general idea behind originally was which worked real cute 10 years ago is that is sent the 1st message from a to z the edge of idea and then there several would pick the resources it started to which you hope is the right 1 from the new response from the full job and subsequent messages so can then be sent to the full knowledge of idea and so well if the close your chat window was summarizes what's the origin of the idea that especially in general what you don't have a chat window close because they are no longer living applications of like that of let him thank God it's an extensible protocol and we had to have extensions but there's 1 extension which basically source the the the rotting issue by simply copying all messages on that coming to all the resources but and this also what works for outgoing messages of course the and know 67 currently little vaguely defined for all messages that are not like with text messages like this they don't do work they should quantum but let me more like MIT and from there it meta-information like if someone's typing or like the all take marks if you have received a message or like greater messages from this is but but the case of s SC i well sensitization committee behind its entropy is currently in the process of cleaning that up a little bit more and will be defining user behavior but but even at that is point it's basically gets the job done I mean you do get all your messages that on all your resources which is really what you want but of course this is only for the resources that are currently connected well if you if you 20 phone off for a short while maybe a few items of analyzes and you want to receive the messages so thank God there's something called message archive management but for those which basically stores all the messages that the server and pop pop new client can thanks to the entire history because songs over and more importantly the lines that had been off line for a short while can also receive the messages that have been sent in the meantime because of otherwise if my phone was down for for an hour and I would always messages all make my Odesta which is looking at home and I don't wanna wait through it all messages like at home so so that was that was what some message archive management for I currently it's a bit tricky to use because it relies on of from the time the only other way I can avoid trees the entire archive is to tell of the flow of our well this is the last time I have seen a message from you so please give me all messages from that point on end especially was short time of this of course requires C of phone and the servitude to have synchronous time which in which my finally a bit too complicated thing in theory but in practice of both modern smartphones as well as so it's just synchronize their clocks I know don't not ideal solution but it's working at moment of more ideal solutions it would be on makes use of ideas the messages identified within the archive of predictable known to the user and the system will into races like for incoming messages so a message management component on the so could just inject the archive ID bound and later point I I could also see last message archive idea I received his give all messages from that was still fails so because I want to I receive on my outgoing messages so the a process that is currently being discussed to solve this issue is to make the outgoing idea predictable it is in some my combining the so stream IDD along some yeah and this will this will also solve a lot of the modification issues I mean if I the archive now and I don't have the same time you might get of messages of are
again Methodist twice and there's a little bit of pain to Due to the double but yeah having a global ideas set by by the so for each message will indefinitely solve these problems as well but yeah what I currently
discusses solutions I
will propose uncle here but from desktop and mobile clients as well but I would like to revolution what problems so mainly will also connections sensible out a lot mean for example a tunnel areas in where you don't have several such at all end of well like like sending and receiving we are your 3 G antenna was consumes a lot of battery on so the count of features to solve the 1st of all of the and reliable connections which we need to have a this article at 3 management which I basically it's also another group of nonsense which controls the speed of screen and sport and we crests and acknowledge mechanisms the it is a stream of but and basically what it does is that owns server and the client just count the stands as a sensor numbers this and and then I can acknowledge to the server of well I received your trees so to performances and it works the other way around as well so the and well I I can also use to resume sections 107 connection dropped out entirely in theaters underlying TCP connexion got replaced I can use Stream management to just resume session reflected before I acted as the life well on my my my TCP connexion dropped out but I received 40 sponsors from you so can we just a session from that point which I on he makes this an interesting dimensions both more reliable and also says Miller traffic because the all means that encode I I have novel connection light discovering my contact list and stuff like that don't have to do again because they've already done the stream on a later point but z is all but but but the but the problematic thing for from the service point of perspective is that is the role of course has to all of the states the client
has lied on his session at all if they're at the Don and so those samples which were sent to you in the meantime the 1st of so there has to be a time out of course because of as silicon cannot be so the state for ever and just hope the use of a comeback some point this so that is
used streams will will time out and some point usually it's about 5 minutes so and z problem is more what what happens with stances that were sent to me but acknowledged money because our able to resume
a connection and the only thing that we can do is to return to messages to the original sender and tell well I'm sorry but I couldn't delivers messages and this is a bit annoying so when we use Stream management in conjunction with much message archive management because messages do get returned to the original sender as understand will then display is also delivery failed but but those messages the source of the message I have many friends reconnecting a client with those so messages on this just the basically useless error message was also shown to original sender but this is currently no perfect solution for this sort of a rough solution is to the did all of those
messages on there are the unacknowledged to so often storage but and then at a later point even clients that do not speak a message archive management would be able to
this is a message from later solutions might include 2 we make message archive management is that as a hot requirements so of sending entities can realize that are on so the recipient will definitely receives a message at some point in the future I but there is still the problem of all the
high-powered the consumption of you can imagine that every package of or the sensors the user receiver wake so users of battery men have a large roster which with a lot of people like going offline going online all if I joint in a In a group checked and can't conference on we have people tend to go online and offline in it in a really short intervals like like every minute of service but as this will wake up my my whole life like government is really bad and but but but I don't have any benefits from sources mobile will user because when not the for the replica don't care who was currently joined in a conference on which of my context this on on on right now I would only like to receive information and only needs this information when I have to see it in the foreground and actually using so this the extension cord client state indication of which basically allows the mobile user to communicate as a of I'm currently in the foreground how background based on that information the service able to withhold
unimportant formations like the lysosome of present all online information of which is also 1 of annoying thing on this type information that I really really temporary and so on I don't get any benefits from like it and when that would know that someone's typing as well as and pocket and I don't see you the lowest typing information stream but and here we we implemented as a set of and it really shows you which are performance improvements concerns about life it was a about this and thousand people are also so which came to me and complaint or or during a lot of battery and after of me telling them you know just enables us all extension up on a server where they can back and reported each I get that we are in the year 2001 14 and
15 and we we really want to be able to not only send text messages but you also thanked like images so even in the presence of outgoing messages from the polyp part and this was looking at ways you could send fights with with extended piece of what like like 5 from 1 and from 1 user to the other there are currently only 2 5 transfer mechanisms in place 1 of them is based on gene all of which is the the entire session nasalization protocol stack of people similar to that for example but which is usually also used to initialize likewise because all you call and on top of that stick out this is also 1 of my friends and annotation the but well if you if you can imagine if a certain type of
behind it's very complicated to to implement all not not really complicated but it is it takes a lot of work to get right and this is not where the desired if you if you just want sent 5 I mean you don't need the entire an employee now and please let URL it's this codec for all of you cause analysis the but this is also and all the mechanism the call the file transfer and horror sci fi transfer in the centerpiece of which doesn't have few drawbacks and the promote altered it right now is the the sensitization Fondation behind its entropy is currently discussing to officially deprecate that 1 so well yeah digital implementation fall from I but only cheering for 4 5 explicit see I didn't implement entirely a stick but but but we tuned it to to 5 4 and so on but yeah all policies approaches a peer-to-peer file transfer and stuff they don't work all of you desire to to use but which the resources of my because you always have to select the which some resources to express sense that was was imaged Welzel is this file to and on the course is really complicated and on the only way to or really is that Justice and files and and and there is the approach for this which is
also used by a lot of on own information using for example what that does this 1 a 2 just upload a little somewhere to the server preferrably like HTTP for example because that's the previews approach for the use and it's implemented and a lot of places and then you can just traveling to the file and this automatically works with and
with with connect resources it's also sense you just another copy of from the outgoing file and they also works as conferences I mean if you don't have to intensify pursuant to the area participant in the conference but 10 it's it's much easier to to just filling well i i i implemented as a drop and also brought my own extensions for as a solution and this is a list of currently under review by wise he systems
that information 1 and here all these combined gives us a pretty good 1 is messenger solution we just the completion of the same level as what the for example or or hang out at the Jet been using recently but but yeah we are know notes and we are also
interested in it what you call end-to-end encryption and if you try to implement this there are 2 approaches to look at all 1st 1 of the solution because OpenPGP which is the same 1 we on do using enough for example some people do using the the advantage is that it has the sort of so lemmatization which which describes along the of this is how we use it in the past so at least if you can In achieve some sort of compatibility with the other clients but but it's OpenPGP is it has several several drawbacks it's for once it's there both because it's public key encryption and it has no verification good and I know
that OpenPGP itself can of course sign messages but I current weights using the severe fueled doesn't at all it doesn't do profit for what secrecy and that's very prone to we play attacks it is you don't have assigned you can just copy a message and are both again to the to the user if you are malicious so for example but which especially in the it is messaging context as of properties big problem because you tend to send very short messages and if you imagine you can is the entire history from someone and 2 and 3 will all the messages in a different order you can the create basically whatever context you like if you're a little bit like on the only advantage of this and the so probes I implemented this are in in the 1st place is that it does work is much the resources as well on the sending side and on the receiving side which is something the
also records encryption our does not do I mean beauteous protocol ignore steak and well it's promotes definition of and trends and end-to-end encryption implies a sort of well 1 user what 1 device to another device that but yeah it's it it is state of the art encryption so encryption was it's much better than OpenPGP unfortunately it's a really relief this annoying on on a animal mobile context because it is has singular sessions meaning of the I have to establish a new session every time want to study utilization meaning time between its of life and its implementation of the humor
here and and consent the messages and if the source is establishing connections some will get lost in the process because 1 device wasn't online as was 1 on 1 of analyzes of gets in the way of also of course it's requires close parties to the on the same time which I is also not really good because I want to send In this situation I would not right now I don't wanna wait on you but i implemented this as well and did some kind of work around for this but well I would not have 0 1 client almost all the most on behalf of the user and then wait for the other client to come line and balls and sends a message and use as the benefit of type is the message forgetting about it and then hopefully in some points the future and boasts device on size messages it sent and like I said we are in a world where we used multiple device at the same time and this is what entire purposes that this project and that is a dig into and b and so what we really want but basically as much as was yet encryption which means the the message I sent from 1 device ultimately shows up on my part that he was 1 decibel metabolites and shows up on all 40 west of my contact whatever where was used for you guys so yeah well thanks to as a Google Summer of Code to read all just implemented this
on and we we recorded it and you will see but more generous and opted encryption and this allows to basically 2 of 7 group image to offline context who used to revise the and you also simultaneously gets a copy of that message on all resources
and we Texas and will be easy the and user experience there you would just select more as an encryption methods of the trust the devices you wanna census messages to and it just works now with a which entomology and encryption you have the new problem which which hasn't been in which you haven't been there before so that he could theoretically receive messages on from a new device which both could be completely religion case because your your content just just got a new phone or reinstall of on its phone or also could be of malicious attacker which just once to insert messages into a message stream and
so what tell you does is Marxist messages and then of guide you to use trust this device don't trust the civilized world that he makes his decision at a later time many Mrs. content in in person and compare the inference and
Pfizer take background is considered concerned we use axolotls the same protocol that is used in all TextSecure which is kind of own more on modern variant of what are which is a little bit better crypto inches elliptic curves but but more importantly against rate of C sessions innovation it instead of it keeps long-running session sessions that can be kept like I only need to establish someone's amenities of busy for error and it also takes care of like lost messages all of your messages so this was we use in the background and we basically create absolutely group sessions between every device combination then I the sense or energy you although session and then encrypts the message was so keep so we have to send the message only the actual message on once and injustice accuse with devices but on the other which tommotiids approach to see approaches but you cannot the Journal trusting users but trust biases because was so this is what you have you have to trust each individual devices the but but makes you I really simple and most up on the current around which entomology and encryption of like a secure for some rewards that uses trust on 1st use approach but this is of course doesn't work because really get
new devices like like every time and so on simply trusting that each time with entirely defeat the purpose of because images that take could just created a new device and injected there but so instead what the
you weeks on your i we chose for this is to display a message to the user saying all your contact got a new device you must have got a new device all 1 in the background it uses a centerpiece technologies so there's no 0 0 so changes summer required for example is it stores the it's accused of of pre keys on on the centerpiece so using that and I don't wanna get into this but is the same mechanism that all pose evidence for example of basically those storage and so have but
OK but there are still if you problems the left that I haven't been able to To address was was my own client this is the beauty of course does said a way to communicate with which use same time called would which is a conference and it's it's a very good life you have all it's even more complex and you have was the roads in uniform but like like boys moderator and it has 1 of conference and private conferences and it can kick and then uses the but the problem is the main problem is that that you have to join us on which is a conference and every session if it can can subscribe to it here each time you connect was there was a device that you create a session ID to join hands so and you only you only actually part of the conference as long as you joined meaning don't really receive messages on that have been sent when all of your all of your plans also on and concerning the encryption you do want to use so it sometimes the future on another the drawback with which is a conference is that you don't have axis to z all member list meaning you don't you only know the doesn't make many users has in a conference and that is the true identity behind it so you are unable to x is still as you know this is a public use of the user so and what what we actually 1 is somewhat simpler approach somewhat close approach to what what what what's the ball hangouts task which is which is similar group threats to a couple of friends when just well just as friends or shared and as send messages to each other at the same time but unfortunately that doesn't exist yet but I see that the standardization fundations does have a general consent that some of the places should exist in the future and on the general idea that policy says that you joint group had 1 with this 1 of a client and from that point all your clients receive all messages every time until you might explicity at some point in the future but it also on probably will avoid z z 1 z of the nature of stuff uh there's a multiuser conference has and instead exposes the true job ideas of each member and so you can have a direct relations of to all these users are aligned conference and those of the same uses that I that you can see the avatar us all accessorize encryption keys yeah this is this is what I am as a base is the next thing I wanna take on and this
problem which for me is this is the last problem remaining in the it's NPP World and yeah until then we often to have a look at
my client which I regard as well as the of the the line for Android phone you can have a look at sort of presented have it's also available and will play and if you're and if you're more interested in common on you encryption message from the more you can check out sync with some of the the code block of the student is such a student amazing job and rule I think this encryptions really well the future lies thank you OK question you have to that you more all others earlier the of the question was if I want to adapt to a z you will is a new way hang out looks now
because when you go back to the to 1 this we should know originally of shows that this of hang onto a 2 years ago in the part of today know I I managed to I started off by copying hangouts bit by bit but I feel like I thought to developmental design language and and find fall on my own niches and my my own concepts and now I'm pretty happy was the next 1 the i is a question was if you want to integrate New England shirts you know about that could and all of the of the of course the opposite the all the the except for this is currently in the work it's nearly done and we will also probably publishers within the next Arnold 24 hours on this dimension w we didn't finish this off to the conference but there is the 1 yeah this is this is a group the group had 1 them is and they're really early stages of development right now there has been no talks on the last piece of peace summits of which it was at the same time as the fostering in Brussels but I was the of the good it's the conference process I knew only what's like people a telling me but yeah I haven't really looked into that that much time but but but I will study now what questions yeah I just got it you and for free yes so the question was what we had to z of all 5 All India to to be operated opportunity and you basically communicate with the so server on the telly also please giving giving you and we have this URL is that is for most ignores it to the protocol and if I have published a python component up which you can install on your own itch to pieces of a few as using centerpiece of only 4 for a few users and and just have fun is ill-defined uploaded to to to the same the same server but you also could use for example all cloud storage like like Amazon S 3 you you can also communicate and basically every whenever you whatever you like but exactly yes that's the the idea is that the the time allowed values i.e. the roughly equal to message archive management of those of operator which is equal to the amount of time more but yeah alright there's no direct link between get chance you yes the question was regarding privacy concerns which is the of age to be uploaded and well we we do can use any encryption on that only is is defined as the message and object encryption meaning on new accounts and compliance I mean then I have also implemented so proprietary of what he or the offline encryption which are already use when sending files watching all and use the same basically I S encryption to to Prof moment to encrypt the file for upload this HDP and then communicates the key for the file out of band in my encrypted are all musician and if a user page appears encryption message of course could you please visit my roommate for encrypting files his willful and prepare yes more you just In way this on the 1 hand for you get it working on the label more than on 1 hand this and so on right by end of the the question was about hydrate of sessions in a minute but is well there's no way for for myself to invalidate my own sections so once once a devices got stolen but as long as I still have a secure channel but to to my content I can tell that context to to purchase session just removed for from the device building the kind of rules invocation process in the it doesn't work for 2 that's also to certificates brother where would work best the and again what questions that is very low all feature so all now the only although that is still so you need this not only at the
the the it was a question was this as a complete archive on the sort of this is it's called message archive management but Of course this doesn't work in conjunction with encryption because you trust device sessions and while the device didn't exist before so it cannot of are X is the history of part but for detections if you'll find was was of why problem messages that works perfectly fine I can set up my you Android tablet right now and it's my entire history from the last 2 years yes is what here on this but which ones they must act management yes this is some extension both the server and the client would have to support structuring management you with walls on the this if all the of visitors was if I can give some overview of which still implements C is accepts I've talked here and both prosody and jeopardy in recent work and support policies and talking about you using the following our conversations users to use prosody and in Germany old and which is a popular so because it's easy to set up especially in small offices and stuff is currently trying to catch up I would describe on they there haven't been too easy Stream management for example a newly of message archive management but by what I was told they will somewhere in the future again yes you probably questions by I know mean it's only a small percentage of this group in terms some of the labeling the ammonia share some of the lying on the move is 1 yeah the question was about the there are so many of different encryption methods is all income it incompatible to each other and will always come this is your sort a lot because composition supports Austria's on well this is a kind of agreement at least I would say it was we use a normal people in the exam if you want us that's was Pinchuk utility I'm not really good because of the drawbacks I described sort of earlier and I I kind of hope people or will implement Newman's at future because well lose basically what you actually want and the couple client development as well already interested in implementing the sensors and in the process of creating rules so if we can help yes it is more you know the so we really just did the implementation conversation approved concept basically as possible without of course was ended yesterday and so on right now non unfortunately but here it could use the conversations with arc welding chromium on just a few thoroughly and that you know we all hope for actually annotations in the future crystals yes so that means moving you got it all in this includes just out of interest in that with yeah like like delegates was a question was is this if a flight France's embeddedness as a size limit but but we do have a lot 5 encrypted to 2 http this our Our approach to it but if you look back at to what clients and would do in the past but jingle file-transfer can negotiate boast trying to invent transform because there are no if I would be to so it's it's getting split into several messages and out of band 5 friends over open stocks connection directed to the other devices and Asensio fighting in binary basically yeah more now the loss of life on this yeah well this the question was which just applying I would recommend it is depends on what you are after a few hours basically after to see the message synchronization for 4 on encrypted messages that you want to switch seamlessly between on your mobile to just apply and you the only real thing you would have to look out for its carbon support which I mentioned variance in the beginning of my talk which copies the methods to realize a couple of clients which do common support dodgem for example if you're a fantastic mind lenses and cover which I personally use if you're into 5 transfer will always sending climbers conversations as well just said appealing so that will work with every client but if you want to send 1 for but just applying to a mobile device and you are probably better off 1 judge because it does the dignified transform and there are also a placozoans works which are you do initiative you follow up upload forgotten the you know if you are kind of old and new so it you can also try conversations and in our well as mentioned before will give you all the features what this is not so yeah thank you
Binärdaten
Metropolitan area network
Offene Menge
Software
Freeware
Bildschirmfenster
Gruppenoperation
Geräusch
Message-Passing
Computeranimation
Bit
Vorlesung/Konferenz
Quantifizierung
Humanoider Roboter
Default
Gerade
Instant Messaging
Code
Computeranimation
Punkt
Gruppenkeim
Element <Mathematik>
Kombinatorische Gruppentheorie
Extrempunkt
Computeranimation
Streaming <Kommunikationstechnik>
Metropolitan area network
Message-Passing
Informationsmodellierung
Perspektive
Datentyp
Endogene Variable
Mixed Reality
Abstand
Maßerweiterung
Automorphismus
Benchmark
Attributierte Grammatik
Gammafunktion
Protokoll <Datenverarbeitungssystem>
Element <Gruppentheorie>
Wiki
Arithmetisches Mittel
Rechenschieber
Rechter Winkel
Mereologie
Message-Passing
Bit
Sensitivitätsanalyse
Punkt
Prozess <Physik>
Momentenproblem
Befreundete Zahl
Computeranimation
Netzwerktopologie
Metropolitan area network
Streaming <Kommunikationstechnik>
Negative Zahl
Client
Prozess <Informatik>
Gruppe <Mathematik>
Bildschirmfenster
Quellencodierung
Gerade
Datennetz
Element <Gruppentheorie>
Negative Zahl
Ausnahmebehandlung
Ideal <Mathematik>
Quellcode
Arithmetisches Mittel
Digitalisierer
Grundsätze ordnungsmäßiger Datenverarbeitung
Client
Server
Routing
Smartphone
Message-Passing
Zeichenkette
Telekommunikation
Server
Subtraktion
Digital Rights Management
Automatische Handlungsplanung
Maßerweiterung
Physikalische Theorie
Multiplikation
Domain-Name
Message-Passing
Endogene Variable
Digital Rights Management
Zusammenhängender Graph
Maßerweiterung
Speicher <Informatik>
Ganze Funktion
Automorphismus
Beobachtungsstudie
Protokoll <Datenverarbeitungssystem>
Physikalisches System
Datenfluss
Packprogramm
Endogene Variable
Portscanner
Chatten <Kommunikation>
Gamecontroller
Authentifikation
Punkt
Hausdorff-Dimension
Digital Rights Management
Gruppenkeim
Zahlenbereich
Zählen
Computeranimation
Netzwerktopologie
Streaming <Kommunikationstechnik>
Client
Perspektive
Datennetz
Rotationsfläche
Digital Rights Management
Mobiles Internet
Touchscreen
Einfach zusammenhängender Raum
Videospiel
Kraftfahrzeugmechatroniker
Mobiles Internet
Mailing-Liste
Arithmetisches Mittel
Dienst <Informatik>
Flächeninhalt
Client
Server
Garbentheorie
Streaming <Kommunikationstechnik>
Aggregatzustand
Streaming <Kommunikationstechnik>
Message-Passing
Punkt
Stichprobenumfang
Client
Digital Rights Management
Vorlesung/Konferenz
Streaming <Kommunikationstechnik>
Computeranimation
Aggregatzustand
Einfach zusammenhängender Raum
Bit
Punkt
Digital Rights Management
Speicher <Informatik>
Quellcode
Quick-Sort
Packprogramm
Computeranimation
Streaming <Kommunikationstechnik>
Message-Passing
Client
Digital Rights Management
Client
Streaming <Kommunikationstechnik>
Message-Passing
Fehlermeldung
Videospiel
Punkt
Hyperbelverfahren
Digital Rights Management
Gruppenkeim
Aggregatzustand
Quellcode
Information
Kontextbezogenes System
Packprogramm
Computeranimation
Client
Dienst <Informatik>
Uniforme Struktur
Rechter Winkel
Client
Digital Rights Management
Vorlesung/Konferenz
Indexberechnung
Information
Maßerweiterung
Streaming <Kommunikationstechnik>
Message-Passing
Aggregatzustand
Videospiel
Kraftfahrzeugmechatroniker
Elektronische Publikation
Protokoll <Datenverarbeitungssystem>
Keller <Informatik>
Wärmeübergang
Aggregatzustand
Computeranimation
Streaming <Kommunikationstechnik>
Wärmeübergang
Datentyp
Mereologie
Statistische Analyse
Client
Server
Dateiformat
Vorlesung/Konferenz
Information
Maßerweiterung
Ganze Funktion
Message-Passing
Bildgebendes Verfahren
Managementinformationssystem
Kraftfahrzeugmechatroniker
Sensitivitätsanalyse
Elektronische Publikation
Multimedia
Implementierung
Systemaufruf
Wärmeübergang
Peer-to-Peer-Netz
Elektronische Publikation
Ausgleichsrechnung
Computeranimation
Codec
Message-Passing
Digitalisierer
Wärmeübergang
Server
Vorlesung/Konferenz
Information
SCI <Informatik>
Analysis
Einfach zusammenhängender Raum
Vervollständigung <Mathematik>
Elektronische Publikation
Multimedia
Mailing-Liste
Physikalisches System
Elektronische Publikation
Computeranimation
Übergang
Metropolitan area network
Message-Passing
Flächeninhalt
Vorlesung/Konferenz
Information
Tropfen
Public-Key-Kryptosystem
Offene Menge
Gewicht <Mathematik>
Zustandsdichte
Vorzeichen <Mathematik>
Kategorie <Mathematik>
Güte der Anpassung
Ablöseblase
Vorlesung/Konferenz
Ordnung <Mathematik>
Kontextbezogenes System
Ganze Funktion
Message-Passing
Quick-Sort
Computeranimation
Offene Menge
Multiplikation
Prozess <Physik>
Punkt
Betragsfläche
Implementierung
Code
Computeranimation
Datensatz
Client
Datentyp
Gerade
Einfach zusammenhängender Raum
Beobachtungsstudie
Videospiel
Protokoll <Datenverarbeitungssystem>
Kryptologie
Mobiles Internet
Softwarewerkzeug
Quellcode
Kontextbezogenes System
Quick-Sort
Arithmetisches Mittel
Singularität <Mathematik>
Chiffrierung
Zustandsdichte
Twitter <Softwareplattform>
Mereologie
Projektive Ebene
Message-Passing
Aggregatzustand
Spezialrechner
Streaming <Kommunikationstechnik>
Message-Passing
Multiplikation
Chiffrierung
Konstante
Gruppenkeim
Einfach zusammenhängender Raum
Inhalt <Mathematik>
Kontextbezogenes System
Message-Passing
Bildgebendes Verfahren
Computeranimation
Server
Bit
Schlüsselverwaltung
Protokoll <Datenverarbeitungssystem>
Amenable Gruppe
Hyperbelverfahren
Schaltnetz
Gruppenkeim
Bitrate
Computeranimation
Entscheidungstheorie
Energiedichte
Chiffrierung
Kryptologie
Gamecontroller
Vorlesung/Konferenz
Elektronischer Programmführer
Inhalt <Mathematik>
Elliptische Kurve
Message-Passing
Fehlermeldung
Kraftfahrzeugmechatroniker
Server
Schlüsselverwaltung
Gamecontroller
Mathematisierung
Vorlesung/Konferenz
Speicher <Informatik>
Schlüsselverwaltung
Message-Passing
Bildgebendes Verfahren
Computeranimation
Gammafunktion
Bitmap-Graphik
Punkt
Multiplikation
Mereologie
Natürliche Zahl
Adressraum
Gruppenkeim
Automatische Handlungsplanung
Computeranimation
Task
Mailing-Liste
Client
Webforum
Konfluenz <Informatik>
Prozess <Informatik>
Uniforme Struktur
Nichtunterscheidbarkeit
Vorlesung/Konferenz
Avatar <Informatik>
Videospiel
Gerichtete Menge
Mailing-Liste
Ähnlichkeitsgeometrie
Arithmetisches Mittel
Chiffrierung
Chatten <Kommunikation>
Mereologie
Binäre Relation
Schlüsselverwaltung
Message-Passing
Standardabweichung
Bit
Prozess <Physik>
Momentenproblem
Hausdorff-Dimension
Formale Sprache
Digital Rights Management
Gruppenkeim
Familie <Mathematik>
t-Test
Code
Synchronisierung
Computeranimation
Homepage
Richtung
Client
Prozess <Informatik>
Gruppe <Mathematik>
Vorlesung/Konferenz
Zusammenhängender Graph
Inhalt <Mathematik>
Softwareentwickler
Speicher <Informatik>
Gerade
Nichtlinearer Operator
Datenmissbrauch
Digitales Zertifikat
Schlussregel
p-Block
Humanoider Roboter
Binder <Informatik>
Elektronische Publikation
Kontextbezogenes System
Packprogramm
Quick-Sort
Integral
Objekt <Kategorie>
Arithmetisches Mittel
Chiffrierung
Rechter Winkel
Mereologie
Server
Garbentheorie
URL
Schlüsselverwaltung
Streuungsdiagramm
Lie-Gruppe
Message-Passing
Subtraktion
Umsetzung <Informatik>
Einfügungsdämpfung
Prozess <Physik>
Gemeinsamer Speicher
Digital Rights Management
Gruppenkeim
Implementierung
Wärmeübergang
Term
Synchronisierung
Eins
Kreisbogen
Streaming <Kommunikationstechnik>
Client
Gruppe <Mathematik>
Inverser Limes
Vorlesung/Konferenz
Maßerweiterung
Softwareentwickler
Varianz
Einfach zusammenhängender Raum
Videospiel
Softwarewerkzeug
Schlussregel
Quick-Sort
Packprogramm
Chiffrierung
Offene Menge
Mereologie
Tablet PC
Heegaard-Zerlegung
Server
Ablöseblase
Message-Passing
Offene Menge
Freeware
Software
Computeranimation

Metadaten

Formale Metadaten

Titel XMPP 2015 - challenges of modern day instant messaging
Serientitel FrOSCon 2015
Teil 16
Anzahl der Teile 80
Autor Gultsch, Daniel
Lizenz CC-Namensnennung 3.0 Unported:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/19561
Herausgeber Free and Open Source software Conference (FrOSCon) e.V.
Erscheinungsjahr 2015
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract There are many instant messaging solutions. Some of them are open source yet only a few rely on open and established protocols. Nonetheless utilizing open standards is a keystone to not just creating the next hype but to create a lasting solution that will outlive its competition. XMPP is such a standard and has been around for over a decade. Unfortunately in the past XMPP had had a hard time adapting to the challenges of mobile and multi-device environments. However in the last 18 month the XMPP community was able to overcome a lot of these problems. This talk is about how we solved the problems of unreliable connections, power consumption and message synchronization. It is also a talk about the remaining challenges and possible solutions. Daniel Gultsch

Ähnliche Filme

Loading...