Ubiquitous Reach and Remote Control Of Devices: Introducing KPML - A Protocol for Efficient Interaction with Devices
Click here for IETF lurk (Limited Use of Remote Keys) work.
Click here for IETF stir (Secure Telephone Identity Revisited) work.
Click here for IETF lemonade (mobile messaging) work.
Click here for IETF speechsc (speech services control) work.
Click here for IETF mediactrl (media server control) work.
Click here for IETF alto (Application-Layer Traffic Optimization) work.
Click here for IETF Applications Area Review work.
I am not a lawyer; that is my brother. I am not a judge; that is my uncle.
The views expressed here are those of the contributor, which may not be me. The views, information, data, commentary, or other content do not necessarily represent the views of Eric Burger or Neustar, Inc. For that matter, they may be entirely incorrect and off base. Any guilt-by-association is wholly unjustified.
The information found on this site comes with no guarantee or warrantee for accuracy, fitness-of-use, standards status, and so on. While I hope the site reflects (and leads) reality, there is no guarantee that the site has correct or timely information. If you want the highest accuracy, go to the source, such as the IETF web page. For that matter, I might get the links wrong. In the spirit of the disclaimer above, I am sorry, but TOO BAD. Bing, Google, or Yahoo! the information.
Use this site at your own risk. If you do find an error or omission, please feel free to e-mail me. I may or may not get around to fixing it. See above.
Last updated: 20160531 2019 ET