Much has been written about the progress of the adoption of IPv6 over the years. I know I've been guilty of adding my writings into the pool, and this article is a further contribution to that pool of observations and measurements. In this case, I want to look in some detail at the deployment of IPv6 in China. Why is China so important in this story of IPv6 deployment? more
Globally, people are connecting more and more "things" to the Internet. Devices that were traditionally offline or dumb like refrigerators, cars, watches, home cameras, air condition, door locks, agriculture monitoring devices, etcetera, are now being connected to the Internet. This is referred to as the "Internet of Things" (IoT). Using sensors, IoT devices collect data of some sort, which is then most likely shared over a network connection to a service provider, where some analysis is performed on the data. more
From the perspective of the domain name industry, 2018 was strongly influenced by, among other things, the EU General Data Protection Regulation (GDPR), the Temporary Specification and especially the Expedited Policy Development Process (EPDP). For the Contracted Parties House (CPH) TechOps Group, one year after its foundation, it was a very exciting and intensive time. This initiative was created to tackle technical and operational needs and challenges plus ideally to create best practices. more
OneWeb has a contract to launch Internet-service satellites on Russian-made Soyuz rockets and has a joint venture with Gonets, a Russian satellite operator, as a marketing partner in Russia. However, the Russian government has expressed concerns about security, dragged their feet on spectrum allocation and complained about US sanctions. This led OneWeb to make two concessions. more
Well, it's that time of year again. The time of year when I look back at all of the biggest domain news stories from the last twelve months, and also reflect on my predictions from last year. As expected, GDPR has had a major impact on the ability to access domain ownership information. And we did indeed see a number of M&A transactions over this last year. However, there wasn't a lot of new .Brand activity. This is one prediction where I may have missed the mark... more
Imagine that you are considering the purchase of your first self-driving car. You anticipate the benefits of sensors and steering that avoid accidents, conserve energy and keep you in contact with emergency personnel should you need help. You unlock the door, get situated in the driver's seat and are about to engage the ignition and then a question pops into your mind, "Is it really safe"? To answer that question, we need to understand first, that the car is not being controlled by Artificial General Intelligence... more
One year ago, in late 2017, much of the policy debate in the telecommunications sector was raised to a fever pitch over the vexed on-again off-again question of Net Neutrality in the United States. It seemed as it the process of determination of national communications policy had become a spectator sport, replete with commentators who lauded our champions and demonized their opponents. more
More than 30 million people lost their data connectivity on December 6, 2018, in the United Kingdom as O2's network suffered from a nationwide service outage. Based on several reports, the incident was caused by a human error at Ericsson, the telecoms supplier responsible for operating certain parts of the O2 network. To compensate for the downtime and tarnished reputation, the O2 management is now reportedly seeking damages of up to a hundred million pounds from Ericsson. more
When properly used, the UDRP enables trademark owners to take control of abusive domain names. Yet sometimes the UDRP itself is misused by trademark owners to try to seize desirable domain names to which they have no legal entitlement. Is there a downside to misusing the UDRP to attempt a domain name hijacking? Unscrupulous companies at times misuse the UDRP by improperly invoking its power to compel a transfer of ownership in order to seize inherently valuable, non-infringing domain names that the companies desire for their own use. more
I find myself reading, frequently, about "interesting" exploits of IP routing. Recent history includes the redirection of Telegram traffic to Iran, Google traffic to China, and Cloudflare traffic to Nigeria -- and, per bgpstream.com, 64 events this month, 18 of them on one day. Is this expensive? You bet, both in money and in mindshare. Imagine the impact of discovering your company's name in the press. more
In recent times, I've been struggling to determine where blockchain has demonstrated its immensely promised value, delivered true market or stakeholder value, or disrupted an existing ecosystem. And thus far, what I keep coming up with is that "blockchain is truly a solution searching for a problem." Most of all, many of its enthusiasts and proponents are generally conceptual thinkers and/or snake oil salespersons who have little to no experience delivering secure, integrated, complex systems. more
Last week ETECSA began offering 3G mobile access to Cuba's national intranet and the global Internet and President Diaz-Canal tweeted the news. His tweet has received 216 comments so far and reading through them, many are effusively positive... Others were critical, noting that the prices are high relative to Cuban incomes (one said "absurd") and the technology is obsolete -- "Congratulations, but they're 20 years late." more
The short history of Internet Governance is full of errors, failures, and - mainly - omissions. Despite the shortcomings, we also must acknowledge the achievements of past and present internet governance efforts. In particular, ICANN and its stakeholder constituencies have delivered on the mandate of a stable, secure and resilient Internet. Working with the IANA, IAB and IETF, the operational functions of IP addresses, and the Protocol Assignment and DNS must be seen as an unqualified success. more
The weighing of evidence involves the connecting of dots, which involves drawing inferences. However, just as there can be false positives, there can be false inferences. The tendency may be to think of inferences as coming in one size, but not all inferences are logically correct. Some are weak and others strong. The reason for talking about both kinds is that so much depends on the quality of their making. more
There is considerable rhetoric propagated today about 5G security. Some of the more blatant assertions border on xenophobia with vague assertions that the 5G vendors from some countries cannot be trusted and wholesale government banning is required. Existing treaty obligations are being summarily abrogated in favour of bilateral trade bullying. These are practices that the late President George H.W. Bush sought to eliminate a quarter century ago through intergovernmental organization initiatives... more
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign
Sponsored byVerisign