In 1990, Teledesic was formed to deliver satellite-based Internet service. Cellular pioneer Craig McCaw, Microsoft co-founder Bill Gates and Saudi Prince Alwaleed bin Talal were early investors and Boeing was both an investor and the prime contractor. Teledesic hoped to offer global Internet connectivity using a constellation of 840 satellites in low-Earth orbit (LEO) at an altitude of 700 km... Teledesic failed. Twenty seven years later three companies SpaceX, OneWeb and Boeing are trying to do what Teledesic could not do. Will they succeed? more
One of the most profoundly disruptive developments occurring in the cyber security arena today is the headlong rush by a set of parties to ubiquitously implement extreme End-to-End (e2e) encryption for communication networks using essentially unbreakable encryption technology. A notable example is a new version of Transport Layer Security (TLS) known as version 1.3. The activity ensues largely in a single venue... more
The best and most knowledgeable experts of dot Brand met in the Brands and Domains conference, on October 2 and 3 in the Hague, Netherlands. Brand and project owners were also present, coming from all around the world -- from Australia or Japan to the USA and Canada. The keynote by Georges-Edouard Dias, CEO of Quantstreams and founder of the concept of brand hospitality, explained how customers are not anymore the targets of brands. more
Amazon filed applications for the .AMAZON top-level domains in several scripts in 2012. Five years later, ICANN will re-examine the applications after an Independent Review Process (IRP) proceeding. The IRP Panel found that ICANN's Board failed to demonstrate the existence of public policy reasons for denying the applications. more
Rep's Graves and Sinema recently introduced H.R. 4036, the catchily named Active Cyber Defense Certainty Act or ACDC act which creates some exceptions to criminal parts of computer crime laws. Lots of reports have decried "hack back" but if you read the bill, it's surprisingly well targeted. The first change is to what they call Attributional Technology, and says it's OK to put bait on your computer for an intruder intended to identify the intruder. more
Independence must be a fashion of the moment. Cataluña, a place where I've lived, is fighting hard to be independent and, even if I don't believe a second that this will ever happen, it is a common example of a community which fought hard, very early and by all means, to operate a new gTLD to clearly identify its culture (and Nation) on the Internet: the .CAT Top-Level domain. Note that this TLD has nothing to do with the .DOG nor .PET new gTLDs (joke). more
Some inevitable changes are hard to see in prospect, yet are 'obvious' in retrospect. The next communications revolution is 'made for cloud' access. A colleague pointed me to a Forbes article "For Today's Telecoms Companies, Customer Experience Is Just As Important As Download Speeds". It was written by Huawei's global president of assurance and managed services. Well, I told you so! more
The French MP and Fields medal award winner, Cédric Villani, officially auditioned Constance Bommelaer de Leusse, the Internet Society's Senior Director, Global Internet Policy, last Monday on national strategies for the future of artificial intelligence (AI). In addition, the Internet Society was asked to send written comments, which are reprinted here. more
The U.S. Internet Revenue Service now says that criminals already had most of the information that credit bureau Equifax lost in a breach that revealed personal information about nearly 150 million people. The incident at Equifax and the IRS' mid-October admission of how much-stolen data was already in criminal hands may force changes in how the world handles personal information. more
This week, I ran into an interesting article over at Free Code Camp about design tradeoffs... If you think you've found a design with no tradeoffs, well... Guess what? You've not looked hard enough. This is something I say often enough, of course, so what's the point? The point is this: We still don't really think about this in network design. This shows up in many different places; it's worth taking a look at just a few. more
As I've written before, the registry operators for many country-code top-level domains (ccTLDs) have adopted the Uniform Domain Name Dispute Resolution Policy (UDRP) or a variation of it, while other ccTLDs have crafted their own dispute policies, or none at all. Although no ccTLD appears as frequently as .com in domain name disputes, it's interesting to see which ccTLDs are subject to dispute the most often. more
On the 25th of September, the northern autonomous region of Iraq known as Kurdistan voted to become an independent country. This vote has led to a current standoff between the central Iraqi government and the Kurdish Regional Government (KRG), with the Kurds threatening to cut off internet service into Iraq in retaliation for any punitive measures inflicted by Baghdad on the KRG. The following analysis was written by Doug Madory of Oracle Dyn after ISIS took control of Mosul, Iraq in 2014. It describes how the internet of Iraq came to be dependent on international connections through telecoms based in Kurdistan. more
In 2015, ETECSA announced/leaked a plan to make ADSL service available in 50% of Cuban homes by 2020. I was skeptical. Doing so would mean investing a lot of money for obsolete technology between 2015 and 2020. They have recently announced the availability of ADSL connectivity at homes in portions of seven cities and, by December, they say some home connectivity will be available in every province. more
Around the world, the growing sophistication of cyber criminals is challenging the capacity of governments, businesses and individuals to defend themselves. In the Caribbean, governments are forging strategic partnerships with regional actors like the Caribbean Telecommunications Union (CTU) and the Caribbean Network Operators Group (CaribNOG), the region's largest volunteer-based community of network engineers, computer security experts and tech aficionados. more
If you work in computer security, your Twitter feed and/or Inbox has just exploded with stories about not just one but two new holes in cryptographic protcols. One affects WiFi; the other affects RSA key pair generation by certain chips. How serious are these? I'm not going to go through the technical details. For KRACK, Matthew Green did an excellent blog post; for the other, full details are not yet available. There are also good articles on each of them. What's more interesting are the implications. more
Sponsored byVerisign
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byCSC