At the outset of the Internet Engineering Task Force (IETF) 100th meeting, a decidedly non-technical initial "Guide for human rights protocol considerations" was just published. Although the IETF has always remained true to its DARPA origins as a tool for developing disruptive new technical ideas, it launches into bizarre territory when dealing with non-technical matters. more
I've written several posts on Cuba's user-deployed street networks (SNET), the largest of which is SNET in Havana. (SNET was originally built by the gaming community, but the range of services has grown substantially). My posts and journalist's accounts like this one describe SNET, but a new paper presents SNET measurement data as well as descriptive material. more
Consumers are embracing VoIP services now more than ever as they get used to calling over Internet application services such as Skype, Facetime, and Google Hangouts. Market Research Store predict that the global value of the VoIP services market is expected to reach above USD140 billion in 2021, representing a compound annual growth rate of above 9.1% between 2016 and 2021. more
Confronted with the rapid development of the Internet, the traditional network is facing severe challenges. Therefore, it is imperative to accelerate the construction of global network infrastructure and build a new generation of Internet infrastructure to adapt to the Internet of Everything and the intelligent society. From November 28 to 30, 2017, "GNTC 2017 Global Network Technology Conference" organized by BII Group and CFIEC, will see a grand opening in Beijing. more
It's highly unusual for a well-known trademark owner to be accused of cybersquatting, but that's what happened when a Mexican milk producer filed a complaint against Apple Inc. under the Uniform Domain Name Dispute Resolution Policy (UDRP) in an attempt to get the domain name lala.com. Not only did Apple win the case, but the panel issued a finding of "reverse domain name hijacking" (RDNH) against the company that filed the complaint. more
The world has officially entered what the MLi Group labels as the "New Era of The Unprecedented". In this new era, traditional cyber security strategies are failing on daily basis, political and terrorist destruction-motivated cyber attacks are on the rise threatening "Survivability", and local political events unfold to impact the world overnight and forever. Decision makers know they cannot continue doing the same old stuff, but don't know what else to do next or differently that would be effective. more
In case you missed it (you probably didn't), the Internet was hit with the Monday blues this week. As operator-focused lists and blogs identified, "at 17:47:05 UTC yesterday (6 November 2017), Level 3 (AS3356) began globally announcing thousands of BGP routes that had been learned from customers and peers and that were intended to stay internal to Level 3. By doing so, internet traffic to large eyeball networks like Comcast and Bell Canada, as well as major content providers like Netflix, was mistakenly sent through Level 3's misconfigured routers." more
In 2003, the world of network engineering was far different than it is today. For instance, EIGRP was still being implemented on the basis of its ability to support multi-protocol routing. SONET, and other optical technologies were just starting to come into their own, and all-optical switching was just beginning to be considered for large-scale deployment. What Hartley says of history holds true when looking back at what seems to be a former age: "The past is a foreign country; they do things differently there." more
The internet is under all kinds of attacks from all kinds of people for all kinds of reasons. It’s not just the internet’s infrastructure that is under attack, so too is the very concept of the internet as an open communications platform serving the commonweal. Constructing effective technical defenses of the internet will require that America’s students learn and develop the quantitative disciplines known as STEM; Science, Technology, Engineering, and Mathematics. Constructing effective, ethical defenses of the internet will require that students study art and philosophy. The two educational paths are symbiotic... more
U.S. federal court issues preliminary injunction, holding that enforcement of Canadian order requiring Google to remove search results would run afoul of the Communications Decency Act... Canadian company Equustek prevailed in litigation in Canada against rival Datalink on claims relating to trade secret misappropriation and unfair competition. After the litigation, Equustek asked Google to remove Datalink search results worldwide. Google initially refused altogether... more
WIPO's newest overview of the Uniform Domain Name Dispute Resolution Policy (UDRP) succinctly states what decisions have made clear through the years: The UDRP's first test is only a "standing requirement." Standing, under the law, simply means that a person or company is qualified to assert a legal right. It does not mean or imply that one will necessarily prevail on any claims. The UDRP includes a well-known three-part test that all trademark owners must satisfy to prevail, but the first element has a low threshold. more
The argument for end-to-end encryption is apparently heating up with the work moving forward on TLSv1.3 currently in progress in the IETF. The naysayers, however, are also out in force, arguing that end-to-end encryption is a net negative... The idea of end-to-end encryption is recast as a form of extremism, a radical idea that should not be supported by the network engineering community. Is end-to-end encryption really extremist? Is it really a threat to the social order? more
Are you passionate about preserving the global, open Internet? Do you have experience in Internet standards, development or public policy? If so, please consider applying for one of the open seats on the Internet Society Board of Trustees. The Internet Society serves a pivotal role in the world as a leader on Internet policy, technical, economic, and social matters, and as the organizational home of the Internet Engineering Task Force (IETF). more
In the case of Oy Vallila Interior Ab v. Linkz Internet Services, a 3-member WIPO Panel denied the Complainant's efforts to have the disputed domain name vallila.com transferred because the Complainant did not prove that the Respondent registered and used the disputed domain name in bad faith. The Complainant is in the business of providing fabrics and interior design services and claimed trademark rights in its registered mark VALLILA in the European Union. more
I have a somewhat unconventional view of 5G. I just happen to believe it is the right one. It is trapped inside a category error about the nature of packet networking, and this means it is in trouble. As context, we are seeing the present broadband Internet access model maturing and begin to reach its peak. 5G eagerly anticipates the next wave of applications. As such, 5G is attempting to both extend and transcend the present "undifferentiated data sludge" model of mobile broadband. more
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byCSC
Sponsored byRadix