Many industries have gone back to pre-COVID days but not telecom or their supporting technology partners. In fact, the pandemic gave a modern-day meaning to the decades-old iconic long-distance campaign to "reach out and touch someone." With so many months (and even years) of remote and isolated living, telecom audio and voice communications became the heroes of the era, bringing us together and forever changing our options in socializing and doing business. more
I saw recent headlines that claim that the time people watch streaming content is now greater than all of the time spent watching content from cable companies. A deeper look at the underlying statistics shows that this isn't entirely true, but it makes for a great headline. But it's still news that the percentage of viewing done through streaming continues to grow while the number of traditional cable customers continues to plunge. more
When SpaceX announced the price of the Starlink service, Elon Musk said it would be the same everywhere but I wrote that eventually it would be priced to be affordable in different nations. (If you predict enough things, you are bound to get something right). The fixed cost of a satellite Internet constellation is high -- satellites are expensive to make and launch -- but the cost of adding and servicing a new customer is low, and the market is global. more
"Saint Elon" is a bit much but ... It started with a tweet from Ukraine's Minister of Digital Transformation. The quoted text below is excerpts from How Elon Musk's Starlink satellite internet keeps Ukraine online in The Kyiv Independent. "Among the Ukrainian military, Elon Musk, the richest tech entrepreneur in the U.S., is often half-jokingly referred to as 'Saint Elon.'. The reason is Starlink, Musk's satellite communication system that keeps many Ukrainians, most importantly the military... more
The NASA-sponsored Artemis program is the first step in the next era of human exploration. Together with a large number of international government and academic partners as well as businesses -- and based on international standards -- NASA will establish a sustainable presence on the Moon. more
In 2020, the ICANN Generic Name Supporting Organization (GNSO) Council approved a plan to revamp the WHOIS system as per the recommendations given by the ICANN Expedited Policy Development Process (EPDP). This plan directed ICANN to develop a centralized System for Standardized Access/Disclosure (SSAD) for WHOIS records. After much debate regarding the suitability and cost of such a system, ICANN brought together a group... more
A Chinese law that went into effect six months ago required online service providers to file details of the algorithms they use with China's centralized regulator, the Cyberspace Administration of China (CAC). In mid-August, CAC released a list of 30 algorithms used by companies such as Alibaba, TenCent and Douyin, the Chinese version of Tiktok, with a brief description of their purpose. more
On August 16, 2022, UN Secretary-General Antonio Guterres nominated ten high-level and eminent persons to serve in a new IGF Leadership Panel (ILP). The ILP includes luminaries like Vint Cerf, the father of the Internet, Tomas Hendrik Ilves, the former president of Estonia, and Maria Ressa, the Philippine woman who won the Nobel Peace Prize in 2021. It is an interesting mix of "usual suspects" and "fresh blood." more
A lot of the money being spent on broadband infrastructure today is trying to solve the digital divide, which I define as a technology gap where good broadband is available in some places but not everywhere. The technology divide can be as large as an entire county that doesn't have broadband or as small as a pocket of homes or apartment buildings in cities that got bypassed. more
After the nuclear submarine debacle with France, political ties have been restored, and both France and Australia have agreed on further cooperation in the South Pacific, where France has several overseas territories. Also, here telecoms is a key issue. Such cooperation has become more urgent with the increased political interest of China in the region. more
A rival tells me how hard it is to compete with Huawei because they manufacture so many products. “We had a good opportunity at one customer. Our software is just right for them. “They wanted to buy a complete system. We bundled our software with $4 million of equipment and bid aggressively at $7 million. Huawei came in with a bid of $4 million for hardware and software combined. They manufacture their own servers at a much lower cost than he could buy servers. more
The last few years have shown us how the Internet shrinks distances between distributed teams, organizations and families. This poses a challenge for some organizations. Many business relationships and contractual agreements involving the Internet have geographical implications and restrictions. This matters to anyone operating a network. It is most important for networks that get new address space. more
In the first quarter of this year, the big cable companies added 482,000 customers, while telcos added over 50,000 customers. In what is a surprise to the industry, that growth has disappeared, and all of the big ISPs collectively lost almost 150,000 customers. That's a loss of 60,000 customers for the cable companies and 88,000 for the big telcos. The following statistics have been compiled by the Leichtman Research Group, which tracks the broadband performance of the largest ISPs in the country. more
Last October, I reviewed multi-orbit tests and plans of several low Earth orbit (LEO), medium Earth orbit (MEO), and Geostationary (GEO) broadband satellite companies and quoted Neil Masterson, CEO of LEO operator OneWeb as saying, "Interoperability with GEO satellites must happen - it's common sense ... Customers don't care whether it's a LEO satellite or a GEO satellite - all they want is connectivity." more
Businesses should consider bumping phishing as an urgent concern in their cybersecurity agendas. To those still unacquainted, "phishing" refers to the use of fake emails, messages, and websites that fool users into giving up access to accounts and information or into installing malware through attachments. It has become quite rampant over recent years. Attackers are using the method as a primary means to breach defenses, and with good reason: they work. more
Sponsored byVerisign
Sponsored byCSC
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byDNIB.com