A rival tells me how hard it is to compete with Huawei because they manufacture so many products. “We had a good opportunity at one customer. Our software is just right for them. “They wanted to buy a complete system. We bundled our software with $4 million of equipment and bid aggressively at $7 million. Huawei came in with a bid of $4 million for hardware and software combined. They manufacture their own servers at a much lower cost than he could buy servers. more
The last few years have shown us how the Internet shrinks distances between distributed teams, organizations and families. This poses a challenge for some organizations. Many business relationships and contractual agreements involving the Internet have geographical implications and restrictions. This matters to anyone operating a network. It is most important for networks that get new address space. more
In the first quarter of this year, the big cable companies added 482,000 customers, while telcos added over 50,000 customers. In what is a surprise to the industry, that growth has disappeared, and all of the big ISPs collectively lost almost 150,000 customers. That's a loss of 60,000 customers for the cable companies and 88,000 for the big telcos. The following statistics have been compiled by the Leichtman Research Group, which tracks the broadband performance of the largest ISPs in the country. more
Last October, I reviewed multi-orbit tests and plans of several low Earth orbit (LEO), medium Earth orbit (MEO), and Geostationary (GEO) broadband satellite companies and quoted Neil Masterson, CEO of LEO operator OneWeb as saying, "Interoperability with GEO satellites must happen - it's common sense ... Customers don't care whether it's a LEO satellite or a GEO satellite - all they want is connectivity." more
Businesses should consider bumping phishing as an urgent concern in their cybersecurity agendas. To those still unacquainted, "phishing" refers to the use of fake emails, messages, and websites that fool users into giving up access to accounts and information or into installing malware through attachments. It has become quite rampant over recent years. Attackers are using the method as a primary means to breach defenses, and with good reason: they work. more
At the end of July, the Open-ended Working Group (OEWG) on ICTs -- which is currently discussing how states should and shouldn't behave in cyberspace - concluded its third meeting, which falls in the middle of its four-year mandate (ending in 2025). Below, we provide a summary of what happened, reflections on the outcomes and implications (the good and the bad), and some practical recommendations for stakeholders and governments to consider ahead of the next meeting. more
On August 10, the FCC issued a press release denying the long-form applications of Starlink and LTD Broadband in the RDOF reverse auction. This is big news because these are two of the biggest winners of the reverse auction. LTD Broadband was the largest winner of the auctions at $1.32 billion, while Starlink had claimed over $885 million in the auction. more
There was a major attack launched against long-haul fiber networks outside of Paris, France, on April 27 of this year. It appears that there was a coordinated attack by vandals to cut three long-haul fiber routes simultaneously. Fibers were cut with what seemed like a circular saw, and sections of fiber were removed to make it hard to make repairs. These were backbone fibers that were shared by multiple ISPs. more
Starlink is available in 37 nations, and the price for best effort service was the same everywhere until August 3, when variable pricing with throttling became available in France. I predicted they would eventually shift from uniform to affordable pricing some time ago, but why did they do it now? Starlink first became available in the U.S. and Canada, and sales are beginning to outrun the available capacity. more
I'm writing this from Taipei, where I have lived in peace for over 10 years. Sadly I learned that during this week, intermediate-range ballistic missiles (operated by China) have flown far above the capital of Taiwan and that five of them have landed in the waters of Japan's exclusive economic zone (EEZ). This provocative live-firing drill came as a direct response from China following Pelosi's visit. more
Recently, an article I wrote for Bitcoin Magazine talked about how we can use DNS underscore scoping to better abstract Lightning addresses and even create a de facto specification that could work on any resource (like a wallet or a smart contract) across all blockchains. more
Let's take a second to look back some 50 years to the world of 1972 and the technology and telecommunications environment at that time. The world of 1972 was one populated by a relatively small collection of massive (and eye-wateringly expensive) mainframe computers that were tended by a set of computer operators working around the clock and directed by specialized programmers, trained in the obscure symbol set used by the job control systems on these computers. more
Casey Lide and Thomas B. Magee of Keller & Heckman highlight an issue that anybody building fiber on utility poles should be aware of. A recent article on their website notes that in some cases, an easement obtained for using private land to bring electric service might not automatically allow an easement for bringing fiber. more
On June 5th Elon Musk said SpaceX had nearly 500,000 customers in 32 nations and 9 languages. By now, there must be 500,000 customers, most of whom are in the U. S. and Canada, and their performance is suffering. In the first quarter of this year, OOKLA reported that the median Starlink download speed fell from 104.97 to 99.55 Mbps in the U.S. and from 106.64 to 97.4 Mbps in Canada. more
All devices that connect to the internet need unique addresses. The number of IP addresses is limited, creating a demand for addresses worldwide, particularly from the cloud computing industry. This demand has raised the value of IPv4 to levels that the internet's original developers didn't predict, in part because the internet was considered an experiment at the time. Of course, use - and so demand -- has exceeded anyone's realistic expectations. more
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byWhoisXML API