I recently participated in two Comverse events, and once again the message was driven home to me about the enormous opportunities that lie ahead of the industry in the field of new telecoms applications. The middleware and cloud applications that are now appearing at the edge of the network will of course, be further developed once high-speed broadband becomes available, but already they are having an enormous impact on the telecoms market. The new user experiences that can be obtainable through these applications will enrich fast broadband networks beyond recognition. What we now have is, on the one hand, the Over-The-Top (OTT) applications that have conquered the world... more
Mobile operators are counting on Long Term Evolution (LTE) technology to handle surging demand for mobile data access. But LTE developers made some poor choices, cutting spectral efficiency and thus driving up operator costs. LTE was envisioned as an all IP system, but the RF allocations follow the voice-centric approach of earlier generations. While LTE standards allow for either Frequency Division Duplexing (FDD) or Time Division Duplexing (TDD), all initial LTE equipment uses FDD. FDD requires two separate blocks of spectrum... more
News reports say that the Israeli government is close to passing a law that requires portable e-mail addresses, similar to portable phone numbers. Number portability has been a success, making it much easier to switch from one provider to another, and address portability might ease switching among ISPs. But e-mail is not phone calls. Is it even possible? more
There are a number of sources talking about the takedown of the Mariposa botnet... Spanish authorities, working with researchers from Panda Labs, Defence Intelligence and a couple of other educational institutions, took down the Mariposa botnet (Mariposa is the Spanish word for "butterfly"). The Mariposa botnet is an absolutely enormous with around 12 million (!) nodes doing its bidding. It was involved in things like credit card phishing and identity fraud. more
The ICANN meeting in Nairobi starts officially next Monday. However, as is normally the case, by the time Monday rolls around people will already have been working since Saturday morning (if not earlier). All ICANN meetings seem to be surrounded by some bit of controversy and excitement, but the Nairobi meeting is possibly more dramatic than many others. The last attempt to hold a meeting in Nairobi failed, with ICANN opting to hold the meeting near LA's airport, LAX, instead. more
The Regional Internet Registries are conducting a Internet community consultation process regarding the recent ITU IPv6 Country Internet Registry (CIR) proposal. In collaboration with the other Regional Internet Registries, APNIC hosted a special session at APNIC 29 / APRICOT 2010 to give the global Internet Community an opportunity to discuss the issues and ramifications of the alternative model proposed by the ITU. For those interested in the outcome of the recent face-to-face session, a raw transcript and session summary statement are available... more
The tremendous demand for, and profitability of mobile telephony supports legislative and regulatory efforts to refarm spectrum with an eye toward reallocating as much as possible for wireless telephony and data services. But there is a downside that no one seems to acknowledge. In light of past FCC practice and the behavior of incumbent wireless carriers I expect two anticompetitive outcomes to occur with the onset of any more spectrum. more
There's a scene in the Steven Soderbergh movie, Traffic, where the widow of a drug dealer brings a doll to the Columbian drug kingpin. "The doll is stuffed with cocaine. Big deal, we've been doing that for years," he says dismissively. "No," she answers, "the doll is cocaine." The whole toy is a heat-treated, compression-molded block of cocaine, undetectable to sniffing dogs. The drug lord becomes very interested. The Internet is like that doll... more
The Ninth Circuit affirmed the district court's ruling in Office Depot v. Zuccarini, agreeing that a creditor may levy against a domain name in the jurisdiction where the domain name registry is located. The decision is significant for two reasons. First, it affirms (or reaffirms) that domain names are property subject to the claims of creditors... more
Cloud Computing is a hot topic. Some say it is already here, most agree that it will be much bigger in the coming years. It is pushed forward by the economic benefits of virtualization and consolidation. Take a heterogeneous data center, full of many kinds of servers, running a myriad of applications and consolidate it into a uniform farm of virtual machines, where each application is services by one or more VMs and you have a cloud, what is called a private cloud. more
The POPClock tells us that there are 6,807,230,170 of us on this planet when I looked it up at 22:26 UTC (EST+5) Feb 26, 2010. In the meantime we are about to connect the 5 billionth cell phone user this year according to ITU Secretary-General Dr. Hamadoun Toure.
more
Permission is always a hot topic in email marketing. Permission is key! the experts tell us. Get permission to send email! the ISPs tell us. Marketers have responded by setting up processes to "get" permission from recipients before adding them to mailing lists. They point to their privacy polices and signup forms and say "Look! the recipient gave us permission." In many cases, though, the permission isn't given to the sender, permission is taken from the recipient. more
The dot-uk registry Nominet has passed a crucial governance test with flying colours, voting yes on eight Board resolutions with more than 93 percent member support... The vote was a crucial test for both Nominet's Board and members: trust and confidence in the Board had been damaged by an acrimonious internal battle, which had subsequently led to the UK government threatening to end self-regulation of the UK's registry operations. more
Joseph Menn has an article on CNN.com wherein the crux of the story is that US experts are closing in on the hackers that broke into Google last month. It is believed by some that the Chinese government sponsored these hackers. China, naturally, denied involvement. My own take is that tools today are sophisticated enough such that you don't necessarily need state sponsorship in order to launch a cyber attack. more
They say late converts are the most passionate believers. Until now I haven't supported the Expression of Interest (EOI) for new TLDs, the proposed mechanism to measure the number and type of likely applications. Not because it won't work (I think it'll work fine) but because I didn't think it was necessary. I've changed my mind. Here's why. more
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byVerisign