When did the Internet begin? It all gets a bit hazy after so many years, but by the early 1970s, research work in packet-switched networks was well underway, and while it wasn't running TCP at the time (the flag day when the ARPANET switched over to use TCP was not until 1 January 1983) but there was the base datagram internet protocol running in the early research ARPA network in the US. Given that this is now around 50 years ago, and given that so much has happened in the last 50 years, what does the next 50 years have in store? more
Three satellite companies, SES, Telesat, and Hughes, are working toward integrated, multi-orbit broadband Internet service and Eutelsat may join them... It is too soon for these companies to be offering integrated multi-orbit services, but they have begun testing and demonstrating switching and antenna technology. more
Would you like to help guide the future of the Mutually Agreed Norms for Routing Security (MANRS) initiative? As the MANRS community continues to develop new efforts to make the routing layer of the Internet more secure (ex. the equipment vendor program), would you like to help lead the work? The MANRS community is seeking volunteers for its new Steering Committee. The committee will lead the community as it evolves its governance model. more
An industry group calling itself 5G Americas has published a whitepaper that touts the advantages of a smart auto grid powered by 5G and the C-V2X technology. This technology is the car connectivity standard that much of the industry has gelled around, replacing the older DSRC standard. Over a decade ago, the FCC became so enamored over the idea of self-driving cars that the agency dedicated the 5.9 GHz spectrum band for the sole use of smart cars. more
According to the Cybersecurity and Infrastructure Security Agency (CISA), most cyberattacks, including ransomware and business email compromise, begin with phishing. Although losses due to ransomware now exceed billions annually, most ransomware protection and response measures don't protect against the most common phishing attacks. Established research shows that phishing attacks most commonly occur from a maliciously registered, confusingly similar domain name, a compromised or hijacked legitimate domain name, or via email header spoofing. more
I haven't talked about the growth of broadband usage for a while. However, I was explaining the exponential growth of broadband usage to somebody recently, and I suddenly realized an easy way for putting broadband growth into context. The amount of data used by the average broadband user has been doubling roughly every three years since the advent of the Internet. This exponential growth has been chugging along since the earliest dial-up days, and we're still seeing it today. more
In our continuing series on RealTime machine learning recommendations for email, we will discuss the importance of Sentiment Analysis in RealTime for Email. The initial feedback we've received from the field to develop a Sentiment Analysis model has been extraordinary. We initially want to dissect why we feel this model is essential, determine the components needed to serve real-time machine learning recommendations for higher engagement rates before the campaign send, and tailoring sentiment to the types of emails companies send. more
Recently I was asked by a customer how they can easily set up rollback capabilities on the endpoints in their corporate network. They had seen the marketing hype by various security technology providers that their products included rollback capabilities they could utilize if/when one of their workstations or servers was infected by malware. Having gotten this question more than once, I thought it would be a good subject to share with a broader audience. more
I’ve lately been looking at broadband policies that have shaped broadband, and I don’t think there has been any more disastrous FCC policy than the one that defines broadband by speed. This one policy has led to a misallocation of funding and getting broadband to communities that need it. The FCC established the definition of broadband as 25/3 Mbps in 2015, and before then, the definition of broadband was 4/1 Mbps, set a decade earlier. The FCC defines broadband to meet a legal requirement established by Congress and codified in Section 706 of the FCC governing rules. more
It was only a few weeks back, in July of this year, where I remarked that an Akamai report of an outage was unusual for this industry. It was unusual in that it was informative in detailing their understanding of the root cause of the problem, describing the response that they performed to rectify the immediate problem, the measures being undertaken to prevent a recurrence of this issue, and the longer-term measures to improve the monitoring and alerting processes used within their platform. more
With cybercrime on the rise, companies in 2021 have experienced increased ransomware attacks, business email compromise (BEC), phishing attacks, supply chain attacks, and online brand and trademark abuse. While domain cyber risk is rising, the level of action being taken by Forbes Global 2000 companies to improve their domain security posture has remained unchanged, leaving these companies exposed to even more risk. The risk of not addressing your domain security can be catastrophic. more
Today, there is demand for more broadband as people realize the importance of being connected to the Internet, whether to access websites, stream entertainment, attend school, attend family events, work remotely, and so much more. This demand has been driven by the success of today's Internet. It is now time to recognize the Internet as infrastructure. The Internet's best-effort approach has allowed us to share the abundant capacity latent in the existing facilities by converting all traffic into packets. more
Domain names are registered by the thousands every day. In July 2021, 236,336 domains were newly registered daily on average across all top-level domains (TLDs). Tens of thousands were also newly expired. Other months could be just as busy. "Newly registered" and "newly expired." Those are two terms I often get questions about. Newly registered domains are domains that someone just reserved, typically through a registrar or web hosting company. Newly expired domains, meanwhile, are those domains that someone had reserved but decided to let go for one reason or another. more
Last month, I announced our Open Data Hub to the CircleID community, inviting anyone interested in making the digital sector more transparent to join our efforts. Today, I am excited to share summaries of our three-part series describing our vision for a sustainable European cloud. It’s a key part of our Roadmap to Sustainable Digital Infrastructure by 2030, and one that is meant to not merely challenge the dominance of the big, non-European cloud providers, but offer an entirely different paradigm that is open-source, fair, sustainable, and creates economic opportunities for all. more
We often forget that a lot of things we do on the web rely on broadband traffic that passes through undersea cables. Any web traffic from overseas gets to the US through one of the many underwater fiber routes. Like with all fiber technologies, the engineers and vendors have regularly been making improvements. The technology involved in undersea cables is quite different than what is used for terrestrial fibers. A long fiber route includes repeater sites where the light signal is refreshed. Without repeaters, the average fiber light signal will die within about sixty miles. more
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byVerisign