Featured Blogs

Latest

Does Bell Really Have a P2P Bandwidth Problem?

Bell filed its response to the Canadian Association Of Internet Providers (CAIP) submission to the Canadian Radio-television and Telecommunications Commission (CRTC) on its throttling practices yesterday, unsurprisingly arguing that its actions are justified and that there is no need to deal with the issue on an emergency basis. Several points stand out from the submission including its non-response to the privacy concerns with deep-packet inspection... and its inference that P2P usage could be deemed using a connection as a "server" and therefore outside the boundaries of "fair and proportionate use" under typical ISP terms of use. more

Locking Out Competing Providers is Bad

Today one of the headlines in Computer Sweden was that there is a dispute between Telia and the regulator PTS in Sweden. PTS requires Telia to stop locking out competing TV-distribution companies for IP-TV in the access network (DSL) that Telia runs. Specifically, they lean towards the fact Telia is dominant provider of the copper, and require Telia to competitors give access to the larger frequency band in the copper that they claim is needed for TV distribution. more

Models for Muni WiFi Completely Neglect Technology Evolution

Modern travel means interminable waits, but it's a good time for reading. I finally read Wireless Pittsburgh: Sustainability of Possible Models for a Wireless Metropolitan-Area Network by Jon M. Peha, published in February as a working paper of the New America Foundation. The good news: it's full of interesting cost estimates and projected subscriber take rates based on specific demographics in Pittsburgh, Minneapolis and Philadelphia... The flaws in this study...
 more

Canadians Aren’t Buying Into Net Neutrality

The Tyee, an independent on-line magazine based in BC wrote a story about net neutrality more than a year ago, noting that most Canadians are sleeping through the debate. They followed up again last week. Despite what is called a "perfect storm of events that may crystallize the issue for consumers, businesses, politicians, and regulators," there hasn't been an overwhelming outcry, despite extensive press coverage of the most recent network activities. There are a number of voices who present a conspiracy theory on traffic shaping in Canada... more

CAIDA and ARIN Release IPv6 Survey

The Cooperative Association for Internet Data Analysis (CAIDA) and the American Registry for Internet Numbers (ARIN) presented the results [PDF] of a recent IPv6 survey at the ARIN XXI Public Policy Meeting in Denver on April 7th. The survey involved over 200 respondents from a blend of Government, commercial organizations (including ISPs and end users), educational institutions, associations, and other profit and non-profit entities. The purpose of the survey, conducted between March 10th and 24th, was to capture IPv6 penetration data in the ARIN region... more

Retrograde Inversion of Telecommunications Policy

Going backwards upside down. That's what we're doing with telecommunications policy in the U.S. The Comcast affair should prompt a re-examination of many decisions the FCC, Congress, and the courts have made over the last few years. When the FCC reports on its reactions to Comcast's activities, the right response will be "You're asking the wrong question." "What is reasonable network management" isn't the question we should be asking... more

If It Spams Like a Duck…

We've been wondering what e360 hoped to gain with their recent lawsuits against Spamhaus and others. If they were trying to clarify the right of ISPs to protect their users from spam, then they've certainly done a good job -- especially in this particular case. If it wasn't clear before, Judge Zagel's explanation should satisfy even the most pedantic of filtering opponents: "ISPs acting in good faith to protect their customers are not liable for blocking messages that some spammer claims are not spam..." more

Comcast 1, E360 0

The judge in E360 vs. Comcast filed his order yesterday (read previous postings here and here), and to put it mildly, he agreed with Comcast. It starts: "Plaintiff e360Insight, LLC is a marketer. It refers to itself as an Internet marketing company. Some, perhaps even a majority of people in this country, would call it a spammer." ...and from E360's viewpoint, goes downhill from there. more

Overloading the Internet? Recent Media Reports Based on Dangerous Misinformation

The London Times article (and a similar one in the Guardian) are based on dangerous misinformation. The net isn't slowing down, and nearly no technical experts believe major "overload" problems likely on the backhaul, core, or decent local loop... Net traffic per user, as documented by Odlyzko and Cisco, has been growing at about 35-40% the last five years, and that growth rate is flat and possibly down the last two years. The net has been able to handle the increase without price increases, much less overload, because the primary and rate limiting equipment (switches, routers, WDM, etc.) have simultaneously been going down at a similar 35-40%. Moore's Law is bringing costs down and capacity up at a remarkable rate. more

NY Times Grossly Misreads WEF Report

Today's New York Times includes an article by John Markoff entitled "Study Gives High Marks to US Internet." But either John Markoff is fuzzy about exactly what the Internet is or he didn't actually read the report. His title is way off base. He did interview a few people who are quoted in the latter part of the article, so there is some information in the article. But he's done a major disservice for the many who read only the title or perhaps first paragraph... more

Call for “ISP Point of Contact” Database for Neutrality “Event” Concerns

When I initiated NNSquad (Network Neutrality Squad), one of my primary concerns was that many seemingly reportable "events" that can occur on the Internet -- and that might seem on their face to be network neutrality "violations" -- might actually be caused by innocent technical issues related to ISP operations, testing anomalies, or misinterpretation of test or otherwise observed data. Analysis of these situations -- which may invoke security and privacy concerns -- can be quite complex, and without a reasonably complete picture of events can also be considerably problematic... more

Managing Internet as a Shared Resource: Reasonable Technical Constraints?

The internet is a shared resource. Different access providers begin mixing traffic at different places, but sooner or later, my internet gets mixed into yours. The Canadian Association of Internet Providers (CAIP) application to the Canadian Radio-television and
Telecommunications Commission (CRTC) seems to acknowledge this shared nature with its reference (at paragraph 50 of its application) to the description of the Gateway Access Service its members resell, a description complete with a graphic of a cloud -- a sign that the resource is being shared... more

Goo Goo Goggles: 700MHz Spectrum Auction and the U.S. Taxpayers

Scott Cleland claims the open access rules on 700MHz spectrum triggered by Google's bid fleeced the US taxpayer by $7bn. I don't buy it, even as a signed-up fully-paid network neutrality opponent. Firstly, the numbers ignore economics. If the C block was encumbered, that would raise the prices of the A and B blocks. So you need to take a much smaller differential as to the cost of the encumbrance. more

Whose Network Is It?

A reader sent me a link last week to a piece that doesn't speak highly of net neutrality. Clyde Wayne Crews wrote an article called "Dumb Pipes, a Dumb Idea: Net Neutrality as 21st Century Socialism" that calls for legislators to reject "nut" neutrality. "Elevating the principle of mandatory net neutrality above the principle of investor ownership and wealth creation in pipes and spectrum deflects market forces away from the infrastructure development that we need..." Did anyone else see a touch of irony in a letter to the editor... more

Sender Address Verification: Still a Bad Idea

A lot of spam uses fake return addresses. So back around 2000 it occurred to someone that if there were a way to validate the return addresses in mail, they could reject the stuff with bad return addresses. A straightforward way to do that is a callout, doing a partial mail transaction to see if the putative sender's mail server accepts mail to that address. This approach was popular for a few years, but due to its combination of ineffectiveness and abusiveness, it's now used only by small mail systems whose managers don't know any better. What's wrong with it? more

Topics

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days