As the pandemic continues, the network operator community continues to meet online. NANOG held its 81st meeting on February 8 and 9, and these are my notes from some of the presentations at that meeting... Ethernet, developed in 1973 at Xerox PARC, was a revolutionary step in network architectures in many ways. The common bus architecture imposed several constraints on the network that have echoed through the ensuing four decades in all kinds of ways. more
After some turmoil, Facebook won the war with the Australian Government as the necessary changes were made to the legislation that avoided them needing to change their business model. Those subtleties are lost in the general press. What counts for the popular media is that they were able to spin some great stories around the fact that Australia stood up to the giants. That brought international attention, which boosted the ego of Australian Prime Minister Scott Morrison. more
When a brand goes so far as to ask a domain name registrar for Whois (the registration contact details) of a potentially abusive domain name, there's likely a lot at stake. Most often, the request is prompted by consumer safety concerns, such as the risk to consumers posed by a malicious site. Other times, the demand has a simple goal: to have a dialog with the registrant about the use of trademarks or other intellectual property in order to avoid extreme action. more
President Biden recently signed an executive order that will require that the federal government buys more goods produced in the United States. This was done to promote American jobs and to keep profits at home. It's a great idea, but it suffers from one big flaw -- we don't manufacture a lot of things in the US anymore. Statistics are hard to pin down, but something like 40,000 US factories have shut down over the last decade. more
A few months ago, I reported on the broader market of which telecommunications infrastructure is a part. I mentioned data centers, cloud computing and data analytics (big data). All together, we can perhaps best call this digital infrastructure. While the importance of this merged set of infrastructures will benefit all economies and societies, I recently focused on regional developments as basically every region and every mid-size town will need to have a digital hub for local computing workloads and storage. more
As mentioned in previous analyses, the way that the Government has approached its battle with the digital giants has been flawed from the beginning. True, its tough stand had made Google pay media companies well above what these companies would have been able to negotiate individually with Google, but the fundamentals of why these battles are taking place are still unchanged. more
The Secondary Market in domain names plays a critical role in Internet commerce yet is often misunderstood. This article will attempt to clear up some of the myths that frequently arise when discussing the Secondary Market... Domain name investors are but one group participating in the thriving domain name Secondary Market, in which already registered domain names move from one owner to another. more
Over the last few years, it's become clear that abuse of the Domain Name System -- whether in the form of malware, botnets, phishing, pharming, or spam -- threatens to undermine trust in the Internet. At Public Interest Registry, we believe that every new .ORG makes the world a better place. That means anything that gets in the way of that is a threat, and that includes DNS Abuse. more
Beta testers in the US and Canada paid $500 for a terminal and are paying $99 per month for the service. The beta tests began in high-income countries, but SpaceX is beginning to roll Starlink out and will include low-income nations, for example, India. Last September, SpaceX responded to a request for consultation on a roadmap to promote broadband connectivity and enhanced broadband speed from TRAI, the Telecommunications Regulatory Authority of India. more
One of the consequences of the Jan 6th events is a renewed attention towards Surveillance Capitalism as a key doctrine undermining democracy.2 This part 2 of the 2 part series of discusses the rise and fall of Surveillance Capitalism under the premise that the better we understand the danger at the door, the better we are able to confront it. more
The signs are that the Australian Government and Google are close to a compromise. The Government's main demands stay in place, but some of the details will be changed. This allows the Government to claim victory, while the damage to Google will be limited... Publishers will, in one way, or another be paid for news, either through a payment based on the value of the news and the value of the Google search facility. more
For the longest time, it was an insurmountable challenge for those in the developing world to be able to afford to legally consume multimedia products. Prices originally set in Dollars, Euros or Yen often received insufficient adjustments to compensate for lower incomes, something that was compounded by local import or manufacture taxes that did little to alleviate matters. more
Nestled in the northeastern part of the United States is the small state of Vermont, the 14th State to join the United States in 1789. Its name comes from the French, in which 'vert montagne' means 'green mountain.' and it is known as the Green Mountain state. With only about 625,000 inhabitants, it is the 45th state out of 50 in size, and 49th of 50 in number of people, even less populated than Alaska. more
As much as I've written about broadband and broadband technology, it struck me that I have never written a concise response to the question, "Why Fiber?". Somebody asked me the question recently, and I immediately knew I had never answered the question. If you're going to build broadband and have a choice of technologies, why is fiber the best choice? more
Cybercriminals are increasingly targeting Personally Identifiable Information (PII). The reason being "data is the new gold" in this digital world, and the more sensitive some data is, the more value it has. There is no more sensitive data than personally identifiable information because it contains enough information to identify you digitally. Examples of personally identifiable information include name, email, contact number, address, social security number, tax file number, banking or financial information, and more such data that helps identify you. more
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byVerisign
Sponsored byCSC
Sponsored byRadix