There is an interesting article recently published in the English version of a South Korean newspaper, the ChosunILBO, that talks about 5G in China. According to the article, the Chinese 5G rollout is an expensive bust. There are a number of interesting facts disclosed about the Chinese 5G rollout. First, it's clear that the rollout is using millimeter wave spectrum. more
The term "attack surface" is often heard in cybersecurity conversations. It refers to the sum of all possible attack vectors or the vulnerabilities that threat actors can exploit to penetrate a target network or damage an organization somehow. An unused and forgotten subdomain, for instance, can become an attack vector when taken over. Certain categories of companies have very large attack surfaces. Such is the case of streaming media businesses like Netflix and HBO Max. more
According to an email, Starlink has moved into the second phase of its beta program, nicknamed the "better than nothing beta," which feels a bit like monopoly hubris to me. It may be better than nothing, but it is not as good as the initial beta, which was free. Participants will pay $99 per month for the service and pay $499 for a terminal, including a tripod and WiFi router. I wonder what the difference is between these "beta testers" and "customers." more
We used to think of computer networks as being constructed using two fundamental common infrastructure components: names and addresses. Every connected device had a stable protocol address to allow all other devices to initiate a communication transaction with this device by addressing a data packet to this protocol address. And every device was also associated with a name, allowing human users and human use applications to use a more convenient alias for these protocol addresses. more
In October 2020, I went on a two-week tour into Queensland's Outback, traveling through various landscapes from pastoral and agricultural lands to savanna and the desert. Leaving Brisbane, past Toowoomba, you enter the Darling Downs. This is one of the richest agricultural areas in Australia. British Botanist Alan Cunningham first explored it in 1827. However, only after the penal colony of Moreton Bay (now Brisbane) was closed, free settlers were allowed in the area. more
Let's play the analogy game. The Internet of Things (IoT) is probably going end up being like... a box of chocolates, because you never do know what you are going to get? a big bowl of spaghetti with a serious lack of meatballs? Whatever it is, the IoT should have network folks worried about security. Of course, there is the problem of IoT devices being attached to random places on the network, exfiltrating personal data back to a cloud server you don't know anything about. more
The statistics concerning the number of gigabit fiber customers in the US is eye-opening. OpenVault tracks the percentage of customers provisioned at various broadband speeds. At the end of 2019, the company reported that 2.81% of all households in the US were subscribed to gigabit service. By the end of the first quarter of 2020, just after the onset of the pandemic, the percentage of gigabit subscriptions had climbed to 3.75% of total broadband subscribers. more
The last two months have seen a flurry of Starlink activity, including the following: Bill Gates has a history of interest in satellite Internet and in September, Microsoft announced their Azure Obrital ground station service, which enables satellite access to its Azure cloud services. SES, Viasat, and Intelsat were announced as initial partners and SpaceX just signed up. Starlink+Azure Orbital will compete with Amazon's satellite constellation and its ground-station service... more
The 20th century was the golden age of surveillance. High-speed communication went either by telegraph and telephone, which needed a license from the government, or by radio, which anyone can listen to. Codes were manual or electromechanical and were breakable, e.g., the Zimmermann telegram and Bletchley Park. (The UK government spent far more effort inventing a cover story for the source of the telegram than on the break itself, to avoid telling the world how thoroughly they were spying on everyone.) more
After two decades of involvement with ICANN, I am stepping down from the Board of Directors, where I served for nine years. I have spent considerable time of late reflecting on the past 20 years, and I have isolated some memories that help frame my time with ICANN. ... November 2000, ICANN07 in Marina del Rey, California - With only a scant idea of what ICANN is all about, I am warmly welcomed by the flag-wearing country code top-level domain (ccTLD) community, who come to ICANN to ensure that nothing happens to affect the independence of ccTLDs... more
Apple is coming out with a full range of new 5G iPhones. The phones have been designed to use the full range of new frequencies that the various cellular companies are touting as 5G, up to and including the millimeter wave spectrum offered in center cities by Verizon. In addition to 5G, the phones have new features like a better camera, better ease at using wireless charging, and a lidar scanner. more
When a service is constructed using diverse components, then the way in which service revenues are distributed to the various suppliers of the components of the service can follow a number of quite distinct models. There are various forms of revenue redistribution models where the revenue per transaction is distributed to the various suppliers according to their inputs to support each transaction. more
The web is full of stories of rural areas with no broadband options, and I've spent a lot of time in the last few decades helping rural areas get better broadband. There has not been nearly as much coverage of the huge broadband gap in urban areas. There are a lot of urban homes that can't afford broadband and, in many cases, got bypassed when the telcos and/or cable companies built their networks. more
MIT released a comical study in May of 2020 on the historical innovation accomplishments, and the potential logistical endeavors brought to light by the beleaguered United States Postal Service. The apparent scholarly article cited several technological implementations and employee empowered frameworks that could define the USPS's plight over the next five years. These frameworks, through FY2025, mention a postal-banking initiative and two AI autonomous vehicles initiatives. more
The risks of fraud and disinformation in the U.S. election process have been hiding in plain sight. CSC's new research finds that a large majority of web domains closely linked to the campaign websites for Joe Biden and Donald Trump lack basic domain security protocols and are prone to domain spoofing tactics. This makes them a potential target for hackers looking to spread disinformation ahead of the election, and criminals who want to take advantage of voter intentions... more
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byVerisign