Marilyn Cade was an exceptionally hardworking, always gracious leader in ICANN and IGF. She was a strong supporter of U.S. interests at ITU and a member of the U.S. delegation at the WCIT. Dozens have spoken of her at a memorial site, including Vint Cerf: "Marilyn was an elemental force in the ICANN, IGF and policy worlds. She was an advocate who could be counted upon to speak passionately for the causes to which she was dedicated..." more
On February 2, 1989, the Soviet Union launched its Cosmos 2004 satellite and the Chinese launched a rocket on December 15, 2009. Cosmos 2004 is now defunct, as is the third stage of that Chinese rocket, but both remain in orbit. They were long forgotten until recently when LeoLabs, a satellite tracking service, predicted that they had a good chance of colliding at 971 km over the sea near Antarctica. more
The ICANN 69 meeting has come to a close, with no progress on DNS abuse or implementation of the Privacy/Proxy Services Accreditation policy (PPSAI). While ICANN is uniquely positioned to do so, it refuses to do anything proactive about DNS abuse, with its executives overtly attempting to limit its role to data collection. Moreover, its refusal to implement community-driven initiatives such as the PPSAI points to a growing trend where ICANN is backing away from its public interest responsibilities, to the detriment of the Internet and its users. more
In the 2020 Broadband Deployment Report, the FCC made the following claim. "The vast majority of Americans -- surpassing 85% -- now have access to fixed terrestrial broadband service at 250/25 Mbps". The FCC makes this claim based upon the data provided to it by the country's ISPs on Form 477. We know the data reported by the ISPs is badly flawed in the over-reporting of download speeds. Still, we've paid little attention to the second number. more
Every few years; some self-proclaimed academic imparts an article on the future of work, with conflicting information from various experts leaving many uncertain about its impact on jobs, skills, and wages. In less than a year, these same scholars will be writing about the "future of labor," and given the speed of innovation, by the time these articles are published, they will be made obsolete. more
JavaScript started out as a simple extension for the browser but has become so much more. In part, this is true in building on rich concepts going back to Lisp. Along the way, it has challenged the givens of programming and given us a high-performance flexible language along with rich libraries and rich tools. We're just beginning to discover the possibilities. more
There is an interesting article recently published in the English version of a South Korean newspaper, the ChosunILBO, that talks about 5G in China. According to the article, the Chinese 5G rollout is an expensive bust. There are a number of interesting facts disclosed about the Chinese 5G rollout. First, it's clear that the rollout is using millimeter wave spectrum. more
The term "attack surface" is often heard in cybersecurity conversations. It refers to the sum of all possible attack vectors or the vulnerabilities that threat actors can exploit to penetrate a target network or damage an organization somehow. An unused and forgotten subdomain, for instance, can become an attack vector when taken over. Certain categories of companies have very large attack surfaces. Such is the case of streaming media businesses like Netflix and HBO Max. more
According to an email, Starlink has moved into the second phase of its beta program, nicknamed the "better than nothing beta," which feels a bit like monopoly hubris to me. It may be better than nothing, but it is not as good as the initial beta, which was free. Participants will pay $99 per month for the service and pay $499 for a terminal, including a tripod and WiFi router. I wonder what the difference is between these "beta testers" and "customers." more
We used to think of computer networks as being constructed using two fundamental common infrastructure components: names and addresses. Every connected device had a stable protocol address to allow all other devices to initiate a communication transaction with this device by addressing a data packet to this protocol address. And every device was also associated with a name, allowing human users and human use applications to use a more convenient alias for these protocol addresses. more
In October 2020, I went on a two-week tour into Queensland's Outback, traveling through various landscapes from pastoral and agricultural lands to savanna and the desert. Leaving Brisbane, past Toowoomba, you enter the Darling Downs. This is one of the richest agricultural areas in Australia. British Botanist Alan Cunningham first explored it in 1827. However, only after the penal colony of Moreton Bay (now Brisbane) was closed, free settlers were allowed in the area. more
Let's play the analogy game. The Internet of Things (IoT) is probably going end up being like... a box of chocolates, because you never do know what you are going to get? a big bowl of spaghetti with a serious lack of meatballs? Whatever it is, the IoT should have network folks worried about security. Of course, there is the problem of IoT devices being attached to random places on the network, exfiltrating personal data back to a cloud server you don't know anything about. more
The statistics concerning the number of gigabit fiber customers in the US is eye-opening. OpenVault tracks the percentage of customers provisioned at various broadband speeds. At the end of 2019, the company reported that 2.81% of all households in the US were subscribed to gigabit service. By the end of the first quarter of 2020, just after the onset of the pandemic, the percentage of gigabit subscriptions had climbed to 3.75% of total broadband subscribers. more
The last two months have seen a flurry of Starlink activity, including the following: Bill Gates has a history of interest in satellite Internet and in September, Microsoft announced their Azure Obrital ground station service, which enables satellite access to its Azure cloud services. SES, Viasat, and Intelsat were announced as initial partners and SpaceX just signed up. Starlink+Azure Orbital will compete with Amazon's satellite constellation and its ground-station service... more
The 20th century was the golden age of surveillance. High-speed communication went either by telegraph and telephone, which needed a license from the government, or by radio, which anyone can listen to. Codes were manual or electromechanical and were breakable, e.g., the Zimmermann telegram and Bletchley Park. (The UK government spent far more effort inventing a cover story for the source of the telegram than on the break itself, to avoid telling the world how thoroughly they were spying on everyone.) more
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byRadix
Sponsored byVerisign