Last week American Airlines launched their Aircell wireless Internet access on a limited number of flights. It didn't take long before a few folks tried to make voice and video calls (in violation of Aircell's terms-of-service according to their PR folks), and it didn't take long before someone figured a way around their voice/video blocking efforts. more
On Thursday, Stephen J. Lukasik passed away peacefully at the age of 88. He was the legend in a field with no peer. For nearly half a century, he shaped the development of national security and network technology developments at a level and extent that is unlikely ever to be matched. For a great many of us in that arena from the 1960s past the Millennium, he was the demanding visionary leader who set the policies and directions, framed the challenges, approved and funded the projects, and questioned the results. more
For the first time ever bankers have launched an EFTPOS advertising campaign. Could this be an indication that they are becoming worried about the competition they are getting from internet companies such as PayPal, Amazon, Google and Apple (iTunes)? The digital economy is growing much faster than the bricks-and-mortar economy and, while EFTPOS is not going away anytime soon, an increasingly large amount of money is now bypassing their systems. more
T-Mobile had a major network outage last week that cut off some voice calls and most texting for nearly a whole day. The company's explanation of the outage was provided by Neville Ray, the president of technology... In plain English, the electronics failed on a leased circuit, and then the backup circuit also failed. This then caused a cascade that brought down a large part of the T-Mobile network. more
The internet affects every individual in this world whether directly or indirectly. For example, a medical professional somewhere in Goma, Congo might access the internet to read and post reviews to current medication available and this might have an impact on the kind of medication that he/she recommends to the patient, whether the patient has access to affordable internet or not. Since the internet affects everyone, Africans citizens who are aware of internet governance discussions, expect African stakeholders to engage in these discussions. more
Those of us who have been working on IPv6 for over 15 years know what it means to be an advocate for an infrastructure technology that cannot be easily tied to new revenue or short-term risks. It is a battle on an icy uphill slope with head winds and a gallery of skeptics who call themselves realists and cheer your every bruise. This has often made us cheer any news of a new IPv6 deployment, as a means to keep faith. However in doing so, it sometimes made us overlook the substance of that news... more
SES's first multi-orbit partnership was Cruise mPOWERED + Starlink, providing a managed blend of SES MEO and Starlink LEO service for maritime operators, and we can expect similar bundled services in aviation and enterprise markets. more
Toward the end of last week, the world waited with bated breath for the outcome of the 21st annual meeting of the Conference of the Parties (COP) of the UN Framework Convention on Climate Change (UNFCC). The meeting, commonly called COP 21, was held in Le Bourget, Paris, from November 30 to December 12; a bit too soon after the terrorists attacks on Paris earlier in November. COP 21 was important because COP 15 in Copenhagen (2009) failed to arrive at a global consensus... more
Domain Name System (DNS) Operators (Registries and Registrars) receive notices asking them to take action on a wide range of alleged technical and content-related abuses. However, there is a fundamental question of when it is appropriate to act at the DNS level and the evaluation of whether the alleged abuse meets a sufficient threshold for action at the DNS level. Additionally, given the volume of abuses occurring on the internet, existing resources, mechanisms, and protocols available in-house to Operators are in many cases insufficient to address abuses in a timely fashion. more
The UDRP lists three nonexclusive circumstances for rebutting lack of rights or legitimate interests in domain names, which if successful also concludes the issue of abusive registration in respondent's favor. The third circumstance is "you are making a legitimate noncommercial or fair use of the domain name without intent for commercial gain to misleadingly divert consumers or to tarnish the trademark or service mark at issue." more
Cloud is a new technology domain, and data centre engineering is still a developing discipline. I have interviewed a top expert in cloud infrastructure, Pete Cladingbowl. He has a vision of the 'lean' data centre and a better kind of Internet for users to reach it. He also has a roadmap for how these can be practically realised. The key is to apply established theories of value flow from more mature industries. more
Before the American Registry for Internet Numbers' 40th Public Policy Meeting closed last week, members were reminded that the elections for two seats on its Board of Trustees was an opportunity for needed change. The opening of polls last Thursday marked the end of an era. The clue was the candidates. For the first time in ARIN’s history, at least one seat on its board would not be filled by an elected white male. more
Ukraine's representative to ICANN's Governmental Advisory Committee (GAC) has sent a letter to the Internet Corporation for Assigned Names and Numbers (ICANN) to remove Russian-administered top level domains (.RU, .SU and .рф) from the DNS root zone. In a separate letter, Ukraine's representative also asked RIPE NCC to withdraw the right to use all IPv4 and IPv6 addresses by all Russian members of the regional IP registry for the European region. more
The Great Renaming was a significant event in Usenet history since it involved issues of technology, money, and governance. From a personal perspective -- and remember that this series of blog posts is purely my recollections – it also marked the end of my "official" involvement in "running" Usenet. I put "running" in quotation marks in the previous sentence because of the difficulty of actually controlling a non-hierarchical, distributed system with no built-in, authenticated control mechanisms. more
In its security bulletin, Akamai's Security Intelligence Response Team (SIRT) reported on abuse of DNS Security Extensions (DNSSEC) when mounting a volumetric reflection-amplification attack. This is not news, but I'll use this opportunity to talk a bit about whether there is a trade-off between the increased security provided by DNSSEC and increased size of DNS responses that can be leveraged by the attackers. more
Sponsored byRadix
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byVerisign