Access Providers

Access Providers / Featured Blogs

Is the FCC Inviting the World’s Cyber Criminals into America’s Living Rooms?

In October 2012, the Chairman and Ranking Member of the House Intelligence Committee issued a joint statement warning American companies that were doing business with the large Chinese telecommunications companies Huawei and ZTE to "use another vendor." The bipartisan statement explains that the Intelligence Committee's Report, "highlights the interconnectivity of U.S. critical infrastructure systems and warns of the heightened threat of cyber espionage and predatory disruption or destruction of U.S. networks if telecommunications networks are built by companies with known ties to the Chinese state, a country known to aggressively steal valuable trade secrets and other sensitive data from American companies."

The Strange Structure of ISP Service Semantics

I have been having a number of conversations recently with several clients and colleagues about "semantics". It's clear that there is not a lot of clarity on this philosophical subject! Whilst is may be an obscure issue, it is a very important one. Our ideas lead us to take actions, and if we want those actions to have the consequences we had in mind, then we need to have done our epistemological homework.

Welcome to Notflix! Your Streaming-Free ISP with the Best Quality of Experience!

It has been widely taken as "obvious" that a "no blocking" rule for ISPs is a good regulatory policy. Is this really the case? Does it save consumers from harm... or cause harm? Netflix has reached the point of being well over 30% of Internet traffic at peak time for some ISPs. This places three costs on the ISP and its users... So for someone who isn't a streaming video user, they are paying a share of the direct costs.

Legacy or Not to Be?

Over the years, most communication service providers will build up their information systems bit by bit. Every so often as new services are required, a new process and vendor product is installed. Several years later, there can be many legacy processes and vendor products chosen and designed by many different people. Generally, each implementation team is diligently aware of these legacy processes and vendor products. But in a lot of cases the whole enterprise architecture becomes very convoluted and complicated.

What Your ISP (Probably) Knows About You

Earlier this week, I came across a working paper from Professor Peter Swire - a highly respected attorney, professor, and policy expert. Swire's paper, entitled "Online Privacy and ISPs", argues that ISPs have limited capability to monitor users' online activity. The paper argues that ISPs have limited visibility into users' online activity for three reasons: (1) users are increasingly using many devices and connections, so any single ISP is the conduit of only a fraction of a typical user's activity; (2) end-to-end encryption is becoming more pervasive, which limits ISPs' ability to glean information about user activity; and (3) users are increasingly shifting to VPNs to send traffic.

Reflections on NANOG 66

The North American Network Operators Group (NANOG) continues to be one of the major gatherings on network operators and admins, together with the folk who work to meet the various needs of this community. Their program committee produces a program that never fails to provide thought provoking interest. Here are my reactions to some of the presentations I heard at NANOG 66, held in San Diego in February.

On the Internet Everyone is Connected to Everyone Else - Right?

We tend to make a number of assumptions about the Internet, and sometimes these assumptions don't always stand up to critical analysis. We were perhaps 'trained' by the claims of the telephone service to believe that these communications networks supported a model of universal connectivity. Any telephone handset could establish a call with any other telephone handset was the underlying model of a ubiquitous telephone service, and we've carried that assumption into our perception of the Internet. On the Internet anyone can communicate with anyone else - right?

The World is in Need of Transformative Solutions

The world has changed significantly since 2000, when the countries of the world adopted the United Nations Millennium Development Goals (MDGs). While strong economic growth in the developing world has helped lift millions out of poverty, global population growth, modern lifestyles and consumption are now stretching the limits of the planet's resources. During this time, technological advances in information and communication technologies (ICT) have radically transformed the way people communicate and lead their lives; now ICT can play a vital, transformative role in helping to put the world on a more sustainable path.

Behind the Curtain: Making IPv6 Work

Wouldn't it be nice if turning on IPv6 really was 'press one button and the rest is magic' easy? For some things, it is. If you're talking about client-side, enabling an IPv4-only home service on DSL or fibre really can be this simple, because all the heavy lifting is being done inside your ISP: you're not enabling IPv6 in the network, you're turning on the last mile. It was knocking at your door and you just had to let it in.

Busting 3 Popular and Misleading Terms in Telecom

"Philosophy is a battle against the bewitchment of our intelligence by means of our language." (-Ludwig Wittgenstein) The words we use to describe telecoms networks often contain hidden metaphors and meanings that lead us into wrong thinking. Here are three examples... Why misleading? The word "best" implies both benevolent and optimal intentionality: the network is going to do the "right" thing for its users, and it will maximise the "rightness" in some way.

Industry Updates

$42 Billion Funding for US Broadband Deployment

Dormant IPv4 Addresses Can Help Mitigate Expected Network Outages

To Accelerate 5G Adoption, European Telcos Need More IP Addresses

Log4j Vulnerability: What Do the IoCs Tell Us So Far?

Gathering Context Around Emotet, Trickbot, and Dridex C&C Servers with Bulk IP Geolocation

i2Coalition and DNA Merger Creates North America’s Largest Internet Infrastructure Advocacy Group

i2Coalition Launches Survey on the Impact of COVID-19 Pandemic on Internet Infrastructure Providers

The Internet Infrastructure Industry Is Protecting Digital Trust and Fighting COVID-19 Related Fraud

Carpet-Bombing Attacks: A Rising Threat to ISPs

Currents of Change: Empowering the Growth and Interplay of Subsea and Interconnection

Peering Versus IP Transit: Answering the Age-Old Question

2016 U.S. Election: An Internet Forecast

Neustar Expands Professional Services Offerings for Communications Service Providers

Australian ISP iiNet selects ARI Registry Services to Help It Apply for and Operate .iinet TLD

NeuStar Names Steven Edwards General Manager, Senior Vice President of Converged Addressing Services