Access Providers

Access Providers / Most Viewed

Why Isn’t Mobile Malware More Popular?

This is a followup to Wout de Natris' as usual excellent piece on the Enisa botnet report -- pointing out the current state of mobile malware and asking some questions I started off answering in a comment but it grew to a length where I thought it'd be better off in its own post. Going through previous iterations of Mikko's presentations on mobile malware is a fascinating exercise. more

Nation Scale Internet Filtering—Do’s and Don’ts

If a national government wants to prevent certain kinds of Internet communication inside its borders, the costs can be extreme and success will never be more than partial. VPN and tunnel technologies will keep improving as long as there is demand, and filtering or blocking out every such technology will be a never-ending game of one-upmanship. Everyone knows and will always know that determined Internet users will find a way to get to what they want, but sometimes the symbolic message is more important than the operational results. more

FBI Pushing Plans to Force Surveillance Backdoors on Social Networks, VoIP, and Email Providers

Declan McCullagh reporting in CNET: "The FBI is asking Internet companies not to oppose a controversial proposal that would require the firms, including Microsoft, Facebook, Yahoo, and Google, to build in backdoors for government surveillance. In meetings with industry representatives, the White House, and U.S. senators, senior FBI officials argue the dramatic shift in communication from the telephone system to the Internet has made it far more difficult for agents to wiretap Americans suspected of illegal activities..." more

A Quick Primer on Internet Peering and Settlements

The business world today features many complex global service activities which involve multiple interconnected service providers. Customers normally expect to execute a single paid transaction with one service provider, but many service providers may assist in the delivery of the service. These contributory service providers seek compensation for their efforts from the initial provider. However, within a system of interdependent providers a service provider may undertake both roles of primary and contributory provider, depending on the context of each individual customer transaction. more

The Internet’s Gilded Age

The rise of the Internet has heralded rapid changes in our society. The opportunities presented by a capable and ubiquitous communications system and a global transportation network have taken some corporations from the multinational to the status of truly global mega-corporation. Good examples of these new corporations include Google, Apple, Amazon, Microsoft and Facebook. There are a handful of large-scale winners in this space and many losers. But this is not the first time we've witnessed a period of rapid technological and social change. more

Network Neutrality is the Wrong Fight!

We shouldn't settle for network neutrality. It's a poor substitute for what we had and much less than what we need. Let me explain. There are two topics to discuss. The first is "common carriage," a centuries old legal concept that applied to the US telecom industry throughout most of the 20th century. The second involves communications protocols. Both topics are complex, so I will cover only what's needed to understand why we shouldn't accept network neutrality and why, at a minimum, we should fight for enforcement of existing common carriage rules. more

Putting COVID-19 Traffic Growth Into Perspective

Nokia Deepfield is another company that works in the background on the web, and that analyzes data traffic patterns for the big ISPs. Their June 4 report on web traffic reports about the same thing we're hearing from most large ISPs -- the volume of web traffic suddenly shot up since the onset of the pandemic. Nokia Deepfield says that the increase in traffic has settled in at about a 25% increase over pre-COVID levels. more

Politico Writes of Comcast’s IPv6 Effort

Larry Seltzer writes: Politico? Comcast's PR gets an 'A' for this article, an upbeat tech-lite description of the impending depletion of the IPv4 space and efforts to adopt IPv6. It also seems that the Obama administration is behind this, and that the Federal government has had "remarkable foresight on this issue." I feel better already. more

NANOG 61 - Impressions of Some Presentations

The recent NANOG 61 meeting was a pretty typical NANOG meeting, with a plenary stream, some interest group sessions, and an ARIN Public Policy session. The meeting attracted some 898 registered attendees, which was the biggest NANOG to date. No doubt the 70 registrations from Microsoft helped in this number, as the location for NANOG 61 was in Bellevue, Washington State, but even so the interest in NANOG continues to grow... more

Moore’s Law and the Economics of Abundance

Moore's Law explains why the price of everything electronic keeps going down; but now Moore's Law is starting to have an effect on much more than technology prices. The costs of energy, medicine, law, education, financial transactions, and government itself are falling because of Moore's Law's relentless progress. But these cost decreases are not being fully reflected in the prices we pay for all these things. more

Can’t Connect… Won’t Connect

BBC technology correspondent Rory Cellan-Jones must be hoping that his near neighbours don’t decide they want a larger family. He recently spent ages setting up a high-speed wireless network at home, documenting the whole tortuous process on the BBC Technology blog, but all his hard work could apparently be ruined by a single baby listener in the neighbourhood... more

The Myth of the Unintended Infringer in SOPA and PIPA

In a recent op-ed piece in TheHill.COM, some friends and I described the futility of mandated DNS blocking as contemplated by the SOPA (H.R. 3261) and PIPA (S. 968) bills now working their way through the U.S. Congress: No Internet user is required to use the Domain Name servers provided by their ISP. And if millions of American citizens who for whatever reason want to engage in online piracy can no longer do so because Congress has passed this law and their ISP is now filtering the citizen's DNS lookups... more

Bandwidth Demands Exceeding Internet Infrastructure Investment

Nemertes Research has released a report on the future of the Internet infrastructure. The key finding from the report is that bandwidth demands are exceeding infrastructure investment, especially at the access layer. We noted in the project that users may begin to see the impact of degraded application performance as early as 2010. We also noted that the planned investments in Internet infrastructure are insufficient to meet growing demand. more

Overloading the Internet? Recent Media Reports Based on Dangerous Misinformation

The London Times article (and a similar one in the Guardian) are based on dangerous misinformation. The net isn't slowing down, and nearly no technical experts believe major "overload" problems likely on the backhaul, core, or decent local loop... Net traffic per user, as documented by Odlyzko and Cisco, has been growing at about 35-40% the last five years, and that growth rate is flat and possibly down the last two years. The net has been able to handle the increase without price increases, much less overload, because the primary and rate limiting equipment (switches, routers, WDM, etc.) have simultaneously been going down at a similar 35-40%. Moore's Law is bringing costs down and capacity up at a remarkable rate. more

Canada: Smart Regulation, Not De-regulation

Canada's CRTC isn't as dumb as U.S. regulators who are considering ruling that the law doesn't apply where the telcos oppose it. (Title II deregulation) Canada just decided wireless needs to follow the rules. In turn, the CRTC intends to make sure the rules are reasonable. Rather than saying "never any rules," they instead try to write sensible ones. more

Industry Updates

$42 Billion Funding for US Broadband Deployment

Dormant IPv4 Addresses Can Help Mitigate Expected Network Outages

To Accelerate 5G Adoption, European Telcos Need More IP Addresses

Log4j Vulnerability: What Do the IoCs Tell Us So Far?

Gathering Context Around Emotet, Trickbot, and Dridex C&C Servers with Bulk IP Geolocation

i2Coalition and DNA Merger Creates North America’s Largest Internet Infrastructure Advocacy Group

i2Coalition Launches Survey on the Impact of COVID-19 Pandemic on Internet Infrastructure Providers

The Internet Infrastructure Industry Is Protecting Digital Trust and Fighting COVID-19 Related Fraud

Carpet-Bombing Attacks: A Rising Threat to ISPs

Currents of Change: Empowering the Growth and Interplay of Subsea and Interconnection

Peering Versus IP Transit: Answering the Age-Old Question

2016 U.S. Election: An Internet Forecast

Neustar Expands Professional Services Offerings for Communications Service Providers

Australian ISP iiNet selects ARI Registry Services to Help It Apply for and Operate .iinet TLD

NeuStar Names Steven Edwards General Manager, Senior Vice President of Converged Addressing Services