JavaScript started out as a simple extension for the browser but has become so much more. In part, this is true in building on rich concepts going back to Lisp. Along the way, it has challenged the givens of programming and given us a high-performance flexible language along with rich libraries and rich tools. We're just beginning to discover the possibilities.
There is an interesting article recently published in the English version of a South Korean newspaper, the ChosunILBO, that talks about 5G in China. According to the article, the Chinese 5G rollout is an expensive bust. There are a number of interesting facts disclosed about the Chinese 5G rollout. First, it's clear that the rollout is using millimeter wave spectrum.
The term "attack surface" is often heard in cybersecurity conversations. It refers to the sum of all possible attack vectors or the vulnerabilities that threat actors can exploit to penetrate a target network or damage an organization somehow. An unused and forgotten subdomain, for instance, can become an attack vector when taken over. Certain categories of companies have very large attack surfaces. Such is the case of streaming media businesses like Netflix and HBO Max.
According to an email, Starlink has moved into the second phase of its beta program, nicknamed the "better than nothing beta," which feels a bit like monopoly hubris to me. It may be better than nothing, but it is not as good as the initial beta, which was free. Participants will pay $99 per month for the service and pay $499 for a terminal, including a tripod and WiFi router. I wonder what the difference is between these "beta testers" and "customers."
We used to think of computer networks as being constructed using two fundamental common infrastructure components: names and addresses. Every connected device had a stable protocol address to allow all other devices to initiate a communication transaction with this device by addressing a data packet to this protocol address. And every device was also associated with a name, allowing human users and human use applications to use a more convenient alias for these protocol addresses.
In October 2020, I went on a two-week tour into Queensland's Outback, traveling through various landscapes from pastoral and agricultural lands to savanna and the desert. Leaving Brisbane, past Toowoomba, you enter the Darling Downs. This is one of the richest agricultural areas in Australia. British Botanist Alan Cunningham first explored it in 1827. However, only after the penal colony of Moreton Bay (now Brisbane) was closed, free settlers were allowed in the area.
Let's play the analogy game. The Internet of Things (IoT) is probably going end up being like... a box of chocolates, because you never do know what you are going to get? a big bowl of spaghetti with a serious lack of meatballs? Whatever it is, the IoT should have network folks worried about security. Of course, there is the problem of IoT devices being attached to random places on the network, exfiltrating personal data back to a cloud server you don't know anything about.
The statistics concerning the number of gigabit fiber customers in the US is eye-opening. OpenVault tracks the percentage of customers provisioned at various broadband speeds. At the end of 2019, the company reported that 2.81% of all households in the US were subscribed to gigabit service. By the end of the first quarter of 2020, just after the onset of the pandemic, the percentage of gigabit subscriptions had climbed to 3.75% of total broadband subscribers.
The last two months have seen a flurry of Starlink activity, including the following: Bill Gates has a history of interest in satellite Internet and in September, Microsoft announced their Azure Obrital ground station service, which enables satellite access to its Azure cloud services. SES, Viasat, and Intelsat were announced as initial partners and SpaceX just signed up. Starlink+Azure Orbital will compete with Amazon's satellite constellation and its ground-station service...
The 20th century was the golden age of surveillance. High-speed communication went either by telegraph and telephone, which needed a license from the government, or by radio, which anyone can listen to. Codes were manual or electromechanical and were breakable, e.g., the Zimmermann telegram and Bletchley Park. (The UK government spent far more effort inventing a cover story for the source of the telegram than on the break itself, to avoid telling the world how thoroughly they were spying on everyone.)