Huawei has filed a legal motion in the United States federal court calling for the ban to be declared unconstitutional and deemed an assault on global human rights. more
In my previous post, I talked about the significance of DNS in connection with the Software Defined Data Center (SDDC) and Software Defined Networking. Although the second generation DNS provisioning model I outlined should have seemed straight-forward enough, in real life it is anything but. In my view, the real-world complications of a seemingly trivial issue are largely related to how the network industry approaches IP addressing. more
The Wall Street Journal has an interview with the outgoing head of the FBI's cyber crime investigation Shawn Henry. In it, he has a blunt assessment of the US's capabilities when it comes to combatting online crime, especially data theft and hacking... The more I read around the Internet, the more clear it's becoming at how cyber security is becoming a central focus. This has pretty big implications for the cloud. more
Hurricane Sandy caused major damage in both the Caribbean and the North-Eastern part of the USA. In an earlier article (RIPE Atlas - Superstorm Sandy) we showed data on 15 RIPE Atlas probes that are located in or near the affected areas in the USA. Most of these locations now appear to be back to normal round trip times to targets we monitor. But the effects of Hurricane Sandy were felt beyond the immediately affected area. more
Earlier this month, Avaya held a new type of customer event in Toronto, called Evolutions. They have been looking for better ways to bring customers together, so aside from their global event, they've put together Evolutions, which has a regional focus. The first one was recently held in Mexico to great success, and my understanding is that Canada was the next trial event, and that's what I attended in downtown Toronto... I'm almost certain I was the only Canadian analyst invited, so this may well be the only place you'll hear about Evolutions. more
Domain name monitoring - that is, the detection of domains with names containing a brand-term (or other string) of interest - is a very well-established element of brand protection services. Branded domain names are of key importance to brand owners (as the basis for business-critical infrastructure (i.e. 'core' domain names), and as part of a 'tactical' portfolio of strategic and defensive registrations), but also to infringers, who can utilise domains as a means of impersonation, passing off, claimed affiliation, or traffic direction and monetisation. more
For the past hundred years or so, the world's vendors of communication networks and services have collaborated -- largely among themselves -- with great success. That paradigm continues today for 5G with the 3rd Generation Partnership Project (3GPP) and an ecosystem cluster of related organizations where industry and affected government agencies worldwide successfully work on a massive scale. more
In a recently published Uptime Institute Survey, Uptime Institute found that organizations operating data centers are finding it increasingly difficult to recruit professionals skilled in security, networking, and hybrid technologies. This realization comes at an interesting time, as the monolithic business infrastructure built over the last two decades is now entering a period of transformation. more
"ICANN holds .islam, .halal in limbo despite losing case," reports Kieren McCarthy in The Register. more
Carlos Slim of Telmex tells me the world is about to change. "Two billion more people will connect to the Internet when smartphones cost $50. The phone makers are promising me a $50 phone in 2014." If Spreadtrum and Firefox deliver a $25 smartphone, as promised, that could accelerate takeover. ~310,000,000 Africans will be connected to the Internet in 2017, Arielle Sumits of Cisco predicts... It's inevitable that the U.S. will be dwarfed by the rest of the world. more
There is no rest for the wicked. If you think that 2018 was the climax of cybercrime, wait until you see what happens in the next few years as cybercriminals are constantly learning new ways to strike. Take for instance domain-related attacks now coming in a variety of forms. There's domain hijacking which involves gaining of access to domains and making changes without owners' permission. You have typosquatting where phishing is often utilized to steal valuable information. more
According to a report by research firm, TeleGeography, the price of wholesale internet access (IP transit) continues to decline but varies considerably around the world. From today's report: "IP transit prices in Asia remain far higher than in the US and Europe. Prices for GigE ports in major Asian cities in Q2 2008 ranged from USD30 per Mbps month in Seoul to USD45 per Mbps per month in Tokyo. IP transit service in Latin America is even more expensive, with median GigE port prices ranging from USD73 per month in Buenos Aires to USD86 per month in Santiago." more
DNSSEC is increasingly adopted by organizations to protect DNS data and prevent DNS attacks like DNS spoofing and DNS cache poisoning. At the same time, more DNS deployments are using proprietary DNS features like geo-routing or load balancing, which require special configuration to support using DNSSEC. When these requirements intersect with multiple DNS providers, the system breaks down. more
The modus operandi of the Internet Corporation for Assigned Names and Numbers (ICANN) is achieving consensus. This also holds true for the principal rights protection mechanism that emerged from a two-year round of debates organized by the World Intellectual Property Organization (WIPO) that ICANN implemented in 1999 as the Uniform Domain Name Dispute Resolution Policy (UDRP). Consensus rules; not precedent, although consensus inevitably becomes that. more
Doug Madory, Director of Internet Analysis at Dyn, has a report published today examining the state of Puerto Rico's recovery of its internet access. more