/ Most Viewed

Network Outages Costing Mobile Operators $15B Annually

Sarah Reedy reporting in LightRading: Mobile operators suffer from an average of five network outages or degradations that impact subscribers each year, costing them around $15 billion annually, according to new Heavy Reading research. Put another way, that's about one outage every other month. More than 80 percent of those outages affect just one or a subset of networks or services. more

Domain Name Registrations Reaching 200 Million World Wide

The global base of domain names grew by more than 3 million in the second quarter of 2010, according to the latest Domain Name Industry Brief, published by VeriSign, Inc. According to the report, the domain name industry ended the second quarter of 2010 with a base of more than 196.3 million domain name registrations across all of the Top-Level Domain Names (TLDs). The combined base of .com and .net domain names surpassed 100 million, finishing the quarter with an adjusted zone size of 101.5 million. New .com and .net registrations totaled 7.9 million during the second quarter, an increase of 13 percent from a year ago. more

Gaza Plunges into Near-Total Internet and Cellular Blackout Amid Intensified Israeli Strikes

The Gaza Strip is experiencing an almost complete blackout of internet and cellphone services. A communication blackout isolates Gaza's residents, impeding emergency responses and potentially escalating humanitarian crises. more

A Look Back at How the Internet of Iraq Came to be Dependent on Telecoms Based in Kurdistan

On the 25th of September, the northern autonomous region of Iraq known as Kurdistan voted to become an independent country. This vote has led to a current standoff between the central Iraqi government and the Kurdish Regional Government (KRG), with the Kurds threatening to cut off internet service into Iraq in retaliation for any punitive measures inflicted by Baghdad on the KRG. The following analysis was written by Doug Madory of Oracle Dyn after ISIS took control of Mosul, Iraq in 2014. It describes how the internet of Iraq came to be dependent on international connections through telecoms based in Kurdistan. more

New Report on Performance Measurements of the DNS Root Service in China

Zhiwei Yan writes to report: "CNNIC recently lunched a monitoring to measure the performance of the DNS root service in China (mainland). The results reflect that the service diversity from different ISPs and different geographical locations is obvious for different root servers. Besides, the stability of the DNS root service is directly affected by the BGP routing system. CNNIC will continue this work and anticipate the wide participation from the community." more

Mobile Malware Growing Exponentially, Limited Capability of Current Security Solutions Big Concern

Security analysis suggest troubling and escalating trends in the development of malware that exploits vulnerabilities on mobile devices. "From turning mobile devices into bots, to infiltration of mobile applications, driven by the use of personal devices in the workplace, cybercriminals are taking full advantage of this market," reports M86 Security Labs in its just released Threat Predictions Report. more

Prime Real Estate in the Cloud

In the physical world of real estate, value is all about location, location, location. In the virtual world of enterprise business, value is all about performance. The catch is that enterprise performance today is often driven by... location, location, location. When it comes to your digital transformation, and the migration of services to the cloud, the location of your data is paramount. To reach a customer looking to complete an on-line purchase or enable a group of employees trying to collaborate on a shared document, data needs... more

Google Bard Fails to Answer Satellite Internet Questions

In an earlier post, I asked whether electronically steered antennas (ESAs) would replace parabolic antennas in satellite ground stations. I did some research and concluded that it is likely that they will. Next, I discussed the same question with ChatGPT and, while it made several false statements, it made a relevant point that I had overlooked. The relevant addition was positive, but the errors were troublesome, so I decided to try ChatGPT's competitor Google Bard. more

ICANN’s Two Decades of Evolution

In the fall of 1998, I was present at the first meeting of the ICANN Board which was then made up of very senior, prominent parties from a broad spectrum of sources. Much to her credit, Esther Dyson accepted the position as the first Chair of the ICANN Board for the newly birthed organization. I was in attendance in support of the nomination of Michael Roberts as the first ICANN CEO. It was a time of uncertainty. more

Community New gTLD Applications: The Wrong Choice

Community new gTLD applications were one of the three options offered by version one of ICANN new gTLD applicant guidebook. It was also possible to submit a "generic" or a "geographic application." I dug the ICANN website and found out that, in the end - and according to me only - it was a bad choice to submit such application...
I went through the 52 delegated applications to investigate which ones have lots of domain name registrations and which ones don't. more

The Hill: FCC Response to Sen. Cruz Reveals Hidden ICANN Agenda in Net Neutrality Order

Fred Campbell reporting in The Hill writes: "It's no secret that controversy has plagued the Obama Administration's plan to surrender U.S. oversight of the Internet domain naming and numbering systems from the current U.S.-based ICANN to the 'global multistakeholder community.' But the reason the Federal Communications Commission (FCC) declined to exercise its statutory jurisdiction over Internet numbering inside the United States was indeed secret until Senator Ted Cruz forced the FCC to explain itself." more

Researchers Detail Faster Methods to Defeat Botnets Like Conficker and Kraken

Michael Cooney reporting in NetworkWorld: "Security researchers this week will detail a prototype system they say can better detect so-called Domain Name Generation- (DGA) based botnets such as Conficker and Kraken without the usual labor- and time-intensive reverse-engineering required to find and defeat such malware. The detection system, called Pleiades, monitors traffic below the local DNS server and analyzes streams of unsuccessful DNS resolutions..." more

Speaking up for the Internet

For most of this year governments from outside the G8 have not wavered from their essential themes on the Internet: they regard it as a shared resource that works in part as a result of their own investment in infrastructure, they want to be included in its governance through a decision-making process that is transparent, accessible and, in broad character, multilateral, and they want to be able to trust it and know that as much as it is a tool of growth for others, it can also be for them. more

U.S. Senate Voted to Eliminate Broadband Privacy Rules

"The US Senate today voted to eliminate broadband privacy rules that would have required ISPs to get consumers' explicit consent before selling or sharing Web browsing data and other private information with advertisers and other companies," Jon Brodkin reporting in Ars Technica. more

Software Has Already Eaten Telecoms (It Just Has Indigestion)

The unconscious and near-universal belief is that packet networks are a telecoms service, and one that constructs an 'additive' resource called 'bandwidth'. This is demonstrably technically false. They deliver distributed computing services, as they calculate how to divide up an underlying telecoms transmission resource. The ubiquitous error is a failure to recognise that the hardware platform has already been devoured by the software industry. more