President Donald Trump expected to sign an executive order on cyber security on Tuesday. more
Congestion. Traffic. Two words that draw a visceral response, whether you are commuting to work or managing a network. Managing data traffic used to be easy. Everything was housed in centralized data centers, and all traffic was routed through big, dedicated, effective but expensive "pipes" -- Multiprotocol Label Switching (MPLS) links. When all the applications are at the data center, it makes sense to build private access for all traffic. more
"The U.S. Justice Department has formed a threat analysis team to study potential national security challenges posed by self-driving cars, medical devices and other Internet-connected tools," reports Dustin Volz from Washington in Reuters" more
Diverging policies and fee structures among Regional Internet Registries are reshaping the global IPv4 market. RIPE has emerged as a liquidity hub, while others leak resources, risking long-term instability and financial fragility. more
Last week marked a significant milestone for the Neustar Registry team. After many months of preparation, we announced the successful migration of the .IN ccTLD onto Neustar's Registry platform. From now onwards, we'll be partnering with the National Exchange of India (NIXI) as the new Technical Services Provider for India's .IN domain. more
Iran's deliberate disconnection from the global internet reveals a deeper crisis in digital governance, where state-led suppression and procedural legitimacy now threaten the foundational architecture and human rights principles of an open web. more
Data generation is all the rage these days. But are you utilizing it to maximize your outcomes? You know that data is indispensable for your business to keep up and outpace the competition. And most leading corporations agree, since statistically, the speed that companies are producing and collecting data is only increasing with 40 zettabytes expected to be created by 2020. The majority of these organizations are then tossing all of this data into data lakes without any real structured methods of extracting some value from it. more
One of the many consequences of the coronavirus is that networks are going to see a shift in busy hour traffic. Busy hour traffic is just what it sounds like -- it's the time of the day when a network is busiest, and network engineers design networks to accommodate the expected peak amount of bandwidth usage. Verizon reported on March 18 that in the week since people started moving to work from home that they've seen a 20% overall increase in broadband traffic. more
Google today announced an early-stage open source plugin called Google Chrome Frame that aims to seamlessly allow use of open web technologies and faster JavaScript engines within Microsoft's Internet Explorer browser. In a blog post today Google says: "One challenge developers face in using these new technologies is that they are not yet supported by Internet Explorer. Developers can't afford to ignore IE -- most people use some version of IE -- so they end up spending lots of time implementing work-arounds or limiting the functionality of their apps." more
Researchers in China have proposed a plan to establish a large satellite network in near-Earth orbit to provide internet services to users worldwide and to stifle Elon Musk's Starlink project. The project, referred to as the GW constellation, would include 12,992 satellites owned by the newly established China Satellite Network Group Co more
There's been a lot of discussion of whether the November 2016 U.S. election can be hacked. Should the U.S. Government designate all the states' and counties' election computers as "critical cyber infrastructure" and prioritize the "cyberdefense" of these systems? Will it make any difference to activate those buzzwords with less than 3 months until the election? First, let me explain what can and can't be hacked. Election administrators use computers in (at least) three ways... more
Nancy Scola reporting in the Washington Post: "The latest battle over who should run the Internet will be waged in the South Korean port city of Busan over the next three weeks. For U.S. officials headed to the United Nation's International Telecommunication Union's Plenipotentiary Conference, the goal is simple: prevent a vote. In short, the State Department's approach is this: Convince the representatives of the other 192 member countries attending the conference that the 150-year-old U.N. technical body is the wrong forum for existential questions about how the Internet should work." more
The Internet Society today announced that it has been awarded a grant by Google.org to extend its Internet exchange point (IXP) activities in emerging markets. The grant will build on the Internet Society's previous efforts and will establish a methodology to assess IXPs, provide training for people to operate the IXPs, and build a more robust local Internet infrastructure in emerging markets. more
In open letter issued today, Senator Al Franken has urged the new Federal Communications Commission (FCC) Chairman Ajit Pai to join the fight to preserve net neutrality. more
In a press release yesterday evening, retailer Eddie Bauer confirmed a point-of-sale malware infection suspected by some sources as early as beginning of last month. more