Imran Ahmed Shah writes: Telecommunication Regulatory Authority (TRA) announced on Sunday to ban Blackberry Services, this ban will take effect on October 11. This ban will affect hundreds of thousands of BlackBerry users who access Internet, e-mail and messaging services on their mobile handsets. more
I am writing this from the Satellite 2008 conference in Washington, D.C. As I make my way through the exhibits, I see many vendors advertising IP capabilities in their hardware products or network services. But when asked about IPv6 support, the common reply is a not so believable "it is on our roadmap" followed by a somewhat vague delivery date. Although IPv6 development has been slow across the board, it appears to be moving even more slowly in the satellite world... more
In fact WiFi (technically standard 802.11) and WiMAX (802.16) don't compete for broadband users or applications today. That's partly because WiFi is widely deployed and WiMAX is still largely an unfulfilled promise and partly because the two protocols were designed for very different situations. However, if WiMAX is eventually widely deployed, there will be competition between them as last mile technologies. Some people describe the difference between WiFi and WiMAX as analogous to the difference between a cordless phone and a mobile phone... more
What would duopoly providers of internet access really like to have? They'd really like to be paid for providing non-commodity services. They'd really like to be rewarded for running the network, top to bottom. "But that's not possible," you say. No provider can tell one packet from another. Providers can only block the ports used by applications they don't like, and that's a clumsy, unwinnable arms race. The applications can always switch to common and useful ports, and no provider wants to alienate its subscriber base. But what if providers could inspect the contents of packets, without using too much computational power, and discriminate among applications? "Naah," you say. "They can't possibly do that."... more
Karl Bode recently wrote an excellent article highlighting the overhyping of wireless technologies. He's right, and for the last twenty years, we've been told that a world-changing wireless technology is coming soon, but none ever materialized. No wireless technology has been a bigger flop than 5G when comparing the hype to the eventual reality. The hype for 5G was amazingly over-the-top. more
Avivah Litan, the storied Gartner analyst, laid it down succinctly for insiders in her blog two and one-half years ago. She said, "Web 3.0 will transform us from Web 2.0's monetization via surveillance capitalism and advertising to monetization built directly into the protocol that is equally available to any connected user." Translated, that means we'll control our destiny by owning and managing our credentials for logging into systems, content, financial resources, and, importantly, our data. And, we are told, blockchain technology will enable all that. more
The US war on Huawei brought down sales internationally, but China's 700,000 5G cells and explosive cloud growth meant Huawei had an up year. The chip blockade did hurt in Q4 and will continue to hold down sales in 2021. Huawei has sufficient reserves to outlast the United States until China catches up in chip production. Perhaps the most important figure in the financial report was the $55 billion cash. Another $10 billion will come in from the sale of Honor/Glory. more
In an earlier post, I described three Chinese low-Earth orbit (LEO) satellite constellations that seemed to be oriented toward broadband communication... None of those companies seem to be pursuing the global consumer market that SpaceX and OneWeb hope to serve, but a new Chinese company code-named GW seems to plan on doing so. more
The Democratic Staff Report Prepared for the use of the Committee on Foreign Relations United States Senate, July 21, 2020, entitled "The New Big Brother," is actually all about 5G technology. The report jumps on the runaway anti-China train chaotically flailing around Washington these days to "out-Trump, Trump." It characterizes 5G technology, longstanding international collaboration, and COVID-19 tracking as all part of a global conspiracy for "digital authoritarianism" run out of Beijing. more
It is supremely ironic. A rogue national leader with the stroke of a pen, dictates that its companies will expose a foreign company's end users to cyberattacks. This is the net effect of denying security patches or operating system updates pursuant to Trump's order. In the US Great Rogue Leader's bizarro world, this is the very behavior that he claims makes his actions necessary. In fact, this Trump malware attack is worse because of the mass exposure to exploits. more
Security for Internet-connected devices, the "Internet of Things" (IoT), is critically important. Now, more than ever, it is top of mind for device manufacturers, network operators, consumer advocates, lawmakers, and government regulators -- domestically and internationally. In the face of recent attacks, government authorities and consumer advocates have proposed legislation, frameworks, certifications, and labeling schemes. more
In Canada at the moment a fight has been engaged between Bell Canada, a major carrier, and a recent decision of its regulator, the CRTC, concerning whether the CRTC (the Commission) made the correct decision when it said that the underlying transport system was "telecommunications", while the "app" that was carried was "broadcasting". The decision appealed from (the Klass decision) is important because it marks the first time the CRTC has made a decision on the idea that lies at the core of Internet thinking: that an application floats on top of transport layers. more
There are often confused reports in the media about mobile and fixed broadband, with arguments that one could replace the other. Yet the reality is that they coexist and complement each other - perhaps even more so since one cannot manage without the other. Increasingly, devices such as smartphones, tablets and smart TVs are at the end of fixed lines, with a wireless (WiFi) connection between the fixed line and the device. more
Lest you think the social + local + mobile (So/Lo/Mo) trend is just a fad, last week, Pew Internet released a new report that found that 18 percent of smartphone owners use a geosocial service to check in and share their location with friends. The report also found that 74 percent of smartphone owners get real-time location-based information on their phones -- up from 55 percent last May. Add to these impressive stats the finding from earlier this year... more
Mobile networks aren't usually thought of as sources of spam, but a quick look at some of the resources that track spam reveals they actually are. This is counter intuitive at first glance because when most people think of mobile they think of smartphones, and those aren't known to be sources of spam (at least not yet). What's really going on is PCs connected to mobile networks with air cards, or tethered with a smartphone where it's permissible, are the culprits more