/ Most Viewed

Net Neutrality Undermining Spreads to Developing Countries

After the USA set the bad example of allowing telcos to start charging different rates for content delivery services, other incumbent telcos elsewhere are only too happy to jump on the bandwagon and use the American example as a reason and an excuse to end net neutrality (NN) in their countries also. As did their American counterparts they too see this as another way to grab some extra monopolistic income. more

Today Marks a Giant Step Towards DNSSEC Deployment

The global deployment of Domain Name System Security Extensions (DNSSEC) is charging ahead. With ICANN 38 Brussels just around the corner, DNSSEC deployment will inevitably be the hot topic of discussion over the next few days. Case in point, today, ICANN hosted the first production key ceremony at a secure facility in Culpepper, Va. where the first cryptographic digital key was used to secure the Internet root zone. The ceremony's goal was simple: for the global Internet community to trust that the procedures involved with DNSSEC are executed correctly and that the private key materials are stored securely. more

Inquiring About the “Unthinkable”

There has been no shortage of speculation within the ICANN community regarding the continued show down between the ICANN Board and its Governmental Advisory Committee (GAC) over new generic Top-Level Domains (gTLDs) and the pending expiration of the IANA contract this September. Now one of the more interesting topics of discussion that I have had with multiple independent parties was the potential of ICANN making changes to the L root zone file... more

Set-Top-Box Revisited: How Does the Gateway Solution Increase Competition?

The FCC seems determined in revisiting and repairing the current CableCard rules fiasco in which it chose to mandate a universal Set-Top-Box for Cable, Telco, and DBS providers. Where does a solution lie, and is the FCC going down another road of improbable acceptance? The problem with a CableCard solution, in an attempt to create more competition, was the opening of current provider STB's to access other venues, which turned out to be both technically and business concept unfriendly. more

Are Phishing and Malware Separate Threats?

Phishing is when bad guys try to impersonate a trusted organization, so they can steal your credentials. Typically they'll send you a fake e-mail that appears to be from a bank, with a link to a fake website that also looks like the bank. Malware offers another more insidious way to steal your credentials, by running unwanted code on your computer... I like VeriSign's characterization of this kind of malware as an insecure endpoint, the PC which is the endpoint of the conversation with the bank isn't actually under the control of the person who's using it. more

What May Happen to GAC Advice? 3 Fearless Predictions

Many TLD applicants are likely to respond to the GAC Advice in a manner that is like story telling: Based on a mixture of fiction garnished with some facts from their applications, applicants will write savvy responses with only one aim -- to calm down the GAC's concerns and survive the GAC Advice storm. The "duck and cover" strategy... According to the Applicant Guidebook, material changes to applications need to go through a Change Request process. more

The Hidden Value of IPv4 Addresses

All devices that connect to the internet need unique addresses. The number of IP addresses is limited, creating a demand for addresses worldwide, particularly from the cloud computing industry. This demand has raised the value of IPv4 to levels that the internet's original developers didn't predict, in part because the internet was considered an experiment at the time. Of course, use - and so demand -- has exceeded anyone's realistic expectations. more

Who Will Crack Cloud Application Access SLAs?

The broadband industry doesn't have an agreed-upon unit of supply and demand that meaningfully "adds up". This is rather odd for a service that aspires to be a utility. It is also a barrier to a much-needed transformation from "bit pipes" to "digital supply chain management". The chart here ought to be in every basic undergraduate textbook on packet networking and distributed computing. That it is absent says much about our technical maturity level as an industry. more

New Revenue Models for the ‘Software Telco’

I was recently asked how telcos might come up with new business models for a world where all resources are under software control. The core idea is to match network supply and demand in space and time (and at all timescales). I've typed up my notes for the curious to critique...Today's telco is more like a static utility 'pipe', the way that gas, electric or oil are delivered. It sells direct access to raw network mechanisms, and users buy circuits that offer a fixed bandwidth in space and time. more

5G Frequency Fees Are Waived in Singapore to Help Drive Market Tests

Singapore government has waived telecom frequency fees for 5G trials until December 2019 in order to catalyze market growth and discovery of potential use cases. more

Call for Participation – ICANN DNSSEC and Security Workshop for ICANN76 Community Forum

Are you doing something interesting with DNS, DNSSEC, or routing security that you would like to share with the larger DNS community at the ICANN 76 meeting in March 2023? If so, please send a brief (1 -- 3 sentence) description of your proposed presentation to dnssec-security-workshop@icann.org by the close of business on Friday, 20 January 2023. Are you doing something interesting with DNS, DNSSEC, or routing security that you would like to share with the larger DNS community at the ICANN 76 meeting in March 2023? more

IXPs and CDNs Critical to the Future of Competitive Broadband Internet

We continue to see consolidation in the broadband market and various games played by the cablecos and telcos to thwart competition or undermine network neutrality. Until regulators create true structural separation between infrastructure and service providers the chances of seeing genuine broadband competition are slim. It is interesting to note telecom regulators in North America have imposed structural separation in the past. more

White Spaces Could Be the Broadcasters Best Hope

For years, the National Association of Broadcasters (NAB) fought the White Spaces Coalition and others interested in making US "TV white spaces" available for broadband, Wi-Fi or indeed, any new purpose. When the FCC voted 5-0 to permit license exempt use of TV White Spaces, the industry brought suit in Federal court. And they did this, despite rules in the FCC's decision that are so restrictive that, for now, white spaces devices are doomed to commercial failure. more

A Month in Africa Charts the Promise and Perils of Internet Governance

There may be no better illustration of how far we've come in Internet governance, than this: twice in the past 30 days, the global Internet community has gathered in sub-Saharan Africa to plot a path to bring the Internet to its next billion users. Just weeks after wrapping up the sixth annual Internet Governance Forum (IGF) in Kenya, Internet stakeholders from around the world traveled back to Africa for ICANN's 42nd meeting in Dakar, Senegal. more

Implementing Natural Language Processing in Your SMB Organization: Now or Never!

If you have already adopted AI in your small or mid-size organization, congratulations. If not, the urgency of adopting should be a top priority. You will become a laggard and most likely obsolete given the supercycle of innovation we are currently in. Implementing AI is quite different from other organization-wide strategies because it involves highly specific characteristics and expert resource pools that SMBs might not be able to access. more