One of the discussion topics at the recent ICANN 75 meeting was an old favorite of mine, namely the topic of Internet Fragmentation. Here, I'd like to explore this topic in a little more detail and look behind the knee-jerk response of declaiming fragmentation as bad under any and all circumstances. Perhaps there are more subtleties in this topic than simple judgments of good or bad. more
Communication Service Providers (CSPs) have been driving the industry to develop agile solutions that abstract physical hardware from their solution platforms. With this technology, they hope to commoditize service functions to increase service agility and reduce the capital required to achieve better and more efficient service. Over the years, we have seen solutions from TMForum and CableLabs that help standardize certain aspects of the CSP plant and similar initiatives in the CPE world with Reference Design Kit (RDK)... more
IT disasters can strike anywhere, anytime. In 1983, a faulty Soviet warning system nearly precipitated World War III -- the system claimed five missiles were en route from the U.S. Only quick thinking by Lt. Col. Stanislav Petrov saved the day when he realized the United States would never launch so few warheads. And in 2004, a private contractor working with the British Child Support Agency (CSA) suffered a glitch that overpaid 1.9 million people and underpaid 700,000. more
Following the American insurrection and the role the media played -- social media, particularly the "doomsday scenario," started to appear again in relation to technological developments. Only a few years ago, a group of hi-tech companies, including Tesla, warned against the negative aspects of artificial intelligence (AI). Other technologies that could seriously affect human developments include gene editing, nanotechnology and synthetic biology. more
There's been some good discussion here about possible policy changes which Canadian Internet Registration Authority (CIRA) could consider. But there's more to the CIRA Board election which is underway than simply arguing about whether a PO Box satisfies a "presence" requirement. CIRA's done pretty well over the past decade, but it's not perfect. As a candidate for re-election to the CIRA Board (and currently Vice-Chair) here are some of my own personal thoughts regarding ways in which CIRA might improve. I call this (unoriginally, I know) CIRA 2.0. more
I periodically take a look at broadband trends into the future. But as I was thinking about how unique 2020 was for everybody, I realized that there were some events during the year that we're going to look back on a decade from now as important to the broadband industry. Interestingly, most of these events were not on anybody's radar at the beginning of the year. more
The State Bank of India (SBI) has announced it will be switching its domain name from "sbi.co.in” to the branded "bank.sbi", according to various news sources. more
Is the United States in full retreat from internationally recognized regulatory best practice? Or is it instead headed toward some different destination -- "dancing to the beat of a different drummer"? Where is this likely to lead? The following is an introduction to a paper, published by IDATE, from J. Scott Marcus, a Senior Consultant for WIK-Consult GmbH: "...What has radically changed is telecoms regulatory practice in the United States. The U.S., in a long series of regulatory decisions, has largely abandoned its long-standing regulatory principles and moved in an entirely new direction." more
ICANN has appointed IID President and CTO Rod Rasmussen to its Security and Stability Advisory Committee (SSAC). An area that Rasmussen's work and recent SSAC reports have both covered in-depth is domain name hijacking. Recent hijackings against UFC.com and Coach.com, and similar past attacks against CheckFree, Comcast and Twitter have heightened awareness about the security dangers with the Internet's infrastructure. more
As if we didn't have a long enough list of problems to worry about, Lumen researchers at its Black Lotus Labs recently released a blog that said that it knows of three U.S. ISPs and one in India was hacked this summer. Lumen said the hackers took advantage of flaws in software provided by Versa Networks being used to manage wide-area networks. more
This month marks the 25th anniversary of the formation of the Internet Corporation for Assigned Names and Numbers (ICANN). A quarter of a century ago, on September 30, 1998, ICANN was officially incorporated as a California non-profit corporation. To commemorate this landmark event, ICANN will be hosting celebrations during ICANN78 in Hamburg, Germany, 21-26 October. more
This summer EU regulators are finalizing their guidelines for member states on legal protections for wired, wireless and mobile open Internet access service. European citizens, businesses and NGOs have one last chance to make their voices heard on the so-called "net neutrality" guidelines by writing a comment for Body of European Regulators of Electronic Communications (BEREC) by July 18. more
Usenet is 40 years old. Did we get it right, way back when? What could/should we have done differently, with the technology of the time and with what we should have known or could feasibly have learned? And what are the lessons for today? A few things were obviously right, even in retrospect. For the expected volume of communications and expected connectivity, a flooding algorithm was the only real choice. more
T-Mobile filed a petition today making it clear that the FCC's commercial reasonableness standard is a failure. Anyone following net neutrality knows that the FCC is proposing to authorize discrimination and pay-for-priority deals known as fast lanes. The FCC is claiming we need not worry, however, because the FCC can make sure that entrepreneurs and users face only "commercially reasonable" discrimination. more
We recently received an email from a customer asking about hybrid DDoS mitigation and its ability to stop large application layer attacks. Here's the truth: Hybrid DDoS mitigation works and can stop large application layer attacks. Hybrid DDoS mitigation typically involves a purpose-built DDoS mitigation appliance or software on dedicated hardware that sits immediately in front of or behind an enterprise's edge router. more