Many organizations and individuals are socially committed and voluntarily help the weak, the poor, and the sick. Others consider how they can contribute. Supporting organizations and individuals by starting an aid project, donating money, or providing human resources, can make a crucial difference. The corona crisis is a challenge for many, if not all. Scientists around the world are experimenting with cures and vaccines, and they need help. However, you don't have to be a virologist to help science fight COVID-19. more
I don't think it's a surprise to anyone, but it's the Christmas season again and doubtless a large number of television sets will be sold as part of the annual retail festivities. But these days the devices for sale in the shops are not just televisions: today's television is perhaps better described as a media computer with a very large display. Sure, the device can tune in to radio transmissions and display them... but the device also is equipped with either a WiFi or an Ethernet jack, or both. This alone sounds like a relatively innocuous addition to the television, but it's providing to be a highly disruptive change in the traditional Internet market space. more
This is the first in a series of releases that tie extensive code injection campaigns directly to policy failures within the Internet architecture. In this report we detail a PHP injection found on dozens of university and non-profit websites which redirected visitor's browsers to illicit pharmacies controlled by the VIPMEDS/Rx-Partners affiliate network. This is not a unique problem, however the pharmacy shop sites in question: HEALTHCUBE[DOT]US and GETPILLS[DOT]US should not even exist under the .US Nexus Policy. more
A recent paper called "Worm Propagation Strategies in an IPv6 Internet", written by Steven M. Bellovin, Angelos Keromytis, and Bill Cheswick, examines whether or not the deployment of IPv6 will in fact provide a substantial level of barrier against worms. Shared below are the introductory paragraphs from this paper. "In recent years, the internet has been plagued by a number of worms. One popular mechanism that worms use to detect vulnerable targets is random IP address-space probing..." more
The best engineers on the planet are coming to the same conclusion: a hybrid 4G/WiFi/landline network is the way to meet mobile demand. Folks like John Donovan of AT&T and Masayoshi Son of Softbank in Japan had this vision around 2007-2008. As the iPhone/iPad/Android made the coming demand clear, networks planners around the world evolved similar strategies. more
Consumption of software as a service with a usage-based business model has gained incredible popularity in recent years. On the other hand, other cloud services such as infrastructure and platform as a service are just starting to pick up. While compute and storage are by the far the most commonly used cloud infrastructure services, few consider core network services such as IP Address Management (IPAM) as something that could be utilized over the cloud. more
The Federal Communications Commission (FCC) in Washington has advanced its wireless health care agenda by adopting rules that will enable Medical Body Area Networks (MBANs), low-power wideband networks consisting of multiple body-worn sensors that transmit a variety of patient data to a control device. MBANs provide a cost effective way to monitor every patient in a healthcare institution, so clinicians can provide real-time and accurate data which allows them to intervene if necessary. more
Neal Stephenson’s foundational cyberpunk novel Snow Crash brought to the public the concept of a metaverse, a virtual reality in which people interact using avatars in a manufactured ecosystem, eschewing the limitations of human existence. More recently, Ready Player One capitalized on that idea and brought it back to prominence with a bestselling novel and subsequent film adaptation. Amid rebranding efforts and seeking a new way forward, Mark Zuckerberg has made it Facebook’s (now Meta Platforms) priority to build a platform that could enable the metaverse to become a mainstream technology with the sort of reach that their social networks and WhatsApp have. more
Following my comments about the iPhone VoLTE announcement I had an interesting conversation with Andy Huckridge from Gigamon, a company that provides intelligent traffic visibility networking solutions for enterprises, datacentres and service providers around the globe. An interesting concept that we discussed was the 'triple challenge of network transformation'. The three elements of this challenge are... more
Anyone who has been watching the technology industry for more than a couple of years quickly learns to recognize FUD: Fear, Uncertainty and Doubt. FUD is (apparently) widely believed to be an effective marketing technique, especially when it comes to security, privacy, or scarcity. But the FUD often falls flat. Scarcity, in particular, is rare on the internet -- even rarer than privacy or security. There's constant FUD about scarcity of bandwidth, but the pipes get upgraded. Attempts to impose artificial scarcity through paywalls or other devices inevitably fail in the face of free alternatives. Even the scarcity of IPv4 addresses, which have indeed run out at the top, hasn't affected end users at the bottom yet -- and probably won't, for a long time. more
The Internet is a great success and an abject failure. We need a new and better one. Let me explain why. We are about to enter an era when online services are about to become embedded into pretty much every activity in life. We will become extremely dependent on the safe and secure functioning of the underlying infrastructure. Whole new industries are waiting to be born as intelligent machines, widespread robotics, and miniaturized sensors are everywhere. more
In this post I'd like to discuss the threat widely circulated insecure broadband routers pose today. We have touched on it before. Today, yet another public report of a vulnerable DSL modem type was posted to bugtraq, this time about a potential WIRELESS flaw with broadband routers being insecure at Deutsche Telekom. I haven't verified this one myself but it refers to "Deutsche Telekom Speedport w700v broadband router"... more
As the pandemic continues, the network operator community continues to meet online. NANOG held its 81st meeting on February 8 and 9, and these are my notes from some of the presentations at that meeting... Ethernet, developed in 1973 at Xerox PARC, was a revolutionary step in network architectures in many ways. The common bus architecture imposed several constraints on the network that have echoed through the ensuing four decades in all kinds of ways. more
There are discussions starting within the Regional Internet Registries (RIRs) about the creation of trading market in IPv4 addresses as we approach the inevitable exhaustion of unallocated addresses. The view being put forward is basically "this is likely to happen anyway and by discussing it now, we can ensure it happens in an orderly way". When I first heard this idea I was a bit surprised. The RIRs are policy based bodies and so a shift to a trading market appears to be an abandonment of that policy base. However I have been partly corrected on that. more
The FCC has long battled for a more efficient deployment of unused spectrum, endeavouring to adapt rules governing 'white space' TV spectrum (largely gifted to broadcasters years ago, and generally in the 700MHz band) to newly released spectrum (in the 600MHz band). This will considerably improve wireless broadband coverage where it is needed most... Certainly, in the US's disjointed broadband sector there are considerable challenges ahead... more