While there is much discussion in the United States about the mergers of Comcast and Time Warner Cable, and of AT&T and DirectTV, issues such as this are generally discussed from a very narrow perspective and, we maintain, from the wrong underlying telecoms regime operating in that country - one that has stifled competition in the telecoms for nearly two decades. The same wrong parameters apply to the endless debates on net neutrality an issue that is, by the way, largely of significance to the US market alone. more
I bet that nobody believed in 1992 that thirty years later, we'd still be discussing the state of the transition to IPv6! In 1992 we were discussing what to do about the forthcoming address crunch in IPv4, and having come to terms with the inevitable prospect that the silicon industry was going to outpace the capacity of the IPv4 address pool in a couple of years, we needed to do something quickly more
Much has been written about the progress of the adoption of IPv6 over the years. I know I've been guilty of adding my writings into the pool, and this article is a further contribution to that pool of observations and measurements. In this case, I want to look in some detail at the deployment of IPv6 in China. Why is China so important in this story of IPv6 deployment? more
The Best Practice Forum (BPF) on IPv6 at the Internet Governance Forum (IGF) explored what economic and commercial incentives drive providers, companies and organizations to deploy IPv6 on their networks and for their services. The BPF collected case studies, held open discussions online and at the 2016 IGF meeting, and produced a comprehensive output report. This article gives a high-level overview. more
There is no doubt that the Google fibre rollout in Kansas City has been a success. Take-up rates are as high as 75%. However, when it was first announced in 2010, we stated that the real reason behind Google's entry into this market was to prove that FttH can be cost-effective and can generate a profitable return -- in the hope that the sluggish telcos would become more active in the rollout of FttH networks. Yet, Google is proving that this indeed can be done, the telcos remain sluggish in deploying FttH. more
At the RIPE 67 meeting in Athens, Greece, the RIPE IPv6 Working Group ran a little experiment to test the feasibility of an IPv6-only network and to identify challenges in user experience. While the results were highly encouraging, they indicated that there is still work to be done before IPv4 can be switched off once and for all. As IPv6 is slowly but surely deployed around the world, we've entered a phase where it's necessary for your devices to be able to communicate using either of the two IP protocols currently in use. more
A Tipping Point for the Internet? Catching the precise moment of a tectonic shift in a global system as large and important as the Internet may be viewed as an exercise in the improbable. However, I point out in this summary that I think we are precisely in the midst of such a shift... more
The past week in the 5G world was notable because of some major events in Reno in the 5G race to roll out the full 5G specifications known as Release 16. A set of seven major concurrent industry standards meetings were hosted there over five days last week. The metrics are indicative of who really participates in and shapes the rapidly emerging 5G platforms. more
The U.S. Government is causing a huge disservice to protection and defense in the private sector (80%+ of CIKR) by creating an ECS that contains monetary incentive for a few large players to exert undue control over the availability, distribution, and cost of security threat indicators. While there may be a legitimate need for the federal government to share classified indicators to entities for protecting critical infrastructure, the over-classification of indicator data is a widely recognized issue that presents real problems for the private sector. ECS as currently construed creates monetary incentives for continued or even expanded over-classification. more
On 23 February, the U.S. Administration had the chutzpah to file a formal communication to the World Trade Organization (WTO) complaining about "measures adopted and under development by China relating to its cybersecurity law." However, it is the U.S. complaint that is most troubling. Here is why. The gist of the U.S. complaint is that China's newly promulgated directive on the use of VPN (Virtual Private Network) encrypted circuits from foreign nations runs afoul of... more
An unprecedented cyberattack on the Canadian government also targeted Defence Research and Development Canada, making it the third key department compromised by hackers, CBC News has learned. ... While there is no definitive proof, of course, that China was behind these attacks, there is a lot of circumstantial evidence that points in that direction. China (allegedly) has a long history of engaging in espionage activities in order to gain access to information. In the United States, this is sometimes referred to as cyber warfare, but I think that cyber espionage is a better choice of terms. more
A very Interesting meeting The Internet Governance Forum (IGF) with an ambitious theme of connecting the worlds next billion people to the Internet took place in early November 2015 in a beautiful resort city of João Pessoa in Brazil under the auspice of the United Nations. Few citizens of the world paid attention to it yet the repercussions of the policy issues discussed affect us all. more
ARIN deployed a series of enhancements to its Whois-RWS service today. This includes enabling CIDR support and IPv6 lookups in the search box on the web page, provided plain text rendering of lists of ASNs and networks on the web - plus enhanced CIDR query matching on WHOIS port 43. more
All the talk early this year seems to be about LTE deployment to alleviate chronic Apple and other smartphones induced indigestion on the AT&T and other major Mobile Networks swamped by data traffic. The telluric shift albeit the user will not care or should not notice is that when he or she will power on that smartphone or whatever the communicating Swiss Knife will be called, it will request an IP address to complete an IP based call. more
At Verisign we take our Internet stewardship mission very seriously, so when details emerged over the past week concerning the XcodeGhost infection, researchers at Verisign iDefense wanted to help advance community research efforts related to the XcodeGhost issue, and leveraging our unique capabilities, offer a level of public service to help readers determine their current and historical level of exposure to the infection. more