Networks

Networks / Most Viewed

M2M Hype and Reality

There are many predictions that the next big wave in telecoms is M2M and that this will be the next growth market for the telecoms industry. There is no doubt that M2M is a revolutionary development, but we need to separate the hype from the reality. In order to do this it is best to divide the major developments into two main areas, although there is no doubt that others will emerge over time. One area is the sensors that are being installed in networks such as electricity, the environment, roads and other infrastructure. more

China Closing the Door to New Technologies

2013 may be a promising year for global trade in technology with the kick-off of the International Technology Agreement expansion discussions, the Trans-Atlantic Trade and Investment Partnership, and as the Trade in Services Agreement gets going. But China calls its own tune, and is now threatening to restrict its market for Internet-enabled technologies through a clever device that could cost its trading partners billions. more

Help Us Answer: What Will the Internet Look Like in 10 Years?

What will the Internet look like in the next seven to 10 years? How will things like marketplace consolidation, changes to regulation, increases in cybercrime or the widespread deployment of the Internet of Things impact the Internet, its users and society? At the Internet Society, we are always thinking about what's next for the Internet. And now we want your help! more

Three Generations of Cuban WiFi Hotspot Sharing

As soon as ETECSA began installing public access WiFi hotspots, black market resellers began sharing connections. They would connect a laptop to an ETECSA account then use pirated copies of Connectify, a connection sharing program running on the laptop, to create small WiFi hotspots of their own. At the time, ETECSA charged 2 CUC per hour online (two day's pay for many Cubans) and the re-sellers typically charged 1 CUC per hour. They broke even with two users and made a profit with more. more

Reducing the Risks of BYOD with DNS-Based Security Intelligence; Part 1: Understanding the Risks

Ah, BYOD. How I love thee. BYOD, or "Bring Your Own Device", gives me choices. I can use a device at work I actually like and am most effective with. (How did I ever get by without my iPad?) But BYOD comes with challenges. Personal devices can be infected with malware. Once they're connected to an enterprise's network, they can be controlled by a bot master to hijack enterprise resources and wreak havoc as part of a botnet. more

Pentagon Reveals Largest Ever Loss of Defense Data in Cyberattack

The Associated Press published an article today that the Pentagon revealed that earlier this year, they suffered one of its largest ever loss of sensitive data to a foreign government by a cyberattack. ... It's hard to say what's right and what's wrong. On the one hand, the Secretary of Defense says that the cyberwar is very real. On the other hand, the cyberczar Howard Schmidt said that there is no cyberwar and instead government needs to focus its efforts to fight online crime and espionage... more

Over 50 Internet Shutdowns Reported in 2016

"Governments around the world shut down the internet more than 50 times in 2016 -- suppressing elections, slowing economies and limiting free speech," Lyndal Rowlands reporting in IPS. more

UN Broadband Commission 2.0

Back in late 2009 I had the honour of explaining my views on how broadband can deliver social and economic benefits to countries and their people to Dr Hamadoun Touré the Secretary-General (SG) of the ITU, the UN body looking after global telecoms. He showed a particular interest in the initiative Australia had taken in developing the NBN. This discussion with the SG led to the establishment in 2010 of the UN Broadband Commission, co-sponsored by UNESCO and the ITU. Dr Touré invited 50 Commissioners from around the world to participate in this initiative, half of them from private industry. more

Community Networks Could Help Strengthen the Caribbean Internet

By some estimates, only half of the world's population has internet access, leaving the other half at a sizeable competitive disadvantage. This profound connectivity gap is especially significant in the unserved and underserved areas of developing and least-developed countries. For people who live in these places, Internet connectivity is not just about the Internet. It is a lifeline that gives access to electronic commerce and telehealth services, distance learning, social and political engagement, government services... more

Some Observations on Reachability of Egyptian Networks and Providers

Different media are reporting that Internet and other forms of electronic communications are being disrupted in Egypt. Presumably after a government order in response to the protests. Looking at BGP data we can confirm that according to our analysis 88% of the ‘Egyptian Internet’ has fallen of the Internet. In this post I’ll share some observations I made with regards to the reachability of Egyptian networks and providers. more

ICANN, NTIA, Verisign and ANA Weighing In on ‘Name Collisions’ and the Readiness of New gTLD Program

Gregory S. Shatan of Reed Smith writes: "Last week, ICANN (the organization that oversees the domain name system of the Internet) was busy with nothing less than the security and stability of the Internet. At ICANN's recent meeting in Durban, those of us attending heard a drumbeat of studies, presentations and concerns regarding "name collisions": the conflicts that will arise when new gTLDs go live and conflict with existing top-level extensions in private networks..." more

Can We Really Blame DNSSEC for Larger-Volume DDoS attacks?

In its security bulletin, Akamai's Security Intelligence Response Team (SIRT) reported on abuse of DNS Security Extensions (DNSSEC) when mounting a volumetric reflection-amplification attack. This is not news, but I'll use this opportunity to talk a bit about whether there is a trade-off between the increased security provided by DNSSEC and increased size of DNS responses that can be leveraged by the attackers. more

Microsoft Launches AI-driven’ Security Copilot’ to Help Companies Fight Hacking Attempts

Microsoft continues to integrate new artificial intelligence technology into its products and today announced a cybersecurity "copilot" to help companies track and defend against hacking attempts. This tool is part of Microsoft's attempt to dominate the fast-growing field of "generative" AI. more

Renesys Chronicles Today’s Internet Blackout in the Sudan (Now Restored)

The team over at Renesys has once again provided a great analysis of an Internet outage in a country, this time in Sudan. In the article simply titled "Internet Blackout in Sudan", Doug Madory writes: A few hours ago, we observed a total Internet blackout in Sudan and, as we publish this blog, the Internet remains largely unavailable. By count of impacted networks, it is the largest national blackout since Egypt disconnected itself in January 2011..." more

Content - The Next Regulatory War Zone

At the 2014 TelSoc Charles Todd Oration the former Chair of the ACCC, Graeme Samuel, warned against the looming content monopoly... "There is a constant risk that the exclusive tie-up of rights to content for new and emerging markets will allow the right holders to shut out competition across a wide range of services delivered over new networks." He didn't think that the current telcos have the right expertise to enter the content market... more