As a product manager and engineer, I really enjoy attending the technology-oriented Cable-Tec Expo each year. It has a stronger technology focus than many other industry trade shows and it's always a good opportunity to talk to the engineering teams from all of the operators and vendors. more
The Internet Society (ISOC) Board of Trustees today passed a resolution to strongly support the plan developed by the global Internet community presented to the U.S. National Telecommunications and Information Administration to transition oversight of key Internet resources. more
AT&T’s CEO plays down the threat of satellite cellular, citing bandwidth and coverage limits. Yet growing interest in rural and IoT applications suggests the technology could still claim valuable niches in the wireless market. more
A little appreciated aspect of our digital infrastructure is just how dependent we are on access to time. Disrupting the time base can not only lead to disruption in communications but can result in various forms of compromise of the integrity of communications. Accurate time was all but unobtainable for centuries, and then, as we spent significant sums devising even more accurate timekeeping instruments, accurate time became a specialized service. more
Internet based attacks have targeted Iranian infrastructure and communications companies, disrupting Internet access across the country, according to today's reports. Country's secretary of the High Council of Cyberspace, has been quoted telling the Iranian Labour News Agency: "Yesterday we had a heavy attack against the country's infrastructure and communications companies which has forced us to limit the Internet. ... Presently we have constant cyber attacks in the country." more
Craig Labovitz reporting today on Arbor Networks blog: "In their earnings call last week, Google announced a record 2010 third-quarter revenue of $7.29 billion (up 23% from last year). The market rejoiced and Google shares shot past $615 giving the company a market cap of more than $195 billion. This month, Google broke an equally impressive Internet traffic record -- gaining more than 1% of all Internet traffic share since January. If Google were an ISP, as of this month it would rank as the second largest carrier on the planet..." more
As we have seen in the first installment of this series, TR-069 offers unprecedented visibility into the customer premises network to highlight devices beyond the gateway, and in the case of WiFi, the issues affecting service quality. Insights into the surrounding WIFI landscape alone provide ample data to provision the access point (AP) to operate in a part of the spectrum with the least amount of interference. more
When I was first advocating home networking at Microsoft, we encountered a problem. The existing systems and applications had implicitly assumed they were inside a safe environment and didn't consider threats from bad actors. Early Windows systems hadn't yet provided file system with access control and other protections though there were some attempts to have separate logins to keep some settings separate. more
IPv4 scarcity turned regional internet registries from clerks into gatekeepers of a valuable resource. Yet liability caps remain trivial, leaving powerful institutions with little accountability and incentives for conflict and structural breakdown ahead. more
The release on websites this week of what appears to be top-secret computer code that the National Security Agency has used to break into the networks of foreign governments and other espionage targets has caused deep concern inside American intelligence agencies, raising the question of whether America's own elite operatives have been hacked and their methods revealed. more
A dispute over African IP governance exposes a flaw in the RIR system, where thin policy, weak accountability and institutional self preservation risk overriding running networks and undermining the technical legitimacy that sustained global coordination. more
In an article titled "A Cyber-Attack on an American City", Bruce Perens writes: "Just after midnight on Thursday, April 9, unidentified attackers climbed down four manholes serving the Northern California city of Morgan Hill and cut eight fiber cables in what appears to have been an organized attack on the electronic infrastructure of an American city. Its implications, though startling, have gone almost un-reported. That attack demonstrated a severe fault in American infrastructure: its centralization. The city of Morgan Hill and parts of three counties lost 911 service, cellular mobile telephone communications, land-line telephone, DSL internet and private networks, central station fire and burglar alarms, ATMs, credit card terminals, and monitoring of critical utilities..." more
Last month, I talked about keeping the Winter Olympics from clogging up your networks as employees raced to stream live events during the workday. Well, in the U.S., we are in the middle of NCAA Men's Basketball Tournament, the annual "madness" repeats itself all over again. And let's be honest, most of us want to sneak a peek at the scores and witness some of the thrilling upsets that happen every year. more
"DNC Hack Prompts Allegations of Russian Involvement," Damian Paletta and Devlin Barrett reported in the Wall Street Journal today: "U.S. authorities said they are still investigating who perpetrated the hack, but cybersecurity experts said the email release resembled past examples of political interference that other countries have tied to Russia." more
At NANOG 96, the AI boom dominated discussions as firms race to build gigawatt-scale data centres packed with advanced GPUs, liquid cooling, and lossless networks, raising fears of overinvestment, neglected security priorities, and a looming infrastructure bubble. more