P2P

P2P / Featured Blogs

As the Comcast Saga Unfolds, Be Careful What You Wish For

Comcast has been in the news recently for deliberately "slowing down" some subscribers and applications in its broadband cable service. There was an article in the Washington Post today updating the case, and there was a recent article in Network World that actually favors the groups filing the complaints and calls for the FCC to crack down on Comcast. more

iPhone, Android, 700 MHz: What Maximizes Wireless Innovation?

At the Emerging Communications Conference eComm 2008, I'm moderating a panel "Wireless Innovation, with or without operators." This will be a discussion -- smart people from differing camps responding to (hopefully) probing questions from yours truly, and the audience. Points of view represented include Google Android, J2ME/JavaFX Mobile, iPhoneWebDev.com, Skype and Trolltech Qtopia (Nokia), plus Chris Sacca, formerly head of Google's wireless initiatives. I've been thinking about subjects and questions for the panel. As a start, I'll set down my current views, then seek others' views and questions. more

Is China Preparing to Go its Own Way with its Own Internet Root?

Interesting things happening in China. An article in the English edition of the People's Daily on line is headlined, Decimal network security address begins operation: "China's decimal network security address was officially launched. China has made a fundamental breakthrough in its Internet development; and actual use has been successful. The birth of decimal network technology makes China the only country able to unify domain names, IP addresses and MAC addresses into the text of a metric system..." Someone asked whether this was a rumored IPv9? It appears IPv9 is a project name, not a new protocol. It lumps together several activities, including at least... more

More on 700 MHz Block C Hits Reserve Price

This is big... For the upper band C Block, the FCC mandated that any winning licensee have in place "no locking" and "no blocking" provisions conditioning its use of this spectrum: "Licensees offering service on spectrum subject to this section shall not deny, limit, or restrict the ability of their customers to use the devices and applications of their choice on the licensee..." The no-locking, no-blocking requirements were hedged in by substantial limitations... But it's still important... Particularly if Google is the winning bidder, something we may not know for a month or so. more

How Tiered Internet Pricing Could Actually Facilitate P2P

Time Warner Cable's planned experiment with tiered charging for Internet access has generated a flurry of coverage in the blogsphere, but no new insights (at least that I've seen). The primary problem ISP's complain about is that 5% of their customers use 90% of the available bandwidth and when they examine this traffic, it's mostly peer-to-peer file sharing... more

Unbridled Discretion and Prior Restraint: The Verizon and Comcast Stories

Let's say that providing communications infrastructure is an inherent function of a state. Most people think of the internet as a telephone system, and most people think the telephone companies aren't supposed to choose which calls will go through based on their content. People think that because they think internet access, like telephone access, is a utility -- like electricity conduit, water pipes, etc. -- that has something to do with the government, and the government isn't supposed to discriminate. more

Making the Wireless World More Web-Friendly

Your wireless carrier (in the U.S., probably AT&T or Verizon Wireless) has a lot of control over the handset you can use and the applications that can run on that device. In fact, wireless carriers routinely ask for (and get) an enormous slice of the revenue from applications that work on their networks, and they force handset manufacturers to jump through all kinds of hoops in order to be allowed to sell devices that can connect to these networks... This has had bad effects on the ecosystem of the wireless world. more

Comcast’s Wrong Approach

Internet Service Providers (ISPs) have to do a lot more than just provide a pipe from your residence to their facilities to assure that you have a good Internet experience. There is a raging debate, inextricable from the debate on Network Neutrality, both on what the proper responsibilities of an ISP are AND what methods are proper for carrying out those responsibilities. more

How Big is the Storm Botnet?

The Storm worm has gotten a lot of press this year, with a lot of the coverage tending toward the apocalyptic. There's no question that it's one of the most successful pieces of malware to date, but just how successful is it? Last weekend, Brandon Enright of UC San Diego gave a informal talk at the Toorcon conference in which he reported on his analysis of the Storm botnet. According to his quite informative slides, Storm has evolved quite a lot over the past year... more

Why a Net Neutrality Law is Not Enough

Once we decide that Network Neutrality is a good thing to (re)enshrine in law, then we need to ask how to do that effectively. One way would be to pass a law saying, "Thou shalt not discriminate." That's the current approach. But network operators will say that they must manage their network, and if, in the course of network management, they were to disadvantage some source, destination, application, service or content, they might be accused of violating the law. So any Network Neutrality law must have a Network Management Exception... more

Industry Updates

There are no postings submitted to this section yet.