/ Recently Commented

Decoding the Cellular IoT Acronym Alphabet Soup

Do you know what all these acronyms and abbreviations mean related to cellular networks and the Internet of Things (IoT)? MTC, Cat-0, Cat-1, Cat-M1, LTE-M, NB-IoT, EC-GSM, LPWA, eDRX, PSM... I certainly didn't, but Tuomas Tirronen at Ericsson Research wrote a blog post titled "Cellular IoT alphabet soup" where he explained all of this for those of us who might be interested. more

Three Reasons Why Apple Didn’t Have to Unlock a Phone

The US government is demanding Apple unlock iPhones in about a dozen cases beside the San Bernardino one. In a strikingly similar case, Judge James Orenstein in Brooklyn rejected the government's request for three separate reasons. In the decision the judge refers several times to the San Bernardino case, and it is clear he expects this decision to be an important precedent for that one. more

The IANA Stewardship Transition: All Eyes Turn Toward ICANN 55 in Marrakech

When in March 14, 2014, the NTIA announced its intention to step away from its historical oversight role over the IANA functions, something extraordinary happened. A global dialogue immediately ensued. The first part of this dialogue is expected to come to an end in the forthcoming ICANN annual meeting in Marrakech next week. After two years of vigorous discussions, the Internet community says it is now ready to move to the next part of the process - implementation. more

Report Finds Arabic Domain Names Ripe for Growth

Since ????. (.web in Arabic and pronounced "dot shabaka") launched as the world's first new Top-Level Domain in 2014, we've faced many hurdles in growing adoption of Arabic domain names. From universal acceptance and general awareness issues to a lack of Registrars with Arabic retail interfaces -- the challenges have been numerous and varied. However, according to a new ICANN-commissioned study released this week - one of the first to investigate the Middle East DNS sector - there is much to celebrate too. more

Mobile Is Not Everything (and That’s OK)

As I type these words, I am perched on one of the benches in the main thoroughfare of the cavernous venue hosting Mobile World Congress (MWC). Above me is a video screen warning me of the perils of the infamous local pickpockets, so I know I'm definitely in Barcelona! In its current form, MWC has been the mainstay event of the telecoms business for a decade, and its roots go back to the late 1980s. The slogan of this year's event is "Mobile is Everything". I believe this phrase is a symptom of an industry suffering from dangerous strategic drift. Here's why. more

ICANN Accountability Proposal Enhances Power of Governments Over Internet, Risks IANA Transition

While most of the recommendations included in the Cross Community Working Group on Enhancing ICANN Accountability (CCWG-Accountability) Report are much needed reforms to ICANN's accountability mechanisms, the proposal also contains a fundamental flaw, which jeopardizes its overall acceptance and risks delaying the IANA transition process further: it changes the role of governments from "advisory" to "decisional" over ICANN's governance, and it separately enhances the power of governments over ICANN's board of directors. more

IPv4 Market Outlook

When 2015 began, there were several million IPv4 numbers still in the American Registry for Internet Numbers (ARIN) IPv4 free pool, ARIN was processing 4-5 unique IPv4 transfer transactions per month, and fewer than 5 million numbers had been transferred publicly in the prior 12 months. The end of 2015 told a different story. In late September, the ARIN free pool was depleted. more

Apple vs FBI: Apple and Others to Argue on the Hill

Tomorrow afternoon at 1pm EST Apple will be giving testimony to the House Judiciary Committee. The session that Apple and others will be taking part in is aptly named, The Encryption Tightrope: Balancing Americans' Security and Privacy In common with other hearings the various witnesses called to speak have already submitted their written testimony, so we can already look at it and analyse it. more

Which Comes First, the Trademark or Domain?

For years, the question of exactly when to register a domain name has been one asked by legal departments, as they've sought to formalize their internal processes. If you were to think about it logically, it would make most sense to register it after the trademark had been cleared. After all, why bother to register a domain, if you aren't going to use it to support a product, service or campaign? more

Repeat DDoS Attacks the Norm in Q4 2015, 24 Attacks per Target on Average

During Q4, repeat DDoS attacks were the norm, with an average of 24 attacks per targeted customer in Q4, reports Akamai in its newly released Q4 2015 State of the Internet - Security Report. more

UK’s Proposed Spy Law Can Force Apple to Bypass Security, Plus a Gag Order

The newly proposed British spying law, the Investigatory Powers Bill (IPB), is reported to include methods that would permit the British government to order companies like Apple to re-engineer their own technology, similar to current demands from the FBI. In addition, if the law passes, it would be accompanied by a gag order. more

Spin Doctoring from FBI in the Apple Case

It is rather amazing to follow the reporting on the FBI vs Apple case in relation to the FBI's order to Apple to provide them with software that would allow them to crack the security code on all Apple phones. In some of those reports spin doctoring from the FBI -- especially through the public media -- led you to believe that Apple is not willing to assist the FBI in the San Bernardino murder case. This is, however, blatantly false. more

Google, Facebook, Twitter and Other Tech Companies Join Forces to Support Apple in FBI Case

Google, Facebook, Twitter and Microsoft are among tech companies that have joined Apple in its iPhone fight with the U.S. government, according the latest report from the Wall Street Journal. more

Reflections on NANOG 66

The North American Network Operators Group (NANOG) continues to be one of the major gatherings on network operators and admins, together with the folk who work to meet the various needs of this community. Their program committee produces a program that never fails to provide thought provoking interest. Here are my reactions to some of the presentations I heard at NANOG 66, held in San Diego in February. more

Better “Always-On” DDoS Mitigation

Distributed Denial of Services (DDoS) attacks have been the frustration of information technology professionals for many years. When asked, most tell you they wish their internet service providers (ISPs) would simply provide them "clean pipes" all the time and take care of DDoS attacks upstream before they ever get to them. Unfortunately, the resources (equipment and personnel) necessary to clean Internet connections all the time are very expensive and come with several downsides. more