The long rumored reorganization of the telecommunications sector in China has begun. Now China will have three major companies, each with both mobile and fixed networks. The focus for fixed network growth is broadband Internet access. The focus for mobile will be continued growth in mobile subscribers and the launch of 3G services, with the three companies using three different 3G technologies. more
Scientists from ETH Zurich and their European partners have demonstrated a groundbreaking capability for transmitting several tens of terabits per second, despite considerable air turbulence. This feat was accomplished with lasers over a distance between the Jungfraujoch mountain peak and the city of Bern in Switzerland. The technology could potentially eliminate the need for expensive undersea cables, currently forming the backbone of the Internet. more
Craig Labovitz writes to report: At 18:40 UTC Amazon Web Services suffered performance issues for their North Virginia datacenter. The performance issues impacted services such as EC2, S3, SES, RDS, and Mechanical Turk among others. more
I outline two possible drawbacks with the idea of first revealing rules for the new proposed Top-Level Domains (TLDs) and then for second-level registrations. I propose a lottery process to initially allocate second-level domain names. A number of people have voiced concerns about the idea of automatically granting the winner of the TLD a monopoly power over second-level domain registrations. We should also be worried about the financial interest ICANN has in not providing the rules for the two-level registrations simultaneously. more
The British government is urging close to 340,000 registered holders of .EU domain in Britain to make contingency plans as their web addresses will disappear if the UK does not agree on a deal with Brussels. more
Building on my last article about Network Assessments, let's take a closer look at vulnerability assessments. (Because entire books have been written on conducting vulnerability assessments, this article is only a high level overview.) What is a vulnerability assessment? more
Brendan Sasso reporting in the Hill: "Julius Genachowski, chairman of the Federal Communications Commission (FCC), issued a statement late Wednesday slamming Russia for passing a bill that would allow the government to blacklist certain websites. He said the country had moved in a 'troubling and dangerous direction.' ... 'The world’s experience with the Internet provides a clear lesson: a free and open Internet promotes economic growth and freedom; restricting the free flow of information is bad for consumers, businesses, and societies,' he said. more
George Reese (author of the new book Cloud Application Architectures: Building Applications and Infrastructure in the Cloud) is talking at Gluecon about securing cloud infrastructures. Two recent surveys found "security" was the number one concern of companies considering a move to the cloud. George says the key to making customers comfortable with cloud security is transparency... more
A recently passed American spending bill, known as H.R. 1, allocates $24.5 billion for fiscal year 2025 to fund a nationwide integrated air and missile defense system. Although the term isn't used in the legislation, the new system is referred to as the Golden Dome. There will be higher costs coming in later years. The Department of Defense has already set a target to be able to test the new system by the fall of 2027. more
It wasn't that long ago that, during a visit home, my brother asked me, "Why are you so stuck on this Internet thing?" His direct question caused me to realize that I had never actually stopped and considered why I was investing so much time – and in such a highly visible manner – into Internet governance when I wasn't being compensated for doing so and, in fact, was – not putting too fine of a point on it – flat broke. more
In a significant service disruption early Thursday, AT&T's network experienced widespread outages, affecting cellular service and internet connectivity for users across the United States. According to the tracking site Downdetector, the issues began around 4 a.m. ET, with over 32,000 reports of outages, which surged to more than 71,000 by 8 a.m. ET. more
Domain names give your intellectual property visibility, as well as provide function for your company's infrastructure. Vital domain names are simply too important to be left exposed. To protect them, you can add extra layers of security to your digital brand with easy, secure, server-level protection in addition to multi-level locks that combat domain name system (DNS) hijacking and protect against unauthorized changes and deletions to your critical domain names. more
APAN (Asia Pacific Advanced Network) brings together national research and education networks in the Asia Pacific region. APAN holds meetings twice a year to talk about current activities in the regional NREN sector. I was invited to be on a panel at APAN 50 on the subject of Cyber Governance, and I'd like to share my perspective on this topic here. more
Given that I've written here about the original call for papers for the W3C/IAB "Strengthening The Internet Against Pervasive Monitoring (STRINT)" Workshop and then subsequently that the STRINT submitted papers were publicly available, I feel compelled to close the loop and note that a report about the STRINT workshop has been publicly published as an Internet-draft. more
The UK's Foundation Model Taskforce has been established in response to the UK government's ambition to become a leader in the development and use of artificial intelligence (AI). The task force will be supported by £100 million of investment and will focus on building the UK's 'sovereign' national capabilities, so public services can benefit from the transformational impact of this type of AI. more