/ Recently Commented

NGN is Not the Internet, and Never Will

I see and hear a lot of confusion about next generation networks (NGN). In most cases people are using the term roughly as the ITU-T defines it: "A Next Generation Network (NGN) is a packet-based network able to provide services including Telecommunication Services and able to make use of multiple broadband, QoS-enabled transport technologies and in which service-related functions are independent from underlying transport-related technologies." but many people don't realize how little this has to do with the Internet... more

Coders, Crackers and Bots, Oh My!

There are more than just blue, black and white hat hackers. There are a few more types of folks out there that don't fit into the above categories. This article is taken from Stratfor with some commentary by myself... Many of the hackers described in my previous post are also coders, or "writers," who create viruses, worms, Trojans, bot protocols and other destructive "malware" tools used by hackers... more

Black Hats, White Hats, Crackers and Bots

One of the other web sites I subscribe to is Stratfor. It's a global intelligence website and doesn't really have much to do with spam. But I like politics so I read it. They have some articles which you can get for free, but the better stuff you have to pay for. About two weeks ago, they ran a three-part series on Cyberwarfare. The first article was the title of this post, which you can access here (requires registration). In the article they described different types of cybercriminals and not-so-criminals which they referred to under the umbrella as "hackers." more

Colorado Has a New Spam Law

The governor of Colorado recently signed a new anti-spam law [PDF] into effect. Since CAN SPAM draws a tight line around what states can do, this law is mostly interesting for the way that it pushes as firmly against that line as it can. Other observers have already done a legal analysis of the way it's worded to avoid being tossed out as the Oklahoma law was in Mummagraphics, and to make it as easy as possible for suits to meet the falsity or deception limits in CAN SPAM. To me the most interesting part of this law is its one-way fee recovery language... more

Fun and Games In the ccTLD World

There must be something in the air. I'm not sure exactly what it is, but there are a lot of things going on in the ccTLD world at the moment. In the UK Nominet's Annual General Meeting (AGM) is being held this week. This would normally provoke a yawn from most people -- it's an AGM -- how exciting can that be? This year's AGM looks like it could be quite entertaining, although it probably isn't going to be particularly beneficial for its membership. more

IPv6… Becoming a Hot Topic Again?

Is IPv6 a hot topic again in the wake of the increased coverage of the looming IPv4 address depletion? This was the theme of a coffee break discussion we had at the recent MENOG3 conference in Kuwait. With as many opinions as participants, I turned to "Google Trend" to help me get a better feel... Using IPv6 as search word and varying the time line indeed provided some interesting perspective and tidbits on when and where IPv6 seems to be or have been a hot topic indeed. more

Brand Complementors: Implementing a Cooperative Domain-Name Use

The essay expands a cooperative solution to third-party use of brands in domain names. Like any approach that depends on cooperation, the solution will require both sides to change behavior but also allow both sides to take credit for the resulting benefits, i.e. a triangular solution. If not immediately addressed, the problem of third-party use can become a major threat to the industry. But we already know one thing: when it comes to this issue, legal action and bullying don't work. more

China’s 3G License Delay is a Smoke Screen

Last week there was a flurry of stories about China's 3G plans after Jonathan Dharmapalan of Ernest & Young was quoted as saying he expected it to take 12 to 24 months from the start of China's commercial TD-SCDMA trials, i.e. from now, until 3G licenses were issued. But there was little analysis or comment on what's really happening. 3G licenses are a formality. They delay the deployment of 3GSM & CDMA 2000 which could otherwise happen rapidly -- just plug new cards into existing radios and offer established handsets (already being manufactured, in China, for the world market). more

The End of End-to-End?

One of the major principles of the architecture of the Internet was encapsulated in a paper by Saltzer, Reed and Clark, "End-to-End Arguments in System Design". This paper, originally published in 1981, encapsulated very clearly the looming tension between the network and the application: "The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the end points of the communication system. Therefore, providing that questioned function as a feature of the communication system itself is not possible." At the time this end-to-end argument was akin to networking heresy! more

FCC’s Stanford Hearing on Broadband Practices

About 300 people attended to the net neutrality hearing Thursday hearing which began with testimony from Larry Lessig, a Stanford Law School professor and founder of the Center for Internet and Society... The meeting was called by the FCC in reaction to the news that US net firm Comcast had been exposed as managing traffic by stopping some of its 13m customers uploading files to BitTorrent and other peer-to-peer networks. The FCC has started a formal investigation to see if Comcast merits a fine for its actions. more

Does Bell Really Have a P2P Bandwidth Problem?

Bell filed its response to the Canadian Association Of Internet Providers (CAIP) submission to the Canadian Radio-television and Telecommunications Commission (CRTC) on its throttling practices yesterday, unsurprisingly arguing that its actions are justified and that there is no need to deal with the issue on an emergency basis. Several points stand out from the submission including its non-response to the privacy concerns with deep-packet inspection... and its inference that P2P usage could be deemed using a connection as a "server" and therefore outside the boundaries of "fair and proportionate use" under typical ISP terms of use. more

Locking Out Competing Providers is Bad

Today one of the headlines in Computer Sweden was that there is a dispute between Telia and the regulator PTS in Sweden. PTS requires Telia to stop locking out competing TV-distribution companies for IP-TV in the access network (DSL) that Telia runs. Specifically, they lean towards the fact Telia is dominant provider of the copper, and require Telia to competitors give access to the larger frequency band in the copper that they claim is needed for TV distribution. more

Models for Muni WiFi Completely Neglect Technology Evolution

Modern travel means interminable waits, but it's a good time for reading. I finally read Wireless Pittsburgh: Sustainability of Possible Models for a Wireless Metropolitan-Area Network by Jon M. Peha, published in February as a working paper of the New America Foundation. The good news: it's full of interesting cost estimates and projected subscriber take rates based on specific demographics in Pittsburgh, Minneapolis and Philadelphia... The flaws in this study...
 more

CAIDA and ARIN Release IPv6 Survey

The Cooperative Association for Internet Data Analysis (CAIDA) and the American Registry for Internet Numbers (ARIN) presented the results [PDF] of a recent IPv6 survey at the ARIN XXI Public Policy Meeting in Denver on April 7th. The survey involved over 200 respondents from a blend of Government, commercial organizations (including ISPs and end users), educational institutions, associations, and other profit and non-profit entities. The purpose of the survey, conducted between March 10th and 24th, was to capture IPv6 penetration data in the ARIN region... more

Retrograde Inversion of Telecommunications Policy

Going backwards upside down. That's what we're doing with telecommunications policy in the U.S. The Comcast affair should prompt a re-examination of many decisions the FCC, Congress, and the courts have made over the last few years. When the FCC reports on its reactions to Comcast's activities, the right response will be "You're asking the wrong question." "What is reasonable network management" isn't the question we should be asking... more