Telecom

Telecom / Most Commented

Telecommunications Advocacy: Who’s Behind That Blog?

An assignment in a Media and Democracy course I teach at Penn State invites students to select a telecommunications advocacy web site for analysis. I want my students to decode the message and attempt to identify whether a bias exists and who financially supports the site. The exercise typically fails miserably... Most students cannot infer that a site that advertises books by Ann Coulter trends to the right and one that talks about social justice trends to the left. more

On the Hunt for “Critical Internet Resources”

I'm writing this column in November, and that means that it is time for the traveling circus known as the Internet Governance Forum (IGF) to come down to earth, unpack its tents and sell tickets for its annual song and dance routine. The script for this year's show has been changed, and after being excluded from the main arena last year at the Athens gig, the headline act of "Critical Internet Resources" is taking a starring role this year in Rio. Some folk are even saying that it is the single most contentious issue to be scheduled at this year's IGF show. So what are "Critical Internet Resources" anyway? If folks are going to spend all this time, energy and carbon emissions traveling to Rio to talk on this topic, then wouldn't it be helpful to understand what it means in the first place? There are probably a number of ways to answer this question, so in this heavily opinionated column I'd like to look at the range of possible answers to this question. more

Comcast’s Wrong Approach

Internet Service Providers (ISPs) have to do a lot more than just provide a pipe from your residence to their facilities to assure that you have a good Internet experience. There is a raging debate, inextricable from the debate on Network Neutrality, both on what the proper responsibilities of an ISP are AND what methods are proper for carrying out those responsibilities. more

The Third Stage of the VoIP Rocket Never Fired

Ten years ago was the dawn of Voice over IP (VoIP). The pioneering Israeli company VocalTec had just released its VoIP software for PCs (it was named iPhone, BTW). Industry guru Jeff Pulver (whom I now partner with in FWD) had begun to hold his Voice on the Net (VON) shows. As the founder of VoIP startup ITXC, I was invited to give a keynote at VON in Boston. The evolution of VoIP, I opined with the requisite PowerPoint slides, will be like a three stage rocket. I was right about the first two stages and dead wrong about the third... more

Walks Like a Telco, Yalks Like a Telco… Must be a Telco

Vonage's latest woes are written up by Om Malik in Vonage: How Low Can You Go. More interesting than Om's reportage (Sprint wins case, Vonage ordered to pay damages, stock drops to $1.30) is the commentary afterward, in which one reader takes Om to task for the "gleeful" way in which he reports the demise of the VoIP companies... Boosters made the argument that VoIP was fundamentally cheaper than the TDM systems that phone companies deploy, and so therefore they enjoyed a price advantage in the market place. Anyone in the business of supplying telecom equipment, however, will tell you that the argument is flawed... more

P2P: Boon, Boondoggle, or Bandwidth Hog?

Depending on whom you ask, peer-to-peer (P2P) services may be the best thing that ever happened to the Internet or a diabolical arbitrage scheme which will ruin all ISPs and bring an end to the Internet as we think we know it. Some famous P2P services include ICQ, Skype, Napster, and BitTorrent. Currently a new P2P service called iPlayer from BBC is causing some consternation and eliciting some threatening growls from British ISPs... more

The End of the (IPv4) World is Nigher!

Funny how some topics seem sit on a quiet back burner for years, and then all of a sudden become matters of relatively intense attention. Over the past few weeks we've seen a number of pronouncements on the imminent exhaustion of the IP version 4 address pools. Not only have some of the Regional Internet Registries (RIRs) and some national registry bodies made public statements on the topic, we've now seen ICANN also make its pronouncement on this topic... Why the sudden uptake of interest in this topic? I suspect that a small part of this may be my fault! more

CAN SPAM Applies Even Within a Single Provider

I recently came across a copy of a ruling in the bizarre case of MySpace vs. theglobe.com. Theglobe.com was the ultimate dot.com bubble company. It started up here in Ithaca, and went public at the peak of dot.com hysteria with one of the the greatest one-day price runups ever. Since then they bought and sold a variety of busineses, none of which ever made any money, including the Voiceglo VoIP service which appears to be what the spam was promoting. more

Black Frog: Next Generation Botnet, No Generation Spam Fighting

Black Frog -- a new effort to continue the SO-CALLED Blue Security fight against spammers. A botnet, a crime, a stupid idea that I wish would have worked -- News items on Black Frog. Blue Frog by Blue Security was a good effort. Why? Because they wanted to "get spammers back". They withstood tremendous DDoS attacks and abuse reports, getting kicked from ISP after ISP. ...The road to hell is filled with good intentions. Theirs was golden, but they got to hell, quite literally, non-the-less. ...When Blue Security went down, some of us made a bet as to when two bored guys sitting and planning their millions in some café would show up, with Blue Security's business plan minus the DDoS factor. Well -- they just did. more

The Search for Net Neutrality

My weekly Law Bytes column (Toronto Star version, freely available version) examines the growing trend toward a two-tiered Internet, which upends the longstanding principle of network neutrality under which ISPs treat all data equally. I argue that the network neutrality principle has served ISPs, Internet companies, and Internet users well. It has enabled ISPs to plausibly argue that they function much like common carriers and that they should therefore be exempt from liability for the content that passes through their systems. ...Notwithstanding its benefits, in recent months ISPs have begun to chip away at the principle. more

Identity Theft: Giving Away Your Personal Information

Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. In the past few months, one company after another is being forced to admit customer data has been lost or stolen. In many cases, they have them come forth repeatedly over the next few weeks, or even months revising the estimated number of impacted customers. To date, I don't think any have ever lowered those numbers. ...Let's consider two events that didn't make the front page of C|Net or CNN.  more

Road Warrior at Risk: The Dangers of Ad-Hoc Wireless Networking

Most people who have wireless Ethernet at home, or the office, connect to the wireless network by attaching to a wireless Access Point, or AP. This method of wireless networking is called "Infrastructure Mode". If you have a secure wireless network configured in "Infrastructure Mode" you are using MAC address filtering, some level of encryption, and have made some additional changes to your AP in order to prevent just anyone from using it or capturing data. ...However, for those who are not using "Infrastructure Mode", and are configured to communicate from machine to machine, or "Ad-Hoc", there are a few things you should be aware of. more

URLs: Ontologically Speaking

I was reading David Weinberger's reports on how the New York Times is planning on tackling its "link rot" problem where articles slip behind the pay-wall. Part of their solution appears to be to replace articles with their summaries. As usual, this got me thinking about telephony. Why don't phone calls and callers have URIs or URLs? ...Let's take addressing the endpoints first. Obviously, ENUM is one way of "Internetising" the phone number address space. more

Internet Governance: Analogue Solutions to Digital Problems

This is an overview of the booklet, "Internet Governance: Issues, Actors and Divides," recently published by DiploFoundation and the Global Knowledge Partnership. "Internet Governance is not a simple subject. Although it deals with a major symbol of the DIGITAL world, it cannot be handled with a digital - binary logic of true/false and good/bad. Instead, the subject's many subtleties and shades of meaning and perception require an ANALOGUE approach, covering a continuum of options and compromises." Update: This article was reposted with additional information and a new title. more

Phone Always Busy? Must be DDoS on VoIP Network

Amidst the fascinating news from the SCO saga, preparing for SANS London and contributing to the Unix timeline project at Grokline my eyes caught a piece of rather distressing news on the BBC. It appears that BT (British Telecom) intends to move its current phone network to an IP-based network by 2009 thereby sending the circuit-switched technology off to the attic. The real question is: can we guarantee the same level of reliability on VoIP as we had on circuit-switched telephony when the stated aim is to carry both voice and data traffic down the same cables (or fibres more likely)? more