Telecom

Telecom / Most Viewed

Skype Goes IPO - What Should Service Providers Do?

Last week's news about Skype's planned IPO brings a renewed focus on what constitutes a service provider these days, and perhaps more importantly, what forms the basis for its valuation? We all know how the advent of IP has turned the economics of telephony on its head, and the drivers of value continue to shift from the physical world of network infrastructure to the virtual world of software, the Web and now the cloud.
 more

Comcast’s Network Management Practices: A Brief Analysis

Late last week, Comcast officially disclosed to the FCC details of its network management practices which have been a subject of considerable discussion here on CircleID. (My thanks to Threat Level from Wired.com for providing a convenient copy of Comcast's "Attachment A" in which this disclosure is made.) There's not a lot of startling disclosure in this document, but it does provide some useful concrete facts and figures. I'll quote the more interesting parts of the document here, and offer comment on it. more

Letter from EU to UN Secretary General

Today the Swedish IT Minister Åsa Torstensson together with the Commissioner Viviane Reding sent a letter to the UN Secretary General Ban Ki-moon. I think the letter is extremely well written, but when I twittered about it, some people contacted me and asked what was so special with it? Let me try to explain... more

The Unbelievably High Cost of the War Against Huawei

U.S. companies were selling $11 billion a year of parts to Huawei before the blockade. Losing those sales is just the start of the damage. Every other Chinese and Russian company is making sure to find non-US suppliers. The U.S. has threatened India and Turkey with sanctions as well. As other companies replace U.S. components, the impact will be tens of billions more than the $11 billion of Huawei suppliers. more

Bandwidth Demands Exceeding Internet Infrastructure Investment

Nemertes Research has released a report on the future of the Internet infrastructure. The key finding from the report is that bandwidth demands are exceeding infrastructure investment, especially at the access layer. We noted in the project that users may begin to see the impact of degraded application performance as early as 2010. We also noted that the planned investments in Internet infrastructure are insufficient to meet growing demand. more

Overloading the Internet? Recent Media Reports Based on Dangerous Misinformation

The London Times article (and a similar one in the Guardian) are based on dangerous misinformation. The net isn't slowing down, and nearly no technical experts believe major "overload" problems likely on the backhaul, core, or decent local loop... Net traffic per user, as documented by Odlyzko and Cisco, has been growing at about 35-40% the last five years, and that growth rate is flat and possibly down the last two years. The net has been able to handle the increase without price increases, much less overload, because the primary and rate limiting equipment (switches, routers, WDM, etc.) have simultaneously been going down at a similar 35-40%. Moore's Law is bringing costs down and capacity up at a remarkable rate. more

Canada: Smart Regulation, Not De-regulation

Canada's CRTC isn't as dumb as U.S. regulators who are considering ruling that the law doesn't apply where the telcos oppose it. (Title II deregulation) Canada just decided wireless needs to follow the rules. In turn, the CRTC intends to make sure the rules are reasonable. Rather than saying "never any rules," they instead try to write sensible ones. more

Can We Create a Secure Caller ID For VoIP?

Can we create a "secure Caller ID" for IP-based communications, a.k.a. voice-over-IP (VoIP)? And specifically for VoIP based on the Session Initiation Protocol (SIP)? Can we create a way to securely identify the origin of a call that can be used to combat robocalling, phishing and telephony denial-of-service (TDOS) attacks? That is the challenge to be undertaken by the "Secure Telephone Identity Revisited (STIR)" group meeting tomorrow morning, July 30, 2013, at 9:00 am in Berlin, Germany, as part of the 87th meeting of the Internet Engineering Task Force (IETF). more

Thailand’s Blacklist of Newly Banned Websites Leaked

Whistleblower website WikiLeaks has released the list of newly blacklisted websites by Thailand's Ministry of Information and Communication Technology (MICT). The list was leaked by advisory board member CJ Hinke, director of Freedom Against Censorship Thailand, according the WikiLeaks website. From WikiLeaks' announcement: "The 1,203 blocked websites are located in Australia, Brazil, Canada, Czech Republic, France, Germany, Hong Kong, Hungary, India, Ireland, Israel, Italy, Japan, Mexico, The Netherlands, New Zealand, Poland, Russia, South Korea, Spain, Sweden and Vietnam..." more

Privatizing the ITU-T: Back to the Future

The awkwardly named International Telecommunication Union Telecommunication Standardization Sector (ITU-T) by any measure is a highly unusual body. It is the only global intergovernmental organization where Nation States produce detailed technical standards for telecommunications. Even more amazing is that it produces these standards for a field that is so dynamic and globally competitive as telecommunications. What is not well known is that the ITU-T was once a private standards body... more

Moving Beyond Telephone Numbers - The Need for a Secure, Ubiquitous Application-Layer Identifier

Do "smart" parking meters really need phone numbers? Does every "smart meter" installed by electric utilities need a telephone number? Does every new car with a built-in navigation system need a phone number? Does every Amazon Kindle (and similar e-readers) really need its own phone number? In the absence of an alternative identifier, the answer seems to be a resounding "yes" to all of the above. more

Beyond Neutrality - Enabling a World of Connected Things

The growing interest in the "Internet of Things" is forcing us to think beyond the web to a much larger world of connected devices. We can tolerate the many barriers to connectivity because we expect that someone can provide the necessary credentials to log in to the providers' services and to adjust Wi-Fi access keys whenever the access point changes or simply to click "agree" at a hotspot. This doesn't work for "things" which can't recognize a sign-on or "agree screen". more

IFTF Tribute to Paul Baran: Forecasted Online Shopping, News and Banking in 1971

With the recent passing of Paul Baran, IFTF is releasing an excerpt of a 1971 report in tribute, entitled "Brief descriptions of potential home information services." The excerpts are from the report titled, Toward a Study of Future Urban High-Capacity Telecommunications Systems, which included a handbook of forecasts for what was then called "broadband telecommunication and information services," later known as the Internet. more

Still Waiting for IPv6

It's now been a decade since the world officially ran out of blocks of IP addresses. In early 2011 the Internet Assigned Numbers Authority (IANA) announced that it had allocated the last block of IPv4 addresses and warned ISPs to start using the new IPv6 addresses. But here we are a decade later and not one of my clients has converted to IPv6. more

Overture to Take Over Internet Governance: ITU at ICANN Meeting, Cairo

ITU is 143 years old and it has done a lot of good work. But it is so huge and powerful that it has been monopolizing (or mono-unionizing) Telecommunications for the last 143 years. ITU's hold over communications has been sweeping. But during the last ten years, ITU's member Telcos have seen several challenges from the open Internet architecture... ITU and the Internet organizations did not quite get along for this and several other reasons Especially the ITU has had its share of differences with the ICANN. Dr. Hamadoun Toure, Secretary General of the ITU addressed the ICANN Annual Meeting at Cairo on 6 November 2008. Here are some excerpts from the Secretary General's speech with my comments. more