Net Neutrality

Net Neutrality / Most Commented

Over 80 European Organizations Demand Protection for Net Neutrality

Today, more than 80 organizations, represented by The European Consumer Organization (BEUC) and European Digital Rights (EDRi), sent a letter to the European Commission demanding the end of dangerous experimentation with the functioning of the Internet in Europe and the protection of the principles of openness and neutrality. more

WCIT Denouement

It is midnight in Dubai and I am listening to the final readings of the International Telecommunication Regulations (ITR). This instrument is the final output of two weeks of negotiations at the World Conference on International Telecommunication (WCIT), a gathering of the world's nations to update the the ITRs. The Chair goes through the document article by article, section by section, and with each passing "thank you", this Conference draws to a close. Many in the room are elated. more

Comcast Xfinity App Argument: Risking Divestiture of Cable or Broadband

This sounds extreme, but Comcast continues to push the boundaries in separation of its broadband service with its cable service. It is walking a thin line between being a broadband provider, offering fast Internet access to millions of subscribers, and treating its Xfinity Xbox 360 App as a priority over customers not having its cable service. Saying the Xbox 360 is just another set-top-box for its own customers is just a complex way of undermining Net Neutrality rules as defined by the FCC upon the companies purchase of NBCU. more

Why SOPA Defender Joins Internet Society as Regional Director

Internet Society recently announced the appointment of former chief technology officer of Motion Picture Association of America (MPAA). The decision has raised concerns within the Internet community as Paul Brigner had campaigned for SOPA while at MPAA as well as being on record opposing net neutrality while being an official at Verizon. more

DDI Integration: We Need IPAM

I am a big fan of DDI (DNS, DHCP and IPAM) as magical trio to manage all transactions on network infrastructures... Or to say the least: make it possible. Basically it makes these "Core Network Services" concise, manageable and integrated. It basically makes the network infrastructures of today and the future possible. There is however one thing that continuously seems to irritate when talking about integrating these services on networks. more

DDoS Mitigation: A Blend of Art and Science

As DDoS attacks become larger, more frequent and complex, being able to stop them is a must. While doing this is part science, a matter of deploying technology, there is also an art to repelling sophisticated attacks. Arbor Networks, Citrix and others make great gear, but there's no magic box that will solve all your problems for you. Human expertise will always be a crucial ingredient. more

SIP Co-Author Henning Schulzrinne Appointed CTO of the FCC

In a move to be celebrated by many of us with a VoIP background, the United States Federal Communications Commission (FCC) announced today the appointment of Henning Schulzrinne as Chief Technology Officer (CTO). As the release indicates, Henning's role as CTO will be to: ...guide the FCC's work on technology and engineering issues, together with the FCC's Office of Engineering and Technology. more

2nd FCC Workshop on PSTN Transition Streaming Live Today

Today, December 14, 2011, the US Federal Communications Commission (FCC) is holding the second of two workshops on the transition of the PSTN to new technologies. The workshop started streaming live this morning at 9:30am US Eastern. The FCC's note about the workshops mentions that people watching the live stream can send in questions to panelists using either of two methods... more

2012 Security Predictions: APT’s, Mobile Malware and Botnet Takedowns

As the weeks remaining in 2011 dwindle and 2012 peaks out from behind the last page of the calendar, it must once again be that time of year for purposeful reflection and prediction. Or is that navel gazing and star gazing? At the highest level of navel gazing you could probably sum up 2011 with one word -- "More"... But let's put that aside for now. What does 2012 hold in stall for us? more

Video Recording Now Available of FCC Dec 6th Workshop on PSTN Transition

If you missed attending or listening to the live stream of the US Federal Communication Commission's (FCC) workshop on the transition of the Public Switched Telephone Network (PSTN) to new technologies that was held last week on December 6th, the FCC has very nicely made a video recording available from their website for viewing... FCC Chairman Julius Genachowski also appeared briefly to provide a few comments. more

Internet Bigger Than Agriculture or Energy Sectors - Importance of R&E Networks

Several months ago McKinsey did a very interesting study on the economic value of the Internet. They pointed out that Internet in the G8 countries as well as Brazil, China, India, South Korea, and Sweden is now bigger than agriculture or energy. The Internet represents 3.4% of GDP and accounted for 21 percent of GDP growth over the last five years among these developed countries and as Vint Cerf pointed out in his blog created 2.6 jobs for every one lost. more

From IPv6 Day to IPv6 Everyday

Quite a number of articles and blogs including one I contributed had IPv6 haruspices dissect the entrails and divine the future of the internet in the wake of the june 8th IPv6 World Day. It came and went with some trepidation, the internet did not go comatose and some marveled at and reported on traffic peaks they witnessed. Preparation of a keynote for the Gogonet Live conference in San Jose, provided me the opportunity to have a look at how some variables evolved since June... more

Mobile Malware Growing Exponentially, Limited Capability of Current Security Solutions Big Concern

Security analysis suggest troubling and escalating trends in the development of malware that exploits vulnerabilities on mobile devices. "From turning mobile devices into bots, to infiltration of mobile applications, driven by the use of personal devices in the workplace, cybercriminals are taking full advantage of this market," reports M86 Security Labs in its just released Threat Predictions Report. more

What Chinese DDoS Malware Looks Like

While at that same Virus Bulletin conference that I was talking about earlier in my other post, I also had the chance to check out a session on Chinese DDoS malware put on by some folks from Arbor Networks. As little insight as I have into Android malware, I know even less about Chinese DDoS malware. So what's Chinese DDoS malware like? What are its characteristics? more

IPv6 RIPEness: More Smaller and Younger Organizations Deploying IPv6

The number of RIPE NCC members [also referred to as Local Internet Registries (LIRs)] that have an IPv6 allocation continues to grow -- in absolute terms as well as in percentages. 46% of all RIPE NCC members have one or more IPv6 RIPEness stars. ... Do new members pick up IPv6? Are older members with more experience, well-established businesses and customer base dominating IPv6 RIPEness scores? And what about the size of a member? Are small and large members adopting IPv6 in equal proportions? In this article we look into answering these questions. more