Networks

Blogs

Questions About Cuba's 3G Mobile Expansion

ETECSA, Cuba's telecom provider and sole operator of fixed telephony, mobile, and data in the country, is rolling out 3G mobile service in Havana and elsewhere in the country. Telegeography reports there are now 229 3G base stations in Cuba... ETECSA says 3G coverage is available in all of Havana, provincial capitals and tourist resorts. AT&T says there is GSM/GPRS coverage for 85% of national territory. more»

Landmark IPv6 Report Published: State of Deployment 2017

On the fifth anniversary of World IPv6 Launch, we're excited to share a detailed report on the State of IPv6 Deployment in 2017. It really is staggering how far IPv6 deployment has progressed in five years. In mid-2012, Google measured less than 1% of users accessing their services over IPv6. Today that figure is getting close to 20%. Since World IPv6 Launch, several major operators are now delivering the majority of traffic from major content sources like Google, Akamai and others over IPv6. more»

Good Samaritans with Network Visibility

In a big open office 30 feet from me, a team of US Veterans speak intently on the phone to businesses large and small, issuing urgent warnings of specific cyber security threats. They call to get stubborn, confused people to take down hidden ransomware distribution sites. They call with bad news that a specific computer at the business has malware that steals login credentials. more»

Be Agile or Be Edged Out: "Live" from TM Forum 2017

I like a conference that's "Live". Not just a lively crowd coalescing together to passionately discuss and debate matters of common interests, but more so in the sense of physical presence: things you can feel and touch. In the case of the TM Forum Live! 2017 event, held last week at Nice, France, it's the Catalyst Pavilions where innovative solutions, best practices, and even exploratory experimentations were on full display. Do I mean that for an IT Operation Support Systems (OSS) and Business Support Systems (BSS) trade show, you can touch it? Yep. more»

Why Not Connect Cuba's Gaspar Social Streetnet to the Internet?

I've been covering Cuban streetnets (local area networks with independent users that are not connected to the Internet) for some time. Reader Doug Madory told me about Gaspar Social, a new streetnet in Gaspar, a small town in central Cuba. Gaspar Social opened to the public last October and has grown quickly -- about 500 of Gaspar's 7,500 residents are now users. Streetnets are illegal in Cuba and the government has ignored some and cracked down on others... more»

8 Reasons Why Cybersecurity Strategy and Business Operations are Inseparable

In modern society, there is one fact that is unquestionable: The hyper-connectivity of the digital economy is inescapable. A financial institution without an online presence or omni-channel strategy will cease to be competitive. Universities (for-profit or non-profit) must develop and continuously evolve their online learning capabilities if they are to stay relevant. Online retailers are quickly outpacing and rendering their 'brick-and-mortar' counterparts irrelevant. more»

In Response to Offensive Destruction of Attack Assets

It is certainly true that DDoS and hacking are on the rise; there have been a number of critical hacks in the last few years, including apparent attempts to alter the outcome of elections. The reaction has been a rising tide of fear, and an ever increasing desire to "do something." The something that seems to be emerging is, however, not necessarily the best possible "something." Specifically, governments are now talking about attempting to "wipe out" the equipment used in attacks. more»

IoT Devices Will Never Be Secure - Enter the Programmable Networks

Harvard Business Review just ran an interesting article on the information security aspects of Internet of Things (IoT). Based on the storyline, the smart city initiatives are doomed to fail unless the security of the IoT devices and the systems will be improved. While security of the digital society is obviously a key concern, I am not entirely convinced that relying on the security of individual devices and systems is the best course of action. more»

The Role of FttH in the Development of 5G

As the roll out of FttH remains a slow process, it is no wonder that more and more people are looking towards mobile as a potential alternative. Obviously, mobile communication has improved over recent years in providing excellent access to broadband; and it has also become more affordable. At the same time, there is the fabulous hype about 5G, and the PR and media machines of the vendors involved make you believe that this will become a real competitor to the slow moving FttH developments. more»

Why Don't We Have Peak and Off-Peak Pricing for Broadband?

I saw a poster on the London Underground yesterday, and as is often the case it got me thinking about the parallels with telecoms. The poster explains the peak and off-peak fare structure for tube travel. The purpose of this pricing system is to manage the relationship between supply and demand in a system that is capacity constrained. Over short and medium timescales the supply is essentially fixed, and demand can oversaturate that supply. more»

Jakarta Declaration Calls on Governments to Recognize Legitimacy of Encryption

Today in Indonesia, media leaders gathered at UNESCO's World Press Freedom Day event issued the "Jakarta Declaration" calling on governments of the world to recognize the importance of a free and independent media in creating "peaceful, just and inclusive societies". The declaration calls on governments to take steps to support the freedom of the press, and, in the midst of the many actions was this statement: Recognise the legitimacy of the use of encryption and anonymisation technologies more»

Internet Fast Lanes - You May Be Surprised at Who Has Them

The Internet Association -- lobbying organization for Internet giants like Google, Amazon and Netflix -- is adamant that it is necessary to apply of 1935 phone regulation (Title 2) to the Internet to assure that there are no premium "fast lanes", that all bits are treated equally, that Internet access providers (ISPs) do not prioritize their own content over content from competitors. more»

Don't Make the Internet Safe for Monopolies

This week I'm going to Washington to argue against regulating Internet access as if it were phone service. Twenty years ago I was there for the same reason. My concern now as it was then is that such regulation will damage the economy and reduce opportunity by stifling innovation and protecting the current dominant players from the startups which would otherwise threaten them. more»

Mend, Don't End, the IETF

Is it time for the IETF to give up? Martin Geddes makes a case that it is, in fact, time for the IETF to "fade out." The case he lays out is compelling -- first, the IETF is not really an engineering organization. There is a lot of running after "success modes," but very little consideration of failure modes and how they can and should be guarded against. Second, the IETF "the IETF takes on problems for which it lacks an ontological and epistemological framework to resolve." In essence, in Martin's view, the IETF is not about engineering, and hasn't ever really been. more»

New Products, Old Regulations: The Example of HTS

Every day, new technologies bring us closer to ubiquitous connectivity. If the capabilities of technology is advancing at a fast pace, the same is not always true of regulations; when creating or marketing a new technology, regulation is likely to act as a bottleneck. Understanding regulatory challenges is therefore the foundation that your next move rest on. Although the target may be a global or regional market, it's essential that strategies are designed both well in advance and target each jurisdiction individually. more»

News Briefs

Mozilla, National Science Foundation Offer $2M Prize for a Decentralized Web

Cisco Introduces Intent-Based Network That Can Learn, Adapt and Mitigate Threats

5G Frequency Fees Are Waived in Singapore to Help Drive Market Tests

Trump Signs Cybersecurity Executive Order, Experts Weigh in on the New Draft

French Presidential Candidate Confirms Massive Hack, Emails Dumped Online Two Days Before Election

Seattle Restores ISP Privacy Rules. Could be First of Many Cities to Defeat FCC's Privacy Roll Back

Germany Investigating Legal Grounds to Destroy Servers Used to Carry Out Cyberattacks

Internet Heavy Weights Staying Out of Net Neutrality Battle

Fierce Political Battle Expected as FCC Chair Elaborated on Plan to Reverse 'Net Neutrality' Rules

Cuba Getting Faster YouTube Access in Next 24 Hours, Thanks to Deal Signed in December

Substantial Majority of Americans Say Local Governments Should Be Able to Build Their Own Broadband

Researches Demonstrate How IPv6 Attacks Can Bypass Network Intrusion Detection Systems

Interpol's Michael Moran Receives 2017 M3AAWG Litynski Award

China's First IPv6-Only Backbone Network Connecting 1,200 More Campuses

Data Breaches Reported During 2016 Exposed Over 4.2 Billion Records

Canadian Energy Firms at Bigger Risk of Cyberattack

Over 50 Internet Shutdowns Reported in 2016

Gambia Criticized for Shutting Down Communication Networks on Election Day

'Avalanche' Network Dismantled in an International Cyber Operation Including Europol and the FBI

Internet, Mobile Connectivity a Lifeline for Refugees, Reports UNHCR

Most Viewed

Most Commented

Industry Updates

Participants – Random Selection