internet protocol rfc

Thai start-up ‘DRVR’ partners with Tata Communications to revolutionise Asia’s smart fleet network

By Zenobia Hegde

International fleet management application provider, DRVR has selected Tata Communications as its global IoT connectivity partner to help achieve its objective of making Asia’s vehicle fleets the smartest and most cost-efficient in the world.

Leveraging Tata Communications’ mobility solution- MOVE™, DRVR can convert information collected from vehicles across Thailand, Myanmar, Philippines and Indonesia into actionable insights to help drive efficiencies and improve cost savings through smarter fleet management.

The advent of connected vehicles has led to an exponential increase in consumption and creation of human to machine interface applications and solutions. A Forrester report on the Internet of Things states that fleet management and its applications in transportation and logistics across retail and wholesale will be the hottest areas for IoT growth. The Asia Pacific automotive telematics market is expected to reach a value of US$ 15,248 million by 2020 at an estimated CAGR of 11.6% during the forecast period.

Vehicles in fleets using DRVR technology have been fitted with Tata Communications’ MOVE-IOT Connect™ SIM technology. The sensors transmit data collected in real-time using Tata Communications’ MOVE, which seamlessly connects services using the best available local cellular network. The DRVR application then processes and analyses this data, turning it into actionable intelligence further illustrating fleet performance metrics on any device, mobile or laptop.

This means that faster and better informed decisions can be made as fleet managers have a more holistic view of everything that is happening across the fleet, communicating updates in real time; on a highly secure infrastructure ultimately leading to more effective and robust operations on the ground.

David Henderson, co-founder and CEO, DRVR said: “Our partnership with Tata Communications enables us to overcome two major challenges in our quest to create smarter fleets across our entire geographical footprint. First, rather than negotiate multiple contracts with individual service providers, our entire international IoT network is managed through Tata Communications.

As a result, we get valuable visibility of data collected across borders so that we can realise the benefits of smarter fleet management. Second, it allows us a holistic view on a singular dashboard allowing us to respond with improved accuracy and eliminating downtime almost entirely.”

Tata Communications’ MOVE service will be rolled out to DRVR customers through its smart fleet management applications. Tata Communications MOVE is part of the company’s long-term strategy for its mobility services portfolio and its vision of creating an access and usage agnostic, cross-border mobile experience for people and things.

The platform is underpinned by Tata Communications’ global network and partnerships with several hundred mobile communications service providers globally. The service enables DRVR to roam across different service providers in any of its covered regions without having to negotiate agreements with multiple providers or pay extra fees.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Thai start-up ‘DRVR’ partners with Tata Communications to revolutionise Asia’s smart fleet network appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Shipments of cellular M2M terminals to reach 13.7 million by 2022, says Berg Insight

By Zenobia Hegde

Berg Insight, the M2M/IoT market research provider, released new findings about the market for cellular M2M terminals. About 4.9 million cellular M2M terminals were shipped globally during 2016, an increase of 28.0% from the previous year.

Growing at a compound annual growth rate (CAGR) of 18.8%, this number is expected to reach 13.7 million in 2022. Berg Insight defines cellular terminals as standalone devices intended for connecting M2M applications to a cellular network. These include primarily general-purpose cellular routers, gateways and modems that are enclosed in a chassis and have at least one input/output port. Trackers, telematics devices and other specialised devices are excluded from this report.

North American and Asian vendors dominate the global cellular M2M terminal market. Cradlepoint, Sierra Wireless and Digi International are the largest vendors in North America, whilst SIMCom is the main manufacturer on the Asian market. Combined, these four vendors generated close to US$ 415 million (€349.15 million) in revenues from M2M terminal sales during 2016. This is equivalent to nearly 50% of the global market.

Other noteworthy vendors include CalAmp, Multitech Systems and Encore Networks in the US, Xiamen Four-Faith, Maestro Wireless and InHand Networks in Asia, Teltonika, HMS Networks, Advantech B+B SmartWorx, NetModule, Matrix Electrónica, Eurotech, Gemalto, Dr. Neuhaus and Option in Europe and NetComm Wireless in Australia.

A large number of small and medium sized vendors are active on the European market, whilst the North American market is dominated by a handful of major vendors, largely due to barriers in the form of carrier certifications required for cellular devices in the region.

“Adoption of 4G LTE in cellular routers, gateways and modems have increased rapidly in recent time due to increased focus on product life cycle costs and decommissioning of 2G networks”, said Fredrik Stålbrand, IoT analyst, Berg Insight. He adds that two thirds of the cellular M2M terminals sold globally during 2017 used 4G LTE as the main standard.

“LPWA technologies such as LTE Cat M1 and NB-IoT are expected to ease the transition from 2G to LTE networks further”, continued Mr. Stålbrand. In 2017, introductions of cellular M2M terminals featuring LTE Cat M1 and NB-IoT technologies were made by Encore Networks, Maestro Wireless and MultiTech Systems and several vendors plan to launch new products with LPWA connectivity during 2018.

Download report brochure here.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Shipments of cellular M2M terminals to reach 13.7 million by 2022, says Berg Insight appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

A Week in IoT: Never mind Predictions, there’s enough to focus on in the Here and Now

By Jeremy Cowan

At this time of year every editor is drowning in predictions for the year ahead. To be honest, I prefer more solid information, says Jeremy Cowan. There is so much enterprise restructuring going on that we’re frantically busy with hard facts in the inter-related worlds of security, billing, car charging, and data management.

Thales CEO goes off ‘merger’ script announcing Gemalto acquisition

The week got off to a bang with Thales (Euronext Paris: HO) and Gemalto (Euronext Amsterdam and Paris: GTO) agreeing to merge.

Patrice Caine, Thales’s chairman and CEO, said: “The acquisition of Gemalto marks a key milestone in the implementation of Thales’s strategy. Together with Gemalto’s management, we have big ambitions based on a shared vision of the digital transformation of our industries and customers. We have a tremendous respect for Gemalto’s technological achievements, and … I welcome warmly Gemalto’s 15,000 employees to our Group. By combining our talents, Thales and Gemalto are creating a global leader in digital security.”

Over the past three years, Thales has significantly increased its focus on digital technologies, investing over €1 billion in connectivity, cybersecurity, data analytics and artificial intelligence (AI), in particular with the acquisition of Sysgo, Vormetric and Guavus. The integration of Gemalto is expected to accelerate this strategy, reinforcing Thales’s digital offering, across its five vertical markets (aeronautics, space, ground transportation, defence and security). Altogether, this new business unit will represent approximately 20% of Group revenues and rank among the top three players worldwide, with €3.5 billion revenues in the fast growing digital security market.

Combined with Gemalto’s digital security portfolio, Thales will be able to offer an end-to-end solution, to secure the full critical digital decision chains, from data creation in sensors to real-time decision-making. Clients are facing data security challenges in all sectors, including telcos, governments, banks, utilities, and other industries.

Thales will combine its digital businesses into Gemalto, which will continue to operate under its own brand as one of the seven Thales global business units. Philippe Vallée, Gemalto’s erstwhile CEO, will lead the combined digital security business.

The deal is a recommended all-cash offer for all issued and outstanding ordinary shares of Gemalto, for a price of €51.00 per share cum dividend.

Smartly’s mobile app helped by Capgemini to bill
Norwegians accurately for electric car charging

It’s not just enterprises that are repositioning themselves, entire countries are refocusing their business models. Norway is well-known as a global leader in renewable energy, having launched an initiative in 2016 to power all cars with renewable energy by 2025.

As part of this process, the country now wants to provide car owners with easy access to charging stations through housing co-operatives. In a new project, Smartly will encourage Norwegians to use of community chargers and move towards electric car usage by 2025.

With help from Capgemini, and its subsidiary Sogeti, Microsoft is now to build Smartly a cloud connected multi-platform mobile app. Using its expertise in cloud-native technology and its commitment to create measurable digital customer experiences, Smartly said it has moved from a proof-of-concept to a working app in […]

The post A Week in IoT: Never mind Predictions, there’s enough to focus on in the Here and Now appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Update on the Root KSK Rollover Project

The ICANN org is today announcing that it will not roll the root zone KSK in the first quarter of 2018.

We have decided that we do not yet have enough information to set a specific date for the rollover. We want to make clear, however, that the ICANN org is committed to rolling the root zone KSK and we will continue to discuss this important process with the community, gather their feedback and give all interested parties advance notice of at least one calendar quarter when we set the date for the rollover.

Furthermore, we are soliciting input from the community to help determine, if possible, appropriate objective criteria to measure the possible negative impact of the root KSK rollover on Internet users, and acceptable values for those criteria before a rollover. This is in accordance with the bottom-up, multi-stakeholder model that has been so successful for ICANN policy development.

On 27 September 2017, the ICANN org announced it was postponing the root zone KSK rollover for at least one quarter, leaving open the possibility the root KSK rollover might occur in the first quarter of 2018. We have since realized that our analysis and preparation will require additional time.

In a previous post, we described our analysis of recursive resolver trust anchor configuration information reported using the protocol defined in RFC 8145, Signaling Trust Anchor Knowledge in DNS Security Extensions (DNSSEC). Our analysis revealed that about 4% of the approximately 12,000 DNSSEC-validating resolvers reporting during the month of September 2017 were configured with only KSK-2010 (the shorthand for the current root KSK) and would have been unable to resolve DNS queries after the rollover occurred.

The ICANN org’s decision to postpone the rollover was based on the concern that we did not understand why those resolvers were not properly configured, and we needed time to investigate.

Since then, we have attempted to contact the operators of 500 addresses that had reported a resolver configuration with only KSK-2010 instead of the correct configuration of both KSK-2010 and the new KSK, KSK-2017. Ideally, that investigation would have revealed a set of clear causes for the improper configuration, allowing further communication and actions to be targeted at addressing those specific issues. But in the end, the analysis was not as conclusive as we would have hoped.

In our initial attempt, we received a response from operators of approximately 20% of the 500 addresses. Of those addresses whose operators we could contact, 60% came from address ranges known to host devices with dynamic addresses, such as routers of home broadband users and ephemeral virtual machines, making these resolvers extremely difficult (if not impossible) to track down. About 25% of the addresses corresponded to a resolver forwarding on behalf of another resolver that was reporting only KSK-2010. Since the address of the device reporting the incorrect configuration was not the actual source resolver, it is extremely difficult (if not impossible) to identify the true source address of the resolver that was reporting only KSK-2010.

To proceed with the root KSK rollover, the ICANN org must have confidence that the rollover will not have an unacceptable negative impact on Internet users. The challenge we have encountered since we began to analyze the RFC 8145 trust anchor configuration reports from resolvers is assessing the impact on users.

We can make a number of assumptions: for example, it is unlikely that a recursive resolver running at a dynamic address could support a large number of users since it does not offer a stable address for any devices to send queries to for resolution. But ultimately, determining potential user impact based on the data available to us is difficult and we are therefore soliciting the community’s input.

Input and discussion on acceptable criteria for proceeding with the KSK roll will take place on an existing email list that is already being used for discussion of the root KSK rollover. We encourage anyone interested in contributing to join the mailing list by visiting the web page here.

The ICANN org will monitor this mailing list and beginning on 15 January 2018, we will develop a draft plan for proceeding with the root KSK roll based on the input received and discussion on the mailing list. The plan will be published by 31 January 2018 and undergo a formal ICANN public comment process to gather further input. We will hold a session at ICANN61 in San Juan, Puerto Rico, to discuss the plan and hear from the community in person. Our intent is to have a revised plan available for community review and public comment prior to ICANN62 in Panama City, Panama, with a final plan published soon thereafter.

Throughout the process we’ll continue to keep the community updated on the root KSK rollover project’s progress.

Read more here:: www.icann.org/news/blog.rss

Phishing for Bitcoin

By Jeff John Roberts

It had to happen sooner or later: The two biggest tech stories of 2017–foreign cyber attacks and bitcoin–have come together perfectly in a single story. Namely, it looks like the infamous North Korean hacking outfit, The Lazarus Group, is running a spear-phishing campaign aimed at executives of cryptocurrency companies.

You may remember this gang from previous outrages such as the WannaCry ransomware outbreak, the hacking of Sony, and the $81 million cyber-heist from the Bangladesh Central Bank. Their latest scam, identified by Secureworks, involves sending emails about a Chief Financial Officer position that contain an infected Microsoft Word document.

As ZDNet reports, clicking on the document triggers a piece of malware that allows the attacker access to the victim’s computer. It’s unclear if any of the targeted executives have fallen for the phish or if the scheme has yielded the Lazarus Group any bitcoins. Let’s hope not–in part because crypto-currency companies know the risk of cyber-threats better than most, and should not be hiring people who click on random Word documents.

More broadly, the idea of North Korea phishing for bitcoin is intriguing because the phenomenon is at once so new and so old. It’s new because countries until very recently didn’t even take bitcoin seriously–and now, as the price of a bitcoin tops $18,000, rogue nations are telling their militaries to go forth and steal it.

At the same time, though, North Korea’s phishing antics can also be seen as a twist on the centuries-old military tactic known as privateering. Once upon a time, this tactic took the form of kings and queens granting letters of marque that allowed privateers to roam the oceans and plunder booty from enemy merchant ships. Today, North Korea is allowing its hackers to operate as digital privateers in search of crypto plunder like bitcoin.

This modern version of privateering is not as exciting as grand naval battles with cannons and cutlasses, but no doubt it’s just as lucrative. Have a good weekend.

Jeff John Roberts

@jeffjohnroberts

jeff.roberts@fortune.com

Welcome to the Cyber Saturday edition of Data Sheet, Fortune’s daily tech newsletter. You may reach Robert Hackett via Twitter, Cryptocat, Jabber (see OTR fingerprint on my about.me), PGP encrypted email (see public key on my Keybase.io), Wickr, Signal, or however you (securely) prefer. Feedback welcome.

THREATS

Bailing on Blockchain: In theory, it sounds great to create a coalition and build a distributed ledger tool for everyone. The reality is more messy: more than 15 members of the Hyperledger Project recently bailed and/or cut off their funds to the much-hyped blockchain project. This follows a similar break-up at R3, the blockchain-for-banks consortium.

Cutting off Kaspersky: The popular anti-virus product is tangled up with a good part of the US government’s IT systems–a big problem since the software maker is strongly suspected of ties to the Kremlin. The White House has hurried up efforts to cashier Kaspersky with an order banning its use anywhere in the government.

Creepy Keyboards: Key-logging software, which lets a third party record what you type, is a popular tool among spies and hackers–it’s not something you want pre-installed on your new computer. Yet that’s what HP did with hundreds of lap-top models. A security researcher discovered that anyone with administrative privileges could activate it. HP is working on a fix.

Easy there, Anderson: The normally bland Twitter account of CNN host Anderson Cooper spat out a string of abuse at Donald Trump in a tweet this week. The network portrayed it as a hack, pointing out that Anderson was in a different city from where the tweet was sent–the latest is that Anderson’s aide left a phone with the Twitter account unattended at the gym.

Feds Nail Mirai Miscreants: Remember that nasty botnet composed of hijacked IoT devices that took down servers across the east cost last year? Well, it turns out Brian Krebs was right: a Rutgers student running a Minecraft scam was responsible for the botnet havoc. The student and two others pled guilty and say they’re sorry.

Share today’s Data Sheet with a friend:

http://fortune.com/newsletter/datasheet/

Looking for previous Data Sheets? Click here.

ACCESS GRANTED

“If you feed the beast, that beast will destroy you,” Palihapitiya advised his audience. “The short-term, dopamine-driven feedback loops that we have created are destroying how society works. No civil discourse, no cooperation, [but] misinformation, mistruth.”

Facebook’s former head of user growth, Chamath Palihapitiya, recently offered a contrite and frightening account of what the company has built. David Meyer has a nice summary of his remarks.

ONE MORE THING

The best holiday movie ever? It’s decided. Wonderful holiday classics include It’s a Wonderful Life and A Christmas Carol, but some (including me) believe the best of the bunch is a little action film called Die Hard. Objectors have claimed Die Hard isn’t a Christmas movie but now a prominent head of state has settled the question. Thanks, Justin Trudeau, and Ho ho ho!

Read more here:: fortune.com/tech/feed/

Idemia and FlexiGroup to launch Australia’s first MOTION CODETM credit card

By Zenobia Hegde

IDEMIA, the provider in trusted identities for an increasingly digital world, announced its partnership with FlexiGroup, Australia’s market supplier in Point of Sale consumer and commercial finance to launch Australia’s first MOTION CODE credit card.

Developed by IDEMIA (formerly known as OT-Morpho), the MOTION CODE credit card is a high-tech payment card with a dynamic security code (CVV2) that automatically changes hourly. Instead of a static security code printed on the back of a bank card, the MOTION CODE CVV2 is displayed on an e-paper “mini-screen”.

The security code automatically refreshes to a random security code every hour. This solution has no impact on the cardholder journey for safer online transactions: if compromised, this dynamic data becomes rapidly unusable.

As online shopping becomes increasingly popular, the cases of online fraud have escalated with online fraud in Australia rampant at $417 m(€354.07 m) last year and growing 15% per year, according to the Australian Payments Network. FlexiGroup will be the first company to launch MOTION CODE credit cards in Australia in the first half of 2018.

“The security of our customers’ payment details is tremendously important to us and the levels of security are constantly evolving with the increasing use of online payments. The addition of this dynamic security feature means FlexiGroup will be able to offer customers advanced safeguarding when making online purchases.”

“We continually strive to deliver innovative and tailored financial solutions for our customers and we are excited to partner with IDEMIA to be the first to bring MOTION CODE technology to Australians”, said Symon Brewis-Weston, CEO of FlexiGroup.

“We are thrilled about this exclusive launch of MOTION CODE here as it is the first product of its kind in Australia and has the potential to significantly impact the online payments industry by reducing fraud. But more importantly, MOTION CODE can create better customer experience for shoppers as well as provide a strong sense of comfort and security for buyers to go online”, said Mark Garvie, Asia Pacific managing director for Financial Institutions activities at IDEMIA. FlexiGroup is also partnering with Mastercard to bring this new MOTION CODE card to market.

“Safety and security is one of Mastercard’s global priorities, so we’re incredibly excited to partner with FlexiGroup to enable the launch of this Australian-first technology. We believe this technology will help shape the future of fraud prevention in Australia to make payments more secure, convenient and reliable for both businesses and consumers”, said Matt Barr, senior vice president: Core, Digital and New Payment Flows.

FlexiGroup will announce further details on a new product offering featuring MOTION CODE technology closer to launch in 2018.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Idemia and FlexiGroup to launch Australia’s first MOTION CODETM credit card appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

ICANN to Participate at the 12th Internet Governance Forum 2017 in Switzerland

This month, members of the ICANN community, Board, and organization will be in Geneva, Switzerland, participating in the 12th annual meeting of the Internet Governance Forum (IGF). It seems only fitting to point out that Geneva is where the first phase of the World Summit on the Information Society (WSIS) – which initiated the IGF – took place back in 2003. It is also the home of the IGF Secretariat.

The event will take place from 18 to 21 December 2017 at the Palais de Nations.

Since its inception, the IGF has evolved to become a unique and important platform for global dialogue on the development of the Internet, involving stakeholders from the wider Internet community. The IGF will afford ICANN an opportunity for bilateral discussions with a range of stakeholders from around the world.

This year, as in previous years, ICANN will engage in dialogue through a number of sessions, either as participants or through organized ICANN sessions. Key topics of discussion will be:

  • General Data Protection Rights (GDPR)
  • Multistakeholder governance in the Domain Name System (DNS)
  • Emerging identifier technologies and how they may play a role in the evolution of the Internet, including in the proliferation of the Internet of Things (IOT)
  • Voice of civil society in ICANN

We will hold our customary ICANN Open Forum, which I encourage you to attend. Göran Marby, ICANN CEO and President, and Cherine Chalaby, Chair of the ICANN Board, will brief participants on areas ICANN is addressing. These include the community’s preparatory work for a potential new application process for generic top-level domains (gTLDs) and an update on the effect of the implementation of GDPR legislation in Europe. This will be an interactive session where IGF participants will be able to engage in an open dialogue and exchange views with ICANN’s leadership.

Below are the main ICANN sessions at the IGF.

Date Time Title
17 December 15:00–16:30 How Digital activists are shaping the evolution of the Internet: the voice of civil society in ICANN
17 December 16:30–18:00 The DNS and Emerging Identifiers (including DOA)
19 December 09:00–10:30 Multistakeholder governance of the Domain Name System, lessons learned for other IG issues (WS76) – CCWG IG Session.
19 December 16:10–17:10 ICANN Open Forum: ICANN – Looking ahead: – Challenges and Opportunities (OF50)

ICANN community members have organized or will take part in other workshops, forums, and sessions. For more information, see the IGF website.

On the ground, the Government Engagement team, led by Tarek Kamel, will be coordinating the involvement of ICANN in this significant event.

We look forward to seeing you there soon!

Read more here:: www.icann.org/news/blog.rss

Nearly three-quarters of retail orgs lack a breach response plan

By Zenobia Hegde

With more than 174 million Americans shopping over the Thanksgiving holiday weekend, it’s looking to be a busy holiday season for retailers this year. As shoppers continue hunting for the perfect gift over the next couple weeks, it’s important to remember that cyber criminals will likely be on the hunt as well. How prepared are retailers to deal with an attack?

In an effort to answer that question, Tripwire surveyed IT security professionals working in retail organisations about their experiences and attitudes towards factors affecting IT security. The results found that a large majority are not fully prepared for data breaches this holiday season.

Of the respondents, only 28% of respondents said they have a fully tested plan in place in the event of a security breach. 21% said their organisation doesn’t have a plan at all, and the same proportion of respondents said they didn’t have the means to notify customers of a data breach within 72 hours, a requirement specified by the General Data Protection Regulation (GDPR).

“Considering the amount of high-profile data breaches that have occurred recently, plus the continued discussion around GDPR, it is surprising and concerning that many retailers do not have a tested plan in the event of a security breach,” said Tim Erlin, vice president of product management and strategy at Tripwire. “It’s encouraging that most respondents think they can meet the 72-hour notification window as set out in the upcoming GDPR, but if they haven’t tested their plans, I don’t know how confident they should be in that assumption.”

Only a small minority of the retail industry felt fully secure in their incident response capabilities. 23% of respondents said they were “fully prepared” to absorb potential financial penalties. Even fewer professionals (15%) said they were fully prepared to manage customer and press communications following an incident.

Not all the survey’s findings were discouraging, however. The results did provide some hope that the industry is moving in the right direction. More than half of respondents (57%) said that their organisation’s ability to detect and respond to a security breach has improved in the past year and a half. With the holiday season in full swing, organisations should make sure they have proper security safeguards in place.

“It’s really critical that organisations have a good view of what’s on their network at all times, that they harden their systems with secure configuration and vulnerability management, and that they are able to continuously monitor for change and are alerted to any drift outside the established security and compliance policies,” said Erlin.

There are a number of effective and established security control frameworks available to guide organisations, such as the CIS Critical Security Controls. Implementing even the most basic security controls can go a long way in improving an organisation’s security posture.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Nearly three-quarters of retail orgs lack a breach response plan appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

On the Road Again: Highlights from ARIN’s Outreach

By Susan Hamlin

We are celebrating our 20th anniversary this December and have found ourselves reflecting over these last two wonderful decades. One of the most important organizational objectives we have here at ARIN is our community outreach efforts. We make it a priority to reach out to you, our community, to provide the tools and advice you need when it comes to Internet number resources. We have hosted and attended an incredible number of events over the years, and thought it would be fun to look back and share where we’ve been and what we’ve accomplished with our community.

What kind of outreach do we do?

Each year, we host or attend a number of different events. Twice annually we hold our Public Policy and Members Meetings in the second and fourth quarters in various locations throughout our region. These meetings provide an opportunity for the entire Internet community to engage in policy discussions, network with colleagues, and attend workshops and tutorials. Everyone with an interest in Internet number resources is welcome to attend the Public Policy & Members Meetings and registration is free!

We also host many ARIN on the Road events around our region throughout the year. These free events provide local communities with the latest news from ARIN, covering everything from requesting IP addresses and Autonomous System Numbers (ASNs) to the status of IPv6 adoption, to current policy discussions, and updates about our technical services. Did you know that you can request an ARIN on the Road in your city, town, or metro area? I encourage you to send an email to info@arin.net if you believe your local Internet community would be interested in participating.

While we do discuss IPv6 at ARIN on the Road, that is not the only way we continue to spread the word in support of IPv6 deployment. Our message has evolved since we started actively promoting IPv6 in 2007, when we set up our TeamARIN site and began exhibiting at major industry shows. Today we exhibit at fewer tradeshows, but we do send speakers to many events across a wide range of industries, where we encourage organizations to prepare for the future by enabling IPv6 on their websites.

Additionally, members of our team attend community events around the world. Whether it be other RIR meetings, Internet Governance events, or partners such as NANOG or CARIBNOG, we believe it’s important to show our support to the wider Internet community. For a full list of events we host or attend, check out our events page.

Where was our first meeting?

Our first members meeting took place in Chantilly, Virginia on 20 March 1998. Since then, we’ve held a total of 40 meetings over the last 20 years!

Where was our first AOTR?

Our first ARIN on the Road event was held in Phoenix, Arizona on 17 August 2010. Since then we have held an additional 46 AOTR events and counting!

How can you get involved?

Phew! As you can see, we’ve done a lot over the last 20 years, but we’ve only just begun. We plan to continue expanding our outreach efforts around our region, including a continued focus on the Caribbean, and it is all possible thanks to our wonderful community.

There are so many ways you can continue to get involved with ARIN, including:

  • Subscribe to our mailing lists to discuss Internet number resource policy development and keep up with ARIN services and activities
  • Attend an ARIN meeting – We have great remote participation capabilities if needed
  • Don’t forget you can apply for a fellowship! We are accepting fellowship applications to ARIN 41 in Miami 15-18 April 2018
  • Attend our ARIN on the Road events
  • Member organizations, get involved in our election process

The post On the Road Again: Highlights from ARIN’s Outreach appeared first on Team ARIN.

Read more here:: teamarin.net/feed/

Vodafone and Huawei live trial extends range of pre-standard 5G in Milan

By Zenobia Hegde

Vodafone and Huawei have completed a trial on a full end-to-end (E2E) network of a technique to improve the range of high frequency spectrum that can in future be used to deliver 5G to its customers. Italy’s Ministry for Economic Development has made frequencies available to Vodafone so that it can trial pre-standard 5G in Milan. An E2E test network has been built for that purpose.

High frequency bands can connect many users at the same time, but broadcast over a more limited distance than lower frequencies. However, Vodafone, working with Huawei, has pioneered a new approach to improve the coverage range of that high frequency spectrum.

Instead of using a single frequency band to communicate between a smartphone and the network, the two telecoms companies tested using different frequency bands for downlink and uplink transmissions.

The downlink is used to receive data from the network – like news read on a smartphone – and the uplink is used to send data through the network – like emails or posts on social media.

The trials compared two scenarios using Vodafone’s 5G test network sending Gigabits of data. In scenario one, the same high frequency band was used for both the downlink and uplink. In scenario two, a high frequency band was used for the downlink, while a low frequency band was used for the uplink.

This capability — known technically as uplink & downlink decoupling — is currently being standardised by 3GPP, a leading organisation through which industry-wide standards are agreed for the implementation of new telecoms technology.

Vodafone measured up to a 10 decibel coverage range improvement in the uplink when also utilising the low band. That means that using the technique, customers would get a stronger signal even in areas where 5G coverage is limited.

Francisco Martin, head of Radio Product for Vodafone Group, said: “This test of pre-standard 5G uplink and downlink decoupling will help us to deploy the technology efficiently to support our customers as soon as we launch services.”

Yang Chaobin, president of Huawei 5G product line, said: “With the acceleration of the 3GPP 5G standard, the first phase of 3GPP Release 15 is expected to be completed by the end of this year, and it will support eMBB application that will bring significant improvement to user experience and even greater enhancement to capacity.

Huawei and Vodafone have successfully completed the verification of the uplink and downlink decoupling solution based on the end-to-end 5G network, including RAN, core network and terminals. Huawei will jointly work with industry partners and make 5G a global success.”

Vodafone expects to launch 5G services in 2020, in markets where it has appropriate spectrum, once the standard is agreed by 3GPP and compatible telecoms equipment and devices are available.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Vodafone and Huawei live trial extends range of pre-standard 5G in Milan appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/