Top of Page
In this chapter, we report on Internet trends over the past year based on information obtained through the operation of this infrastructure. In particular, we analyze changes in trends from the perspective of BGP routes, DNS query analysis, IPv6, and mobile.
In this report, We take another look at the SIM (Subscriber Identity Module) technology used in mobile phones. The report gives some background to the development of GSM standards and the birth of SIM cards, covers the history of SIM card miniaturization, and looks at developments that took us from physical SIM cards to virtual SIM technologies like eSIM. Against that backdrop, the report also describes solutions developed by IIJ and the future outlook for standards in this area.
All sorts of incidents and accidents have occurred since we started our security business. Looking back on the past 30 years, the Internet has established itself as a platform for one-to-many and many-to-many communications in a communication services world that had primarily been a one-to-one affair. And those communications are always changing, both in form and composition. It started out as a network that only some people used, but those times have changed with the advent of commercial services for business customers and the like, consumer services, always-on connections for the home, mobile phone-based access, the cloud, smartphones, and IoT technologies. In this article, a number of people who have worked on the front lines of IIJ's security business share their experiences and give their own unique perspectives on the past 30 years.
End of the page.