copy and paste this google map to your website or blog!
Press copy button and paste into your blog or website.
(Please switch to 'HTML' mode when posting into your blog. Examples: WordPress Example, Blogger Example)
IPv4 scarcity triggers dispute over who controls African . . . The big picture: Chinese entrepreneur Lu Heng has built a global IPv4 leasing business from addresses initially allocated to Africa, igniting a legal and political fight over who should control
A treasure worth billions of dollars: China attacks a rare . . . A resource worth billions of dollars | Photo: Maariv Online Between 2013 and 2016, AFRINIC granted Cloud Innovation Ltd, owned by Lu Heng, about 6 2 million IPv4 addresses – more than were allocated to Nigeria, the continent’s most populous country At the same time, in a report by DNS Africa – an African organization dedicated to digital literacy and Internet infrastructure – it was
How a Chinese language entrepreneur amassed 10M+ IPv4 . . . Technology How a Chinese language entrepreneur amassed 10M+ IPv4 addresses, largely from Africa, to lease them exterior Africa, leaving African ISPs struggling to develop capability (Alexandra Wexler Wall Road Journal)
How a Chinese entrepreneur amassed 10M+ IPv4 addresses . . . Alexandra Wexler Wall Street Journal: How a Chinese entrepreneur amassed 10M+ IPv4 addresses, mostly from Africa, to lease them outside Africa, leaving African ISPs struggling to expand capacity Abram Brown The Information:
How a Chinese entrepreneur amassed 10M+ IPv4 addresses . . . How a Chinese entrepreneur amassed 10M+ IPv4 addresses, mostly from Africa, to lease them outside Africa, leaving African ISPs struggling to expand capacity wsj com business telecom africa-ip-addresses-china-3e543b9d?reflink=desktopwebshare_permalink st=Wk6YWj
Chinese Telecom Infrastructure in Africa Shapes Strategic . . . Chinese telecom infrastructure in Africa has expanded rapidly, embedding Beijing’s influence into the continent’s digital backbone While Chinese investments have boosted connectivity, they also introduce grave strategic vulnerabilities, including espionage risks, supply chain manipulation, and coercive leverage