The exposed areas needing improvement by ICANN - both the organization as well as its global community of stakeholders - provide a target-rich environment. In the nearly three years since the completion of the transition of the Internet Assigned Names Authority (IANA), ICANN has persistently sought to drive top-down dictatorial policymaking; to shroud its activities and decision-making from public view; and, to evade accountability -- in some cases even doubling down on its efforts. more
President Trump knows that in the current trade war, the Huawei issue is perhaps one of the most important issues for the Chinese government. It directly undermines the Chinese prestige and the ban create global anxiety. This is resulting in discussions in many countries, assessing their relationship with China. It highlights the domination of the Chinese in telecoms manufacturing, but at the same time, it opens up other discussions in relation to Chinese dominance and influence. more
China's Belt and Road Initiative (BRI) is an ambitious, long-term, global investment and development program. It was launched in 2013 with a focus on infrastructure -- roads, railroads, pipelines, undersea cables and ports. Since then China has invested $80 billion and signed 173 BRI agreements with 125 countries and 29 international organizations. more
The IETF's DMARC working group is thinking about a maintenance update to the DMARC spec, fixing bits that are unclear and perhaps changing it where what mail servers do doesn't exactly agree with what it says. Someone noted that a lot of mailers claim to have "deployed DMARC," and it's not at all clear what that really means. ... I've suggested that we could write a DMARC deployment guide that describes the parts of DMARC, the ways they interact and in what sequence it's useful to deploy them. If you'd find that useful, leave a comment. more
You won't go far with your cybersecurity when you're relying on the wrong intelligence. This is simply because not all types of threat intelligence are equal. You might have experienced this yourself; investing time and resources into just one only to receive meagre results in the end. Sadly, many organizations fail to realize that depending on just a single source of information is a big mistake. more
After some years of accelerating IPv6 deployment, we are now into a period of slower growth and it's not clear where we are heading. It is therefore interesting to try to predict the future of IPv6 over the coming years. At Ericsson Research, we have been working on this topic since 2013, but just recently created a forecast model that seems to be quite accurate. However, it gives a disappointing message of a very low final level of IPv6 deployment at less than 30%! more
The Complainant is the owner of the well-known Coachella festival. It owns a trademark registration, issued in 2016, for the mark CHELLA. The Respondent asserted that he intended to use the disputed domain name to set up an online women's clothing store but never did so. He claimed that growing up, his nickname was "Chelle" and that he modified that name to make it sound more feminine for use in connection with the store. more
Outside of China, very few governments would expect a saving in spectrum costs would mostly go to investment. Corporations have other priorities, including advertising and executive salaries. Stockholders come above everything at most companies. Rarely would even 1/3rd of the saving go to capital spending. The U.S. under Trump had a massive tax cut, worth literally billions to Verizon and AT&T. Verizon actually cut investment. AT&T's increase in capex was far lower than the tax saving. more
DNS Operations, Analysis, and Research Center (DNS-OARC) held its 30th meeting in Bangkok on the 12th and 13th May. Here's what attracted my interest from two full days of DNS presentations and conversations, together with a summary of the other material that was presented at this workshop. Some Bad News for DANE (and DNSSEC): For many years the Domain Name X509 certification system, or WebPKI, has been the weak point of Internet security... more
Apollo 11 was the spaceflight which landed the first two humans on the Moon. Commander Neil Armstrong and lunar module pilot Buzz Aldrin landed the Apollo Lunar Module, Eagle, on July 20, 1969. Armstrong became the first person to step onto the lunar surface six hours later, and Aldrin joined him 19 minutes later. The two astronauts spent about two and a quarter hours outside the spacecraft, and they collected 47.5 pounds of lunar material to bring back. more
Recently I've had several people ask me about the expected impact of low-orbit satellite broadband. While significant competition from satellites is probably a number of years away, there are several major initiatives like StarLink (Elon Musk), Project Kuiper (Amazon), and OneWeb that have announced plans to launch swarms of satellites to provide broadband. more
There is always some degree of confusion in discussions about the "new TLDs". Some points of view try to be optimistic, others on the contrary only highlight the bad news, and most refer indistinctly to the "new TLDs" as if they did not break down into different segments, each of which obeys dynamics and constraints of its own. The purpose of this post is to provide some food for thought and to shed some light on those dynamics and constraints... more
The European Space Agency (ESA) reported that as of January 2019 there were about 5,000 satellites in space and 1,950 of them are still functioning. Hopefully, those functioning satellites have fuel and thrusters that will enable them to de-orbit and (mostly) burn up in the atmosphere when their useful life is finished. The remaining 3,050 are slowly drifting, along with a lot of debris. The ESA estimates that there have been over 500 break-ups, explosions, collisions, or anomalous events... more
GenX-ers may remember spending a summer afternoon at the movie theater and seeing the somewhat corny but beloved antics of Marty McFly and Doc as they used a souped-up Delorean to travel the space-time continuum. In Back to the Future Part II, Doc and Marty travel into the future, where the bullying, boorish Biff causes a time-travel paradox when he steals the Delorean and takes a joyride into the past to give his younger self a sports almanac containing the final scores of decades worth of sporting events. more
It is supremely ironic. A rogue national leader with the stroke of a pen, dictates that its companies will expose a foreign company's end users to cyberattacks. This is the net effect of denying security patches or operating system updates pursuant to Trump's order. In the US Great Rogue Leader's bizarro world, this is the very behavior that he claims makes his actions necessary. In fact, this Trump malware attack is worse because of the mass exposure to exploits. more
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byCSC
Sponsored byVerisign