The network engineering world has long emphasized the longevity of the hardware we buy; I have sat through many vendor presentations where the salesman says "this feature set makes our product future proof! ... Over at the Networking Nerd, Tom has an article posted supporting this view of networking equipment, entitled Network Longevity: Think Car, not iPhone. It seems, to me, that these concepts of longevity have the entire situation precisely backward. more
The broadband industry has falsely sold its customers on "speed", so unsurprisingly "speed tests" have become an insane and destructive benchmark... marketing departments at ISPs refuse to define what experience that actually intends to deliver (and what is unreasonable to expect), the network engineers are left with a single and simple marketing requirement: "make it better than it was". more
As you've undoubtedly heard, the Equifax credit reporting agency was hit by a major attack, exposing the personal data of 143 million Americans and many more people in other countries. There's been a lot of discussion of liability; as of a few days ago, at least 25 lawsuits had been filed, with the state of Massachusetts preparing its own suit. It's certainly too soon to draw any firm conclusions... but there are a number of interesting things we can glean from Equifax's latest statement. more
I ran into an article over at the Register this week which painted the entire networking industry, from vendors to standards bodies, with a rather broad brush. While there are true bits and pieces in the piece, some balance seems to be in order. The article recaps a presentation by Peyton Koran at Electronic Arts (I suspect the Register spiced things up a little for effect); the line of argument seems to run something like this... more
When ICANN implemented the Uniform Domain Name Dispute Resolution Policy (UDRP) in 1999, it explained its purpose as combating "abusive registrations" of domain names which it defined as registrations "made with bad-faith intent to profit commercially from others' trademarks... Bad actors employ a palette of stratagems, such as combining marks with generic qualifiers, truncating or varying marks or by removing, reversing, and rearranging letters within the second level domain (typosquatting). more
Three companies, SpaceX, OneWeb, and Boeing are working on constellations of low-Earth orbiting satellites to provide Internet connectivity. While all three may be thinking of competing with long, terrestrial cables, SpaceX CEO Elon Musk said "the goal will be to have the majority of long-distance traffic go over this (satellite) network" at the opening of SpaceX's Seattle office in 2015. Can he pull that off? more
Too often, people consider themselves passive consumers of the Internet. The apps and websites we visit are made by people with technical expertise using languages we don't understand. It's hard to know how to plug in, even if you have a great idea to contribute. One solution for this problem is the hackathon. For the uninitiated, a hackathon is a place of hyper-productivity. A group of people converge for a set period of time, generally a weekend to build solutions to specific problems. more
When ICANN launched the new gTLD program five years ago, Amazon eagerly joined the process, applying for .AMAZON and its Chinese and Japanese translations, among many others. Our mission was -- and is -- simple and singular: We want to innovate on behalf of our customers through the DNS. ICANN evaluated our applications according to the community-developed Applicant Guidebook in 2012; they achieved perfect scores. more
With reference to IPv6, probably most end users do not have any sense of it. The mainstream condition in the industry is that network carriers and content/service providers stick to their own arguments. Carriers consider lack of IPv6 content and service as the reason demand for IPv6 from the users is very low. The content and service providers believe that users cannot have access to content and service through IPv6 and thus carriers should provide the service in the background. more
One of the most intense natural disasters in American history occurred last week...You may wish to donate or get involved with hurricane Harvey relief to help the afflicted. That's great, but as we all know, we should be wary of who we connect with online... The FTC warned last week that there are many active relief scams in progress and noted that there always seems to be a spike in registration of bogus domains. more
Suppose for a moment that you are the victim of a wicked ISP that engages in disallowed "throttling" under a "neutral" regime for Internet access. You like to access streaming media from a particular "over the top" service provider. By coincidence, the performance of your favoured application drops at the same time your ISP launches a rival content service of its own. You then complain to the regulator, who investigates... It seems like an open-and-shut case of "throttling" resulting in a disallowed "neutrality violation". Or is it? more
Google's Cuba project has been in the news lately. Mary Anastasia O'Grady wrote a Wall Street Journal article called "Google's Broken Promise to Cubans," criticising Google for being "wholly uninterested in the Cuban struggle for free speech" and assisting the Castro government. The article begins by taking a shot at President Obama who "raved" about an impending Google-Cuba deal "to start setting up more Wi-Fi access and broadband access on the island." more
I opened an email from GoDaddy over the weekend on my phone. Or so I initially thought. I had recently helped a client transfer a domain name to a GoDaddy account (to settle a domain name dispute), so the subject line of the email -- "Confirm this account" -- simply made me think that I needed to take another action to ensure everything was in working order. But quickly, my radar went off. more
With ever more TLDs, where does it make sense to focus resources? After four years and a quadrupling of internet extensions, what metrics continue to make sense in the domain name industry? Which should we discard? And how do you gain understanding of this expanded market? For registries, future success is dependent on grasping the changes that have already come. For registrars, it is increasingly important to identify winners and allocate resources accordingly. The question is: how? more
There's lots of security advice in the press: keep your systems patched, use a password manager, don't click on links in email, etc. But there's one thing these adages omit: an attacker who is targeting you, rather than whoever falls for the phishing email, won't be stopped by one defensive measure. Rather, they'll go after the weakest part of your defenses. You have to protect everything -- including things you hadn't realized were relevant. more
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byRadix