Cloud is a new technology domain, and data centre engineering is still a developing discipline. I have interviewed a top expert in cloud infrastructure, Pete Cladingbowl. He has a vision of the 'lean' data centre and a better kind of Internet for users to reach it. He also has a roadmap for how these can be practically realised. The key is to apply established theories of value flow from more mature industries. more
The 7th African Peering and Interconnection Forum (AfPIF) took place in Dar es Salaam, Tanzania, from 30 August - 1 September 2016. AfPIF is the annual conference organised by the Internet Society to specifically address interconnection challenges together with the wide-ranging opportunities the African continent offers. Tanzania is well-known for its safari, Mount Kilimanjaro and beautiful Zanzibar beaches, but not only that... more
Senator Cruz's against the IANA transition will continue next week with a senate hearing next week. The hearing is entitled: Protecting Internet Freedom: Implications of Ending U.S. Oversight of the Internet. While the hearing is being chaired by Cruz, no indication of who else will be speaking has been made public so far. In a press release from Cruz's offices earlier this evening, the Senator continued his almost hysterical and misleading narrative. more
No censure attaches to having domain names registered by proxy/privacy services. However, while the practice has become routine for protecting privacy and sensitive information, registering in the name of a proxy is still taken into account in assessing intention, and even circumstantial evidence without contradiction or explanation can tip the scale in complainant's favor. more
On August 31st the Department of Justice (DOJ) sent a response to the August 12th letter from Senator Ted Cruz and some Congressional colleagues to the head of the Antitrust Division. In that letter Cruz et al asserted that if the pending extension of the .Com registry Agreement (RA) was granted in combination with the consummation of the IANA transition, that DOJ could be prevented from having "meaningful input into the prices that Verisign charges for registering a domain name within the .com domain for an extended period". more
Back in early 2012, the media was all over stack wars that reportedly were taking place between Cisco and VMware. This culminated in VMware's Nicira acquisition in July 2012, paving the way for the coming of software-based networking. Four years later, the market still remains in development mode. Many service providers and enterprises are trying to come to grips with Network Function Virtualization (NFV) and Software-Defined Networking (SDN). more
I've mentioned the IANA transition in several posts over the last year or so. Personally I'd love to not have to mention it ever again, as it's not the kind of topic that we should be spending too much time thinking about or worrying about. There are plenty of other things out there that cause us all headaches without adding to the list. However the IANA transition is a topic that is of fundamental importance for the global internet community. more
Senator Cruz' crusade against the IANA transition is back in full swing. With the deadline for the expiry of the IANA contract approaching both he and other anti-transition types have been working hard on their campaigns to block the transition. The latest addition to the Cruz website is a special lander page featuring a countdown clock... Yes, that's an image of President Obama shaking hands with China's Xi Jiping. more
In a development that few people will notice but is interesting to us domain geeks, Apple is in the process of retiring its news.apple.com domain in favor of apple.news. Apple is not going to shed light on why it is making this migration. I suspect that anything to take traffic off the .com domain is never a bad idea. Perhaps Apple has a long-term vision for making its News app web-accessible (instead of locked within an app). more
In World of Ends, Doc Searls and Dave Weinberger enumerate the Internet's three virtues: 1. No one owns it. 2. Everyone can use it. 3. Anyone can improve it. ... Online services and interactions are being held back by the lack of identity systems that have the same virtues as the Internet. This post describes what we can expect from an Internet for identity. more
Do you have information or an idea you would like to share with members of the broader DNS / DNSSEC community? Have you developed a new tool that makes DNSSEC or DANE deployment easier? Have you performed new measurements? Would you like feedback about a new idea you have? Would you like to demonstrate a new service you have? If so, we're seeking proposals for the DNSSEC Workshop to be held at ICANN57 in Hyderabad, India, in early November 2016. more
Trademarks can be strong in two ways: either inherently distinctive (arbitrary or fanciful marks), or composed of common elements that have acquired distinctiveness (descriptive or suggestive marks). Trademarks can also be weak in two ways: either composed of common elements, or lacking significant marketplace presence other than in their home territories. Panelists have seen them all, even by respondents alleging trademark rights registered later in time to complainant's. more
On 24 August, fifteen applicants for the .corp, .home, or .mail (CHM) new gTLDs sent a letter to the ICANN Board asking for action on the stalled process of the their applications. This points to the answer for the question I asked in march of this year: Whatever happened with namespace collision issues and the gTLD Round of 2012. As the letter from the applicants indicates, ICANN has done little to deal with issues concerned with namespace collisions in the last 2 years. Is it now time for action? more
If you are passionate about ICT policy, Peering, and Interconnection, then the Africa Peering and Interconnection Forum (AfPIF) is the place to be. The 7th annual AfPIF takes place in Dar es Salaam, Tanzania from 30 August – 1 September 2016. AfPIF is a multistakeholder forum organized by the Internet Society that brings together a diverse range of business leaders, infrastructure providers, Internet service providers (ISPs), Internet Exchange Points (IXPs), international financial institutions, policy-makers, and regulators from all over the world. more
In a recent talk at Black Hat, Apple's head of security engineering (Ivan Krsti?) described many security mechanisms in iOS. One in particular stood out: Apple's Cloud Key Vault, the way that Apple protects cryptographic keys stored in iCloud. A number of people have criticized Apple for this design, saying that they have effectively conceded the "Going Dark" encryption debate to the FBI. They didn't, and what they did was done for very valid business reasons -- but they're taking a serious risk... more
Sponsored byRadix
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byCSC
Sponsored byWhoisXML API