Featured Blogs

Latest

Some of the World’s Largest Investors Are Investing in FttH

While some governments are still struggling with the concept of FttH - some of the world's largest investors such as the Dutch superannuation funds (ABP, PGGM and Pensioenfonds Vervoer (PfV)), have been investing in FttH in the Netherlands since 2010. This is happening in a country with a broadband cable network that covers 95% of the country and nationwide access to ADSL2+ networks. more

Update on Assigning 32-bit ASNs

As mentioned in Assigning 32-bit ASNs published one year ago, 16-bit Autonomous System Numbers (ASNs) are becoming a scarce resource just like 32-bit IP addresses. In 2007, the Internet Engineering Task Force (IETF) addressed this scarcity by developing a new format: 32-bit AS Numbers (RFC 4893), which increased the supply of ASNs to four billion. more

Cyber Criminals Infiltrate Even Small Businesses

I read an interesting article in the Wall Street Journal today entitled Cyber Criminals Sniff out Vulnerable Firms. It's a story of a small business owner in New York whose company was broken into by cyber criminals and stole $1.2 million from its bank accounts, although the owner was able to later recover about $800,000 of that. The moral of the story is that small businesses feel like they are not a major target for online thefts like these. more

The GAC Strikes Back

Last week in Prague, the GAC (Government Advisory Committee) relentlessly hammered ICANN over a range of issues relating to the new gTLD program. And while their criticisms were legitimate, one has to wonder to what extent governments were punishing ICANN for past offenses. At the same time, the ICANN board and management seem to have finally - much belatedly - figured out how important it is to maintain a constructive and positive relationship with governments. more

ICANN’s New TLDs: Of Course There Will Be an Auction - Part 2

A few days ago I opined that if several people want the same Top-Level Domain (TLD) and can't come to terms otherwise, they should arrange a private auction. It would be an odd sort of auction, since the buyers and sellers are the same people, so unlike normal auctions, the goal is not to maximize the selling price. How might it work? more

Cloud Redundancy: How Amazon Should Repair Credibility

I'm curiously puzzled, but not entirely surprised, how a company such as Amazon (NASDAQ: GS) allowed its servers to be interrupted for any length of time due to severe storm damage in northern Virginia this past weekend. Companies using cloud servers are both expectant and dependent on being able to pull information from cloud sources to operate their businesses without interruption. After all, IT professionals have been preaching the security and reliability of the cloud for quite some time to manage large data off-site. Steps for Amazon to repair credibility should be transparent and swift. more

Towards a More Fully Accountable and Transparent ICANN

ICANN held its second international meeting of 2012 last week in Prague, Czech Republic. While the agenda focused heavily on issues related to new gTLDs and on welcoming incoming CEO Fadi Chehade, ICANN also conducted a community consultation on its accountability and transparency reviews. more

Broadband Demand-Side Management

Countries, cities and commercial organisations around the globe are facing problems associated with the rollout of fibre-to-the-home networks... We have been warning about these issues for well over a decade. The problem arises because the telecoms industry has been based on the principle 'build and they will come'. more

ICANN’s New TLDs: Of Course There Will Be an Auction - Part 1

The process for ICANN's new TLDs says that if there are several equally qualified applicants for a TLD, and they can't agree which one gets it, ICANN will hold an auction to decide. Recently some people have suggested that the applicants could use a private auction instead. Well, of course. In a situation like this, the question isn't whether there will be an auction, but only who will keep the money. more

What If New gTLD Applicants Held Private Auctions Where Losing Applicants, Not ICANN Gets The Money

Over the last week at ICANN the arguably best idea coming out of the ICANN meeting is the concept that applicants for new gTLD strings with more than one application, hold a private auction amongst themselves with the winning amount going to the other losing applicants instead of to ICANN. As a backdrop, under the Guidebook multiple applicants for a new gTLD extension are encouraged to work together and come to an agreement to resolve the conflict. more

High Performance DNS Needs High Performance Security

There's been a lot of emphasis on DNS performance lately because faster DNS contributes directly to a better user experience. There's an interesting flipside to DNS performance though, higher performance DNS servers may be better targets for cache poisoning attacks. Faster servers give attackers more opportunities to insert fake entries into the DNS - speed can kill (or at least inflict a nasty wound!) so it's important to understand the security implications if you're looking to upgrade DNS performance. more

A Report on the OECD/BEREC Workshop on Interconnection and Regulation

I presented at a OECD/BEREC workshop that was held on the 20th June in Brussels, and I'd like to share some personal impressions and opinions from this workshop. The OECD/BEREC workshop was a policy-oriented peering and exchange forum. It was not a conventional operational peering forum where the aim is to introduce potential peers to each other and facilitate peer-based interconnection of network operators, but a workshop that involved both network operators and various national and EU regulators, as well has having inputs from the OECD. more

The Sportsmanship of Cyber-warfare

As a bit of a history buff I can't avoid a slight tingling of déjà vu every time I read some new story commenting upon the ethics, morality and legality of cyber-warfare/cyber-espionage/cyberwar/cyber-attack/cyber-whatever. All this rhetoric about Stuxnet, Flame, and other nation-state cyber-attack tools, combined with the parade of newly acknowledged cyber-warfare capabilities and units within the armed services of countries around the globe, brings to the fore so many parallels... Call me a cynic if you will, but when the parallels in history are so evident, we'd be crazy to ignore them. more

Let a Thousand Flowers Bloom… But Watch Out for Weeds

When ICANN committed -- after no small debate -- to an open, rather than limited application process for new gTLDs, supporters likened it to "letting a thousand flowers bloom." On reveal day we got our first glimpse at the thousand (plus) flowers they promised. Now it falls to ICANN to tend this wild new garden... But now the fun of spreading the seeds has already begun to fade, and the hard work of turning this new, unprecedented flowerbed into a safe, innovative and worthwhile global garden has already begun. more

WCIT Prep Dénoument?

I'm sitting in the Popov Room of the ITU Tower in Geneva, the room is quiet, the atmosphere placid, chairs are empty. The final meeting of the CWG WCIT prep WG has just concluded its work and the chair will be reporting to the Council the results of our work. I find myself strangely calm and looking forward to my next week, to be spent in Prague... Should you choose to read through the documents, and they are lengthy at approximately 375 pages, you might think that a number of the proposals were directed at the Internet. more

Topics

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days