Featured Blogs

Latest

Running DNSBLs in an IPv6 World

DNS blacklists for IPv4 addresses are now nearly 15 years old, and DNSBL operators have gathered a great deal of expertise running them. Over the next decade or two mail will probably move to IPv6. How will running IPv6 DNSBLs differ from IPv4? There aren't any significant IPv6 DNSBLs yet since there isn't significant unwanted IPv6 mail traffic yet (or significant wanted traffic, for that matter), but we can make some extrapolations from the IPv4 experience. more

National Infrastructure Crisis: Improving Distribution Metrics

Not understanding the need for a newer, more economically sound, eco-friendly, and secure utilities infrastructure can be a (socio-economic disaster in the making), if top leaders of U.S. industry and government do not seek a solution to our historically aged telecommunications, power, and water delivery systems. The legacy systems in place are expensive, un-reliable, publically unsafe, and vulnerable to sabotage on both a large and small scale. more

Hello World

I've been threatening to blog for several years now. I can't recall for how many years I've left the threat open, but hopefully you'll understand given the title of this piece, that I'm prone to senior moments. For the past two years I've been immersed in Internet Governance, an area I knew precious little about before being tossed into the deep end of the pool... My current employer, PayPal (eBay), recognizes the importance of cat herding, and has formed a group that I am fortunate to be part of, that specializes in Internet Standards and Governance. more

The Antivirus Uncertainty Principle

The antivirus industry has been trying to deal with false positive detection issues for a long, long time - and it's not going to be fixed anytime soon. To better understand why, the physicist in me draws an analogy with Heisenberg's Uncertainty Principle - where, in its simplest distillation, the better you know where an atom is, the less likely you'll know it's momentum (and vice versa) - aka the "observer effect". more

A Logical Place to Start the IPv6 Transition

The transition to IPv6 is top of mind for most service providers. Even in places where there are still IPv4 addresses to be had surveys we've run suggest v6 is solidly on the priority list. That's not to say everyone has the same strategy. Depending where you are in the world transition options are different -- in places such as APAC where exhaustion is at hand one of the many NAT alternatives will likely be deployed since getting a significant allocation of addresses is not going to happen and other alternatives for obtaining addresses will prove expensive. more

Facebook Size Estimates

At a staggering $100 billion dollar valuation and reported 900 million users, Facebook represents a massive presence in the global economy. From an Internet infrastructure perspective, Facebook also ranks amongst the largest of the "hyper giants" generating a significant share of daily global Internet traffic. This blog explore Facebook's size in terms of its Internet traffic contribution. more

Comcast Xfinity App Argument: Risking Divestiture of Cable or Broadband

This sounds extreme, but Comcast continues to push the boundaries in separation of its broadband service with its cable service. It is walking a thin line between being a broadband provider, offering fast Internet access to millions of subscribers, and treating its Xfinity Xbox 360 App as a priority over customers not having its cable service. Saying the Xbox 360 is just another set-top-box for its own customers is just a complex way of undermining Net Neutrality rules as defined by the FCC upon the companies purchase of NBCU. more

Donuts and Efficiency: Ways to Recover Time and Money Lost to TAS

On April 12, ICANN closed the TLD Application System (TAS) to ensure security of applicant data. For more than a month, the system outage has cost applicants and others millions of dollars. Here's how to make up for lost time and money. Donuts supported ICANN's decision to close TAS when it realized there was a data security risk. At a critical moment, ICANN made the right choice... However, now that staff has communicated to affected applicants (including Donuts) and is preparing to re-open the TAS system, efficiency has grown to become a crucial element of the process. more

So/Lo/Mo for Business

Lest you think the social + local + mobile (So/Lo/Mo) trend is just a fad, last week, Pew Internet released a new report that found that 18 percent of smartphone owners use a geosocial service to check in and share their location with friends. The report also found that 74 percent of smartphone owners get real-time location-based information on their phones -- up from 55 percent last May. Add to these impressive stats the finding from earlier this year... more

Case Studies from the UN Broadband Commission

The Broadband Commission for Digital Development, in partnership with ITU, has released its first country case studies looking in-depth at the state of broadband development in four economies and examining links between broadband and the UN Millennium Development Goals. The case studies look at the effect of broadband connectivity on economic growth and access to basic services like education and health. They offer regulatory guidance and best practices, showcasing success stories and lessons learned. more

Rethinking Protection Technologies: A Change Has Occurred

Talking technical is easy. Distilling technical detail, complex threats and operation nuances down to something that can be consumed by people whose responsibility for dealing with cybercrime lays three levels below them in their organizational hierarchy is somewhat more difficult. Since so many readers here have strong technical backgrounds and often face the task of educating upwards within their own organizations, I figured I'd share 4 slides from my recent presentation that may be helpful in communicating how the world has changed. more

2011 UDRP Filings Up at WIPO, Down at NAF - And Still Infinitesimal

The World Intellectual Property Organization (WIPO) recently issued a detailed press release regarding Uniform Dispute Resolution Policy (UDRP) cases for which it provided arbitration services in 2011 and, once again, the number of WIPO filings was up. According to WIPO: "In 2011, trademark holders filed a record 2,764 cybersquatting cases covering 4,781 domain names with the WIPO Arbitration and Mediation Center (WIPO Center) under procedures based on the Uniform Domain Name Dispute Resolution Policy (UDRP), an increase of 2.5% and 9.4% over the previous highest levels in 2010 and 2009, respectively." Yet that's an incomplete picture. more

Business Case for IPv6 - Part 2

In my previous blog on the topic, I stated that the business case supporting the IPv4 roll-out in the late 90s was the Internet. Although IP depletion will slowly become a reality, the chances are that due to mitigating technologies such as NAT and DNS64, it may take quite a while before organizations in the developed economies will get serious about IPv6. So where should we look to find a business case for IPv6? more

Hosters: Is Your Platform Being Used to Launch DDoS Attacks?

As anyone who's been in the DDoS attack trenches knows, large multi-gigabit attacks have become more prevalent over the last few years. For many organizations, it's become economically unfeasible to provision enough bandwidth to combat this threat. How are attackers themselves sourcing so much bandwidth? more

Measuring IPv6 at the Network and the Customer Level

George Michaelson, APNIC's Senior Research and Development Scientist recently visited the RIPE NCC to collaborate on various research projects with his RIR colleagues. IPv6 measurements were one of the topics we looked at. Recent IPv6 statistics from the RIPE NCC show an accelerated uptake of IPv6 in Norway, both in terms of the number of allocated prefixes, and visible announcements in the routing system. more

Topics

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days