Even as we increasingly discover that every facet of our modern lives now revolve around, and are dependent on the Internet, for which reason its availability, functionality, safety, stability and security are now of great and continuing concern to all of us. These issues have a profound impact on its overall governance. To most of us, during the past three decades, the Internet has always been available, stable, affordable and open; and it should continue this way even as it is controlled and administered in a secure manner... more
As regular readers know, ICANN holds lengthy, in-depth discussions devoted to DNSSEC at each of its three annual meetings. The half-day session held at ICANN 43 in Costa Rica last month was particularly interesting. What became clear is that the industry is quickly moving into the end-user adoption phase of global DNSSEC deployment. more
I recently shared the idea that there is a new category of network architecture, the Network of Probabilities. This differs from classical circuits (Network of Promises) or best-effort packet data (Network of Possibilities). I personally believe it's the next revolution in telecoms. What's new is that it provides a trading space for allocating contention between flows, and does this with some novel applied mathematics. more
The eccentricities of California-based ICANN, the allocator of domain names, know few bounds. Based on the best of legal advice, though perhaps not the best of PR advice, it's Board has announced the system for allocating priority in the processing of around 1000 weighty applications for new top-level domain names. It has described the system, with all seriousness, as Digital Archery. A description that just begs for comparison with the English folk hero, Robin Hood. more
When visiting a friend in the UK in my student days some decades ago, he asked me at one point in time if I had some coins to keep the electricity meter going. This was the first and last time I saw a coin activated electricity meter. In my mind, prepaid electricity now essentially belonged to a distant past when Scrooge like landlords would make sure renters did not disappear without paying their electricity bills. more
In a recent press release ICANN has stated that they will publish the list of applicants for new generic Top-Level Domains (gTLDs) on April 30th. Previously many had spoken of a "big reveal" on May 1st, though that would have coincided with a public holiday in many countries and might have been "missed". However ICANN CEO, Rod Beckstrom, claims that the organisation had always planned to publish the list two weeks after the application window closed. more
The RIPE NCC is 20 years old and it now has over 8,000 members. In this article we are looking at the growth curve and the composition of the membership: what industry do RIPE NCC members come from today. The RIPE NCC became the first Regional Internet Registry in September 1992 (six months after it was set up as the secretariat for the European operators community, RIPE). more
This morning, Global Payments held a conference call with investors and analysts covering their earlier breach announcement and projected earnings. Global Payments had also released an update advisory yesterday stating that "the company believes that the affected portion of its processing system is confined to North America and less than 1,500,000 card numbers have been exported" and that only Track 2 card data may have been stolen. more
Global Payments, an Atlanta-based payment card processing firm, announced yesterday that they had suffered "unauthorized access into a portion of its processing system". Sometime in early March they uncovered the attack, and there are some indications that the breach occurred between January 21st and February 25th of this year... There are a number of unverified reports that a New York City street gang with Central American ties took control of "an administrative account that was not protected sufficiently". more
I opined about a year ago that DNS blacklists wouldn't work for mail that runs over IPv6 rather than IPv4. The reason is that IPv6 has such a huge range of addresses that spammers can easily send every message from a unique IP address, which means that recipient systems will fire off a unique set of DNSBL queries for every message... Now I'm much less sure this will be a problem... more
At the recent IETF meeting there has been considerable discussion about interconnection of Content Delivery Networks. A lot of this is being driven unfortunately by the incumbent telco/cableco's who never understood CDN in the first place, and now want to assert control over this critical new Internet architecture, much in the same way that they want to take control over open WiFi hot spots as part of an integration strategy with their 3G/4G networks. more
The Wall Street Journal has an interview with the outgoing head of the FBI's cyber crime investigation Shawn Henry. In it, he has a blunt assessment of the US's capabilities when it comes to combatting online crime, especially data theft and hacking... The more I read around the Internet, the more clear it's becoming at how cyber security is becoming a central focus. This has pretty big implications for the cloud. more
As unusual as it may be for a lawyer to speak at a IETF meeting, Ian Walden gave a lecture on Data Protection Directives and updates thereof. He said they affect some 90 jurisdictions. A difference between email addresses and cookies - the latter are the main subject of the January 2012 update of the directives - is that after more than a decade of enforcement, specific browser extensions may allow users to browse what cookies they have, while no record states whom they conferred their email addresses to. more
It is great to see US and European governments undertake initiatives to promote the development of research into Big Data utilizing commercial clouds. Many cloud providers are offering free resources to support these initiatives. R&E networks will play a critical role in linking researchers to the commercial clouds and developing collaboration platforms and portals. more
The King is dead. Long live the King! Or, given this week's events, should the phrase now be "Kelihos is dead. Long live Kelihos"? It is with a little amusement and a lot of cynicism that I've been watching the kerfuffle relating to the latest attempt to take down the Kelihos botnet. You may remember that a similar event ("Kelihos is dead") occurred late last year after Microsoft and Kaspersky took it on themselves to shut down the botnet known as Kelihos (or sometimes as Waledac 2.0 or Hlux). more
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byRadix
Sponsored byWhoisXML API