Featured Blogs

Latest

Turn the Table on Content Filtering

Why do we run content filters at the recipient's side? Paul Graham's Plan for Spam introduced them that way. After several years, we can say that plan doesn't work very well. Email has become much less reliable. One way to recover reliability, at least between trusted parties, is to run filters at the sender's side. Let's look at the diagram in more detail... more

Presenting a Way Forward: Step-by-Step and ICANN’s New gTLD Process

I read this to the ICANN Board Thursday morning, in Sydney, after more prep work than I care to recall. If you don't know that the DAGv3 is delayed, or what the IRT is, this is a good time to bush up on current ICANN state. "Good morning. My name is Eric Brunner-Williams, and I am speaking to you on behalf of the initial signatories of the Step-by-Step proposal. I represent one of the signatories as the principal of the native, aboriginal, and indigenous cultural and linguistic Top-Level Domain (TLD) project, one of many similar efforts to preserve living languages and cultures..." more

Who Needs More TLDs?

ICANN's Sydney meeting has come and gone, with the promised flood of new Top-Level Domains (TLDs) claimed to be ever closer to reality. Does the world need more TLDs? Well, no. Way back in the mid 1990s, it seemed obvious that Internet users would use the DNS as a directory, particularly once early web browsers started to add .COM to words typed in the address bar. This led to the first Internet land rush, with heavy hitters like Procter and Gamble registering diarrhea.com in 1995... more

Green Dam is Breached… Now What?

As a number of China hands predicted, the Chinese government has postponed its mandate requiring that all computers sold in China must include the Green Dam -Youth Escort censorware by today. Yesterday after the news broke I told the Financial Times: "There's been this impression in the internet industry that when the Chinese government makes a demand, they have to roll over and play dead. The lesson here is that's not necessarily the case." more

Sharing ICANN Can Be Win-Win for the United States

With the Internet's global reach and importance showing exponential growth, pressure on the United States to share control of ICANN is mounting. A number of experts believe that the question is simply how much the United States should give up and how soon. This essay argues that "giving up" can be a win-win solution; i.e., control sharing is not a zero-sum game. more

The Browser Is the OS (Thanks to Firefox 3.5, Chrome 2, Safari 4)

Almost a year ago I wrote about Google Chrome: Cloud Operating Environment and [re]wrote the Google Chrome Wikipedia article, discussing the ways in which Google was changing the game through new and innovative features... Similar features were quickly adopted by competitors including Opera (which Chrome quickly overtook at ~2%) and Firefox (which still has an order of magnitude more users at ~20-25%). more

IPv6, LTE and IPSO: Not So Long Term Evolution to 50 Billion Devices

Who would dare to predict the year the Internet will reach 50 billion addressable devices? Thomas Noren, head of LTE product development at Ericsson sees one day 50 billion devices shouldered by LTE. He sees LTE as the truly global standard putting to rest the long and acrimonious rivalry between CDMA and GSM protagonists and even sees the Chinese third way with their TD-SCDMA aligned on LTE. Mobile WiMax is, in his mind, already relegated to the dustbin of history... more

Mobile’s Need for Fibre

It was interesting to see that in New Zealand Vodafone had second thoughts and decided to come up with its own proposal of forming a consortium of network operators, rather than simply supporting the government's announcement of its FttH plans. Our analysis of this change of mind is that mobile operators increasingly need fibre networks to sustain the enormous growth in mobile broadband. Most mobile stations around the world are not connected to a fibre network. more

More Questions About WSJ Claims of Iran DPI

The Wall Street Journal's dubious story about Iran's use of Deep Packet Inspection (DPI) for spying, censorship and disinformation appears in a highly charged atmosphere. The US Republican right wing wants the US to talk tougher to Iran, to bomb-bomb-bomb, invade, or commit "regime change." More questions than mine have surfaced about the WSJ's story... more

China’s Censorship Blowback

I'm not sure what the Chinese government is thinking, or whether certain parts of certain ministries and party apparatus have gotten completely out of control. Until recently, it had seemed to me that the Chinese government was managing its censorship system with surprising success... But this month, something shifted. It's unclear whether the shift is long-lasting or just temporary madness until the PRC's 60th anniversary on October 1st. more

Just Say No, to Your ISP Subverting Your DNS Queries

Over the past few weeks I have been seeing reports that some ISP's are actually subverting DNS queries to their own DNS server. Oh the humanity! What this means is that when you (your computer) does a UDP or TCP Port 53 DNS query the ISP is intercepting that and directing it to their own servers. Has anyone been told by their ISP that they are doing this? No? I didn't think so... more

New Top-Level Domains and Software Implications

Many software applications rely on validation routines to check the validity of domain names. By validation, I mean here to test the string submitted by the user and see if it matches a pre-defined pattern. A typical example are web forms that need to validate e-mail addresses. This is by new means a new issue. It first appeared with the introduction of the .info Top-Level Domain (TLD). more

Next Generation Telecoms: FttH and Trans-Sector Strategies

The deployment of Fiber to the Home (FttH) around the world is beginning to lead to exciting developments for the next generation of telecommunications. In particular, infrastructure based on FttH is providing the foundation for smart communities and cities where a number of technologies and services are combined to create an enhanced value proposition for residents. Smart homes connected to these networks can utilise services such as tele-health, e-education and e-government as well as access digital media and high speed Internet. more

Extending the JPA is the Right Thing to Do

Internet governance is getting a thorough look under the hood, thanks to the National Telecommunication and Information Administration. NTIA recently concluded its public comment period under a Notice of Inquiry (NOI), which asked for public comments regarding the future of the Joint Project Agreement (JPA) between the Department of Commerce and ICANN. At its core, the NOI asks whether the White Paper's original vision of privatizing the technical coordination and management of the Internet is working. For reasons I will explain, it would be deeply unwise for NTIA to terminate the JPA just yet. more

Careful What You Wish For: Why ICANN “Independence” is a Bad Idea

ICANN controls the "root" of the naming hierarchy, designating the operators and managers of the top-level domains, like ".com" and ".net" and ".uk." Since its founding in 1998, ICANN has operated under a "Joint Partnership Agreement" (JPA) with the U.S. Department of Commerce. The current extension of this agreement is set to expire on September 30 of this year. Some advocates say it's now time for the U.S. government to cut its ties and let ICANN stand on its own. That's not a good idea. more

Topics

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days