Featured Blogs

Latest

Cloud Computing: The New Service

The penny dropped when I started looking at cloud computing as a service rather than a new technology. In that respect it is more like Google search and a DotCom development than a set of software and hardware tools. That was what I needed to get a better strategic grip on this new concept. As with all services, business strategies are key here, rather than technologies. As soon as it is seen as a technology customer issues often come in second, which then leads to a technology looking for a market... more

Recursive DNS and You

In the world of DNS, there are two types of DNS servers, 'recursion disabled' and 'recursion enabled'. Recursion disabled servers, when asked to resolve a name, will only answer for names that they are authoritative for. It will absolutely refuse to look up a name it does not have authority over and is ideal for when you don't want it to serve just any query. It isn't, however, very useful for domains you don't know about or have authority over... more

DPI is Not a Four-Letter Word!

As founder and CTO of Ellacoya Networks, a pioneer in Deep Packet Inspection (DPI), and now having spent the last year at Arbor Networks, a pioneer in network-based security, I have witnessed first hand the evolution of DPI. It has evolved from a niche traffic management technology to an integrated service delivery platform. Once relegated to the dark corners of the central office, DPI has become the network element that enables subscriber opt-in for new services, transparency of traffic usage and quotas, fairness during peak busy hours and protection from denial of service attacks, all the while protecting and maintaining the privacy of broadband users. Yet, DPI still gets a bad rap... more

ICANN to IP Experts: Come Back With a Solution for Internet Trademark Protection

Trademark issues are emerging with the upcoming introduction of new generic top-level domains on the internet, and the board members of the body introducing the names has passed the ball back to intellectual property experts to find answers. The Intellectual Property Constituency of the Internet Corporation for Assigned Names and Numbers (ICANN) has been asked to work out a viable solution "no later than 24 May 2009." Trademark issues have been defined as one of four overarching issues still to be solved before ICANN can finalise the application procedure for the next hundreds or thousands of top-level domains from .eco to .music. more

Google AdSense Asks Publishers to Change Their Websites’ Privacy Policy

I received an e-mail from Google Adsense about its new interest-based advertising feature. The latest feature of Google AdSense allows Google to track the behavior of users who click on ads on their AdSense network. It also allows Google users to ‘select’ their interests—this way they would view advertisements based on their category of interest…

 more

Searching for Truth in DKIM: Part 2 of 5

In part 1, we explained that the DKIM "d=" value identifies the domain name which signed the message, which may be a different domain name from the author of the message. Tying the signing and author domains together will require an additional standard: Author Domain Signing Practices (ADSP). In IETF parlance, the "author domain" is the domain name in the From: header, so ADSP is a way for the author domain to publish a statement specifying whether any other domain name should ever sign a message purporting to be From: that author domain... more

The Disadvantages of Digital Inclusion and the Perils of Non-Universal Access

Many of us are familiar with network effects within telecommunications. Fundamentally, the notion is that as the number of participants in a network increases, the value of that network increases superlinearly. Though many different theories exist about how best to value these networks, the general idea is that the more people on a network, the more benefits accrue to everyone on the network... more

The Third Wave of Internet Exceptionalism

From the beginning, the Internet has been viewed as something special and "unique." For example, in 1996, a judge called the Internet "a unique and wholly new medium of worldwide human communication." The Internet's perceived novelty has prompted regulators to engage in "Internet exceptionalism," crafting Internet-specific laws that diverge from regulatory precedents in other media. Internet exceptionalism has come in three distinct waves... more

Cybersquatter Hit With Maximum Penalty

Defendant Shui registered the domain name citybank.org and established a site there promoting financial services, sometimes using the mark CITIBANK. The real Citibank, armed with its trademark registrations in over 200 countries and over 50 years of use of its CITIBANK mark, filed suit against Shui under the Anticybersquatting and Consumer Protection Act, 15 USC 1125(d) ("ACPA")... Citibank sought $100,000 -- the maximum amount of statutory damages available under the ACPA, plus payment of Citibank's attorneys' fees... more

WiMAX vs. LTE

Mobile WiMAX, with the release of 2×2 MIMO chips in 2008, gives WiMAX a lead of two or so years on its major competitor -- the 3GPP's LTE. However, 3G cellphones using 3GPP UMTS technologies, extended to higher speeds with HSPA, is widely used in handsets in many countries. In North America, 3GPP2 CDMA2000 and EV-DO are widely used, but these are likely to be replaced over time by LTE and to some extent WiMAX. more

More Cracks Appearing in Mobile Market

When I wrote the BuddeComm analysis on the introduction of Apple's iPhone I commented that the most significant element of this event was that it would begin to create cracks in the flawed business models of the mobile operators, who are desperately hanging on to their closed networks very much like the fixed operators were fighting tooth and nail against opening up their networks. We have seen that the fixed operators have largely lost this battle and we predict that the future of the mobile networks will be no different... more

Why You Needed to Be at eComm 2009

I've been posting photos and snippets during eComm 2009 this week, but composing my overall impressions has been another matter. Sitting through 3 days mostly filled with continuous 15 minute presentations is a surefire recipe to fry your brain, and most people I talked to were topped out well before things wrapped up Thursday night. It's information overload of the highest -- and best -- order... Here's my top-line takeaway, and reading the rest of this post is really just detail. But it's detail you'll probably love if you really want to know what you missed... more

Mexico City Hosts an Eventful ICANN Meeting

The Mexico City ICANN Conference was more eventful than some of us had anticipated. Among the highlights was Paul Twomey's announcement that he is stepping down as President and CEO of ICANN effective on June 30... Before the Conference, ICANN had released the second draft of its Guidebook for new generic Top-Level Domains (gTLDs). It was not greeted with universal acclaim... more

The Slow Mainstreaming of IPv6

Slowly, we’re making progress mainstreaming IPv6. I wanted to post on a few interesting developments. Late last month, Netflix got an IPv6 allocation from ARIN, and they’re advertising it in BGP... I look forward to the day I can stream movies to my Netflix set-top box over IPv6. more

Searching for Truth in DKIM: Part 1 of 5

DomainKeys Identified Mail (DKIM) is the leading email authentication technology, supported by major ISPs including Google, AOL, and Yahoo! (who invented its predecessor), popular mail server software like Sendmail, and many of the best minds in email technology. But if you peruse the archives of the IETF DKIM mailing list, or start up a conversation at MAAWG, it might appear that there's still a lot of disagreement about what a DKIM signature actually means. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days