Featured Blogs

Latest

Pakistan Hijacks YouTube: A Closer Look

A few hours ago, Pakistan Telecom (AS 17557) began advertising a small part of YouTube's assigned network. This story is almost as old as BGP. Old hands will recognize this as, fundamentally, the same problem as the infamous AS 7007 from 1997, a more recent ConEd mistake of early 2006 and even TTNet's Christmas Eve gift 2005. Just before 18:48 UTC, Pakistan Telecom, in response to government order to block access to YouTube, started advertising a route for 208.65.153.0/24 to its provider... more

Domain Pulse 2008: Day 2 Focuses on DNS Security

Day two of Domain Pulse 2008 last Friday (see review of day one) focused on online security issues giving the techies amongst us details of security issues, and the more policy-orientated amongst us something to chew on in a few other presentations. Kieren McCarthy, these days of ICANN, also gave some insights into the drawn out sex.com drama with more twists and turns than the average soap opera has in a year! And Randy Bush outlined the problems with IPv6. Among other presentations... more

IP Addresses and Personally Identifiable Information

I don't normally cheer for Google when I don't own shares in the company, but this time I will make an exception. Alma Whitten, Software Engineer at Google, today posted to their Public Policy Blog that IP addresses shouldn't be considered Personally Identifiable Information (PII). This is not a problem in the United States but it is in the EU, and if the EU actually were to legislate this it would most definitely affect Microsoft and Google's business functionality in the EU... more

Domain Pulse 2008: Internet Governance the Focus of Day One

Around 350 attendees came from Russia in the east to Ireland in the west, as well as a few people from elsewhere around the globe, to attend Domain Pulse 2008 in Vienna on February 21 and 22. Day one's focus was internet governance. The future of the DNS was one of the key issues addressed by Michael Nelson of Georgetown University in Washington DC, with domain names becoming less important, but their numbers still increasing, as online access by a myriad of devices skyrockets connect -- everything from the television, refrigerator, washing machine, pets, sprinkler systems and cars. more

Why Regulate Cable Internet Access

The cable guys have their way of saying it: "What do you want to do, nationalize our businesses?" Another way of seeing this issue is: We have a very few very large providers of highspeed internet access in U.S. They have sufficient market power to decide how and when to prioritize internet communications. And all of these providers are competing with the internet in some way -- they are all (or are becoming) old media and old telecom companies that want to maintain control over their distribution channels. more

Take Down Order by California Court Raises Issues of Censorship and Free Speech

The internet is abuzz with commentary about a recent case in the United States District Court for the Northern District of California concerning the web site wikileaks.org, a "website dedicated to leaking documents that are "anonymous, untraceable, uncensorable." Time Magazine allegedly described the site by stating that it "could become as important a journalistic tool as the Freedom of Information Act." The case certainly raises important issues concerning First Amendment Rights, censorship and freedom of speech. The case involves the alleged posting of private internal documents of Bank Julius Baer & Co and its bank customers... more

WiMAX vs. WiFi

In fact WiFi (technically standard 802.11) and WiMAX (802.16) don't compete for broadband users or applications today. That's partly because WiFi is widely deployed and WiMAX is still largely an unfulfilled promise and partly because the two protocols were designed for very different situations. However, if WiMAX is eventually widely deployed, there will be competition between them as last mile technologies. Some people describe the difference between WiFi and WiMAX as analogous to the difference between a cordless phone and a mobile phone... more

Circumstantial Evidence of Yahoo’s CAPTCHA Being Broken

A couple of weeks ago, I read an article on Yahoo that some outfit in Russia claimed to have broken Yahoo's CAPTCHA for creation of new email accounts. Another blogger wrote that it was unlikely that the spamming outfit had achieved 100% success at breaking the CAPTCHA. Yet, in the past couple of weeks, I have noticed something that would seem to confirm the theory... more

Comments on an IP Address Trading Market

With IPv4 addresses becoming scarcer, there has been talk that a trading market will develop. The idea is that those holding addresses they do not really need will sell them for a profit. More alarming is that there have been a few articles about how the Regional Internet Registries (RIR) are contemplating creating such a market so that they can regulate it, conceding that it will happen anyway and taking the "if you can't be 'em, join 'em" attitude. This is all a bit disturbing. Maybe I'm naïve, but it's a little unclear to me how an unsanctioned trading market could really operate without the RIRs at least being aware... more

Call for Telecom Industry Wake-Up

As many of you know, I'm launching the Emerging Communications (eComm) conference -- taking place next month in Silicon Valley, at the Computer History Museum. Communications innovation has been stagnant, in my opinion, for nearly a decade. Telecommunications and Internet communications both seem to be at somewhat of an impasse. The communications industry needs a forum to help break through the stagnancy and highlight the huge opportunity space that is emerging. The stagnancy has been strikingly more so in telecommunications... more

The Future of Cyber Warfare

Every now and then I get emails from readers of my blog. I mostly reply to them in private, but I recently got one question where I thought my reply might be of general interest. I took the liberty of editing the question somewhat, but in essence it was: "If you have any insight you can share with my class on cyber warfare and security, I would be delighted on hearing it." In general, I think that it's an obvious conclusion that both offensive and defensive actions with regard to national telecommunications infrastructure is becoming an integral part of a nations security assessments.... more

As the Comcast Saga Unfolds, Be Careful What You Wish For

Comcast has been in the news recently for deliberately "slowing down" some subscribers and applications in its broadband cable service. There was an article in the Washington Post today updating the case, and there was a recent article in Network World that actually favors the groups filing the complaints and calls for the FCC to crack down on Comcast. more

Typosquatting: A Solution

Typosquatting's negative effect on the surfing experience can be easily eliminated, and in a way that allows all parties to make money. What's called for is an affiliate program. You would not be happy if you typed a domain name into your browser and wound up in nowhere land because of a simple misspelling. That's the negative surfing effect of typosquatting... more

IPv6: Do as I Say or Do as I Do?

How important is it for a vendor, service provider or integrator to be using a service or technology that it is pushing on its clients? When Voice over IP (VoIP) came out Cisco began a gigantic push, having its salespersons pitch it to anyone and everyone on their client list. But Cisco had not yet deployed VoIP within its own corporate network. It was still making use of traditional voice systems from vendors that today it probably considers competitors. Many people on the receiving end of a sales pitch recognized this... more

Upcoming Domain Pulse 2008 Within Central Europe

Domain Pulse, the yearly get-together of the German-speaking registries of nic.at (Austria), Denic (Germany) and SWITCH (Switzerland) is happening on February 21 and 22 in Vienna. The conference alternates between the countries -- last year it was Switzerland, this year Austria and next year Germany... Domain Pulse covers everything in the domain name arena from management of the DNS, what's happening in each of the ccTLDs, after market and domaining, security threats to the DNS and internet as well as wider issues affecting the internet's development such as internet governance. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days