Featured Blogs

Latest

A Root Server With a View…

Running a DNS server that serves the root gives an interesting view into the world of the DNS. With the ongoing improvements to the ICANN operated L-ROOT, we've been fortunate enough to be able to make use of the "DNS Statistics Collector" (DSC) tool. "DSC" allows us to generate different views of the DNS queries we have been seeing at the L-ROOT systems. more

Spam Kings: Book Review (Part 2)

I'd like to continue on in my review of the book Spam Kings (read part 1) and make some more comments, particularly regarding the antispammers. One thing that I really liked about the book is learning the history of some of the spam tools. I was never a participant on NANAE (news.admin.net-abuse.email; a USENET newsgroup which discusses e-mail spamming), that was before my antispam time. But I was intrigued by its history. People would gather together and discuss spammers and tools for stopping them, and sometimes spammers would stop by and the flame wars would ensue. more

Spam Kings: Book Review (Part 1)

A few months ago, I purchased the book Spam Kings, but only recently managed to get around to reading and finishing it. In case you've never read it, it chronicles the stories of some spammers and the anti-spammers who fought them. These anti-spammers are not people like myself in industry; rather, they are users who have received spam who hunt down the source of the spam and work to bring them down. more

USA Today: Spam Is Bad

A reasonably well informed article in Thursday's USA Today reminds us that in 2004 Bill Gates said the spam problem would be solved in early 2006, but here at the end of 2007 there's more spam than ever. They go through a laundry list of problems of spambots, new kinds of PDF and MP3 spam, and phishing, and a list of of partial or non-solutions including filters, walled gardens, and an odd system called Boxbe, a hybrid of whitelists, challenge/response, and pay for delivery. Oh, and Bill says he never said spam would be solved... more

An Internet Security Operations Viewpoint of IGF

The Internet Governance Forum (IGF) is an annual UN conference on Internet governance which was held this year in Rio de Janeiro, Brazil. The topics discussed range from human rights online to providing Internet access in developing countries. A somewhat secondary topic of conversation is Internet security and cyber-crime mostly limited to policy and legislative efforts. Techies and Internet security industry don't have much to do there, but I have a few updates for us from the conference. more

Bandwidth Demands Exceeding Internet Infrastructure Investment

Nemertes Research has released a report on the future of the Internet infrastructure. The key finding from the report is that bandwidth demands are exceeding infrastructure investment, especially at the access layer. We noted in the project that users may begin to see the impact of degraded application performance as early as 2010. We also noted that the planned investments in Internet infrastructure are insufficient to meet growing demand. more

Unbridled Discretion and Prior Restraint: The Verizon and Comcast Stories

Let's say that providing communications infrastructure is an inherent function of a state. Most people think of the internet as a telephone system, and most people think the telephone companies aren't supposed to choose which calls will go through based on their content. People think that because they think internet access, like telephone access, is a utility -- like electricity conduit, water pipes, etc. -- that has something to do with the government, and the government isn't supposed to discriminate. more

Financial Times on Telecoms Separation

I've written that a Network Neutrality law needs a Network Management Exception, and I've laid out how this exception is likely to become a giant vacuum-cleaner-fish loophole. The way out is the separation of infrastructure from service, so infrastructure operators can have no financial interests in the services they carry, hence no motive to discriminate in anti-competitive ways. Now today's Financial Times has an editorial on the EC telecom regulator, Viviane Reding's proposal to beef up national telecom regulatory authority within European countries and create a Europe-wide so-called super-regulator. more

Leading a Horse to Water

It is one thing to bring broadband internet to the masses, but how do we make them drink from the fountain of knowledge? One of the challenges, of course, is that the industry has not yet sold turn-key applications that capture the imaginations of the unconnected. Surprising as it seems, email, Facebook, file swapping and web surfing have not yet attracted 100% of the population. Are there some applications that might lend themselves to a toll-free model in order to reach the rest of the market? more

Three Years With ICANN

I joined the ICANN board during the December 2004 ICANN meeting in Cape Town. I served for a three year term and stepped down at this last meeting in Los Angeles and didn't run for another term... Before joining ICANN, I thought that ICANN was the only part of the Internet that wasn't really working. I knew that there must be a better way to do what ICANN does, but I couldn't be bothered to figure it out. I'd agree with people who said things like, "it should just be distributed" or "it should just be first come first serve" or "we should just get rid of it." People from ICANN would say, "it's more complicated than that" or "at this point that would be impossible." After being part of the process for three years, I find myself saying those same things... more

On the Hunt for “Critical Internet Resources”

I'm writing this column in November, and that means that it is time for the traveling circus known as the Internet Governance Forum (IGF) to come down to earth, unpack its tents and sell tickets for its annual song and dance routine. The script for this year's show has been changed, and after being excluded from the main arena last year at the Athens gig, the headline act of "Critical Internet Resources" is taking a starring role this year in Rio. Some folk are even saying that it is the single most contentious issue to be scheduled at this year's IGF show. So what are "Critical Internet Resources" anyway? If folks are going to spend all this time, energy and carbon emissions traveling to Rio to talk on this topic, then wouldn't it be helpful to understand what it means in the first place? There are probably a number of ways to answer this question, so in this heavily opinionated column I'd like to look at the range of possible answers to this question. more

Whois: If You Want Privacy, Pay For It

Netchoice, a lobbying group for the e-commerce industry had a strange reaction on the failure of the GNSO working group on Whois to reach a consensus. After all, they say, "Privacy concerns with Whois that were identified years ago have already been addressed by in the marketplace"... more

Change of Leadership at ICANN as Cerf Makes Way for Intellectual Property Expert

Intellectual property and computer law barrister Peter Dengate-Thrush has been elected as new Chairman of the Board of the Internet Corporation for Assigned Names and Numbers (ICANN). The former chairman of InternetNZ, the country-code top-level domain (ccTLD) registry for New Zealand (.nz), and cofounder of the Association of Asian Pacific ccTLDs, succeeds the legendary Vinton Cerf... more

Domain Management White Paper

Businesses may rely on domain names to conduct their day to day work, but that does not mean that they really understand what they are using or how important they are. Of course those of us in industry may feel tempted to either scoff at people's naivety or feel terribly frustrated with their ignorance, however neither action is particularly productive. Loic Damilaville, however, has tried to take a more practical and positive approach by publishing a white paper on domain name management. The document was published a few months ago in French and has since been made available in English. more

Making the Wireless World More Web-Friendly

Your wireless carrier (in the U.S., probably AT&T or Verizon Wireless) has a lot of control over the handset you can use and the applications that can run on that device. In fact, wireless carriers routinely ask for (and get) an enormous slice of the revenue from applications that work on their networks, and they force handset manufacturers to jump through all kinds of hoops in order to be allowed to sell devices that can connect to these networks... This has had bad effects on the ecosystem of the wireless world. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days