Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

A Digital ‘Red Cross’

A look into the past reveals that continuous developments in weaponry technology have been the reason for arms control conventions and bans. The banning of the crossbow by Pope Urban II in 1096, because it threatened to change warfare in favour of poorer peasants, the banning of poisoned bullets in 1675 by the Strasbourg Agreement, and the Geneva protocol banning the use of biological and chemical weapons in 1925 after world war 1, all prove that significant technological developments have caused the world to agree not to use certain weapons. more

Triple Challenge of Network Transformation

Following my comments about the iPhone VoLTE announcement I had an interesting conversation with Andy Huckridge from Gigamon, a company that provides intelligent traffic visibility networking solutions for enterprises, datacentres and service providers around the globe. An interesting concept that we discussed was the 'triple challenge of network transformation'. The three elements of this challenge are... more

Two More Crypto Holes

If you work in computer security, your Twitter feed and/or Inbox has just exploded with stories about not just one but two new holes in cryptographic protcols. One affects WiFi; the other affects RSA key pair generation by certain chips. How serious are these? I'm not going to go through the technical details. For KRACK, Matthew Green did an excellent blog post; for the other, full details are not yet available. There are also good articles on each of them. What's more interesting are the implications. more

What New gTLD Applicants Need Is a Quick, Lightweight Answer to the World’s Governments. Here It Is.

It's safe to say that with just a week to go before ICANN intended to sign the first contract for a new gTLD, the last thing anyone wanted was a 12-page document from the world's governments with 16 new "safeguards", six of which it wants to see applied to every new extension. But what the industry shouldn't overlook, especially in the face of the expected critical responses this week and next, is that the Governmental Advisory Committee's (GAC's) formal advice from the ICANN Beijing meeting represents an opportunity for the domain name industry to lock-in self-regulation at a critical point in its evolution. more

IP Address Management as a Service on the Cloud

Consumption of software as a service with a usage-based business model has gained incredible popularity in recent years. On the other hand, other cloud services such as infrastructure and platform as a service are just starting to pick up. While compute and storage are by the far the most commonly used cloud infrastructure services, few consider core network services such as IP Address Management (IPAM) as something that could be utilized over the cloud. more

Why is .EU Trying to Destroy the Internet?

Eurid, the operator of .EU, announced that it was cutting its wholesale price from 10 Euros to 5 Euros (about US$6.40 at today's rate). Is Eurid crazy? They're cutting the price in half! Eurid is acting as if unit cost should go down as sales increase! Haven't they learned the lesson... more

DotConnectAfrica Trust Response to John Jeffrey’s ICANN Legal Blog Posting

The attention of DotConnectAfrica Trust (DCA Trust) has been drawn to a recent blog posting by John Jeffrey, the ICANN General Counsel and Company Secretary, who wrote to clarify what he termed as "misinformation and erroneous reporting that have framed parts of the discussion" regarding the recent DCA vs. ICANN IRP Final Declaration. As we can't see a way of making comments on his blog, DCA Trust as a directly affected party, will respond to the issues Mr. Jeffrey has advanced... more

Worm Propagation Strategies in an Ipv6 Internet

A recent paper called "Worm Propagation Strategies in an IPv6 Internet", written by Steven M. Bellovin, Angelos Keromytis, and Bill Cheswick, examines whether or not the deployment of IPv6 will in fact provide a substantial level of barrier against worms. Shared below are the introductory paragraphs from this paper. "In recent years, the internet has been plagued by a number of worms. One popular mechanism that worms use to detect vulnerable targets is random IP address-space probing..." more

Potential Impacts of Large-Scale Metaverses on Internet Governance: Bandwidth

Neal Stephenson’s foundational cyberpunk novel Snow Crash brought to the public the concept of a metaverse, a virtual reality in which people interact using avatars in a manufactured ecosystem, eschewing the limitations of human existence. More recently, Ready Player One capitalized on that idea and brought it back to prominence with a bestselling novel and subsequent film adaptation. Amid rebranding efforts and seeking a new way forward, Mark Zuckerberg has made it Facebook’s (now Meta Platforms) priority to build a platform that could enable the metaverse to become a mainstream technology with the sort of reach that their social networks and WhatsApp have. more

Let’s Face Facts: We Need a New Industrial Internet

The Internet is a great success and an abject failure. We need a new and better one. Let me explain why. We are about to enter an era when online services are about to become embedded into pretty much every activity in life. We will become extremely dependent on the safe and secure functioning of the underlying infrastructure. Whole new industries are waiting to be born as intelligent machines, widespread robotics, and miniaturized sensors are everywhere. more

Caribbean Peering Forum Brings Dream of Better Internet Closer

The dream of a faster, safer, more affordable Internet in the Caribbean sometimes seems elusive. One group of Internet pioneers is taking steps to make it a reality. The Caribbean Peering and Interconnection Forum, or simply CarPIF, is an annual event that brings together the people responsible for delivering Internet services to the region, including internet service providers, internet exchange point operators, content delivery networks, data centre managers and other computer network professionals. more

CAIDA and ARIN Release IPv6 Survey

The Cooperative Association for Internet Data Analysis (CAIDA) and the American Registry for Internet Numbers (ARIN) presented the results [PDF] of a recent IPv6 survey at the ARIN XXI Public Policy Meeting in Denver on April 7th. The survey involved over 200 respondents from a blend of Government, commercial organizations (including ISPs and end users), educational institutions, associations, and other profit and non-profit entities. The purpose of the survey, conducted between March 10th and 24th, was to capture IPv6 penetration data in the ARIN region... more

Verisign vs. ICANN: More at Stake than Sitefinder

It's easy to dismiss Verisign's antitrust suit as a ploy to push through Sitefinder. But whether one loves Sitefinder or hates Sitefinder, the complaint raises a much more significant issue that won't go away even if ICANN lets Verisign roll out Sitefinder. At the heart of Verisign's complaint is the lack of any definable process for decisionmaking, and its a complaint shared by others. A settlement between Verisign and ICANN that does not create a clear process for decisionmaking at ICANN that includes trustworthy independent review will merely delay the inevitable. Eventually, some other party will become just as frustrated and again challenge ICANN -- either in U.S. court or by enlisting the help of the U.S. Commerce Department, non-U.S. governements, or multinational treaty organizations. ICANN must recognize that the days of ad hoc decision making based on realpolitick must end and give way to stable processes that ICANN staff cannot control. more

21st Century Triple Networks: Ubiquitous 4G, WiFi, & Wires

The best engineers on the planet are coming to the same conclusion: a hybrid 4G/WiFi/landline network is the way to meet mobile demand. Folks like John Donovan of AT&T and Masayoshi Son of Softbank in Japan had this vision around 2007-2008. As the iPhone/iPad/Android made the coming demand clear, networks planners around the world evolved similar strategies. more

The Politics of Submarine Cable in the Pacific

There was a naive idealism in the early days of the Internet that attempted to rise above the tawdry game of politics. Somehow, we thought that we had managed to transcend a whole set of rather messy geopolitical considerations that plagued the telephone world and this new digital space that the Internet was creating was simply not going to play by the old rules. more

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days