The bitter partisan divide that characterizes so many of official Washington's current policy discussions was conspicuous in its absence at the July 8th hearing held on "Internet Governance Progress After ICANN 53" by the House Energy and Commerce Committee's Subcommittee on Communications and Technology. In opening remarks that asked "What is the multi-stakeholder community, anyway?", Subcommittee Chairman Greg Waldren went on to declare that he and his colleagues "sought to strike the right balance between supporting the multi-stakeholder model of Internet governance, while still protecting the invaluable tool of communications and commerce the Internet has become". more
If you put 65 million people in a locked room, they’re going to find all the exits pretty quickly, and maybe make a few of their own. In the case of Iran’s crippled-but-still-connected Internet, that means finding a continuous supply of proxy servers that allow continued access to unfiltered international web content like Twitter, Gmail, and the BBC... more
As the unallocated IPv4 address pool runs out, are Internet Service Providers (ISPs) actually deploying IPv6? The graph, first in a series from RIPE Labs, looks at the IPv6 "ripeness" of all ISPs registered as RIPE NCC members. We created a rating system that gives ISPs up to four "stars" for IPv6 services that they provide, based on the following criteria... more
Mobile operators face soaring data demand. The natural evolution of 2G/3G/4G infrastructure delivers about 2X additional capacity every 24 months. That's a major disconnect! (At least) two solutions are on the table, Femtocells and Wi-Fi offload. Both approaches solve the backhaul issue by using customer or 3rd party links (DSL, DOCSIS, T1/E1, WISP or otherwise)... As a solution for mobile data capacity, Wi-Fi wins, for many reasons. more
IPv6 advocacy has been tainted by FUD and half-truth. CommsWorld recently interviewed Juniper's Jeff Doyle, who is a strong supporter of IPv6 -- but who also has little patience for IPv6 mythology. Forget security, half-true address crises and QoS: the best reason for the world to run with IPv6 is what's driven the Internet all along -- innovation. more
My local area code (814) is running out of phone numbers. When discussing IPv6 with non-technical folks, I frequently use the hypothetical scenario of running out of phone numbers as an analogy for IPv4 address depletion. The conversation usually goes like this: "Imagine if we were running out of phone numbers. One way of solving that problem would be to make them bigger. Instead of ten digits, what if we made then thirty digits? If we did that, how many other things would we have to change? Some mundane things like business cards, letterhead, and phone books. But also more substantial things..." more
The Canadian Internet Registration Authority (CIRA) has issued a public letter to ICANN calling on the organization to follow accountable, transparent, and fair processes. Until the concerns are addressed, CIRA says it is suspending its voluntary contributions to ICANN... more
The Internet has enhanced freedom of communication, ignored national borders, and removed time and space barriers. But the Internet sphere was never a law-free zone. Already ICANN's "Articles of Incorporation" (1998) constituted that the management of critical Internet resources has to take place within the frameworks of "applicable national and international law". more
Domain names, domain name systems (DNS), and digital certificates are fundamental components of the most important applications that enable your company to conduct business - including your website, email, voice-over IP, and more. However, these vital applications are being attacked with an increasingly high level of sophistication and severity. more
This is a preliminary input for the current policy-development process on "new registry services" that was prepared by ALAC members; Jonathan Weinberg has provided input and comments in response to earlier drafts. The ALAC is currently soliciting comments on this text. Comments can be submitted either to CircleID (see comment section), or to the ALAC's public comment address at [email protected]. ..."In the present document, we will focus on substantive criteria to be used by ICANN in evaluating requests to review proposed changes to the architecture or operation of a gTLD registry. We are, however, not stating any opinion about the kinds of requests that ICANN currently has the authority (or obligation) to consider." more
Planning for a short trip to Hong Kong tomorrow reminded me of Jonathan Shea, something I wanted to blog about but was waiting for the hype around the new generic Top-Level Domains (TLDs) to cool down. Jonathan Shea is an old friend who is in-charge of ".hk". I had the pleasure to catch up with him in Paris ICANN meeting. Before Jonathan, let me talk about something related that happened in Paris. At the Cross Constituency Meeting, there was a presentation by the Anti-Phishing Working Group (APWG). In summary, they were proposing working with registries to take down domain names that are suspected to be involved in phishing. more
At APNIC Labs we've been working on developing a new approach to navigating through some of our data sets the describe aspects of IPv6 deployment, the use of DNSSEC and some measurements relating to the current state of BGP. The intent of this particular set of data collections is to allow the data to be placed into a relative context, displaying comparison of the individual measurements at a level of geographic regions, individual countries, and individual networks. more
Verisign's spent the best part of 2016 putting out warnings. The .COM operator and domain industry heavyweight highlighted its Q3 earnings report with a stern "Ending Q4 '16 Domain Name Base expected to decrease by between 1.5M to 2.8M registrations from the end of Q3 '16". A forecast which the company said was based on "on historical seasonality and current market trends." As 2016 drew to a close, the downturn seemed to materialize... more
Your first line of defense to any DDoS, at least on the network side, should be to disperse the traffic across as many resources as you can. Basic math implies that if you have fifteen entry points, and each entry point is capable of supporting 10g of traffic, then you should be able to simply absorb a 100g DDoS attack while still leaving 50g of overhead for real traffic... Dispersing a DDoS in this way may impact performance -- but taking bandwidth and resources down is almost always the wrong way to react to a DDoS attack. But what if you cannot, for some reason, disperse the attack? more
On Tuesday (November 30) Internet backbone provider Level3 publicly accused cable-based ISP Comcast of trying to thwart competing video services delivered through the internet. Comcast was, according to Level3, suddenly choosing to charge it more because of its carriage of Netflix traffic. The accusation was consciously framed to raise net neutrality alarms. It appeared as if a cable TV giant was using its control of internet access to make access to a competing, over the top video service more expensive... Then the full story came out. more
Sponsored byCSC
Sponsored byVerisign
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byVerisign