Until the pandemic hit, I rarely thought about upload bandwidth. I mostly used upload bandwidth to send files to people, and I rarely cared if they received the files immediately -- I was happy as long as files got sent. But the pandemic changed everything for millions of people. All of a sudden, homes were unable to function well due to problems with uploading. more
CircleID recently interview Paul Vixie, Founder & Chairman of Internet Software Consortium (ISC), to discuss ISC's newly formed Operations, Analysis, and Research Center (OARC). OARC is launched in response to DDoS attacks at the Internet's core infrastructure and the vital requirement for a formal coordination system. OARC is also a part of US homeland security initiatives, such as the formation of Information Sharing and Analysis Centers (ISACs).
"Registries and registrars, ccTLD operators, large corporate NOCs, ISPs and ecommerce companies that host many domain names are all likely candidates. This is also a natural for law enforcement groups that are worried about attacks on the Internet." more
On April 21st the Internet Commerce Association submitted a formal request to Mr. Frank Fowlie, ICANN Ombudsman, requesting an immediate investigation of the non-compliance of the Implementation Recommendation Team (IRT) with applicable provisions of ICANN's Bylaws. The IRT was created by a March Resolution adopted by the ICANN Board during its Mexico City meeting, and was charged with proposing "solutions" to the concerns of trademark holders. Unfortunately, the IRT has chosen to operate in a non-transparent manner... more
Brooks is famous for many things. Many people know him best as the author of The Mythical Man-Month, his musings on software engineering and why it's so very hard. Some of his prescriptions seem quaint today -- no one these days would print out documentation on microfiche every night to distribute to developers -- but his observations about the problems of development remain spot-on. But he did so much more. more
There has been a good deal of talk of late on the important topic of security and privacy in relation to cloud computing. Indeed there are some legitimate concerns and some work that needs to be done in this area in general, but I'm going to focus today on the latter term (indeed they are distinct -- as a CISSP security is my forte but I will talk more on this separately). more
An earthquake on Tuesday near Taiwan caused widespread disruption to telephone and Internet networks. The quake affected an area of the sea bottom with a lot of undersea cables that broke, and since there is only a limited number of cable repair ships, it will take at least weeks to fish them up and splice them. more
Discrimination, Closed Networks and the Future of Cyberspace... Just over a month ago, Karl Auerbach asked, "Is the Internet Dying?". Today, Commissioner Michael J. Copps, of the Federal Communications Commission (FCC) in a speech at the New America Foundation, is asking the very same question, "Is The Internet As We Know It Dying?" and warning about FCC policies that damaged media now threatening the Internet. more
The Wall Street Journal reported that AT&T saw wireless networks about to drown under a deluge of data. To see YouTube content uploaded form an iPhone or Slingbox rerouting a favourite television program to your smart phone gives mobile network operators the shivers. Skype over 3G in the meantime gives sleepless nights, not because of surging megabyte floods but due to nightmares of considerable voice and roaming revenues washing away. Not easy to plan and engineer "managed transitions" under those circumstances. more
The domain name system (DNS) grew to prominence during the initial, innocent days of the internet. During that time, early internet users tended to work for government or education organizations where trust was assumed, and security was not even a consideration. Since the online community was small and the internet was sparsely used, the importance of DNS was not widely understood, and as a consequence, left undefended. more
The ITU-T has proposed a new system of country-based IP address allocations which aims to satisfy a natural demand for self-determination by countries; however, the proposal also stands to realign the Internet's frontiers onto national boundaries, with consequences which are explored here. ...we do indeed see the Internet as a single entity, and we even speak of the Internet's architecture as if there was one designer who laid out a plan and supervised its construction. But despite all appearances, the Internet landscape is indeed made up of many separate networks... This article will explore these issues, particularly in light of recent proposals to introduce new mechanisms for IP address management, a prospect which could, over time, substantially alter both the geography of the Internet, and its essential characteristics as a single cohesive network. more
For a book project I decided to extend my interview with Milton Mueller from November 2003 (Part I | Part II). Exclusively for CircleID readers, here's part III that deals with WSIS, WGIG, US-American bias and the Internet Governance Project. "...One good result of the WGIG process is that the involved international community has already moved beyond those cliches. No one is proposing that the UN control the Internet. There is growing consensus that control of the DNS root needs to be internationalized..." more
Typosquatting's negative effect on the surfing experience can be easily eliminated, and in a way that allows all parties to make money. What's called for is an affiliate program. You would not be happy if you typed a domain name into your browser and wound up in nowhere land because of a simple misspelling. That's the negative surfing effect of typosquatting... more
A big security news event last night and today is that the Twitter.com Web site was hacked and content on the site replaced. TechCrunch reported it and it has been picked up globally. But - was the Twitter.com website really hacked? We now know it was not so. There are four ways that users typing in Twitter.com would have seen the Iranian Cyber Army page. more
While 86 percent of small businesses see the importance of the cloud, 70 percent aren't using cloud solutions. This data, from a Microsoft report for National Small Business Week and reported by Talkin' Cloud, yields a sobering conclusion: Small businesses understand the broad value of cloud computing, but aren't sure how to apply the technology on a case-by-case basis. more
5G sounds like the successor to 4G cellular telephony, and indeed that is the intent. While the progression from 2G to 3G, to 4G and now 5G seems simple, the story is more nuanced. At CES last month I had a chance to learn more about 5G (not to be confused with the 5Ghz WiFi) as well as another standard, ATSC 3.0 which is supposed to be the next standard for broadcast TV. more
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byVerisign
Sponsored byRadix
Sponsored byVerisign