A few days ago I opined that if several people want the same Top-Level Domain (TLD) and can't come to terms otherwise, they should arrange a private auction. It would be an odd sort of auction, since the buyers and sellers are the same people, so unlike normal auctions, the goal is not to maximize the selling price. How might it work? more
Quite a number of articles and blogs including one I contributed had IPv6 haruspices dissect the entrails and divine the future of the internet in the wake of the june 8th IPv6 World Day. It came and went with some trepidation, the internet did not go comatose and some marveled at and reported on traffic peaks they witnessed. Preparation of a keynote for the Gogonet Live conference in San Jose, provided me the opportunity to have a look at how some variables evolved since June... more
Turning network technical protocols into religion seems like an inherently bad idea -- transient and unstable at best. However, it happens. More than 40 years ago, the world of legacy telecommunications and network design formalism started the tendency with OSI (Open Systems Interconnection) and ISDN (Integrated Services Digital Networks). A few years later, the academic research community did it with their myriad host-to-host datagram protocols -- eventually calling one "the Internet." more
Sitting in the Aruba hospitality at the Italian round of the Superbike World Championship in Imola, CEO Stefano Cecconi exudes passion. The love he has for motorcycles in general, and racing in particular, is evident. Less so is the rational behind Aruba's multi-million-euro-a-year spend to be the title sponsor for the factory Ducati World Superbike team. For Internet industry onlookers at least. more
Global Payments, an Atlanta-based payment card processing firm, announced yesterday that they had suffered "unauthorized access into a portion of its processing system". Sometime in early March they uncovered the attack, and there are some indications that the breach occurred between January 21st and February 25th of this year... There are a number of unverified reports that a New York City street gang with Central American ties took control of "an administrative account that was not protected sufficiently". more
The latest ICANN Applicant Guidebook was released in mid-April and covers the introduction of new generic Top Level Domains (gTLD). The introduction of new gTLDs has been an ongoing conversation for more than a decade. We have an opportunity to approve the final draft in time for consideration of the new gTLD implementation program during the ICANN Board meeting, which will be held on Monday, 20 June 2011, in Singapore. We submitted our comments yesterday and wanted to share them with you. more
Having been involved in this sector for over fifteen years now, the rate of change in the market dynamics continues to surprise me - from its early years when MarkMonitor and NetNames clearly led the space for several years, then seeing well-funded startups such as Yellow Brand Protection and Incopro challenge that, followed by a period of heavy M&A, it is now extremely diverse. more
It seems like most new technology today comes with a lot of hype. Just a few years ago, the press was full of predictions that we'd be awash with Internet of Thing sensors that would transform the way we live. We've heard similar claims for technologies like virtual reality, blockchain, and self-driving cars. I've written a lot about the massive hype surrounding 5G -- in my way of measuring things, there isn't any 5G in the world yet, but the cellular carriers are loudly proclaiming its everywhere. more
Early June 2018 the European Internet community traveled into the Caucasian Mountains to participate in EURODIG 11. On its way into the digital age, Europe is, as EU Commissioner Mariya Gabriel said, at another crossroad. In cyberspace, Europe risks becoming sandwiched between US and Chinese Cyberpower policies. Social networks, search engines, smartphones, eTrade platforms - key sectors of today's digital economy - are dominated both by the US and Chinese giants: Alibaba and Amazon, Google and Baidu, Facebook and Weibo, Apple and Huawai. more
The emergence and proliferation of Internet of Things (IoT) devices on industrial, enterprise, and home networks brings with it unprecedented risk. The potential magnitude of this risk was made concrete in October 2016, when insecure Internet-connected cameras launched a distributed denial of service (DDoS) attack on Dyn, a provider of DNS service for many large online service providers (e.g., Twitter, Reddit). Although this incident caused large-scale disruption, it is noteworthy that the attack involved only a few hundred thousand endpoints... more
There is a questionmark over ICANN's upcoming meeting in Nairobi, Kenya again. This time it has more bite than the usual xenophobia: the COO has published a US Department of State report that lists the conference centre itself as a specific threat from a Somalian insurgency group, Al-Shabaab. In response, a number of Internet companies have already announced they are pulling their people. more
Over the past few years, the term "open internet" has become popular among politicians in Washington and Europe. It is bandied about in political pronouncements that assert that everyone needs to somehow support the open internet without ever actually defining it. It is sometimes used as a synonym for Net Neutrality. In fact, it is a bogus public relations term that is rather like saying you believe in the Tooth Fairy. more
In "Net Neutrality: Discrimination, Competition, and Innovation in the UK and US", Alissa Cooper and Ian Brown explore the relationship between two broadband regulatory regimes and their practical outcomes. The paper is of (paradoxical) interest as it (unintentionally) demonstrates how policy is being made without sufficient understanding of packet network performance. This paper contains many common fallacies about performance. These fallacies are fuelling misdirected conflicts over broadband regulatory policy. The underlying (false) assumption is that 'neutral' (aka 'non-discriminatory') networks exist. more
The sixth annual Counter-eCrime Operations Summit (CeCOS VI) will engage questions of operational challenges and the development of common resources for the first responders and forensic professionals who protect consumers and enterprises from the ecrime threat every day. This year's meeting will focus on the shifting nature of cybercrime and the attendant challenges of managing that dynamic threatscape. more
A very good friend of mine is an archivist with the Ontario government, and we share similar views on how technology is impacting modern life. He passed a really interesting item along that ran in yesterday's Washington Post. Some of you may be following this – Google's Book Search Settlement. I can definitely see how this has a direct bearing on the archive space, but also how it touches on a few tangents of my world – emerging communications technologies. more
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byCSC
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byWhoisXML API