Not satisfied with seizing domain names, the Department of Homeland Security asked Mozilla to take down the MafiaaFire add-on for Firefox. Mozilla, through its legal counsel Harvey Anderson, refused. Mozilla deserves thanks and credit for a principled stand for its users' rights. more
Forty days. That's how long Fadi Chehade has had to get a handle on the most complex, diverse and important non-profit corporation the world has ever known. The last guy to face such an unforgiving timeline was measuring timber in cubits. So if Cheade is Noah, I guess that makes ICANN Chairman Steve Crocker God, telling Fadi to wrangle all these diverse (and often diverging) constituencies and march them two-by-two into the boat, ahead of the coming storm. more
A remote exploit in the BIND 9 DNS software could allow hackers to trigger excessive memory use, significantly impacting the performance of DNS and other services running on the same server. A flaw was recently discovered in the regular expression implementation used by the libdns library, which is part of the BIND package. The flaw enables a remote user to cause the 'named' process to consume excessive amounts of memory, eventually crashing the process and tying up server resources to the point at which the server becomes unresponsive. more
Almost a year ago I wrote about Google Chrome: Cloud Operating Environment and [re]wrote the Google Chrome Wikipedia article, discussing the ways in which Google was changing the game through new and innovative features... Similar features were quickly adopted by competitors including Opera (which Chrome quickly overtook at ~2%) and Firefox (which still has an order of magnitude more users at ~20-25%). more
Everyone is familiar with broadband 'speed test' applications. When you have an ISP service quality problem, it is common to grab one of these tools to see if you are getting the service you feel you are entitled to get. Whenever you upgrade your broadband, the first thing you might do is to run a speed test. Then you can show off to your mates how superior your blazing fast service is compared to their pitiful product. more
There certainly is a lot of interest in machine-to-machine communication (M2M) and the Internet of Things (IoT). But what we are seeing is only what is happening on the surface. Most of the M2M activities are taking place unnoticed. For example, most newly produced electronic devices are now all M2M enabled. Over 100 million smart meters have already been deployed by the electricity industry, with literally hundreds of millions of them in the pipeline. Healthcare is another key industry. more
Irrespective of which solution to the current domain name brand-sharing impasse ends up being adopted by brand owners (option 1, option 2, or a combination), the owners must first understand and embrace current trends in online communications, information gathering, and entertainment. Thus, for a solution to succeed the corporate mindset toward new technologies needs to change; after that brand owners can work cooperatively with the domain name industry (owners and institutions) to increase the aggregate pie. more
The debate about the control of the internet is intensifying, with interesting discussions expected later on this year in Dubai at the WCIT conference organised by the ITU. Over the last 25 years the industry has moved from being mainly telephony-based to being mainly IP-based, and many say that what is now at stake is the future of the internet as we know it at this point in time... The reality now is that the political stakes of the internet have risen significantly. more
I recently saw that AT&T is offering a $10,000 reward to anybody who provides information that leads to the arrest and conviction of people stealing copper wiring. The particular announcement is related to a recent theft of copper in South Dallas, Texas, but there have been numerous other thefts. This is not a small problem, and the estimated value of stolen telephone copper is between $1.5 and $2 billion annually. more
The success or failure of public cloud services can be measured by whether they deliver high levels of performance, security and reliability that are on par with, or better than, those available within enterprise-owned data centers... IDC forecasts that public cloud IT spending will increase from $40 billion in 2012 to $100 billion in 2016. To provide the performance, security and reliability needed, cloud providers are moving quickly to build a virtualized multi-data center service architecture, or a "data center without walls." more
The end of the year is approaching which seems to be a harbinger of Internet disasters. Four years ago (on 24 Dec. 2004), TTNet significantly disrupted Internet traffic by leaking over 100,000 networks that were globally routed for about an hour. Two years ago (on 26 Dec. 2006), large earthquakes hit the Luzon Strait, south of Taiwan, severing several underwater cables and wreaking havoc on communications in the region. Last year there was a small delay. On 30 Jan. 2008, more underwater cables were severed in the Mediterranean, severely disrupting communications in the Middle East, Africa, and the Indian subcontinent. Calamity returned to its customary end-of-year schedule this year, when early today (19 Dec. 2008) several communications cables were severed, affecting traffic in the Middle East and Indian subcontinent. more
There's been a global argument going on for some time now over how the Internet should be governed. Many governments, including China but also many others, are not happy that the "root" of the Internet is controlled by the Internet Corporation for Assigned Names and Numbers (ICANN), which ultimately answers to the U.S. Department of Commerce. In 2005, there were proposals from various countries to move Internet governance from ICANN to a United Nations body of some kind... But there was no consensus. Human rights groups were rightly concerned that giving governments like China and Iran greater say in Internet governance would lead to more censorship and the elimination of privacy and anonymity. more
The DNS is a remarkably simple system. You send it queries, and you get back answers. Within the system, you see exactly the same simplicity: The DNS resolver that receives your query may not know the answer, so it, in turn, will send queries deeper into the system and collects the answers. The query and response process is the same, applied recursively. Simple. However, the DNS is simple in the same way that Chess or Go are simple... more
Turning network technical protocols into religion seems like an inherently bad idea -- transient and unstable at best. However, it happens. More than 40 years ago, the world of legacy telecommunications and network design formalism started the tendency with OSI (Open Systems Interconnection) and ISDN (Integrated Services Digital Networks). A few years later, the academic research community did it with their myriad host-to-host datagram protocols -- eventually calling one "the Internet." more
Tomorrow Internet Governance Forum (IGF) starts. The overall discussion topic this year is How to reach the next billion(s), and that builds on the fact that today we have around one billion Internet users. A number that will explode when all different kinds of devices, from cellphones, to TV sets to toasters will be Internet connected... Some workshops have been cancelled and panelists have been replaced as many people and organisations have made the decision to not go to India. more
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byCSC