Just when you thought Nexus One was the biggest thing coming out of Google this week, we now get word about Google Energy. Well, Nexus One is a big deal, but I say that wearing my telecom analyst hat. Switching to my smart grid hat, Google Energy is something else altogether... As big as that is -- and will be -- Google Energy has all kinds of implications for smart grid. For starters, more
Earlier today ICANN held a webinar to provide an update on their data privacy activities in relation to whois and GDPR. Rather than simply talking about the various "models" they produced both a visual mapping as well as a matrix. While some attendees may not agree with how all the models are classified it is still a helpful way of showing the deviations from the current fully public whois model for gTLD domain name registrations. more
As discussed in the several studies on name collisions published to date, determining which queries are at risk, and thus how to mitigate the risk, requires qualitative analysis. Blocking a second level domain (SLD) simply on the basis that it was queried for in a past sample set runs a significant risk of false positives. SLDs that could have been delegated safely may be excluded on quantitative evidence alone, limiting the value of the new gTLD until the status of the SLD can be proven otherwise. more
Starlink launched maritime service in July 2022, and by January 2023 Elcome International LLC, a maritime technology solution provider since 1970, had installed multi-antenna Starlink Maritime arrays on two super yachts with more than 100 passengers and crew. Elcome launched its Starlink maritime service in May 2024 and now has over 3,000 terminals under management. more
Is anyone calling espionage by means of computers cyber-espionage yet? I hope not. At least they shouldn't call it cyber war. Two news stories of computerized espionage reached me today. The first, regarding the Oil industry, was sent by Marc Sachs to a SCADA security mailing list we both read. The second, about the hotel industry, was sent by Deb Geisler to science fiction convention runners (SMOFS) mailing list we both read. more
Images of clouds have been used when discussing networks for quite some time. When traditional telecoms companies were selling point-to-point circuits a drawing of a cloud was sometimes used. The cloud symbol helped indicate the provider?s domain of responsibility, effectively hid the internal complexity of the network and focused on the end user. This was all fine when the product offered was an end-to-end circuit. more
We’ve noted in previous CSC studies that phishing continues to be an extremely popular threat vector with bad actors and shows no signs of subsiding in part, because of the COVID–19 pandemic and the rise in popularity of remote working. Indeed, the most recent figures from the Anti-Phishing Working Group (APWG) show that the numbers of phishing attacks are higher than ever before, with the quarterly total of identified unique phishing attacks exceeding 1 million for the first time in Q1 2022, and over 600 distinct brands attacked each month. more
Since its founding, Amazon has reinvested profit in building infrastructure. They began with retail sales and distribution infrastructure and later added Amazon Web Services (AWS), providing data center and hosting infrastructure. Amazon founder Jeff Bezos also established Blue Origin, a company to provide satellite launch service and eventually to support space travel. Last year Amazon filed an application for a 3,236-satellite constellation of low-earth orbit Internet service satellites - Project Kuiper. more
How can we track the amount of DNSSEC validation happening globally? Is there a way we can see the trend over time to (we hope!) see validation rise? At the recent excellent DNSSEC Workshop at ICANN 50 in London Geoff Huston let me know that his APNIC Labs team has now created this exact type of trend chart. more
The RIPE NCC took active measurements of World IPv6 Day participants before, during and after World IPv6 Day (in cooperation with CAIDA). We selected 53 participants and performed periodical A and AAAA DNS lookups and HTTP fetches from 40 servers worldwide. For HTTP, we fetched data over IPv4 and IPv6. These provide important control points... more
Virgin Media announced its intention of restricting BitTorrent traffic on its new 50Mbps service according to an article by Chris Williams in The Register. Does this mean that net neutrality is endangered in the UK? The question is important because advocates of an open Internet like me hold the UK up as a positive example of net neutrality achieved through competition rather than through regulation. more
The launch of a new or repurposed Top-Level Domain (TLD) is always surrounded with speculative activity. Some domainers will register domains in the new TLD with hopes of getting rich quick. Others will do so because the same domain in .com is worth a lot of money. And then there are the developers who see the prospect of building a carefully branded website in the new TLD. And with all those proposed new generic Top-Level Domains (gTLDs), this cycle will be repeated. But what does a Domain Name Land Rush look like? more
Earlier this month, MarkMonitor representatives were privileged to witness, at the first ICANN meeting of 2016 in Marrakech, Morroco, the historic presentation of the plan to transfer the stewardship of key internet functions (IANA) from the United States Government to a community and consensus-based model of governance through ICANN (Internet Corporation for Assigned Names and Numbers). more
The New Jersey Supreme Court has issued an important decision on Internet users' right to privacy. The case involves a dispute about whether an ISP violated a user's privacy rights by turning over subscriber information (name, address, billing details) associated with a particular IP address. It ends up that the subpoena served on the ISP was invalid for a variety of reasons. As the user had a 'reasonable expectation of privacy' in her Internet activities and identifying information, and because the subpoena served on the ISP was invalid, the New Jersey court determined that the ISP should not have turned over the personal data... more
The Internet is not new. It has existed, in one form or another, since the 1960s. Since that time, it has been primarily the domain of the engineers and the other technology-minded individuals that built it. The organizations that were put in place to govern it predate the huge growth in end users the Internet experienced in the 2000s... They are able, in structure and capacity, to deal with technological issues. The issues facing the Internet in 2014, however, are very different from those in 1998. more
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign