Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Green Dam is Breached… Now What?

As a number of China hands predicted, the Chinese government has postponed its mandate requiring that all computers sold in China must include the Green Dam -Youth Escort censorware by today. Yesterday after the news broke I told the Financial Times: "There's been this impression in the internet industry that when the Chinese government makes a demand, they have to roll over and play dead. The lesson here is that's not necessarily the case." more

Registration Operations Workshop (ROW) at IETF-93: RDAP as a Successor of Whois

The next Registration Operations Workshop will take place at the start of IETF 93 on Sunday, July 19th, 2015. The focus of this workshop is on the Registration Data Access Protocol, the successor of Whois. RDAP is a combined protocol for IP addresses and names registration data. Therefore, we are expecting both domain names and RIR communities to attend the workshop. more

Debilitating Cyber Attack: Not If, But When?

We all know how easy it can be to ignore or underestimate the possibly, or even likelihood, of a terrorist attack; just remember what happened on 9-11. That seems to be just what the U.S. is doing when it comes to a possible Cyber-Attack, no not in other countries, but right here at home where targets like private sector companies, who provide vital economic and emergency services to our population using broadband infrastructure, and are woefully under-secured for such attacks. more

ICANN Regime Change:  Exit Twomey, Enter Beckstrom

On July 1st 2009, Rod Beckstrom succeeded Paul Twomey as the fourth CEO of the Internet Corporation for Assigned Names and Numbers (ICANN). Rod assumes this important leadership role at a critical juncture in ICANN's ongoing evolution. Saying that he is jumping into the deep end of a pool would not do justice to the magnitude of the tasks before him. The more appropriate analogy might be parachuting from a plane above the Mariana Trench during a typhoon. However, after reading some of his writings, reviewing his biography, and having met with him one-on-one during ICANN's recent Sydney meeting, I am confident that the ICANN Board made the right decision in selecting Rod to lead the organization at this defining moment in Internet governance. more

ICANN Clarifying Questions - Question 50 Focus (Part 3 of 3)

If the timeline for turn-around of clarifying questions (CQs) remains two-weeks, the long pole in your CQ tent is likely to be revising your Q50 letter of credit or escrow agreement to meet the ICANN requirements. Based upon ICANN comments, it appears that many applicants are having trouble meeting the specific letter of credit (LOC) or escrow agreement language. To remedy this ICANN should consider publishing what it considers acceptable language for an LOC or escrow agreement. more

IPv6 Inside Everything and Everybody

With the market for connected humans reaching saturation in advanced economies, mobile operators now see connected devices as the next growth opportunity. 'Everything that can benefit from being connected will be connected', according to Ericsson's CTO (source). In the meantime, Intel dreams of embedding processors into everything that can gain something from communicating. more

Why CDNs Are Critical to Future of R&E Networks, Big Data and the Internet

Netflix has announced that they are deploying their own Content Delivery Network (CDN) for delivery of their video streams to Internet Exchange Points (IXPs) around the world. More importantly they are making the hardware and software design of their CDN servers freely available. That means any network can deploy Netflix CDN boxes deep into their network to significantly reduce traffic volumes and improve performance for users. more

Extreme Vulnerability at the Edge of the Internet - A Fresh New Universal Human-Rights Problem

By design, the Internet core is stupid, and the edge is smart. This design decision has enabled the Internet's wildcat growth, since without complexity the core can grow at the speed of demand. On the downside, the decision to put all smartness at the edge means we're at the mercy of scale when it comes to the quality of the Internet's aggregate traffic load. Not all device and software builders have the skills - and the quality assurance budgets - that something the size of the Internet deserves. more

Nothing to See Here

Three parallel events in US communications policy today, all reported on widely - but with a common thread. ... Law enforcement and national security officials want to make sure that they have the same ability to execute warrants and surveillance orders online that they had in the switched-telephone-circuit age -- which will mean substantial government design mandates for new software, hardware, and communications facilities. more

A Look at Why We Need Fibre-to-the-Farm

One of the discussions I am currently having with my international colleagues is about the global trend towards urbanisation and the resulting shift of political, economic and financial powers from centralised states and federal structures to mega-city or mega-urban region centres. Some of my American colleagues expressed the fear that this would further marginalise rural communication. more

OneWeb Is Out of Bankruptcy, but Not Out of the Woods

OneWeb, which declared bankruptcy in May, has reorganized and emerged from bankruptcy. Bharti Global, an Indian telecommunication conglomerate, and the British government each own 42.2% of the new company, and most of the rest is owned by previous investors SoftBank and Hughes Network Systems. Hughes will continue work on ground infrastructure and marketing and the original joint venture with Airbus, which designs and manufactures OneWeb satellites... more

Is 5G a Race We Want to Win?

There is an interesting article recently published in the English version of a South Korean newspaper, the ChosunILBO, that talks about 5G in China. According to the article, the Chinese 5G rollout is an expensive bust. There are a number of interesting facts disclosed about the Chinese 5G rollout. First, it's clear that the rollout is using millimeter wave spectrum. more

Spamhaus Tells Us That Botnets Are Getting Worse

The Spamhaus Project just published a long article about the botnets they've been watching during 2014. As this chart shows, we're not making any progress. They also note that the goals of botnets have changed. While in the past they were mostly used to send spam, now they're stealing banking and financial information, engaging in click fraud, and used for DDoS and other malicious mischief. more

The Digital Decade – A Look Back

With 2019 coming to a close, we're not just saying goodbye to the past 365 days, we're also saying goodbye to an entire decade. As we bid farewell to the 2010s, we're taking this opportunity to look back and reflect on the digital decade as well as consider what the future might have in store for us all. The past ten years were a whirlwind of change, with new advances in technology exploding onto the market at a faster pace than ever before. more

Trust in Email Begins with Authentication

As most CAUCE supporters already know, forging 'From:' or other commonly seen email headers is trivially easy. It's one of the most frustrating oversights in the creation of Internet email technology -- though of course that's only obvious in hindsight; it was just fine for the pre-Internet networks of the late 1970s and early-mid 1980s. Since then, things have changed -- and the most interesting recent technological advancements in email have been in the realm of sender authentication, which encompasses ways to verify that the apparent sender of a message actually is the entity which sent it. more

Topics

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days