Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

IPv6… The Dangers of Prolonged Inter AS Tunnel Vision

Tunnel vision is a rather serious medical condition and the Internet or at least a number of service providers could be at risk if not treated soon enough. Symptoms of inter AS (Autonomous System) tunnel vision are many slower connections with IPv6 compared to IPv4 with some failing all together. Reason is that tunnels, especially inter-AS tunnels, can lead to long paths and non-optimal routing. more

The Future of Religions on the Internet

Internet is facing the biggest change in its history. New brands, ideas, groups, communities,... have now found the chance to apply for their own specific space on internet naming system through ICANN's new gTLD program. One of the most interesting points of this courageous program was the motivation it created among communities to try to represent their specific webspace on the internet by applying for their own TLD; and among them were the religious communities as well. more

Back from RightsCon Manila: Trading Freedoms for Security?

In Asia -- a region that at various points in its recent history has been a hotbed for civil unrest, secessionist movements and political instability -- the line between national security and public interest can be difficult to draw. A session organised by the Internet Society at the recently held RightsCon Southeast Asia in Manila shed some light on the perceived trade-offs between national security objectives and digital rights, in particular freedom of expression and privacy. more

Former ICANN Board Member to Congress - ICANN Needs Oversight

Karl Auerbach has written a quite long but very detailed and well thought out letter to Congress. It's not clear which members of Congress were sent the letter. Karl Auerbach is a former member of ICANN's board and is probably best remembered by many as having taken ICANN to court (and winning) in order to gain access to the organisation's financial records. more

Public Sharing and a New Strategy in Fighting Cyber Crime

A couple of years ago I started a mailing list where folks not necessarily involved with the vetted, trusted, closed and snobbish circles of cyber crime fighting (some founded by me) could share information and be informed of threats. In this post I explore some of the history behind information sharing online, and explain the concept behind the botnets mailing list... we may not be able to always share our resources, but it is time to change the tide of the cyber crime war, and strategize. One of the strategies we need to use, or at least try, is public information sharing of "lesser evils" already in the public domain. more

NTIA Seeks Nominations to Serve on the Online Safety and Technology Working Group

In the midst of the election season, Congress passed a plethora of Internet related laws. Most involved child protection. One involved webcaster protection. Wasting no time, the impact of the new laws is already being felt through federal agency implementation. On Friday, the National Telecommunications and Information Administration (NTIA) in the Department of Commerce released the following notice... more

Provoking National Boundaries on the Internet? A chilling thought…

The impact of the recently revealed US government data collection practices may go well beyond the privacy ramifications outlined in the Internet Society's statement: expect a chilling effect on global, resilient network architecture. As governments of other countries realize how much of their citizens' traffic flows through the US, whether or not it is destined for any user or service there, expect to see moves to curtail connections to and through the US. more

Advantage of Commercial Clouds vs. HPC for Scientific Research

The Department of Energy (DoE) recently came out with an excellent report, called the Magellan report, on the advantages and disadvantages of using commercial clouds versus in house High Performance Computers (HPC) for leading edge scientific research. The DoE probably supports the largest concentration of HPC facilities in the world. I agree with the report that for traditional applications such as computational chemistry, astrophysics, etc. will still need large HPC facilities. more

Reputation and “The Cloud”

As Reddit recently learned it's not a great idea to use the Amazon EC2 cloud to host mailservers. There are a number of reasons for this, most of them related to the reputation of mail coming from EC2 servers. When you're using machines in the cloud, changing IP addresses is as simple as initializing a new server. Spammers discovered this almost as soon as the EC2 cloud became public. more

The World of Internet Threats Is Constantly Changing

The world of Internet threats has changed continually over the years. From the time that a "worm" first showed up in the wild, or whenever someone penetrated a system without authorization for the first time, various forms of attacks and malware have presented dangers to the system and those who use it. Different vectors have received varied focus over the years... Many parts of the Internet community have been involved in addressing relevant issues and fostering efforts to combat them. more

Interest Grows for Video-On-Demand Opportunities

With the DVD rental market continuing to dwindle, we are again seeing interest emerge for online video-on-demand, with both the large Hollywood Studies and online content distributors making recent strategic moves in this direction. ... A sign of the times came with the 2010 bankruptcy of Blockbuster, once one of the largest move rental companies. more

Broadband Access: What Should We Regulate?

Network Neutrality is a hot topic in the US. The FCC held hearings in my neighborhood recently (while I was in Asia). Now I see Professor Susan Crawford will be testifying next Tuesday at a House Judiciary Committee hearing on "Net Neutrality and the First Amendment." I look forward to her remarks, but I worry that the whole discussion will be focused on "IP Pipes," that is connectivity at network layer 3. This distracts us from the fundamental problem... more

China Passes 900 Million Cell Phone Users!

Fascinating stats out of an article at TheNextWeb this week: China has become the first country to reach the 900 million mobile phone user milestone after amassing about 11 million mobile phone users in April alone, according to a report by the country's Ministry of Industry and Information Technology. more

EU Ruling on Google Ad Keywords: Implications for Brand Owners

In a landmark judgment issued this past Tuesday, the European Court of Justice (ECJ) ruled that Google is not liable for trademark infringement when an advertiser purchases a keyword based on a competitor's trademark to trigger a search ad, so long as it removes infringing ads promptly when notified by brand owners. However, and this is critical, individual advertisers could be held liable if ads triggered by a keyword involving a competitor's trademark are found to confuse consumers. So, what qualifies as consumer confusion? more

The Growing Security Concerns… Don’t Have Nightmares

Anyone concerned about the security of their computers and the data held on them might sleep a little uneasily tonight. Over the past few weeks we've heard reports of serious vulnerabilities in wireless networking and chip and pin readers, and seen how web browsers could fall victim to 'clickjacking' and trick us into inadvertently visiting fake websites. The longstanding fear that malicious software might start infecting our mobile phones was given a boost... And now a group of researchers have shown that you can read what is typed on a keyboard from twenty metres away... more

Topics

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days