Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Madness of Broadband Speed Tests

The broadband industry has falsely sold its customers on "speed", so unsurprisingly "speed tests" have become an insane and destructive benchmark... marketing departments at ISPs refuse to define what experience that actually intends to deliver (and what is unreasonable to expect), the network engineers are left with a single and simple marketing requirement: "make it better than it was". more

America’s Telecoms Market in Dire Straits

In late 2008 it was my good fortune to be asked to write a number of reports on broadband and trans-sector development for the Obama Transition Team. President Obama had just won office and this team was crucial in setting the policies for the future. I gathered together a team of international experts to assist in writing these reports. I was able to do this because the revolutionary plans of the Australian government in relation to the NBN very much appealed to the Obama Team. more

Interplanetary Internet

We had a very interesting presentation and discussion regarding the topic of interplanetary internet with my international colleagues, of which Vint Cerf – one of the “fathers of the internet” – is also a member. As a partner of the Interplanetary Networking Special Interest Group (IPNSIG), he took us on a journey that he has been involved with over the last 20 years regarding communication networks in space. A true mind-broadening experience. more

Youth Aren’t Just the Internet’s Future, Youth Shape the Internet’s Future

For the past 27 years, or at least as long as I can remember, I have heard one phrase on an endless loop: "youth are the future." It is a statement that always caused me to feel mild confusion. I thought, "How can I, for instance, be the future if I'm here now?" As I "grew up" and the term "youth" seem to expand in both meaning and breadth of inclusion, I quickly realized that when this statement is used by many it is platitudinous at best and disingenuous rhetoric at worst. What should actually be clarified is that, as no one is immune from the natural progression of the life course (at least not yet anyway), youth will one day constitute the key decision-makers in political, economic and social institutions. more

A Sophisticated Online Counterfeit Ring

Online fakes can be a lucrative business and difficult to crack down on, due to the ease and low-cost of setting up multiple virtual storefronts and the ability to obfuscate an operation's identity. A federal lawsuit filed on March 1, 2010 by Polo Ralph Lauren and VF Corp. illustrates these points and highlights many of the intricacies of an online counterfeit ring. more

Net Neutrality Undermining Spreads to Developing Countries

After the USA set the bad example of allowing telcos to start charging different rates for content delivery services, other incumbent telcos elsewhere are only too happy to jump on the bandwagon and use the American example as a reason and an excuse to end net neutrality (NN) in their countries also. As did their American counterparts they too see this as another way to grab some extra monopolistic income. more

Remembering the Good Times

The most effective early email-borne viruses didn't need botnets. They didn't change your computer settings, or steal your login credentials. And they somehow convinced regular users to help them spread. The first warnings about the Good Times virus began to appear in November of 1994, and by December the warnings were seen all over as people did what the warning said, and forwarded it to all their friends. There was another outbreak the following March... more

Yahoo’s 1 Billion Accounts Hacked is a Chilling Warning: Start Doing Things Differently or Die

Today, this is how easily "TRUST" by your users/customers can be shattered, your revenues devastated, your share value plunged into the abyss, and your business destroyed. Furthermore, conventional thinking belongs only in university libraries, not in board rooms. It is time to seriously consider other innovative Out-Of-The-Box Solutions and doing things differently, or start writing your business obituary. more

Security and Reliability: A Closer Look at Penetration Testing

As noted in my first article of this series (see part one, two and three), security and reliability encompass holistic network assessments, vulnerability assessments and penetration testing. This month I'd like to go deeper into penetration testing; however, first, let's go back for a quick refresh before getting started. more

Aged Security Flaw Renews Open/Closed-Source Debate

The recent announcement of a 13-year old security flaw found in an Open Source security library has renewed the debate between open source and closed source software. The library, crypt_blowfish, allows for fast two-way password encryption. The flaw introduces the potential for passwords to be easily compromised and affects PHP and a number of Linux distributions that include the crypt_blowfish library. more

Opportunity Missed: Hilton Checks-Out of New Domains Boom

American author Mark Twain once wrote: "I was seldom able to see an opportunity until it had ceased to be one." Last month we learned that Hilton Hotels & Resorts joined six other new Top-Level Domain applicants in withdrawing their application and exiting the program. I was disappointed when I first heard the news. My initial thoughts were centred on the enormous potential .hilton offered the company and the innovative business opportunities they were now abandoning. more

A Visualized gTLd Sequencing Proposal

As a follow-up to our previous CircleID article "Strong Support for IDNs, GEOs and/or Communities to Go First" we have developed a flow chart which visualizes how the applications may be processed in a fair and transparent manner. The chart also shows that at the end of the day only about 1,200 new gTLDs may go online, that means that we will likely see about 730 drop outs. more

Commerce Department: Headed Toward ICANN 3.0?

The NTIA has published a Notice of Inquiry, Assessment of the Transition of the Technical Coordination and Management of the Internet's Domain Name and Addressing System, in advance of the expiration of the Joint Project Agreement in September 2009. The document outlines the history and evolution of the Memorandum of Understanding (MOU) between the Department of Commerce (DoC) and ICANN, and the questions posed cover fairly standard territory. However, the following might be worth paying attention to... more

Ossification and Fragmentation: The Once and Future ‘net

Mostafa Ammar, out of Georgia Tech recently posted an interesting paper titled The Service-Infrastructure Cycle, Ossification, and the Fragmentation of the Internet. I have argued elsewhere that we are seeing the fragmentation of the global Internet into multiple smaller pieces, primarily based on the centralization of content hosting combined with the rational economic decisions of the large-scale hosting services. The paper in hand takes a slightly different path to reach the same conclusion. more

21 Experts Give Their 2014 Predictions on Internet Performance

Last week, we started an email thread (old school!) amongst a large group of our tech leadership and thought leaders from all aspects of web traffic management and message management. There was a simple question we wanted to know in a few sentences or less: "In 2014, what do you think the big trends will be with Internet performance?" What follows are 21 very unique, and some very similar, answers. Without a doubt, there are challenges ahead for the Internet as we know it, but the rewards for accomplishing goals are massive. more

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days