Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Net Neutrality Reflection

So this afternoon my charge is to lay out all the Net Neutrality (NN) issues to a bar association that doesn't have a telecom subcommittee... Cringely says that "In the end the ISPs [network providers] are going to win this [network neutrality] battle, you know. The only thing that will keep them from doing that is competition, something it is difficult to see coming along anytime soon..." more

Businesses Beware: Cybersecurity Awareness Varies Based on Job Function

Businesses should consider bumping phishing as an urgent concern in their cybersecurity agendas. To those still unacquainted, "phishing" refers to the use of fake emails, messages, and websites that fool users into giving up access to accounts and information or into installing malware through attachments. It has become quite rampant over recent years. Attackers are using the method as a primary means to breach defenses, and with good reason: they work. more

Interplanetary Internet

We had a very interesting presentation and discussion regarding the topic of interplanetary internet with my international colleagues, of which Vint Cerf – one of the “fathers of the internet” – is also a member. As a partner of the Interplanetary Networking Special Interest Group (IPNSIG), he took us on a journey that he has been involved with over the last 20 years regarding communication networks in space. A true mind-broadening experience. more

Youth Aren’t Just the Internet’s Future, Youth Shape the Internet’s Future

For the past 27 years, or at least as long as I can remember, I have heard one phrase on an endless loop: "youth are the future." It is a statement that always caused me to feel mild confusion. I thought, "How can I, for instance, be the future if I'm here now?" As I "grew up" and the term "youth" seem to expand in both meaning and breadth of inclusion, I quickly realized that when this statement is used by many it is platitudinous at best and disingenuous rhetoric at worst. What should actually be clarified is that, as no one is immune from the natural progression of the life course (at least not yet anyway), youth will one day constitute the key decision-makers in political, economic and social institutions. more

The Madness of Broadband Speed Tests

The broadband industry has falsely sold its customers on "speed", so unsurprisingly "speed tests" have become an insane and destructive benchmark... marketing departments at ISPs refuse to define what experience that actually intends to deliver (and what is unreasonable to expect), the network engineers are left with a single and simple marketing requirement: "make it better than it was". more

Rewiring Internet Governance: Choice and Control (Part 2)

It is tempting to write off ICANN as a U.S. foreign policy lackey and that's all there is to say about ICANN. However, if the mantra for rewiring governance means "lets get ICANN" we risk missing forest for trees. ICANN is merely the symptom of a dysfunctional governance predicament that somehow (despite best efforts) skews oversight. Shapiro, for example, regards oversight as a "game" (1994). His "delegation dilemma" or "agency problem" stems from two options, neither of which are attractive vis-á-vis governance. more

WSJ on Wireless Network Neutrality

Today's Wall Street Journal had an interesting article (subscription required) on the current state of the wireless walled garden. It cites several recent clashes between handset vendors and cellcos over the extent to which consumers can use their phones to access non cellco content. From the article: "At stake for consumers are what services will be available on their mobile phones and whether they're free or cost a monthly fee. The wireless Web is taking off more slowly in America than overseas, and one reason is that U.S. carriers tightly control what applications are available on mobile devices..." more

Security and Reliability: A Closer Look at Penetration Testing

As noted in my first article of this series (see part one, two and three), security and reliability encompass holistic network assessments, vulnerability assessments and penetration testing. This month I'd like to go deeper into penetration testing; however, first, let's go back for a quick refresh before getting started. more

Opportunity Missed: Hilton Checks-Out of New Domains Boom

American author Mark Twain once wrote: "I was seldom able to see an opportunity until it had ceased to be one." Last month we learned that Hilton Hotels & Resorts joined six other new Top-Level Domain applicants in withdrawing their application and exiting the program. I was disappointed when I first heard the news. My initial thoughts were centred on the enormous potential .hilton offered the company and the innovative business opportunities they were now abandoning. more

America’s Telecoms Market in Dire Straits

In late 2008 it was my good fortune to be asked to write a number of reports on broadband and trans-sector development for the Obama Transition Team. President Obama had just won office and this team was crucial in setting the policies for the future. I gathered together a team of international experts to assist in writing these reports. I was able to do this because the revolutionary plans of the Australian government in relation to the NBN very much appealed to the Obama Team. more

Y2038: It’s a Threat

Last month, for the 20th anniversary of Y2K, I was asked about my experiences. (Short answer: there really was a serious potential problem, but disaster was averted by a lot of hard work by a lot of unsung programmers.) I joked that, per this T-shirt I got from a friend, the real problem would be on January 19, 2038, and 03:14:08 GMT. Why might that date be such a problem? On Unix-derived systems, including Linux and MacOS, time is stored internally as the number of seconds since... more

21 Experts Give Their 2014 Predictions on Internet Performance

Last week, we started an email thread (old school!) amongst a large group of our tech leadership and thought leaders from all aspects of web traffic management and message management. There was a simple question we wanted to know in a few sentences or less: "In 2014, what do you think the big trends will be with Internet performance?" What follows are 21 very unique, and some very similar, answers. Without a doubt, there are challenges ahead for the Internet as we know it, but the rewards for accomplishing goals are massive. more

As a Service?

I'm happy to have the option of buying services. It's easier to eat at a restaurant than to do my own cooking, and I'm happy to pay for a ride rather than fighting traffic on my own. However, I'm not happy if I don't have the option of cooking for myself or of taking a stroll. I used to be willing to pay for all of my phone calls but today I know that, thanks to VoIP, there is no need to. But the phone companies are attempting to wrest back control with their wider 5G agenda. more

Ossification and Fragmentation: The Once and Future ‘net

Mostafa Ammar, out of Georgia Tech recently posted an interesting paper titled The Service-Infrastructure Cycle, Ossification, and the Fragmentation of the Internet. I have argued elsewhere that we are seeing the fragmentation of the global Internet into multiple smaller pieces, primarily based on the centralization of content hosting combined with the rational economic decisions of the large-scale hosting services. The paper in hand takes a slightly different path to reach the same conclusion. more

Yahoo’s 1 Billion Accounts Hacked is a Chilling Warning: Start Doing Things Differently or Die

Today, this is how easily "TRUST" by your users/customers can be shattered, your revenues devastated, your share value plunged into the abyss, and your business destroyed. Furthermore, conventional thinking belongs only in university libraries, not in board rooms. It is time to seriously consider other innovative Out-Of-The-Box Solutions and doing things differently, or start writing your business obituary. more

Topics

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days