Over three years ago ICANN boldly announced that the top level of the domain name system would be opened up to new registry operators. As we now approach a likely spring 2011 launch, a number of key issues remain unresolved including how trademarks will be protected. more
DomainKeys Identified Mail (DKIM) is the leading email authentication technology, supported by major ISPs including Google, AOL, and Yahoo! (who invented its predecessor), popular mail server software like Sendmail, and many of the best minds in email technology. But if you peruse the archives of the IETF DKIM mailing list, or start up a conversation at MAAWG, it might appear that there's still a lot of disagreement about what a DKIM signature actually means. more
Distributed Denial of Services (DDoS) attacks have been the frustration of information technology professionals for many years. When asked, most tell you they wish their internet service providers (ISPs) would simply provide them "clean pipes" all the time and take care of DDoS attacks upstream before they ever get to them. Unfortunately, the resources (equipment and personnel) necessary to clean Internet connections all the time are very expensive and come with several downsides. more
History is littered with manifestos, the public statements of principles and intentions that announce policies, revolutions or ambitious visions in politics and the arts... And now we have a new manifesto for the modern age of distributed computing. The ‘open computing manifesto’ was launched this week with the support of some very large computer companies including Cisco, AT&T, Sun Microsystems and Telefonica as well as over fifty other players in this growing market, all under the leadership of IBM. more
Research from Infonetics shows that last year was a strong year for data centre network equipment sales, due to a rebound from bare-bones 2009 spending levels and, more importantly, fundamental trends favouring investments in the data centre, such as the explosion of content and traffic, use of virtualization, and increasingly, cloud-based services and architectures. more
Recently the relevancy of Spamhaus and whether it is still necessary has been raised in various discussions and in particular among marketers. I think this is an interesting question for a lot of reasons. One is because there's such a broad range of opinions about Spamhaus and almost none of them are ambivalent. Another is because so many people don't really know what Spamhaus does, other than publish the SBL and ROKSO. more
The explosion in mobile communications in the developing world has created social and economic changes that have exceeded all expectations and predictions -- even those made as recently as five years ago. There are still countries lagging behind, but now is the time to move on to the next stage -- and that means broadband. Already the developed world is showing an enormous appetite for mobile broadband, so the demand is most certainly there. The rapid development of low cost Smartphone, projected to approach $50 soon... more
A strange feeling came over me after I got home from ICANN 47 in Durban, something I haven't felt after an ICANN meeting before. The feeling? Optimism. I'm optimistic, albeit cautiously so, about the future of ICANN and by extension, hopefully that of Internet governance in general. If the meeting in Durban is any indication, we've come a long way in the past year. There were no indicted war criminals invited to dinner. And though it may be too soon to say for sure, I don't think a letter will be sent to the government of South Africa about the quality of the hotel. more
What's a domain name? What business function do they serve? Can a domain name generate ROI? I imagine these were the questions the Board of Racing Victoria asked before signing off on the purchase of racing.com to support a Victorian racing industry joint initiative to establish a digital media and content platform similar to that of the AFL. more
This is the African Union Commission's formal objection, through the ICANN GAC Early Warning Process, to the DotConnectAfrica Trust's amended application 1-1165-42560 for the .africa TLD. Here, it objects to the DCA .africa bid as not having the requisite government support for a Geographic name, and further characterizes DCA's bid as an "Unwarranted Interference and Intrusion" more
It is interesting to follow what is happening with triple and quadruple play broadband prices in competitive markets. Through triple and quadruple play, customers are increasingly getting more services for the same money. As most fixed telecoms markets are still largely monopolistic in nature, basic access charges remain high; but good prices are even available in markets with healthy wholesale competition, if one shops around. more
DOTZON presents the sixth edition of the Digital Company Brands study. After having introduced the study in 2018, DOTZON continued to expand and enhance the underlying data to display how companies successfully use their Digital Company Brands. The Digital Company Brand is the digital dimension of a company brand and mirrors the "digitalness "of a company. more
Canadian Industry Minister Tony Clement has announced that the Harper government will overturn the CRTC's decision that effectively ends "unlimited use" Internet plans if the regulator doesn't rescind the decision itself. more
I think the concept that I have to explain the most as a consultant is oversubscription, which is how ISPs share bandwidth between customers in a network. Most broadband technologies distribute bandwidth to customers in nodes. ISPs using passive optical networks, cable DOCSIS systems, fixed wireless technology, and DSL all distribute bandwidth to a neighborhood device of some sort that then distributes the bandwidth to all of the customers in that neighborhood node. more
In a blog post, Stewart Baker proposed restricting access to sophisticated anti-virus software as a way to limit the development of sophisticated malware. It won't work, for many different and independent reasons. To understand why, though, it's necessary to understand how AV programs work. The most important technology used today is the "signature" - a set of patterns of bytes - of each virus. Every commercial AV program on the market operates on a subscription model... more
Sponsored byCSC
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byVerisign