Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The New ICANN Emerges in Seoul

With the loud crashing of a traditional drum ceremony and an impromptu electric guitar performance by a young Korean whose rendition of Pachabel has been downloaded sixty million times on YouTube, the 36th meeting of ICANN was kicked off this morning (Korean time) by new CEO Rod Beckstrom and his fellow Directors and assembled one thousand or so participants. ICANN has always been about change, but the atmosphere in Seoul this week is charged with a sense of new challenges and new opportunities. more

Who Cares About 50,000 .CAT’s?

This past May 19th, 5 years after its sunrise, puntCAT arrived at the 50,000 domain names landmark. We know that, nowadays, 50,000 domain names may hardly be described as shocking news, and, certainly, this is not our limit, and we believe there's still plenty of room for .cat to grow. Then, who and why should care about this number? more

New Revenue Models for the ‘Software Telco’

I was recently asked how telcos might come up with new business models for a world where all resources are under software control. The core idea is to match network supply and demand in space and time (and at all timescales). I've typed up my notes for the curious to critique...Today's telco is more like a static utility 'pipe', the way that gas, electric or oil are delivered. It sells direct access to raw network mechanisms, and users buy circuits that offer a fixed bandwidth in space and time. more

NTIA & You: NTIA’s Intention to Transfer IANA Functions to the Global Community Is Welcome, But…

It is no secret that both the US government, ICANN, and the global Internet community have argued and worked tirelessly for the past 15 odd years on the vexing issue of globalizing the US government's role in the IANA function. Despite the desire, long-held by many, for the US to relinquish its control of the IANA function, it is clear that getting to full multistakeholder control of the function is not going to be easy. more

Worming Our Way Out of Trouble

The Conficker worm will be active again on April 1st, according to an analysis of its most recent variant, Conficker.C, by the net security firm CA. This malicious piece of software, also known as Downup, Downadup and Kido, spreads among computers running most variants of the Windows operating system and turns them into nodes on a multi-million member ‘botnet’ of zombie computers that can be controlled remotely by the worm’s as yet unidentified authors. more

Designing Secure Networks with Cisco Technology, Part 1

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies.... "Wisdom consists in being able to distinguish among dangers and make a choice of the least harmful." That quote is quite possibly the most accurate depiction possible of the never-ending struggle between network security and corporate budget. Providing a mechanism to defend the enterprise network from every conceivable threat is impossible in terms of both technology and funding. more

Making Multi-Language Mail Work (Part 2)

In the previous instalment we looked at the software changes needed for mail servers to handle internationalized mail, generally abbreviated as EAI. When a message arrives, whether ASCII or EAI, mail servers generally drop it into a mailbox and let the user pick it up. The usual ways for mail programs to pick up mail are POP3 and IMAP4. more

Apple iPhone Apps Store: Refreshing Openness or Walled Garden?

Apple Computer has received high praise for the diversity of applications available for the iPhone. The company shows great willingness to accept third party software innovations. But Apple also solely decides whether to accept and make available any application. Rejected software vendors for the most part do not exist if they do not have shelf space at the Apple store. more

Who Will Crack Cloud Application Access SLAs?

The broadband industry doesn't have an agreed-upon unit of supply and demand that meaningfully "adds up". This is rather odd for a service that aspires to be a utility. It is also a barrier to a much-needed transformation from "bit pipes" to "digital supply chain management". The chart here ought to be in every basic undergraduate textbook on packet networking and distributed computing. That it is absent says much about our technical maturity level as an industry. more

Who Is Responsible for Your Application’s Security?

The dividing line between developers and IT operations used to be distinct. Developers were responsible for adding new features securely, but it was IT operations who had responsibility for infrastructure and network security. For the most part, developers didn't have to think too much about the wider security context. With the advent of the cloud, and of devops, things changed radically. more

Digital Governance Discussion Group (DGDG): One World, One Internet, Many Voices

On February 12–13, 2024, the first round of the final consultations for a Global Digital Compact (GDC) took place online and offline at the UN Headquarters in New York City. Around 50 governments and 50 speakers from non-governmental institutions took the floor. It was not really a dialog; it was a formal presentation of three-minute statements. more

DOJ to Cruz: .Com Price Freeze Can Be Extended to 2024

On August 31st the Department of Justice (DOJ) sent a response to the August 12th letter from Senator Ted Cruz and some Congressional colleagues to the head of the Antitrust Division. In that letter Cruz et al asserted that if the pending extension of the .Com registry Agreement (RA) was granted in combination with the consummation of the IANA transition, that DOJ could be prevented from having "meaningful input into the prices that Verisign charges for registering a domain name within the .com domain for an extended period". more

Assigning 32-bit ASNs

With 16-bit Autonomous System Numbers (ASNs), 65,536 unique numbers are possible. Just like 32-bit IP addresses, these 16-bit ASNs are becoming a scarce resource. Therefore, in 2007 the Internet Engineering Task Force (IETF) developed a new format, 32-bit ASNs (RFC 4893), which increases the supply of ASNs to four billion. more

Omnibus Cybersecurity Bill May Not Go Where Original Authors Intended

In an interview with GovInfoSecurity, Sen. Thomas Carper said that the U.S. Senate is considering attaching cybersecurity legislation to a defense authorizations bill. Though clearly a ploy to be able to say "we did something about those evil hackers" before the elections, CAUCE applauds the attempt. There can be no doubt that the United States (and many other countries) sorely needs better laws to deal with these threats. more

The Cyber Security Ecosystem: Collaborate or Collaborate - It’s Your Choice

As cyber security as a field has grown in scope and influence, it has effectively become an 'ecosystem' of multiple players, all of whom either participate in or influence the way the field develops and/or operates. It's increasingly evident that, more than ever, it is crucial for those players to collaborate and work together to enhance the security posture of communities, nations and the globe. more

Topics

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days