Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

White Spaces Could Be the Broadcasters Best Hope

For years, the National Association of Broadcasters (NAB) fought the White Spaces Coalition and others interested in making US "TV white spaces" available for broadband, Wi-Fi or indeed, any new purpose. When the FCC voted 5-0 to permit license exempt use of TV White Spaces, the industry brought suit in Federal court. And they did this, despite rules in the FCC's decision that are so restrictive that, for now, white spaces devices are doomed to commercial failure. more

Video: IETF Chair Jari Arkko on “Pervasive Monitoring and the Internet”

Today at the RIPE 67 event in Athens, Greece, IETF Chair Jari Arkko gave a presentation on "Pervasive Monitoring and the Internet" where he spoke about the ongoing surveillance issues and: What do we know? What are the implications? What can we do? Similar to his earlier article on the topic, Jari looked at the overall issues and spoke about how Internet technology should better support security and privacy. more

Resources for Cleaning Your Network

The first step (but certainly not the last) towards saving the internet from spam, malware, and other abuse is to keep your own network clean. A friend of CAUCE, who wishes to remain anonymous, offers these tips and resources to help you identify problem traffic emanating from your network, and clean it up. Though primarily written for ISPs, many of the items below should apply equally well to any network owner. more

Is Laser Going to Be the Next Telecoms Frontier?

When I became involved in the telecoms industry back in the late 1970s, we were just seeing fiber optic cables being commercially developed by Corning. Over the following decades, I have been asked many, many times -- do we need fiber cables or wireless technologies, and what is next? During all that time, my answer has been that there was no other communication technology available in any commercial sense that would make either fiber optical or mobile technologies obsolete. more

On the Internet Everyone is Connected to Everyone Else - Right?

We tend to make a number of assumptions about the Internet, and sometimes these assumptions don't always stand up to critical analysis. We were perhaps 'trained' by the claims of the telephone service to believe that these communications networks supported a model of universal connectivity. Any telephone handset could establish a call with any other telephone handset was the underlying model of a ubiquitous telephone service, and we've carried that assumption into our perception of the Internet. On the Internet anyone can communicate with anyone else - right? more

It’s Time for Privacy Progress in ICANN

Privacy issues have been important to parts of the ICANN community for many years. I can attest to that fact as a long time veteran of Whois debates as far back as 1998 when I was with the U.S. Federal Trade Commission. However, they have started to receive the general ICANN community visibility only relatively recently. These efforts must continue in order to protect rights, to avoid increasing potential conflicts between ICANN rules and applicable laws, and to generally maintain trust in the Internet as a place to be. more

Cuba Censors SMS Messages ... for Now

What could the Cuban government do with Russia-style access to Facebook data? What sorts of fake news could they create and circulate on YouTube and Pinterest? What can be done to control the dark side of the Cuban Internet? Cuba is about to hold a referendum on a proposed constitution that the government supports and Eduardo Sanchez posted a test showing that SMS messages with anti-referendum terms. more

Shifting Clouds

There have been some interesting developments in cloud computing over the last year. For over five years our position has been that we acknowledge the enormous economic advantages that cloud computing has to offer, but at the same time recognise that the risk of losing control over data and IT systems is, at this stage, too great for most companies and governments to start utilising the cloud advantages in a serious way. more

The Three-Character Question at the Heart of Single-Character .COMs: W-H-Y?

In the matter relating to O.COM, I've focused on the fact that VeriSign has -- in correspondence to the organization that is counter-party to its .COM and transliterated .COM IDN Registry Agreements, in earnings calls with its investors and financial analysts, and in policy published on its website for every innocent and unsuspecting Tom, Dick, and Harry in the world to be duped by -- stated an unequivocal and unwavering commitment . more

Watch LIVE: ICANN 59 DNSSEC Workshop - June 26 at 7:00am UTC

Want to learn more about DNSSEC deployment challenges? Interested in learning about a DANE middlebox for HTTPS? Curious about how the upcoming DNSSEC Root Key Rollover will affect systems? And have you heard about the CDS and CDNSKEY records for DNS? What are they -- and what impact will they have on ICANN policies? more

Do-Not-Track: Still Not a Great Idea

Back in August, FTC chair Jon Leibowitz suggested an Internet do-not-track registry, analogous to the telephone do-not-call registry. At the time, I thought it wasn't a good idea for both technical and non-technical reasons. This week, the FTC published an online privacy report recommending the same thing, and Rep. Ed Markey promises to offer a bill next year to mandate do-not-track for children. With all this interest, might it be a good idea now? Maybe. more

Post JPA: Tempered Happiness

The Affirmation gladdens me. The Affirmation worries me. The Affirmation makes me wonder what is next. I am of course referring to the Affirmation of Commitments between the United States Department of Commerce (DoC) and ICANN. In the respect that the US is loosening its grip on ICANN a little, this is a good thing. Symbolically, of course it is gigantic... more

The Proliferation of Microtrenching

There is an interesting new trend in fiber construction. Some relatively large cities are getting fiber networks using microtrenching. Just in the last week, I've seen announcements of plans to use microtrenching in cities like Mesa, Arizona, and Sarasota Springs, New York. In the past, the technology was used for new fiber networks in Austin, Texas, San Antonia, Texas, and Charlotte, North Carolina. more

Exploiting the Firewall Beachhead: A History of Backdoors Into Critical Infrastructure

There is no network security technology more ubiquitous than the firewall. With nearly three decades of deployment history and a growing myriad of corporate and industrial compliance policies mandating its use, no matter how irrelevant you may think a firewall is in preventing today's spectrum of cyber threats, any breached corporation found without the technology can expect to be hung, drawn, and quartered by both shareholders and industry experts alike. more

Dealing With DMARC

DMARC is an anti-phishing scheme that was repurposed in April to try to deal with the fallout from security breaches at AOL and Yahoo. A side effect of AOL and Yahoo's actions is that a variety of bad things happen to mail that has 'From:' addresses at aol.com or yahoo.com, but wasn't sent from AOL or Yahoo's own mail systems. If the mail is phish or spam, that's good, but when it's mailing lists or a newspaper's mail-an-article, it's no so good. more

Topics

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days