Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Reconsideration Request Denied

Having been passed over by the "old guard" Board Governance Committee of ICANN Board of Directors, I took the occasion to speak from my heart to provide the "new guard" with the observations of a 16-year ICANN volunteer. For those of you in the community who are wondering what happened, what follows is word for word what I shared with the Board of ICANN at my closed door proceedings. more

Live Webcast Thursday March 28 of ION Singapore IPv6 and DNSSEC Sessions

For those of you interested in IPv6 and/or DNSSEC, we'll have a live webcast out of the Internet Society's ION Singapore conference happening tomorrow, March 28, 2013, starting at 2:00pm Singapore time. more

In Praise of ICANN

ICANN comes in for a lot of criticism. That's because people care very deeply about it. The multi-stakeholder model, of which ICANN is the exemplar, is such a radical and revolutionary departure from how global affairs have been managed in the past that many of us are constantly on guard lest ICANN degrade into the command-and-control structure that characterizes other global regulatory bodies. At ICANN, it's the volunteers, those who care (as well as, yes, those who are paid to pretend to care) who set policy more

The Good, the Bad and the Ugly in the Google-Verizon Legislative Framework

Google and Verizon have developed a "Proposal" on Internet access which I am sure they expect to serve as a template, starting point and frame of reference going forward. In light of the FCC's judicial reversal in the Comcast case, the absence of substantive progress at the FCC and the unlikelihood of congressional action, two major stakeholder can and have taken the lead. It should come as no surprise that Verizon and Google have emphasized and begrudgingly compromised on their corporate interests. more

The Privacy Party and Leaving Dishes in the Sink

Boy, that was a great party the White House threw yesterday when their new online privacy rights were unwrapped and passed around. Most everyone hefted their shiny new rights, agreed they were nice, and talked about the need for swift adoption. But when the party was done, everyone filed out, turning a blind eye to the post-party cleanup and a sink full of dirty dishes. more

Why Most Discussions for Fibre Optic Infrastructure Take Place from the Wrong Perspective

Fibre-based infrastructure requires vision and recognition of the fact that many of today's social, economic and sustainability problems can only be solved with the assistance of information and communications technology (ICT). In many situations the capacity, robustness, security and quality necessary for this calls for fibre optic infrastructures. This need will increase dramatically over the next 5 to 10 years as industries and whole sectors (healthcare, energy, media, retail) carry out the process of transforming themselves in order to much better address the challenges ahead. more

Notes from NANOG 89: Trust and Network Infrastructure

Trust is such a difficult concept in any context, and certainly, computer networks are no exception. How can you be assured that your network infrastructure is running on authentic platforms, both hardware and software and its operation has not been compromised in any way? more

Anti-Consumer ICANN Can Not be Trusted To Protect Domain Registrants’ Property Interests

Domain name registrants who purchase a name in any of the present or pending generic (gTLD) top level domains should think twice before entrusting a domain name property interest to ICANN, even though ICANN levies a money tariff on each domain registration. ICANN has no policy language that indemnifies domain name registrants. ICANN language does not even contemplate the possibility of domain theft by an ICANN registrar. more

Hiding in Plain Sight: Post-Breach

The majority of network breaches begin and end with the installation of malware upon a vulnerable device. For the rest, once that initial malware beachhead has been achieved, the story is only just beginning. The breach disclosures that make the news are often confusing as they're frequently compiled from third-hand reports, opinions and technical assumptions. More often than not, they include a discussion about the malware - how advanced it was, etc. - and whether any 0-day vulnerabilities were likely used by the mysterious attacker. more

A Q&A on Google’s New gTLD Solution, Nomulus

Nomulus is the code for the backend domain name registry solution offered by Google which requires the use of Google Cloud. This solution is the one used for all of Google's new gTLDs and the solution works. An announcement for this solution can look like a potentially "simple" solution for future .BRAND new gTLD applicants, but is it truly the case? more

Industry Structure at the Core of WCIT Problems

At the WCIT in Dubai it is interesting to follow the debates surrounding the many issues being addressed at this world congress. There are the issues of internet governance in the broadest sense of the word - these have received widespread attention. But if we look at the core issues that an organisation such as the ITU can address then the scope widens - to topics such as the rules for the International Telecommunications Regulations (ITRs), and particularly those in relation to the rules for rates and charges. more

Report on the Eve of WCIT

Hello, from Dubai where the WCIT (World Conference on International Telecommunications) - under the auspices of the United Nations agency, the International Telecommunications Union (ITU) - is set to get underway... There is a great deal of jockeying for position taking place, and it is interesting to walk through the corridors and listen to what is going on. more

Has Real “Change” Come to ICANN? (How to Repair Trust Part I.5)

Just under 4 years ago and fresh from his world celebrated election win of the White House and the US Presidency on a platform of "Change Has Come To America", newly elected US President Barak Obama packed his bags and headed to Cairo on a strategic vision and mission that included delivering a speech from Cairo University aimed at winning the trust of Arabs and Muslims worldwide... This morning in Toronto, Canada new ICANN President and CEO Fadi ChehadĂ© will also attempt a similar feat that is no less important to the world than that of Obama's 4 years ago. more

Y2038: It’s a Threat

Last month, for the 20th anniversary of Y2K, I was asked about my experiences. (Short answer: there really was a serious potential problem, but disaster was averted by a lot of hard work by a lot of unsung programmers.) I joked that, per this T-shirt I got from a friend, the real problem would be on January 19, 2038, and 03:14:08 GMT. Why might that date be such a problem? On Unix-derived systems, including Linux and MacOS, time is stored internally as the number of seconds since... more

Call the Routing Police!

There was a somewhat unfortunate outage for a major communications service provider in Australia, Optus, in mid-November. It appears that one of their peer Border Gateway Protocol (BGP) networks mistakenly advertised a very large route collection to the Optus BGP network, which caused the routers to malfunction in some manner. more

Topics

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days