Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

RIM’s Secret Weapon

The US analyst community has been holding a wake for RIM in the last few days... It's a pile-on that has driven the stock price down from the upper fifties to the mid forties in the last month. And yeah, RIM's stock price is going to suffer in the short term, not just because of these analyst reports, but because their existing software technology is long-in-the-tooth, to put it politely... I wouldn't count them out, though. RIM's secret weapon is the man I nearly bumped into last week... more

Network Dis-Aggregation and SDN: Different, But Related

Two of the hottest trends in networking today are network dis-aggregation and SDN. This is great for many reasons. It's also confusing. The marketing hype makes it hard to understand either topic. SDN has become so vague that if you ask 10 experts what it means, you are likely to get 12 different answers. Network dis-aggregation seems straightforward enough until it gets confused with SDN. We need to take a step back. In a recent Packet Pushers blog post; I start with a simple explanation of each of these trends and then map how they interact. more

What’s With the 32-Bit Numbers That the Internet Keeps Defying?

By now you might have read the news "How 'Gangnam Style' Broke YouTube?" What happened is that a YouTube video named 'Gangnam Style' by a South Korean singer Park Jae-sang, known by his stage name PSY, has been viewed so many times that it broke YouTube's view counter. YouTube's view counter is built on a 32-bit integer, which provides a view-tracking capability of nearly 2.15 billion views. more

IPv6 Enabled Networks Before and After World IPv6 Day

In our last post on CircleID, Measuring World IPv6 Day - First Impressions, we showed exactly when World IPv6 Day participants switched on IPv6 on their networks (by way of announcing DNS AAAA records). Now, a few weeks after World IPv6 Day, it's interesting to see what the longer-term effects have been. more

Usenet, Authentication, and Engineering (or: Early Design Decisions for Usenet)

A Twitter thread on trolls brought up mention of trolls on Usenet. The reason they were so hard to deal with, even then, has some lessons for today; besides, the history is interesting. (Aside: this is, I think, the first longish thing I've ever written about any of the early design decisions for Usenet. I should note that this is entirely my writing, and memory can play many tricks across nearly 40 years.) more

A Cynic’s View of 2015 Security Predictions - Part 3

A number of security predictions have been doing the rounds over the last few weeks, so I decided to put pen to paper and write a list of my own. However, I have a quite a few predictions so I have listed them over several blog posts. After all, I didn't want to bombard you with too much information in one go! Part three examines the threats associated with data breaches. more

IPv6 a Case of Confirmation Bias

Is the glass half full or half empty? The human reflex of selective deafness to information or arguments countering one’s established believes lives on. The ISOC organized lunchtime IPv6 panel at IETF 74 in San Francisco illustrates the point... more

Who Makes the Any Apps Any Handset Call?

The Wall Street Journal today reported that FCC Chairman Kevin Martin wants to reject a Petition for Declaratory Ruling filed by Skype that would establish a wireless Carterfone policy, i.e., that wireless carriers must allow subscribers to use any compatible handset to access any application, content or software. Chairman Martin has confidence that the marketplace solutions obviate any necessary FCC intervention. Such optimism must derive in part from the apparently newfound willingness of one major wireless carrier, Verizon, to support aspects of open access. Perhaps Chairman Martin has confidence in the marketplace based on the magnanimous offer of most wireless carriers to pro-rate their early termination penalties by $5 a month. But here's the rub... more

LTE: Another Way to Estimate when It Will Be Real

Hardly a week goes by without a press release touting how soon we'll be using a Long Term Evolution (LTE) wireless network. Verizon has promised a major commercial launch in 2010 and a two-city trial before the end of 2009. Let me show you a little chart I put together for my 3G Tutorial and have repeatedly updated... more

Rodney Joffe Wins a Well-Deserved Mary Litynski Award

Every year M3AAWG gives an award for lifetime work in fighting abuse and making the Internet a better place. Yesterday at its Dublin meeting they awarded it to Rodney Joffe, who has been quietly working for over 20 years. I can't imagine anyone who deserves it more. more

On the Success of Malware

There's often a lot of discussion about whether a piece of malware is advanced or not. To a large extent these discussions can be categorized as academic nitpicking because, at the end of the day, the malware's sophistication only needs to be at the level for which it is required to perform -- no more, no less. Perhaps the "advanced" malware label should more precisely be reattributed as "feature rich" instead. more

Phishing 2020: A Concentrated Dose of Badness

How much phishing is there? Where is it occurring, and why? How can it be reduced? I and my colleagues at Interisle Consulting have just published a new study called Phishing Landscape 2020, designed to answer those questions. We assembled a deep set of data from four different, respected threat intelligence providers and enriched it with additional DNS data and investigation. The result is a look at phishing attacks that occurred in May through July 2020. more

Global Patterns in IPv4 Allocation Statistics

In January 2007 we highlighted that the IPv4 allocation rate had increased significantly since early 2004. By 2006 it was clear that continued growth would see IPv4 exhaustion occur sometime between 2010 and 2015. In October 2010 we revisited the subject in the CircleID articled 'Graph Shows Decline of IPv4 Almost Linear'. ... Now, in January 2011, we are very close to the exhaustion of the IANA pool of IPv4 address space. more

What’s Abusive in Registering Domain Names, and the Reverse?

The two major providers of arbitration services for adjudicating cybersquatting complaints under the Uniform Domain Name Dispute Resolution Policy (UDRP), the World Intellectual Property Organization (WIPO) and Forum, issue daily lists of decisions. In approximately 90% of those disputes, the registrations cannot be described as anything less than mischievous in acquiring second level domains incorporating well-known or famous marks. more

Observations in and Around the UN Broadband Commission

The 7th meeting of the UN Broadband Commission in Mexico City was again a good combination of announcements about new plans, results of previously undertaken activities, and views on the future of broadband. Very noticeable was the enthusiasm and acknowledgement of the impact of ICT, and of broadband in particular. In September 2012 the Commission launched its working group on gender equality. Research undertaken by the various members of the workgroup provided somewhat similar results. more

Topics

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days