Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Carpet Bombing in Cyber Space - Say Again?

I was pointed to an article in the Armed Forces Journal where Col Charles W. Williamson III argues that the US Air Force needs to develop a BOTnet army as part of the US military capability for retaliatory strikes. The article brings up some interesting issues, the one that I believe carries the most weight is the argument that we (well, people living on the Internet) are seeing an arms race. It is true that more and more nations are looking into or developing various forms of offensive weapons systems for the use on the Internet... more

A Look Ahead to Fedora 19

Fedora 19 is the community-supported Linux distribution that is often used as a testing ground for features that eventually find their way into the Red Hat Enterprise Linux commercial distribution and its widely used noncommercial twin, CentOS. Both distributions are enormously popular on servers and so it's often instructive for sysadmins to keep an eye on what's happening with Fedora. more

We Are All Sony

"Nobody knows anything," screenwriter William Goldman (think "Butch Cassidy and the Sundance Kid" and "The Princess Bride") said famously of Hollywood. The same may be said of enterprise security. Word now comes that the Sony hack for which the FBI has fingered North Korea may, in fact, be the work of some laid-off and disgruntled Sony staff. But that's not clear, either. more

Looking Back on 2012: What’s in our Rearview Mirror?

Well, 2012 is almost over, and we can now reflect on the major events that hit our industry this year. If I had to choose the top three trends from the past 12 months, they would have to be: 1. Over-the-top (OTT) services; 2. IPv6 deployments (finally!); 3. TR-069 adoption. Let's examine each of these in more detail. more

How Will Rural Chileans Use SpaceX Starlink?

The Chilean Undersecretary of Telecommunications (SUBTEL) has begun a year-long pilot study of SpaceX's Starlink satellite Internet service. I don't know how many test locations they are planning, but the first two have been selected. Last week I discussed the first, the John F. Kennedy school in Sotomó, an isolated town at 41.6° South on a fjord in Chile's Lake Region, and the second will be in Caleta Sierra on the coast about 1,200 miles north of Sotomó. SpaceX is also considering a European pilot study in Georgia and perhaps (hopefully) others. more

ICANN - A Catalyst for Development

In 1998 the idea of "Newco," ICANN's informal predecessor name, was dreamlike. It was so new, so unprecedented, that it was constantly being referred to as an "experiment." It was not every day that one came across an organization conceived by one nation (e.g., the U.S.), that was available for globally shared ownership. One that was defined, in large part, by international participation. more

CIDR in Networking: Improved IP Routing Efficiency

CIDR (Classless Inter-Domain Routing) is a routing system in which network engineers can distribute IP addresses based on the size of their specific network. This is more efficient than the previous system, which assigned IP addresses depending on whether the size of a network fits into one of only three sizes: Class A, Class B, and Class C. more

Quo Vadis ICANN?

The short history of Internet Governance is full of errors, failures, and - mainly - omissions. Despite the shortcomings, we also must acknowledge the achievements of past and present internet governance efforts. In particular, ICANN and its stakeholder constituencies have delivered on the mandate of a stable, secure and resilient Internet. Working with the IANA, IAB and IETF, the operational functions of IP addresses, and the Protocol Assignment and DNS must be seen as an unqualified success. more

The ANA and Hand-Wringing

The Association of National Advertisers is at it again, this time spelling the death of new gTLDs barely after they emerge from the gate. In 1982, at the dawn of the video age, Motion Picture Association of America President Jack Valenti infamously told Congress, with more than one unfortunate reference to various types of violent crime, that the advent of the VCR would spell immediate and irrevocable doom to the motion picture industry, and that the device should certainly be thrown to the scrap heap even before its arrival. more

Application Delivery Controllers as Safety Net for Ad Servers

Ad serving platforms drive a lot of web site revenue. These software platforms grant a site manager control over local or remote ads appearing on his web site. Over the years these platforms grew in functionality and today they offer diverse functions... Performance issues on such a platform can take down the ads on dozens of different sites, causing massive loss of revenues to the site and the platform owners. more

Telecoms Infrastructure As a Service

More than a decade ago we predicted that the telecoms industry would be transformed, driven by its own innovations and technological developments. As a result we indicated that in many situations the telecommunications infrastructure would be offered as a service by hardware providers. We also predicted that this would open the way for a better sharing of the infrastructure. more

A Cautionary Tale of Reputation Damage: Striking the Right Balance With Brand Protection

In early March 2020, a well-known European fashion brand found themselves on the receiving end of a protest campaign on social media. The background to the case was the fact that, in 2019, the brand had launched a cease and desist (C&D) action against a small, U.K.-based company in response to their use of similar product names and sale of associated clothing merchandise. more

ICANN Voting to Pull the Weeds is Good - Pulling Them is Even Better

At the ICANN Public Forum in Singapore yesterday, I likened the ICANN to a community garden: fertile, colorful and above all, worthwhile, but not without a few troublesome weeds. Today's Board vote to adopt the recommendations of the Accountability and Transparency Review Team (ATRT) is a vote to pull those weeds. As good as voting for this weed-pulling exercise is, completing it will be even better. more

The xz liblzma Vulnerability

On 29 March 2024, an announcement was posted notifying the world that the Open-Source Software (OSS) package "xz-utils," which includes the xz data compression program and a library of software routines called "liblzma" and which is present in most Linux distributions, had been compromised. The insertion of the compromised code was done by "Jia Tan", the official maintainer of the xz-utils package. more

Your Future is Scripted! China, AI and the Race for Digital Authoritarianism

The race for digital authoritarianism between China and the US is now exceedingly stark. It is a race with enormous implications for the management of humankind, (yes I said it) and the respected doctrines of our human rights and freedoms. Everything we care about today as freedom-loving citizens will be transformed by AI, from access to healthcare to economic status and, more importantly, your ability to serve. more

Topics

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days