Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

UK: Barely One in Ten Users Are Satisfied With Mobile Broadband

A web-based poll on the Mobile Broadband Genie site had participants 1160 who were asked: "Is your mobile broadband fast enough?" 133 yes; 740 no; 287 don't know. Perceptions of the term "mobile broadband" appear to far exceed what is being delivered. While operators have been competing to offer cross-subsidized laptop and netbook deals with higher usage caps and ever cheaper mobile Internet deals, they seem to have overlooked the quality of the service. more

Swiss Sanctuary for “International Organization Refugees”

Over the past year as the impending doom of a potential Trump installation in the U.S. WhiteHouse pervaded the international organization community, my former chief-of-staff at the ITU found consolation in Swiss history. Now retired with his wife formerly with the World Health Organization in the mountains near the tranquil Canton Vaud municipality of Château-d'Oex, he pointed his old friends to its heritage site. more

Mix It Up: Key Ingredients of Successful Cloud Management Systems

The cloud cuts both ways; while the ability to spin up compute power on demand has empowered even small businesses to compete on a global scale, this same flexibility has led to a significant amount of "cloud sprawl." According to Tech Radar, 61 percent of companies surveyed said cloud sprawl - both from employees using unauthorized services and not fully utilizing approved resources - is responsible for business-wide inefficiencies. Bottom line? more

Don’t Blame Open Recursives For DDoS Attacks and Why You Should Implement BCP38

There has been plenty of buzz and chatter on the Internet recently concerning a very large DDoS attack against CloudFlare, with coverage on their blog, the New York Times, and the BBC, among many others. While attacks of this nature are certainly nothing new, the scale of this attack was surprising, reported to hit 120Gbps. For a sense of scale, your average cable modem is only about 20Mbps, or about 0.016% of that bandwidth. more

Why Integrating IPAM Matters and How to Achieve It

IPAM solutions are the source of truth for IP resources on the network, but when performing IPAM functions such as assignments, reconciliations, DNS updates, network plans, or Regional Internet Registry (RIR) requests, IPAM is often limited by its integration with an OSS. Operational teams can find it challenging to complete routine tasks without an integrated IPAM solution due to siloed data pools and swivel-chair environments. more

FAKE45: Trump Administration Illegitimacy Under International Law

The FAKE45 sign in the photo lower right corner appearing on the front page of today's Washington Post -- ironically in front of the Department of Justice headquarters -- captures a result of yesterday's events that may have far-reaching consequences. About 4.5 million people -- including a million in Washington DC alone -- spontaneously came together from every corner of the nation and world to question the legitimacy of a Trump Administration, express disdain for its actions, and assert the repugnancy of its positions. I was there. more

I’m Shocked, Shocked to Find There’s Cryptanalysis Going On Here (Your plaintext, sir.)

There's been a lot of media attention in the last few days to a wonderful research paper on the weakness of 1024-bit Diffie-Hellman and on how the NSA can (and possibly does) exploit this. People seem shocked about the problem and appalled that the NSA would actually exploit it. Neither reaction is right. In the first place, the limitations of 1024-bit Diffie-Hellman have been known for a long time. RFC 3766, published in 2004, noted that a 1228-bit modulus had less than 80 bits of strength. That's clearly too little. more

The Christmas Goat and IPv6 (Year 11)

This is the fourth year now with almost no snow during the Christmas Goat event here in Sweden, and so once again, you get a photo without any snow. Because of Covid-19 and 99.99% people working for home, I have not even seen the Goat live this year... What a crazy year it has been! more

5G for Fixed Connectivity in Cuba

ETECSA reports that over 110,100 Cuban households have DSL connectivity using their Nauta Hogar service. There are also shared facilites – 986 WiFi hotspots (127 in Havana) and 347 Navigation Rooms (44 in Havana) with 1,309 computers (304 in Havana). These services are dead-ends on the road to hoped-for "computerization." The Cuban population is around 11 million so, after three years, roughly one person in 100 lives in a Nauta home and the services are limited geographically... more

High-Performing Cloud Networks Are Critical to M2M Success

Machine to machine (M2M) communications may not be new, but with the rapid deployment of embedded wireless technology in vehicles, appliances and electronics, it is becoming a force for service providers to reckon with as droves of businesses and consumers seek to reap its benefits. By 2020, the GSM Association (GSMA) predicts that there will be 24 billion connected devices worldwide, while Forrester predicts that mobile machine interactions will exceed the number of mobile human interactions more than 30 times. more

Bring a Responsible Closure to the New gTLD Process - The Home Stretch

Over the course of the last year, the ICANN Board and Governmental Advisory Committee (GAC) have constructively worked through a long list of their differences contained in the GAC scorecard. As we near the finish line with Monday's scheduled ICANN Board meeting to approve the Applicant Guidebook, there remains a small handful of issues that will hopefully be resolved in a similar responsible manner during Sunday's ICANN Board/GAC consultation. more

Thoughts on the Best Western Compromise

The Sunday Herald reported on Sunday that Best Western was struck by a trojan attack that lead to the possible compromise of about 8 million victims. There is some debate as to the extent of the breach and not a small amount of rumor going around. I'm not entirely disposed to trust corporate press releases for the facts, nor am I going to blindly accept claims of security researchers whose first call is to the PR team when discovering a problem. That said, here is what seems to be the agreed upon facts... more

Achieving Multi-Stakeholder Progress on DNS Abuse

DNS Abuse and how to address it has been the topic of intense, often conflictual, and rarely conclusive discussions for many years, starting with the very definition of the term and the degree of responsibility bestowed upon DNS operators. In 2018, after several months of intersessional work, the Internet & Jurisdiction Global Conference brought together in Ottawa more than 200 key stakeholders to define a roadmap to address certain jurisdictional challenges on the Internet, including DNS abuse. more

Net Neutrality - The Phoney War?

The current battles being fought over net-neutrality were over before they began. Whether you regard it as a good thing or a bad thing the world already has a multi-tiered internet and it's likely to become even more stratified in the coming years. Most markets, or perhaps countries is a better grouping, depend on commercial organisations to deploy broadband access and to serve the consumers that sign-up. The internet service providers that governments and customers depend on to reach more and more consumers and in increasingly difficult locations (read 'less likely to generate revenue') are there to make money. more

The “Kiwi” Way of Interneting

By now, we are all exposed to the narrative of how the Internet is no longer a safe place. It is full of bots, misinformation, abuse and violence; it is a space that has been overtaken by terrorists and extremists. The Internet is weaponized to influence elections, undermine democracies, and instill fear in its users. That's the story we are told. No one can deny the swift change that is taking place in global politics. The "brave new world" that has emerged is, currently, based on isolation and fear. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days