Last month, application security provider Veracode came out with a study that stated that more than half of all enterprise applications aren't secure. The company tested approximately 2,900 applications over an 18-month period, and 57 percent failed to meet Veracode's "acceptable levels" of security. While this study gained a tremendous amount of traction in the media... it does not focus on the bigger issue... more
In 2019 and 2020, the economic conflict between the US and China reached a peak. There was a months-long tariff battle that is still not fully resolved. After blocking Chinese-centered equipment manufacturer Huawei from its own markets, the US pushed hard to get the Five Eyes and all of its allies to block Huawei from foreign markets, too. Then the US started blocking its own companies... more
For the first time in my career, we face the possibility of some big changes for broadband in low-income neighborhoods in cities. The recent American Rescue Plan Act (ARPA) gave cities significant funding that can be used for various kinds of infrastructure, including broadband. Cities have been handed a once-in-a-lifetime chance to fix some of the broadband deserts that have grown in poor neighborhoods. I'm already working with several cities that are taking this opportunity seriously. more
The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system and IP addressing. The 9th ROW will be held online on Tuesday, June 16th, 2020 at 13h00-16h00 UTC. more
ICANN has spent years trying to figure out what to do with domain name variants, strings that look different but mean the same thing, for some definition of "the same." They've been trying to deal with them in second level domains for a decade, and are now working on rules to allow variant top-level domains. Unfortunately, variants don't work. The problem isn't putting them in the DNS; it's that once they're in the DNS, they don't work anywhere else. more
Analysis from Point Topic's recent reports on global broadband tariffs has revealed a significant gap in residential and business tariffs worldwide. Clearly businesses are paying more for their services than residential consumers but the relative differences in the ratios is more marked than might be expected. The first thought is that they are paying for more bandwidth and that is true to an extent. more
Are you interested in helping guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG, .NGO and .ONG domains? (and more) Or do you know of someone who would be a good candidate? If so, the Internet Society is seeking nominations for two positions on the PIR Board of Directors. The nomination deadline is 31 January 2024. more
Over at the ECI blog, Jonathan Homa has a nice article about the importance of network planning: In the classic movie, The Graduate (1967), the protagonist is advised on career choices, "In one word – plastics." If you were asked by a young person today, graduating with an engineering or similar degree about a career choice in telecommunications, would you think of responding, "network planning"? Well, probably not... more
There is always some degree of confusion in discussions about the "new TLDs". Some points of view try to be optimistic, others on the contrary only highlight the bad news, and most refer indistinctly to the "new TLDs" as if they did not break down into different segments, each of which obeys dynamics and constraints of its own. The purpose of this post is to provide some food for thought and to shed some light on those dynamics and constraints... more
Before the Holidays, Yahoo got a flurry of good press for the announcement that it would (as the LA Times puts it) "purge user data after 90 days." My eagle-eyed friend Julian Sanchez noticed that the "purge" was less complete than privacy advocates might have hoped. more
Like many foreigners, I follow U.S. politics closely. What happens in Washington, D.C. on trade, economics, foreign policy, and security matters can often have ripple effects across the world. This is also true with respect to internet policy, and like many who work in the internet industry, I am getting increasingly concerned by some of the news coming out of Washington. more
San Francisco recently passed an interesting ordinance that requires that landlords of apartments and multi-tenant business buildings allow access to multiple ISPs to bring broadband. This ordinance raises all sorts of regulatory and legal questions. At the most recent FCC monthly meeting, the FCC jumped into the fray and voted on language that is intended to kill or weaken the ordinance. more
Across the Internet, yesterday, Google users twittered, blogged and emailed that Google search and mail were not usable. And, yesterday afternoon, on Google’s official blog, Urs Hoelzle reported that Google “direct[ed] some […] web traffic through Asia”... Even though Google is very well-connected to a diverse set of other networks, two of these relationships predominate. It is through these relationships that much of the Internet reaches Google... more
As one of the earliest protocols in the internet, the DNS emerged in an era in which today's global network was still an experiment. Security was not a primary consideration then, and the design of the DNS, like other parts of the internet of the day, did not have cryptography built in. Today, cryptography is part of almost every protocol, including the DNS. And from a cryptographer's perspective, as I described in my talk at last year's International Cryptographic Module Conference (ICMC20), there's so much more to the story than just encryption. more
An IPv4 address identifies your connection to the online world. IP addresses make it possible to host websites, manage secure communication, and engage in countless other essential, internet-related activities. Typically, when migrating to a new cloud provider, a business has only one path: lease the provider's IP addresses. But what if a business already has a block of IP addresses? more
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byIPv4.Global