/ Featured Blogs

Keep Your Pants On: Governments Want Suspenders for Secure Routing

The difficulty of applying a hierarchically organized PKI to the decentralized world of Internet routing is being fully exposed in a new Internet-draft. The document represents a rational response to an RPKI that closely ties address resources to a handful of Internet governance institutions, nicely illustrates how governments and national security policy are influencing Internet security, and portends substantial costs for network operators and beyond if adopted widely more

The Maturing Domain Industry

Day one of the Digital Marketing and gTLD Strategy congress is happening in London today. As we inch ever closer to new gTLDs actually launching on the Internet, business models and marketing approaches are becoming clearer and better defined. This was evident in today's presentations and workshops, with applicants and current TLD operators alike showing much greater depth of thought into how these namespaces might actually be of use to Internet users. more

Renesys Chronicles Today’s Internet Blackout in the Sudan (Now Restored)

The team over at Renesys has once again provided a great analysis of an Internet outage in a country, this time in Sudan. In the article simply titled "Internet Blackout in Sudan", Doug Madory writes: A few hours ago, we observed a total Internet blackout in Sudan and, as we publish this blog, the Internet remains largely unavailable. By count of impacted networks, it is the largest national blackout since Egypt disconnected itself in January 2011..." more

ICANN Opens GNSO Whois Study on Privacy/Proxy Abuse for Comment

ICANN has opened the Generic Names Supporting Organization (GNSO) Whois study on privacy/proxy abuse for public comment. Performed by the National Physical Laboratory (NPL), this study is one of many commissioned by the GNSO to examine the current, disparate, and often maligned registration directory service, and aims to measure the hypothesis that "a significant percentage of the domain names used to conduct illegal or harmful Internet activities are registered via privacy and proxy services to obscure the perpetrator's identity." more

Valuing IP Addresses

The prospect of exhaustion of the IPv4 address space is not a surprise. We've been anticipating this situation since at least 1990. But it's a "lumpy" form of exhaustion. It's not the case that the scarcity pressures for IP addresses are evidently to the same level in every part of the Internet. It's not the case that every single address is being used by an active device. A couple of decades ago we thought that an address utilisation ratio of 10% (where, for example, a block of 256 addresses would be used in a network with some 25 addressed devices) was a great achievement.  more

2% of All Traffic to Google Now Over IPv6! (Doubling in Past Year)

This weekend brought the great news that Google's IPv6 statistics have shown that connections over IPv6 to Google's web sites hit the 2% threshold for the first time. (You can see for yourself.) While 2% sounds tiny, as I wrote in a Deploy360 post today, the important fact here is that this represents a doubling of IPv6 traffic to Google over the past year! more

ICANN and Your Internet Abuse

In spite of the material we were presented with in Durban something has gone very wrong inside of ICANN Compliance. KnujOn has published a report which demonstrates that ICANN Compliance appears to completely collapse between September 2012 and December 2012. Following December 2012, ICANN seems to stop responding to or processing any complaints. It is around this time certain compliance employees start disappearing. This was not limited to the Sydney office as some would have us believe... more

Mobiles Moving Into Fixed Networks

There are often confused reports in the media about mobile and fixed broadband, with arguments that one could replace the other. Yet the reality is that they coexist and complement each other - perhaps even more so since one cannot manage without the other. Increasingly, devices such as smartphones, tablets and smart TVs are at the end of fixed lines, with a wireless (WiFi) connection between the fixed line and the device. more

ICANN - Dispenser of Internet Justice

The following is a paper presented as a keynote speech at Studienkreis 2013 in Pisa, Italy last week. ICANN is beginning to look more and more like a government. It assesses taxes, it has amassed an enormous treasury, it passes laws with international effect, and it has developed an ad hoc judiciary system to enforce its laws. This paper will take a look at that judiciary system and ICANN as dispenser of Internet justice. more

Bring Your .Brand to Life

A preview of my upcoming presentation for the Digital Marketing and gTLD Strategy Congress on why your Top-Level Domain (TLD) strategy is paramount to making or breaking your .brand... Your strategy will be the most significant weapon in your Top-Level Domain arsenal to drive the launch of your .brand, and you'll only get there with preparation and engagement. For the vast majority of .brand applicants, ICANN has recently informed you that you have passed your application. You've come this far. more