/ Featured Blogs

Cisco: P2P Flat in North America? Some Experiencing Major Growth

North American p2p went from 370 petabytes in 2006 to only 416 petabytes in 2007 according to Cisco's figures. Since U.S. users increased 16% in the same period, that's a drop in p2p per user and a significant drop in p2p as a percentage of all traffic. There's a major margin of error in these figures, so I'm calling it "flat." That's very different from pre 2007 experience, when p2p grew rapidly. It severely contradicts what many in Washington D.C. are saying... more

It’s Time to End Domain Name Front Running

Next week the Internet Corporation for Assigned Names and Numbers (ICANN) Board of Directors will consider adopting a 20 cent per-transaction fee that will effectively end the abusive speculating practices of domain tasting, front running and kiting. The fee will only apply when domain names are deleted excessively, a signal that they are being "tasted" by speculators. We, at Network Solutions, strongly encourage ICANN to enact this important provision as part of its budget and we have released a statement to that effect today... more

Unforeseen Legal Consequences of Implementing Internationalized Top-Level Domains

ICANN is currently analyzing technical and policy implications regarding the introduction of Internationalized Top-Level Domains into the root. This is an important step in the continued evolution of the Internet by enabling language communities of the world that write non-Latin and extended Latin scripts to utilize their languages on the Internet... While the IDNC Working Group (IDNC) has made constructive progress on proposing a framework for the introduction of an initial set of IDN TLDs, the approach taken by the IDNC from a legal perspective is fundamentally flawed. more

Chinese Internet Research Conference: Getting beyond “Iron Curtain 2.0”

At last week's Chinese Internet Research Conference, much discussion of the "myths and realities" of the Chinese Internet revolved around images, metaphors, and paradigms. In his award-winning paper titled The Great Firewall as Iron Curtain 2.0, UPenn PhD Student Lokman Tsui argued that "our use of the Great Firewall metaphor leads to blind spots that obscure and limit our understanding of internet censorship in the People's Republic." more

MySpace Wins Big Against Richter?

News rumblings are that MySpace is celebrating its $6mm award against Scott Richter and his entities... Who Won? ...I'm not sure what MySpace asked for (their complaint is probably not a reliable barometer) but the overall tone of the document written by the arbitrator is that Richter's companies shouldn't be held entirely liable for all damages to MySpace. (In fact, the arbitrator's decision takes pains to show both sides of Richter. Some would say this is typical in arbitration.) more

Bit Caps, Consolidation, and Clearwire

The news that Comcast, Time Warner, and AT&T are all considering capping use of their networks -- so that "overuse" would trigger a charge -- has prompted intense discussion of just why these network operators are moving in this direction. One camp suggests that these operators have to do *something* to manage congestion, and because any protocol-specific discrimination plan raises howls of protest from the Net Neutrality side of the fence adopting bit-usage discrimination schemes is inevitable. It's the least-bad approach, following this view. more

SPIT is in Everyone’s Mouth, Though Not Yet in Everyone’s Ears

Spam over Internet Telephony (SPIT) is viewed by many as a daunting threat. SPIT is much more fatal than email spam, for the annoyance and disturbance factor is much higher. Various academic groups and the industry have made some efforts to find ways to mitigate SPIT. Most ideas in that field are leaning on classical IT security concepts such as intrusion detection systems, black-/white-/greylists, Turing tests/computational puzzles, reputation systems, gatekeeper solutions, etc... We identified the lack of a benchmark testbed for SPIT as a serious gap in the current research on the matter, and this motivated us at the to start working on a first tool for that. more

ICANN Paris: Seeking Comments from Internet Users in North America

Ahead of next week's ICANN meeting in Paris, I would like to consult users, At-Large Structures (ALSs) and others involved in internet governance in North America. As one of the three regional representatives on the ICANN At-Large Advisory committee, I want to make sure individuals, users and ALS's are given the chance to summit their own questions, suggestions and items to the agenda of the upcoming meeting. I'd be happy to receive your comments, and/or schedule a chat with you Mon-Thur, from 13:00-18:00 EDT. Leave a comment to this post, or leave me a message. more

Introductory Remarks from Innovation ‘08

Here's my opening remarks from Media Access Project's Innovation '08 in Santa Clara this morning. A DVD will be available shortly. This was a lively discussion, with Google and Vuze on the case. Good morning and welcome. My name is Richard Bennett and I'm a network engineer. I've built networking products for 30 years and contributed to a dozen networking standards, including Ethernet and Wi-Fi... I'm opposed to net neutrality regulations because they foreclose some engineering options that we're going to need for the Internet to become the one true general-purpose network that links all of us to each other, connects all our devices to all our information, and makes the world a better place. Let me explain. more

Will a Global TAR Make DNSSEC Stick?

Two US Government contractors and the National Institute of Science and Technology have released a white paper, "Statement of Needed Internet Capability," detailing possible alternatives and considerations for a Trust Anchor Repository (TAR) to support DNSSEC deployment. The document was released through the DNSSEC-Deployment Group this week with a request that it be circulated as widely as possible to gather feedback. A Trust Anchor Repository (TAR) refers to the concept of a DNS resource record store that contains secure entry point keys... more