/ Featured Blogs

Notes from NANOG 63

The following is a selected summary of the recent NANOG 63 meeting, held in early February, with some personal views and opinions thrown in! ...One view of the IETF's positioning is that as a technology standardisation venue, the immediate circle of engagement in IETF activities is the producers of equipment and applications, and the common objective is interoperability. more

The Top 25 Global Websites from the 2015 Web Globalization Report Card

I'm pleased to announce the publication of The 2015 Web Globalization Report Card. Here are the top-scoring websites from the report... You'll notice that Google is once again ranked number one. The fact is, no other company on this list invests in web and software globalization like Google. While many software companies are happy to support 40 or even 50 languages on their websites, Google is looking at 60 or more languages across its many products. more

Ensuring Trust in Internet Governance

This week in Singapore, important decisions are being made about the future of the Internet at the Internet Corporation for Assigned Names and Numbers (ICANN) 52 conference. At stake are fundamental questions: Should the American people surrender stewardship over core technical functions that have preserved the open and neutral operation of the Internet since its inception? Should the Obama Administration cede this authority to an organization many consider to be non-transparent, unaccountable and insular? more

The 2015 IGF Brazil Will Focus on Empowering Sustainable Development

The preparations of the Brazil Internet Governance Forum (IGF) meeting are well under way. After consulting the wider Internet community and discussing the overarching theme of the 2015 IGF meeting, the Multistakeholder Advisory Group (MAG) decided to retain the title "Evolution of Internet Governance: Empowering Sustainable Development". This theme will be supported by eight sub-themes that will frame the discussions at the Joao Pessoa meeting... more

The Why and How of DNS Data Analysis

A network traffic analyzer can tell you what's happening in your network, while a Domain Name System (DNS) analyzer can provide context on the "why" and "how." This was the theme of the recent Verisign Labs Distinguished Speaker Series discussion led by Paul Vixie and Robert Edmonds, titled Passive DNS Collection and Analysis -- The "dnstap" Approach. more

Phishing Costs Companies over $411 Million per Alert

Phishing blindsides businesses' best defenses and takes a toll whose price tag still hasn't been pinned down. Here's one estimate: $441 million per attack, according to a recent study of the cybercrime's effect on stock market data (market value, volume of shares traded, and stock volatility) of global firms. The authors use "event studies" techniques (i.e., analyzing the impact of specific types of events on companies' market performance) to analyze nearly 2,000 phishing alerts by 259 companies in 32 countries... more

NETmundial Initiative Taking Positive Steps Forward

The Net Mundial conference in Sao Paulo in April 2014 added a new element to the global Internet Governance Ecosystem. It demonstrated that the multistakeholder model for the governance of the Internet is able, not only to discuss issues of global importance, as we do it now for nearly ten years within the Internet Governance Forum (IGF), but it can also produce a concrete outcome. The Universal Declaration of Internet Governance Principle and the Sao Paulo Roadmap have enhanced the existing mechanisms. more

So You’ve Got Some Big Data, but Now What?

As Internet connection continues on a steady path of becoming a ubiquitous commodity in mature markets, we saw an eruption of big data tracking and analysis software in 2014. But what are operators going to do with all this new information? And how can they turn data into revenue? To start with, providers need more than just a data measurement tool. They need a solution that can analyze real-time data and then automate processes to optimize their networks and improve their subscribers' experiences. more

Title II Will Have Little Effect on Telecom Developments in The USA

We now know what direction the FCC will take in reorganising the American telecoms market. For many years I have mentioned the rather bizarre situation in that country wherein broadband is not seen as a telecoms service but rather as an internet service, which is itself classified as providing content. Thanks to extensive lobbying from among the telcos (who also refer to themselves as ISPs) in the early days of the internet, back in the 1990s, the FCC accepted their unbelievable proposals. As a result, over the last 20 years or so the USA's telecom market has changed from being one of the most competitive among developed economies to what it is now: a market with hardly any fixed telecoms competition at all. more

The Uses and Abuses of Cryptography

Another day, another data breach, and another round of calls for companies to encrypt their databases. Cryptography is a powerful tool, but in cases like this one it's not going to help. If your OS is secure, you don't need the crypto; if it's not, the crypto won't protect your data. In a case like the Anthem breach, the really sensitive databases are always in use. more