/ Most Viewed

Demand for Online Video Drives Akamai Single Day Traffic to 3.45 Tbps

Leading Internet content distribution service provider, Akamai, has announced that its global network is now serving as much as 3.45 Terabits per second (Tbps) of content per day. "The traffic peak of 3.45 Tbps is roughly equivalent to the capacity needed to download the entire printed contents of the U.S. Library of Congress in less than a minute," says the company. Paul Sagan, Akamai's President and CEO, says increasing demand for high definition video streaming is a key factor in these recent delivery milestones. more

Examining Actual State of IPv6 Deployment

There have been quite a number of recent articles about various IPv6 issues. Thus the question: how far along is the actual IPv6 deployment? This is a quick-and-dirty survey that focuses mainly on the content provider side. What domains were surveyed? Alexa offers country depended TopSites listings. Domains listed are frequently visited by users from that country, not necessarily hosted there... more

Botnets Shift Focus to Credential Abuse, Says Latest Akamai Report

Akamai's Fourth Quarter, 2017 State of the Internet, was released today in which it states that the analysis of more than 7.3 trillion bot requests per month has found a sharp increase in the threat of credential abuse, with more than 40 percent of login attempts being malicious. more

Corporate Domain Registration Practices in Light of New gTLDs

For years, corporate domain name administrators have scoffed at every new second-level and third-level country code Top-Level Domain (ccTLD) liberalization, and rightly so. Until recently, most had continued the practice of registering significant numbers of variations, misspellings and typo-squats. While I have never encouraged the practice of registering every variation in every geography, as this becomes prohibitively expensive over time... With what seems to be the imminent launch of hundreds of new TLDs as a result of ICANN's new initiative, companies appear to be saying enough is enough, and meaning it. more

Searching Under Lampposts with DKIM

Email is a complex service and email abuse adds confusing deceptions. Worse, like postal mail and even telephone service, Internet mail is inherently open, flexible and even anonymous, making things much easier for abusers. Bad actors hide their true identity and their true purpose. Most other communication tools for users also are also quite open, and problems with email are being replicated elsewhere, such as instant messaging and social media. more

Why Are the EU Data Protection Authorities Taking Away Our Fundamental Right to be Safe?

What if we created a rule that gave everyone - good or bad - the right to hide their license plate, where they live, who they are, and just go incognito? What if we made it a right to walk into any building in the world, and simply say "No, thank you" when the security guards asked for one's identification? The criminals would celebrate, and we'd all be utterly alarmed. We would immediately be afraid for our personal safety. more

So you want to apply for a new gTLD in the second Round of the ICANN new gTLD program?

New domain names are now on the market and you start to realize that you may have missed the train by not submitting your own new gTLD application. So why not get your part of the cake and consider applying for your own new Top-Level Domain in the second Round of the ICANN new gTLD program? Why not become a "Registry" and sell domain names... to the world? more

The Future of Home Networking: A Problem Statement

I'm a network engineer, and like many engineers I often gravitate to the big projects; large networks with problems of scale and complexity in my case. However, I also consider myself a student of Occam's razor and often quote Antoine de Saint-ExupĂ©ry: "perfection is reached not when there is nothing left to add, but when there is nothing left to take away." In this spirit of "less is more" I have recently become intrigued by the problems appearing in home networking. more

Close to Half of US East Coast Fuel Supply Shutdown Due to Ransomware Cyberattack

Colonial Pipeline, which accounts for close to half of the United States East Coast's fuel, has shut down its operations due to a cyberattack. The incident, believed to be the largest successful cyberattack on oil infrastructure in the U.S., was disclosed over the weekend. more

FCC Approves White Space for Broadband in Unanimous Vote

The Federal Communications Commission (FCC) today approved, in a 5-0 unanimous vote, the plan to open up unused, unlicensed portions of TV white space spectrum for wireless applications and devices. However, to prevent interference, FCC has also placed some "rigorous certification process" which device offered by a technology company for use on the white spaces will have to go through. more

ICANN’s Uniform Rapid Suspension: The Good, the Bad and the Ugly

With so many new gTLDs moving into their respective general availability periods, and incidents of cybersquatting beginning to appear, many companies are now looking towards the URS (Uniform Rapid Suspension) as a possible solution for quickly remediating abuse. As a reminder, domains that are the subject of a successful URS ruling are suspended for the remainder of the registration term, or can be renewed for an additional year at the current registrar. more

Moving Telephone Numbers Into the Internet Age

Now that we're 20 years past TN 2.0, well into the 21st century, and onto the 3rd generation of the web; it is about time we move telephone numbers into the Internet age. They are still managed as if they all connect to four copper wires. We manage to the lowest common denominator rather than acknowledging the power of mobility and Internet technology. more

DNSSEC Deployment at the Root

The DNSSEC is a security protocol for providing cryptographic assurance (i.e. using the public key cryptography digital signature technology) to the data retrieved from the DNS distributed database (RFC4033). DNSSEC deployment at the root is said to be subject to politics, but there is seldom detailed discussion about this "DNS root signing" politics. Actually, DNSSEC deployment requires more than signing the DNS root zone data; it also involves secure delegations from the root to the TLDs, and DNSSEC deployment by TLD administrations (I omit other participants involvement as my focus is policy around the DNS root). There is a dose of naivety in the idea of detailing the political aspects of the DNS root, but I volunteer! My perspective is an interested observer. more

Free Pool of IPv4 Addresses Drops to 8.5 Percent

A new report issued by the Number Resource Organization (NRO) has found that demand for both IPv4 and IPv6 address space is continuing to grow. The Internet Number Resource Status Report for the first quarter of 2010 is based on data collected by the five Regional Internet Registries (RIRs) that oversee the allocation of all Internet number resources, and outlines RIR allocation of IP address space (IPv4 and IPv6), as well as AS number assignments. In the report, the NRO notes that allocations of IPv4 addresses in Q1 have reduced the IANA free pool of IPv4 addresses to 8.5 percent. more

ICANN Needs a Good Root

It's not been the best of years for ICANN. Leaving aside for a few seconds the controversy about xxx, and the allegations of improper behavior about the .Net assignment, ICANN has had a lot to deal with. The troubles began with the UN Working Group on Internet Governance hell bent on fixing ICANN, even though ICANN says nothing is broke. That trouble remains and isn't likely to go away for some time. And then, just when it seemed that the UN and ITU was the cause of all ICANN's problems, the old ally, US Government's DOC, decided that it was going to be in charge of ICANN. ...This could be the beginnings of a distinct change where the centralized DNS as we know it gradually gives way to some next generation structure which is far more decentralized. The coming 12 months may see some significant changes in this area. more