A recent report by NS1 provides a comprehensive look at global DNS traffic trends. It reveals that public resolvers dominate the internet, accounting for nearly 60% of recursive DNS usage. Telecom giants represent nearly 9%, with Google the clear front-runner at a little over 30%, followed by Amazon Web Services at 16%. more
As if we didn't have a long enough list of problems to worry about, Lumen researchers at its Black Lotus Labs recently released a blog that said that it knows of three U.S. ISPs and one in India was hacked this summer. Lumen said the hackers took advantage of flaws in software provided by Versa Networks being used to manage wide-area networks. more
According to a report released today, 69% of adult internet users, or roughly half of all U.S. adults (52%), have used the internet to watch or download video, with 18-29 year-olds leading the way. "We are seeing a surge in online video watching that is driven by a combination of broadband access, the increasing use of social networking sites, and the popularity of video-sharing sites," explains Kristen Purcell, Associate Director for Research at the Pew Research Center's Internet & American Life Project and author of the report. "To tap into these trends, untold numbers of websites now showcase online video as part of their content." more
In today's interconnected world, your business's online identity is increasingly more vulnerable than ever. With the rapid advancement of AI and 6G technologies, cyber threats are evolving at an alarming rate, making it critical to protect your brand's digital presence. How can businesses proactively safeguard their online identity in this changing landscape? more
Danish businessman Joacim Bruus-Jensen challenged the domain name www.joacimbruus-jensen.com in ICANN UDRP proceeding. He failed to prove enforceable trademark rights in his name and was denied relief in this decision by Panelist Derek Minus. Joacim Bruus-Jensen v. John Adamsen, Case No. D2004-0458 (WIPO Sept.29, 2004). The case should be considered before seeking to use the ICANN UDRP to take action based on the personal name of a business executive. more
The recent NANOG 61 meeting was a pretty typical NANOG meeting, with a plenary stream, some interest group sessions, and an ARIN Public Policy session. The meeting attracted some 898 registered attendees, which was the biggest NANOG to date. No doubt the 70 registrations from Microsoft helped in this number, as the location for NANOG 61 was in Bellevue, Washington State, but even so the interest in NANOG continues to grow... more
As the IPv4 address pool is rapidly reaching exhaustion, Silvia Hagen, a leading expert on IPv6 and the author of O'Reilly's book, "IPv6 Essentials," stresses that a primary step towards IPv6 address space is not about "transition" but "integration". IPv4 and IPv6 are going to co-exist for many years to come and so what companies need to do, in the first place, is to look at their IPv4 landscape and identify areas of priority, Hagen said in a recent interview with CircleID. more
The Latin America and Caribbean Domain Name System (LAC DNS) Forum will be held on November 15, 2013 in Buenos Aires, Argentina. This follows on a similar initiative that took place at ICANN 47 in Durban, South Africa. The event's global, regional and local organizers plan to address key online issues, including more regional involvement with Internet governance. more
ICANN has announced today that it has tentatively agreed to settle a longstanding dispute with VeriSign Inc. The dispute which began in part from SiteFinder, a controversial search service VeriSign created in late 2003 for users who mistype Web addresses. The following is an excerpt from today's press release... more
I have long been intrigued by the question of how do we turn the internet into a lifeline grade infrastructure... My hope that this will occur soon or even within decades is diminishing. Most of us observe, almost daily, how even well established infrastructures tend to crumble when stressed, even slightly... I was at the O'Reilly Etel conference last week. The content was impressive and the people there were frequently the primary actors in the creation and deployment of VOIP. However, not once during the three days did I hear a serious discussion by a speaker or in the hallways about how this evolving system would be managed, monitored, diagnosed, or repaired. more
New developments that have been announced by the FCC in the United States have rekindled the decade-old debate on the use of the so-called 'white spaces' in broadcast spectrum that are to be used for telecoms purposes. In September 2010, the FCC adopted a Second Memorandum Opinion and Order that updated the rules for unlicensed wireless devices that can operate in broadcast television spectrum at locations where that spectrum is unused by licensed services. This unused TV spectrum is commonly referred to as television 'white spaces'. The rules allow for the use of unlicensed TV devices in the unused spectrum to provide broadband data and other services for consumers and businesses. more
Thanks to Prof. Goldman I see that the Virginia Supreme Court issued its opinion in Jaynes, the state-law criminal spam case that has wound its way through the courts there. It affirms the conviction and rejects the various challenges to Virginia's spam statute... As a side note I should say that it's not often one is actually excited to read an order in a case you're not involved with. This is definitely one of those instances where the excitement is palpable... The news reports billed the case as the first felony conviction for sending spam. more
Most of our IPv6 Security Myths are general notions, often passed on unwittingly between colleagues, friends, conference attendees, and others. Today's myth is one that most often comes specifically from your vendors or suppliers. Whether it's a hardware manufacturer, software developer, or Internet Service Provider (ISP), this myth is all about trust, but verify. more
The growing interest in the "Internet of Things" is forcing us to think beyond the web to a much larger world of connected devices. We can tolerate the many barriers to connectivity because we expect that someone can provide the necessary credentials to log in to the providers' services and to adjust Wi-Fi access keys whenever the access point changes or simply to click "agree" at a hotspot. This doesn't work for "things" which can't recognize a sign-on or "agree screen". more
Dell filed a suit in Florida in early October against a nest of domain tasters in Miami, widely reported in the press last week... The primary defendant is a Miami resident named Juan Vasquez, doing business as several registrars called BelgiumDomains, CapitolDomains, and DomainDoorman, as well as a whole bunch of tiny companies of unknown authenticity... Those registrars have an egregious history of domain churning. I gave a talk on domain tasting at MAAWG in October in which I picked out the registrars who churned the most domains from the May registrar reports, and those three were the worst, each having registered about 500,000 domains, refunded over 10 million... more