/ Most Viewed

DNSSEC Happy Talk Enters a New Era

So we finally have a signed root zone. Now when is someone going to answer the question I first asked over five years ago and have still not had an answer to: How do the domain name owner's keys get into the TLD? Before we have a system people can use there have to be technical standards, validation criteria and a business model. Where are they? more

The Federal Cybersecurity Regulation Already in Place

While Congress and the White House deliberate possible actions on FISMA reform and increased oversight of critical infrastructure, relatively little attention is being given to the government-wide cybersecurity regulation already in place, the Data Quality Act (DQA). Unlike FISMA, which primarily governs the government's internal cybersecurity processes, and contemplated legislation and/or Executive Order(s), which would likely also include a focus on critical infrastructure protection, the DQA contains a unique mandate. more

Evaluating the Growth of Internet Traffic

At the opening of NANOG 53, Kevin McElearney of Comcast commented that within Comcast Regional Area Networks (CRANs), the company is regularly pushing 40+ Gbps of traffic out to the global Internet. This is a massive amount of traffic and in many cases, it's more traffic than entire countries around the world push out to the Internet. It got me thinking about just how much traffic there is on the Internet and the rate at which that traffic will grow over the coming years. more

How to .DOWNLOAD Banging Tunes, Sick Movies and Nasty Apps

TeenSpeak is being rivalled by GeekSpeak: most Internet Geeks know what "the cloud" is. They know because they are "Internet Geeks", most Internet users don't profess to the same level of 'Geekdom'. Now while I don't claim to be an Internet Geek, I do like to think of myself as an educated Internet user; and the way I think of "the Cloud" is of a computer, plugged in somewhere, and holding lots of "computer things" for the use of anyone, anywhere. You may have heard the expression: "it is hosted in the cloud". more

Verisign iDefense Analysis of XcodeGhost

At Verisign we take our Internet stewardship mission very seriously, so when details emerged over the past week concerning the XcodeGhost infection, researchers at Verisign iDefense wanted to help advance community research efforts related to the XcodeGhost issue, and leveraging our unique capabilities, offer a level of public service to help readers determine their current and historical level of exposure to the infection. more

Nigerian Cable Company Takes Blame for Misrouting Google’s Global Traffic Through China

Much of Google's traffic yesterday appeared to be re-routed through Russia and dropped at China Telecom. The issue raises serious concerns as a possible traffic hijacking incident. more

The Pace of Domain Growth Has Slowed Considerably, Reports CENTR

The global Top-Level Domain market is currently estimated at 348 million domains across all recorded TLDs. Although the overall domain count has continued to grow in all regions and types, the Council of European National Top-Level Domain Registries (CENTR) reports that the pace of growth has slowed considerably. more

Why Businesses Aren’t Hanging Up Landlines Yet

There was a recent article in the Wall Street Journal that noted that the business world still uses a lot of landline telephones. Landline telephones have been steadily disappearing from homes, but are still not gone. I see ISPs still selling a telephone line to 10% or more of passings, and surveys show that the average residential landline penetration rate is still somewhere between 15% and 20%. more

The FCC Cyber Trust Label Gambit: Part II

Sixty years ago, Paul Baran and Sharla Boehm at The RAND Corporation released a seminal paper that would fundamentally reshape the cyber world forever more. Their paper, simply known as Memorandum RM -- 1303, described how specialized computers could be used to route digital communications among a distributed universe of other computers. It set the stage for a flood of endless developments that resulted in the interconnected world of everything, everywhere, all the time. more

Register.com’s Director of Policy Responds to WLS Issue

Register.com has not taken a position for or against WLS. If and when the registry launches this service, Register.com will consider whether to offer it based on the price and conditions attached to the service. We are committed to delivering to our customers the best in class services available. Therefore, the registry's price will be an important factor. Moreover, we are concerned about some of the conditions currently being considered by ICANN - primarily, the "black out period." This is a period of time prior to the final deletion of a name, during which a registrar would be prohibited from selling a WLS subscription on a domain name that it sponsors. We consider this a condition that could confuse consumers and dampen domain name competition. more

SpaceX’s Rural Development Project in India

Sanjay Bhargava, Starlink Country Director for India at SpaceX (source)SpaceX Starlink is moving quickly in India. Last April, they said they would be offering service in 2022 and began accepting pre-orders. In July, SpaceX committed to manufacturing antenna systems and terminals in India and, at the end of September, Sanjay Bhargava, who had been with Elon Musk at Paypal, was selected to head Starlink in India. In the last week or two, they set up a wholly-owned subsidiary that will apply for licenses, seek Indian distribution partners, and attempt to sell 200,000 units - 80% in rural districts - in 2022. more

ITU’s Critical Cybersecurity Role and the 2018 Plenipotentiary

In the rather unique world of public international law for cybersecurity, the treaty provisions of the International Telecommunication Union (ITU) stand alone. They form the multilateral basis for the existence of all communication networks, internets, and services worldwide and have obtained the assent by every nation in the world. They also contain the only meaningful multilateral cybersecurity provisions that have endured over a century and a half through all manner of technological change. more

IPv6 Presents a Security Paradox for the Network

The capabilities IPv6 provides will enhance online security, but the shift to the new Internet address scheme may also present risks if not properly managed. Previously, Internet security was largely an after-thought for the early Internet, as its primary purpose was to facilitate open, end-to-end, any-to-any communications and information exchange for bridging and accelerating research efforts. Today, we have a much more complex online ecosystem that spans billions of users across the globe and serves not only as an engine for e-commerce, but as an engine for all commerce. more

NGN is Not the Internet, and Never Will

I see and hear a lot of confusion about next generation networks (NGN). In most cases people are using the term roughly as the ITU-T defines it: "A Next Generation Network (NGN) is a packet-based network able to provide services including Telecommunication Services and able to make use of multiple broadband, QoS-enabled transport technologies and in which service-related functions are independent from underlying transport-related technologies." but many people don't realize how little this has to do with the Internet... more

A Framework for Selecting New TLDs

Your corporate domain names send implicit messages (signals) through their Top-Level Domains (TLDs) and their second-level words. Shape your domain names so to send the right messages and to avoid sending unintentionally confusing messages. The post focuses on a framework to help bidders determine which TLDs send messages that are potentially profit generating... Soon TLDs such as ".car," ".cars," ".green," and ".eco" will be available to any qualified body whose request is favored by the allocation system. The system being discussed is a combination of beauty contests and auctions. more