/ Most Viewed

Do We Really Need a New BGP?

From time to time, I run across (yet another) article about why Border Gateway Protocol (BGP) is so bad, and how it needs to be replaced. This one, for instance, is a recent example. It seems the easiest way to solve this problem is finding new people - ones who don't make mistakes - to work on BGP configuration, building IRR databases, and deciding what should be included in BGP? more

Notorious Russian Ship Yanter Suspected of Cutting Syria’s Undersea Internet Cables

A Russian ship, suspected by intelligence and military officials to be capable of cutting undersea Internet cables, is spotted near the coast of Syria. more

State of Broadband Report 2014

Last Sunday I attended the 10th meeting of the UN Broadband Commission for Digital Development in New York, where we launched this new report -- State of Broadband Report 2014. Here are some of the highlights of the report. Over 50% of the global population will have Internet access within three years' time, with mobile broadband over smartphones and tablets now the fastest growing technology in human history, according to the 2014 edition of the State of Broadband report. more

NY Times Grossly Misreads WEF Report

Today's New York Times includes an article by John Markoff entitled "Study Gives High Marks to US Internet." But either John Markoff is fuzzy about exactly what the Internet is or he didn't actually read the report. His title is way off base. He did interview a few people who are quoted in the latter part of the article, so there is some information in the article. But he's done a major disservice for the many who read only the title or perhaps first paragraph... more

May 31 Deadline for $517,000 US in Internet-related Grants in Africa and Asia Pacific

If you are located in Africa or the Asia Pacific region, this coming Tuesday, May 31, is the application deadline for an excellent series of grants related to Internet infrastructure, development, security and education. I just wrote about the Internet Society Cybersecurity Grant for up to $56,000 AUD (roughly $40K USD) in the Asia Pacific region... but it is part of a larger set of grants that all have a deadline of May 31. more

More on the Soloway Case

I've now read Soloway's plea agreement. Despite some claims from his lawyers that it's some kind of victory that he only pleaded to three of the 40 charges, with the rest being dismissed, it's clear from the agreement that he indeed did just about everything that the government charged. The government as is usual had several similar charges in each category. more

Havana Can Have 5G Before Miami

Compared to Miami, Havana is an Internet desert, but Havana may have 5G wireless connectivity before Miami. 5G architecture, US politics and policy, and the 5G timetable favor Havana. Let's start with 5G architecture. 5G will require many "small cells" because it uses high-frequency radio signals that don't travel as far as 4G signals and are more easily blocked by obstructions like trees and buildings. more

COVID-19, WHOIS, and the Pressing Need for Help With Domain Name System Abuse

As widely reported, and not surprising, the internet is swimming in COVID-19 online scams. Criminals, accustomed to rapidly grabbing online territory during times of crisis and profiting from public fear, are working overtime in the face of the coronavirus. Unfortunately, ICANN's failure to enforce its minimal WHOIS and DNS abuse requirements has resulted in delayed mitigation efforts at a time when swift responses are needed to protect the public from COVID-19 scams. more

ICANN to Grant Verisign Right to Sell a Single-Character .com Domain for First Time in Over 25 Years

ICANN's board of directors is due to vote next Thursday at the conclusion of ICANN 64, which begins Saturday in Kobe, Japan, to approve a complex proposal allowing Verisign to auction off o.com, with almost all of the proceeds going to good causes. more

The Internet of Things and User-Generated Internet Energy

One of the key factors in the transformation of the telecommunications industry was the fact that, thanks to the internet, end-users were suddenly able to become active participants in generating content for both private and public use. Companies such as Google, Amazon, eBay, Skype and Apple, followed by a number of national and international social media companies, all became involved in these new developments, and they became the great game-changers of the industry. Telecoms companies were caught off guard... more

Why Is the Client-Side Scanning a Concern for Encryption?

As today is the Global Encryption Day, I decided to make my first post here on this topic. About two months ago, Apple caused a controversy by announcing the adoption of a measure to combat the spread of Child Sexual Abuse Materials (CSAM). The controversy was so huge that, a month after its announcement, Apple decided to postpone its plans for the new features to have more time to gather information from the various stakeholders and implement improvements before releasing the measures originally announced. more

CENTR Reports TLD Slowdown Partly Due to Deletes by Chinese Investors Which Had Peaked in 2016

The Council of European National Top-Level Domains Registries (CENTR) in its quarterly report released today, says global domains under all TLDs have contracted slightly due to declines in several larger new gTLDs. more

Governments Shouldn’t Play Games with the Internet

Governments often use small players as pawns in their global games of chess. Two weeks ago the European Court of Justice invalidated the EU-US Safe Harbor ("Safe Harbor") framework, turning Internet businesses into expendable pawns in a government game. But for the past fifteen years, Safe Harbor allowed data flows across the Atlantic -- fostering innovation and incredible economic development. more

Is It Time to Supplement Desktop Security Protections?

Internet users are acutely aware of their exposure on the Internet and clearly concerned about their safety. Increased downloads of scareware as Conficker made headlines in the mainstream media are only the latest evidence. Desktop software is often viewed as a one-stop shop for fighting Internet threats such as viruses, worms and other forms of malware and phishing. These solutions have served us well but more protections are needed to address the dynamic and increasingly sophisticated web based exploits being launched... more

What is Bring Your Own IP (BYOIP)?

An IPv4 address identifies your connection to the online world. IP addresses make it possible to host websites, manage secure communication, and engage in countless other essential, internet-related activities. Typically, when migrating to a new cloud provider, a business has only one path: lease the provider's IP addresses. But what if a business already has a block of IP addresses? more