Apple Computer has received high praise for the diversity of applications available for the iPhone. The company shows great willingness to accept third party software innovations. But Apple also solely decides whether to accept and make available any application. Rejected software vendors for the most part do not exist if they do not have shelf space at the Apple store. more
The broadband industry doesn't have an agreed-upon unit of supply and demand that meaningfully "adds up". This is rather odd for a service that aspires to be a utility. It is also a barrier to a much-needed transformation from "bit pipes" to "digital supply chain management". The chart here ought to be in every basic undergraduate textbook on packet networking and distributed computing. That it is absent says much about our technical maturity level as an industry. more
It is no secret that both the US government, ICANN, and the global Internet community have argued and worked tirelessly for the past 15 odd years on the vexing issue of globalizing the US government's role in the IANA function. Despite the desire, long-held by many, for the US to relinquish its control of the IANA function, it is clear that getting to full multistakeholder control of the function is not going to be easy. more
The dividing line between developers and IT operations used to be distinct. Developers were responsible for adding new features securely, but it was IT operations who had responsibility for infrastructure and network security. For the most part, developers didn't have to think too much about the wider security context. With the advent of the cloud, and of devops, things changed radically. more
In 2012 I wrote a blog on CircleID called State hacking: Do's and don'ts, pros and cons. In this post I give some thoughts to the concept of a government "hacking back" at criminals. The reason for this was an announcement by the Dutch government that it contemplated law along these lines. The proposed law is now here: the Act Computer Criminality III. more
This post was co-authored by Yixin Sun, Annie Edmundson, Henry Birge-Lee, Jennifer Rexford, and Prateek Mittal. In this post, we discuss a recent thread of research that highlights the insecurity of Internet services due to the underlying insecurity of Internet routing. We hope that this thread facilitates important dialog in the networking, security, and Internet policy communities to drive change and adoption of secure mechanisms for Internet routing. more
In the previous instalment we looked at the software changes needed for mail servers to handle internationalized mail, generally abbreviated as EAI. When a message arrives, whether ASCII or EAI, mail servers generally drop it into a mailbox and let the user pick it up. The usual ways for mail programs to pick up mail are POP3 and IMAP4. more
This past May 19th, 5 years after its sunrise, puntCAT arrived at the 50,000 domain names landmark. We know that, nowadays, 50,000 domain names may hardly be described as shocking news, and, certainly, this is not our limit, and we believe there's still plenty of room for .cat to grow. Then, who and why should care about this number? more
The study report analyzes the distribution and the trends of IP address allocation in 238 countries for 2007. From the data analysis (see Table 1 & Chart 1), the United States tops the allocation list by holding 37.73% of the IP addresses worldwide. It follows by United Kingdom (12.83%), Japan (7.64%), China (5.74%), Germany (3.81%), France (3.65%), Canada (2.81%), Korea (2.74%), Netherlands (2.00%) and Italy (1.67%). These Top 11 countries in the list occupied more than 80% of total allocated IP address ranges in the world in 2007. more
On February 12–13, 2024, the first round of the final consultations for a Global Digital Compact (GDC) took place online and offline at the UN Headquarters in New York City. Around 50 governments and 50 speakers from non-governmental institutions took the floor. It was not really a dialog; it was a formal presentation of three-minute statements. more
The year 2018 represents a tipping point for the Internet and its governance. Internet governance risks being consumed by inertia. Policy decisions are needed if we want to prevent the Internet from fragmenting into numerous national and commercial Internet(s). Geopolitical shifts, in particular, will affect how the Internet is governed. The Internet is made vulnerable by the fragmentation of global society, which is likely to accelerate in response to the ongoing crisis of multilateralism. more
In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies.... "Wisdom consists in being able to distinguish among dangers and make a choice of the least harmful." That quote is quite possibly the most accurate depiction possible of the never-ending struggle between network security and corporate budget. Providing a mechanism to defend the enterprise network from every conceivable threat is impossible in terms of both technology and funding. more
In the wake of increasingly lenient bring your own device (BYOD) policies within large corporations, there's been a growing emphasis upon restricting access to business applications (and data) to specific geographic locations. Over the last 18 months more than a dozen start-ups in North America alone have sprung up seeking to offer novel security solutions in this space - essentially looking to provide mechanisms for locking application usage to a specific location or distance from an office, and ensuring that key data or functionality becomes inaccessible outside these prescribed zones. more
On August 31st the Department of Justice (DOJ) sent a response to the August 12th letter from Senator Ted Cruz and some Congressional colleagues to the head of the Antitrust Division. In that letter Cruz et al asserted that if the pending extension of the .Com registry Agreement (RA) was granted in combination with the consummation of the IANA transition, that DOJ could be prevented from having "meaningful input into the prices that Verisign charges for registering a domain name within the .com domain for an extended period". more
The recently completed ICANN Conference in Seoul, Korea will be remembered for a unique accomplishment -- the first definitive step towards the addition of Internationalized Domain Names (IDNs) to the Internet root... As the announcement states, the applicants, at this time, are limited to nations and territories; the first IDNs will be in country code top level domains (ccTLDs). The generic TLDs, (the gTLDs, e.g., .org, .com and .info) will have to wait for their opportunity to apply for IDNs... more