/ Most Viewed

Nov 25th Deadline To Nominate Technical Community Reps for IGF Multistakeholder Advisory Group (MAG)

Would you (or someone you know) be interested in representing the "technical community" on the Multistakeholder Advisory Group (MAG) of the Internet Governance Forum (IGF)? If so, the deadline to nominate someone (including yourself) is Monday, November 25, 2013. Under-Secretary-General Wu Hongbo of UNDESA has issued a statement on the Internet Governance Forum (IGF) Multistakeholder Advisory Group (MAG) renewal process for 2014 with the stated aim of rotating one third of the MAG members. more

Much Ado About Nothing

With much fanfare last month, Uniregistry announced that proposals for dispute resolution between New TLD applicants in lieu of ICANN's so-called "Auction of Last Resort" posed significant antitrust risks. Their claim of concern was not based on any critical antitrust analysis, but rather on the fact that they had sought a "Business Review" letter from the Antitrust Division of the U.S. Department of Justice (DOJ), and, according to Uniregistry, the DOJ failed to provide them a positive response and discussed the issue with them. more

IPv6 a Case of Confirmation Bias

Is the glass half full or half empty? The human reflex of selective deafness to information or arguments countering one’s established believes lives on. The ISOC organized lunchtime IPv6 panel at IETF 74 in San Francisco illustrates the point... more

What’s With the 32-Bit Numbers That the Internet Keeps Defying?

By now you might have read the news "How 'Gangnam Style' Broke YouTube?" What happened is that a YouTube video named 'Gangnam Style' by a South Korean singer Park Jae-sang, known by his stage name PSY, has been viewed so many times that it broke YouTube's view counter. YouTube's view counter is built on a 32-bit integer, which provides a view-tracking capability of nearly 2.15 billion views. more

Network Dis-Aggregation and SDN: Different, But Related

Two of the hottest trends in networking today are network dis-aggregation and SDN. This is great for many reasons. It's also confusing. The marketing hype makes it hard to understand either topic. SDN has become so vague that if you ask 10 experts what it means, you are likely to get 12 different answers. Network dis-aggregation seems straightforward enough until it gets confused with SDN. We need to take a step back. In a recent Packet Pushers blog post; I start with a simple explanation of each of these trends and then map how they interact. more

DNSSEC Signed ROOT by 1 July 2010

Mehmet Akcin writes: As announced today as part of RIPE meeting in Lisbon, Portugal by Joe Abley, DNS Group Director at ICANN, and Matt Larson, Vice President of DNS Research at VeriSign, in their presentation (Page 25), DNSSEC for the root zone is proposed to be fully deployed by July 1, 2010. The Draft Timeline suggests Root zone being signed by December 1, 2009 while initially staying internal to ICANN and VeriSign. The incremental roll out of the signed root would then take place from January until July 2010. more

According to the Department of Homeland Security, Cybercrime Is a Bigger Threat Than Terrorism

An article in Forbes the other day reports on US Secretary of Homeland Security Janet Napolitano's comments that 'cybercrime represents the "greatest threat and actual activity that we have seen aimed at the west and at the United States" in addition to "or other than Al Qaeda and Al Qaeda-related groups."' ..."Napolitano cited a study commissioned by Symantec that put the total worldwide cost of cybercrime at $388 billion -- higher than the global market for heroin, cocaine and marijuana combined." more

Who Makes the Any Apps Any Handset Call?

The Wall Street Journal today reported that FCC Chairman Kevin Martin wants to reject a Petition for Declaratory Ruling filed by Skype that would establish a wireless Carterfone policy, i.e., that wireless carriers must allow subscribers to use any compatible handset to access any application, content or software. Chairman Martin has confidence that the marketplace solutions obviate any necessary FCC intervention. Such optimism must derive in part from the apparently newfound willingness of one major wireless carrier, Verizon, to support aspects of open access. Perhaps Chairman Martin has confidence in the marketplace based on the magnanimous offer of most wireless carriers to pro-rate their early termination penalties by $5 a month. But here's the rub... more

Phishing 2020: A Concentrated Dose of Badness

How much phishing is there? Where is it occurring, and why? How can it be reduced? I and my colleagues at Interisle Consulting have just published a new study called Phishing Landscape 2020, designed to answer those questions. We assembled a deep set of data from four different, respected threat intelligence providers and enriched it with additional DNS data and investigation. The result is a look at phishing attacks that occurred in May through July 2020. more

Widespread Network Outages Disrupt AT&T Services Across the US

In a significant service disruption early Thursday, AT&T's network experienced widespread outages, affecting cellular service and internet connectivity for users across the United States. According to the tracking site Downdetector, the issues began around 4 a.m. ET, with over 32,000 reports of outages, which surged to more than 71,000 by 8 a.m. ET. more

Developing the Next Generation of Internet Champions – Internet Society’s Early Career Fellowship

How do we help develop the next generation of champions for an open Internet? As many of us who were involved in the early years of the Internet are getting older, how do we help inspire a new wave of advocates for an open Internet available to everyone? As we face so many threats to "the Internet way" from many different forces - governments, corporations, criminals, and other organizations - how do we help build the corp of people who understand Internet technology and policy issues and can help shape the future of this Internet we have all come to rely on? more

On the Success of Malware

There's often a lot of discussion about whether a piece of malware is advanced or not. To a large extent these discussions can be categorized as academic nitpicking because, at the end of the day, the malware's sophistication only needs to be at the level for which it is required to perform -- no more, no less. Perhaps the "advanced" malware label should more precisely be reattributed as "feature rich" instead. more

No Time Bar for Cybersquatting Claims Under UDRP

Headline in TheDomains.com, June 18, 2016: "Wow: 20 Year Old Domain Name WorldTradeCenter.com Lost in UDRP." For those who don't follow UDRP decisions carefully this may elicit, how can this be? Well, surprised or not, and assuming complainant has priority in the string of characters that is both a domain name and a trademark... delay is not a factor in prevailing on cybersquatting claims when there is an alignment of other factors... more

IPv6 Enabled Networks Before and After World IPv6 Day

In our last post on CircleID, Measuring World IPv6 Day - First Impressions, we showed exactly when World IPv6 Day participants switched on IPv6 on their networks (by way of announcing DNS AAAA records). Now, a few weeks after World IPv6 Day, it's interesting to see what the longer-term effects have been. more

Cuba’s New WiFi Regulations – Good, Bad or Meh?

Soon after ETECSA began rolling out WiFi hotspots for Internet access, people began linking to them from homes and community street nets. These connections and importing the WiFi equipment they used were illegal, but generally tolerated as long as they remained apolitical and avoided pornography. Regulations passed last month legalized some of this activity in a bid to boost connectivity by allowing Internet access from homes and small private businesses like restaurants and vacation rentals that are located close enough to a hotspot to establish a WiFi connection. more