As mentioned in Assigning 32-bit ASNs published one year ago, 16-bit Autonomous System Numbers (ASNs) are becoming a scarce resource just like 32-bit IP addresses. In 2007, the Internet Engineering Task Force (IETF) addressed this scarcity by developing a new format: 32-bit AS Numbers (RFC 4893), which increased the supply of ASNs to four billion. more
Once you head away from the areas serviced by modern terrestrial cable infrastructure, the available digital communications options are somewhat limited. Some remote areas are served using High-Frequency radio systems, using radio signals that bounce off the ionosphere to provide a long-distance but limited bandwidth service. Or there are satellite-based services based on spacecraft positioned in geostationary orbital slots. more
I have on my desk a rather small tube. It's a little under 2cm in diameter, 6 cm long, and looks like it's made from a dull white polycarbonate material. At the end, I can see a copper inner tube, and inside that, another polycarbonate layer, and then a smaller steel tube that holds a thin steel thread and some fibre optic cables. There are no layers of steel jacketing, nor any other additional wrapping at all. more
On 24-27 April, a 33-year-old international organisation of ICT organisations will convene a meeting at London under ETSI auspices after a four-year hiatus. Known today as the GSC or Global Standards Collaboration organisation, it began its existence in the Spring of 1990 at Fredericksburg, Virginia, as an umbrella mechanism for all of the world's ICT standards bodies to collaborate on "high interest subjects." more
Modern networks can be attacked in a variety of ways, meaning that companies need different types of protection. This article explains some of the risks involved, and provides some easy ways to deal with them. more
Ample evidence exists to underline that shortcomings in a third-parties cybersecurity posture can have an extremely negative effect on the security integrity of the businesses they connect or partner with. Consequently, there's been a continuous and frustrated desire for a couple of decades for some kind of independent verification or scorecard mechanism that can help primary organizations validate and quantify the overall security posture of the businesses they must electronically engage with. more
In a call for "fairness and justice" in cyberspace, China's top diplomat, Wang Yi, has encouraged emerging economies to collectively resist any attempts at dominance in science, technology, or the internet. more
Due to unusual behaviour with the operation of its TLD Application System (TAS), ICANN announced today that it has shut down the system until Tuesday. ICANN has also extended the submission deadline: "In order to ensure all applicants have sufficient time to complete their applications during the disruption, the application window will remain open until 23:59 UTC on Friday, 20 April 2012." more
The 2010 Domain Pulse, hosted by SWITCH (the .CH registry) was held in the snowy Swiss city of Luzern. Domain Name Security (DNS) was of particular importance in this year's meeting with DNSSEC being implemented in the root zone in 2010 by ICANN, and by many registries in the next few years. ICANN plan to have all root servers signed with DNSSEC by mid-2010 Kim Davies, Manager, Root Zone Services at ICANN told the meeting, starting with the L root server, then A root server with the last being the J root server as all are gradually signed. more
As AI accelerates global data demand, tech giants are investing heavily in subsea cables. These critical networks face rising geopolitical scrutiny and security risks, reshaping the future of digital infrastructure and global connectivity. more
In late September Google introduced Google Instant, an auto-complete algorithm that assists users in searching with greater speed. Google's new service predicts search queries in real time, can catch a mistake if the user mistyped and guides users to previously performed searches. This new service greatly benefits top brands on the Internet and those that have purchased key words and ad words; while it might not be as beneficial for companies with low website traffic or those that are not well known. more
One existing resource that is often overlooked in designing wireless networks is AM radio towers. For the most part, companies deploying fixed wireless and microwave antenna have avoided these towers. This is due to the nature of AM radio, which transmits at such a low frequency that the entire tower is effectively used as the transmitting antenna. The entire tower is energized with the AM signal, and the typical AM tower sits on a base insulator that blocks the tower from being grounded. more
Buzz Lightyear, the astronaut character from the movie Toy Story, is known for his tagline, "To infinity, and beyond!" ICANN can take a lesson from the ebullient Buzz with respect to accountability and transparency. Just as Buzz believed he could fly beyond infinity, ICANN should view full implementation of the Accountability and Transparency Review Team (ATRT) recommendations not as the last stop, but as the next stop on its important journey of accountability and transparency. more
Ethos Capital has recently announced that it has voluntarily proposed to add an amendment to Public Interest Registry's (PIR) .ORG Registry Agreement with ICANN in the form of a Public Interest Commitment, also known as a "PIC." In the press release Ethos indicated that the PIC would become "legally binding" and "enforceable" both by ICANN and by members of the community. I anticipate that some would ask a number of logical questions: How would that work in practice? more
Not all domain name disputes are appropriate for resolution under the Uniform Domain Name Dispute Resolution Policy (UDRP). While the UDRP is clearly the "go-to" legal tool for trademark owners pursuing cybersquatters, some disputes are about larger -- or different -- issues than the UDRP was designed to address. As stated in WIPO's Overview: Depending on the facts and circumstances of a particular case, and irrespective of whether the parties may also be engaged in court litigation... more