/ Most Viewed

Live Data Visualization of DDoS Attacks

Google Ideas in collaboration with Arbor Networks has released a data visualization that maps daily, global DDoS attacks. The tool shows anonymous data linked to these attacks, allowing users to explore historical trends and make the connection to related news events. "The data is updated daily, and historical data can be viewed for any country worldwide." By surfacing this data and providing insights on the global patterns of DDoS attacks, the companies hope that more informed decisions can be made that can reduce the threat of digital attacks. more

The 5 Stages of gTLD Shock

PCWorld lists new gTLDs among the 5 major changes facing the Internet in 2012. No doubt the sudden introduction of hundreds of new gTLDs will have a significant impact on the Internet. I postulate that users will react to new gTLDs by going through the following stages... more

OneWeb Fails in Latest Attempt to Get Russian Approval for Its Worldwide Internet Coverage Plan

Russian State Commission for Radio Frequencies has denied the global satellite communications company OneWeb to use a certain band of radio frequencies in Russia that the company seeks as part of its plan to launch hundreds of satellites into orbit to provide worldwide internet coverage. more

Inquiring About the “Unthinkable”

There has been no shortage of speculation within the ICANN community regarding the continued show down between the ICANN Board and its Governmental Advisory Committee (GAC) over new generic Top-Level Domains (gTLDs) and the pending expiration of the IANA contract this September. Now one of the more interesting topics of discussion that I have had with multiple independent parties was the potential of ICANN making changes to the L root zone file... more

Net Neutrality Undermining Spreads to Developing Countries

After the USA set the bad example of allowing telcos to start charging different rates for content delivery services, other incumbent telcos elsewhere are only too happy to jump on the bandwagon and use the American example as a reason and an excuse to end net neutrality (NN) in their countries also. As did their American counterparts they too see this as another way to grab some extra monopolistic income. more

What May Happen to GAC Advice? 3 Fearless Predictions

Many TLD applicants are likely to respond to the GAC Advice in a manner that is like story telling: Based on a mixture of fiction garnished with some facts from their applications, applicants will write savvy responses with only one aim -- to calm down the GAC's concerns and survive the GAC Advice storm. The "duck and cover" strategy... According to the Applicant Guidebook, material changes to applications need to go through a Change Request process. more

The Hidden Value of IPv4 Addresses

All devices that connect to the internet need unique addresses. The number of IP addresses is limited, creating a demand for addresses worldwide, particularly from the cloud computing industry. This demand has raised the value of IPv4 to levels that the internet's original developers didn't predict, in part because the internet was considered an experiment at the time. Of course, use - and so demand -- has exceeded anyone's realistic expectations. more

Today Marks a Giant Step Towards DNSSEC Deployment

The global deployment of Domain Name System Security Extensions (DNSSEC) is charging ahead. With ICANN 38 Brussels just around the corner, DNSSEC deployment will inevitably be the hot topic of discussion over the next few days. Case in point, today, ICANN hosted the first production key ceremony at a secure facility in Culpepper, Va. where the first cryptographic digital key was used to secure the Internet root zone. The ceremony's goal was simple: for the global Internet community to trust that the procedures involved with DNSSEC are executed correctly and that the private key materials are stored securely. more

Who Will Crack Cloud Application Access SLAs?

The broadband industry doesn't have an agreed-upon unit of supply and demand that meaningfully "adds up". This is rather odd for a service that aspires to be a utility. It is also a barrier to a much-needed transformation from "bit pipes" to "digital supply chain management". The chart here ought to be in every basic undergraduate textbook on packet networking and distributed computing. That it is absent says much about our technical maturity level as an industry. more

Set-Top-Box Revisited: How Does the Gateway Solution Increase Competition?

The FCC seems determined in revisiting and repairing the current CableCard rules fiasco in which it chose to mandate a universal Set-Top-Box for Cable, Telco, and DBS providers. Where does a solution lie, and is the FCC going down another road of improbable acceptance? The problem with a CableCard solution, in an attempt to create more competition, was the opening of current provider STB's to access other venues, which turned out to be both technically and business concept unfriendly. more

5G Frequency Fees Are Waived in Singapore to Help Drive Market Tests

Singapore government has waived telecom frequency fees for 5G trials until December 2019 in order to catalyze market growth and discovery of potential use cases. more

Are Phishing and Malware Separate Threats?

Phishing is when bad guys try to impersonate a trusted organization, so they can steal your credentials. Typically they'll send you a fake e-mail that appears to be from a bank, with a link to a fake website that also looks like the bank. Malware offers another more insidious way to steal your credentials, by running unwanted code on your computer... I like VeriSign's characterization of this kind of malware as an insecure endpoint, the PC which is the endpoint of the conversation with the bank isn't actually under the control of the person who's using it. more

How to Protect Your Brand in Web3

In 2014, computer scientist Gavin Wood coined the term "Web 3.0." The phrase, which has now been shortened to "Web3", refers to the third generation of the internet that's designed to be truly decentralised and free from a central authority. Web3 has the potential to add real-world value for businesses by creating additional avenues to reach consumers. However, owing to its less regulated nature, brands also have the potential to be taken advantage of both by users and by the providers in the space. more

New Revenue Models for the ‘Software Telco’

I was recently asked how telcos might come up with new business models for a world where all resources are under software control. The core idea is to match network supply and demand in space and time (and at all timescales). I've typed up my notes for the curious to critique...Today's telco is more like a static utility 'pipe', the way that gas, electric or oil are delivered. It sells direct access to raw network mechanisms, and users buy circuits that offer a fixed bandwidth in space and time. more

ICANN Has Opened Up Opportunities for Everyone Including Africa

The ICANN latest reveal of the applications pending batching has shown a number of very crucial details of what the new domains system is like. The new system before batching presents new applications with the North Americas having the highest applications amounting to 911, Europe follows with 675, Asia pacific which already has one continental domain .asia has three hundred and three domains, Latin America which shares the same ecological niche with Africa has 24 new applications 7 domains higher than Africa which has presented 17 new domains. more