/ Most Viewed

Opportunity Missed: Hilton Checks-Out of New Domains Boom

American author Mark Twain once wrote: "I was seldom able to see an opportunity until it had ceased to be one." Last month we learned that Hilton Hotels & Resorts joined six other new Top-Level Domain applicants in withdrawing their application and exiting the program. I was disappointed when I first heard the news. My initial thoughts were centred on the enormous potential .hilton offered the company and the innovative business opportunities they were now abandoning. more

Security and Reliability: A Closer Look at Penetration Testing

As noted in my first article of this series (see part one, two and three), security and reliability encompass holistic network assessments, vulnerability assessments and penetration testing. This month I'd like to go deeper into penetration testing; however, first, let's go back for a quick refresh before getting started. more

America’s Telecoms Market in Dire Straits

In late 2008 it was my good fortune to be asked to write a number of reports on broadband and trans-sector development for the Obama Transition Team. President Obama had just won office and this team was crucial in setting the policies for the future. I gathered together a team of international experts to assist in writing these reports. I was able to do this because the revolutionary plans of the Australian government in relation to the NBN very much appealed to the Obama Team. more

Y2038: It’s a Threat

Last month, for the 20th anniversary of Y2K, I was asked about my experiences. (Short answer: there really was a serious potential problem, but disaster was averted by a lot of hard work by a lot of unsung programmers.) I joked that, per this T-shirt I got from a friend, the real problem would be on January 19, 2038, and 03:14:08 GMT. Why might that date be such a problem? On Unix-derived systems, including Linux and MacOS, time is stored internally as the number of seconds since... more

Live Data Visualization of DDoS Attacks

Google Ideas in collaboration with Arbor Networks has released a data visualization that maps daily, global DDoS attacks. The tool shows anonymous data linked to these attacks, allowing users to explore historical trends and make the connection to related news events. "The data is updated daily, and historical data can be viewed for any country worldwide." By surfacing this data and providing insights on the global patterns of DDoS attacks, the companies hope that more informed decisions can be made that can reduce the threat of digital attacks. more

21 Experts Give Their 2014 Predictions on Internet Performance

Last week, we started an email thread (old school!) amongst a large group of our tech leadership and thought leaders from all aspects of web traffic management and message management. There was a simple question we wanted to know in a few sentences or less: "In 2014, what do you think the big trends will be with Internet performance?" What follows are 21 very unique, and some very similar, answers. Without a doubt, there are challenges ahead for the Internet as we know it, but the rewards for accomplishing goals are massive. more

As a Service?

I'm happy to have the option of buying services. It's easier to eat at a restaurant than to do my own cooking, and I'm happy to pay for a ride rather than fighting traffic on my own. However, I'm not happy if I don't have the option of cooking for myself or of taking a stroll. I used to be willing to pay for all of my phone calls but today I know that, thanks to VoIP, there is no need to. But the phone companies are attempting to wrest back control with their wider 5G agenda. more

Ossification and Fragmentation: The Once and Future ‘net

Mostafa Ammar, out of Georgia Tech recently posted an interesting paper titled The Service-Infrastructure Cycle, Ossification, and the Fragmentation of the Internet. I have argued elsewhere that we are seeing the fragmentation of the global Internet into multiple smaller pieces, primarily based on the centralization of content hosting combined with the rational economic decisions of the large-scale hosting services. The paper in hand takes a slightly different path to reach the same conclusion. more

Yahoo’s 1 Billion Accounts Hacked is a Chilling Warning: Start Doing Things Differently or Die

Today, this is how easily "TRUST" by your users/customers can be shattered, your revenues devastated, your share value plunged into the abyss, and your business destroyed. Furthermore, conventional thinking belongs only in university libraries, not in board rooms. It is time to seriously consider other innovative Out-Of-The-Box Solutions and doing things differently, or start writing your business obituary. more

Net Neutrality Undermining Spreads to Developing Countries

After the USA set the bad example of allowing telcos to start charging different rates for content delivery services, other incumbent telcos elsewhere are only too happy to jump on the bandwagon and use the American example as a reason and an excuse to end net neutrality (NN) in their countries also. As did their American counterparts they too see this as another way to grab some extra monopolistic income. more

A Sophisticated Online Counterfeit Ring

Online fakes can be a lucrative business and difficult to crack down on, due to the ease and low-cost of setting up multiple virtual storefronts and the ability to obfuscate an operation's identity. A federal lawsuit filed on March 1, 2010 by Polo Ralph Lauren and VF Corp. illustrates these points and highlights many of the intricacies of an online counterfeit ring. more

A Visualized gTLd Sequencing Proposal

As a follow-up to our previous CircleID article "Strong Support for IDNs, GEOs and/or Communities to Go First" we have developed a flow chart which visualizes how the applications may be processed in a fair and transparent manner. The chart also shows that at the end of the day only about 1,200 new gTLDs may go online, that means that we will likely see about 730 drop outs. more

Why the Fukushima Analogy Was Apt

A few days ago, CAUCE published a blog post entitled "Epsilon Interactive breach the Fukushima of the Email Industry" on our site, and the always-excellent CircleID. A small coterie of commenters was upset by the hyperbolic nature of the headline. Fair enough, an analogy usually has a high degree of probability that it will fail, and clearly, no one has died as a result of the release of what appears to be tens of millions of people's names and email addresses. But, the two situations are analogous in many other ways, and here's why. more

Is More Protection of Intellectual Property Rights Necessary on the Internet?

I firmly believe that we need to protect any form of intellectual properties (IP) built by one through hard and honest work. At the same time, I also believe that several of the current methods of protecting IP, such the as the copyright laws, patent systems and legislations, are not evolving fast enough in order to protect IP and avoid hindering the path of creativity and innovation. more

Remembering the Good Times

The most effective early email-borne viruses didn't need botnets. They didn't change your computer settings, or steal your login credentials. And they somehow convinced regular users to help them spread. The first warnings about the Good Times virus began to appear in November of 1994, and by December the warnings were seen all over as people did what the warning said, and forwarded it to all their friends. There was another outbreak the following March... more