/ Most Viewed

ICANN Accountability Takes Center Stage at Dublin Meeting

With the ICANN 54 meeting in Dublin in full swing, the internet stakeholder community should be assessing where the IANA transition and ICANN accountability proposals stand and where they will need to go before a transition occurs. At the IANA Stewardship Transition Coordination Group meeting in Los Angeles last month, the consensus seemed to be all systems are go for launch. more

Tracking Outages

The idea of tracking data outages spawned from an early discussion on the outages forum including feedback from an outages survey about having a status page for (un)planned outages as a central resource. The purpose of such effort is to have a wider focus that one could view as opposed to having to check dozens of provider status pages. There were many ideas put forth but nothing really panned out and things kinda fell on the back burner. more

Mobile World Congress: 4G Technology Enters the Residential Market

We're just back from Mobile World Congress in Barcelona, Spain, where more than 85,000 attendees from over 200 countries gathered to discover what the 1,800 companies present had to showcase. As expected, some of the show's biggest themes focused on the Internet of Things, the mobile cloud, Big Data, 4G LTE and wearable devices... After speaking to a cross-section of service providers, it became clear that many operators are already starting to leverage their investment in existing 4G LTE infrastructure... more

Domain Name Disputes Doubled Since 2003, Origin of Most Cases in US

Domain name disputes have been on steady rise for the past several years and have more than doubled since 2003. As reported today by Pingdom, while there was a period between 2000 and 2003 when the number of domain dispute cases declined, they have been continuously increased since 2003 with most cases involving more than one domain name. more

A Root Server With a View…

Running a DNS server that serves the root gives an interesting view into the world of the DNS. With the ongoing improvements to the ICANN operated L-ROOT, we've been fortunate enough to be able to make use of the "DNS Statistics Collector" (DSC) tool. "DSC" allows us to generate different views of the DNS queries we have been seeing at the L-ROOT systems. more

Open Season

In June 2016 the Organization for Economic Cooperation and Development (OECD) hosted a meeting of ministers to consider the state of the Digital Economy. The central message from this meeting was the message that: "Governments must act faster to help people and firms to make greater use of the Internet and remove regulatory barriers to digital innovation or else risk missing out on the potentially huge economic and social benefits of the digital economy." All well and good, and as a piece of rhetoric it seems to strike an appropriately positive note without straying far from what appears to be bland truisms of our time. more

A Closer Look at the “Sovereign Runet” Law

In December 2018, a bill on the "stable operation" of the Russian segment of the Internet was introduced and got the title "Sovereign Runet" in mass media and among the public. It was adopted after 5 months later, despite doubts about the technical feasibility of its implementation. The law is very ambitious in its intent to simultaneously control Internet traffic and protect Runet from some external threats, but legislators still have no idea how it would actually work. more

Hello World

I've been threatening to blog for several years now. I can't recall for how many years I've left the threat open, but hopefully you'll understand given the title of this piece, that I'm prone to senior moments. For the past two years I've been immersed in Internet Governance, an area I knew precious little about before being tossed into the deep end of the pool... My current employer, PayPal (eBay), recognizes the importance of cat herding, and has formed a group that I am fortunate to be part of, that specializes in Internet Standards and Governance. more

Stealth Cyberattacks by China’s Volt Typhoon Threaten U.S. Infrastructure: Microsoft Unmasks Espionage Campaign

Microsoft today disclosed the detection of covert and targeted malicious activity aimed at critical infrastructure organizations in the United States. The attack is orchestrated by a state-sponsored group from China, known as Volt Typhoon, with the suspected objective of disrupting the communication infrastructure between the U.S. and Asia during potential future crises. more

Do-It-Yourself Rural Fiber

Necessity has led Cubans to become do-it yourself (DIY) inventors -- keeping old cars running, building strange, motorized bicycles, etc. They've also created DIY information technology like software, El Paquete Semanal, street nets and WiFi hotspot workarounds. Last June the International Telecommunication Union (ITU) adopted a standard for "low-cost sustainable telecommunications infrastructure for rural communications in developing countries," L.1700. L.1700 cable should be of interest to both DIY technologists and ETECSA. more

How Safe is Your Fiber Network?

There was a major attack launched against long-haul fiber networks outside of Paris, France, on April 27 of this year. It appears that there was a coordinated attack by vandals to cut three long-haul fiber routes simultaneously. Fibers were cut with what seemed like a circular saw, and sections of fiber were removed to make it hard to make repairs. These were backbone fibers that were shared by multiple ISPs. more

SpaceX Applies for a Constellation Re-Design and Announces Beta Test Dates

This week SpaceX petitioned the FCC to reconfigure their Starlink constellation and Elon Musk outlined their beta testing plan. As shown below, the most significant configuration change is reducing the altitude of four of the five groups of orbital planes by around 50%. The total number of satellites and the number orbiting at a 53-degree inclination, which gives good coverage over relatively affluent regions, are not changed very much. more

A Perfect Storm: Net Neutrality Debate Poised to Spread Its Wings Down Under

To date, proponents of a neutral internet have had relatively scant reason to raise their voices beyond anything more than a murmur in Australia. While the FCC's Open Internet Order of 2015 has been hailed as a significant win for consumers in the US, and the wording of proposed legislation to institute ex-ante regulation of service providers is soon to be considered in the EU, Aussies have been quarantined from anything other than the fringes of the Net Neutrality debate. more

Symantec Acquires VeriSign’s Security Business for $1.28 Billion

Symantec today announced that it has signed a definitive agreement to acquire VeriSign's identity and authentication business, which includes the Secure Sockets Layer (SSL) Certificate Services, the Public Key Infrastructure (PKI) Services, the VeriSign Trust Services and the VeriSign Identity Protection (VIP) Authentication Service. more

Driving Force Behind Mobile Connect Initiative

Increased pressure is being exerted in different parts of the industry to create a more secure and a more private environment for a range of mobile activities. Whether it is women in developing economies who need to be certain that their communication is kept private, especially in relation to their husband and male relatives, or the 100 million users, mainly in developing economies, which rely heavily on mobile payments; there are now 16 countries that have more citizens with mobile bank accounts than the traditional ones. more