There has been much discussion in ICANN circles concerning auctions to resolve new gTLD contention sets. This article summarizes the discussion and events to date, and suggests there should be little worry for applicants seeking to resolve their contention sets via private auction, rather than ICANN's "last resort" auction. more
Cuba, one of the least connected nations in the world, recently created 35 public-access, WiFi hotspots around the island. While 35 hotspots is a drop in the bucket, this opening is a start and it has been noted in many articles and blog posts. Most of the coverage of the new hotspots has been lackluster and redundant, but an article last month in Miami Herald stands out because it stresses the human and emotional impact of these access points. more
Our goal was to announce Usenet at the January, 1980 Usenix meeting. In those days, Usenix met at universities; it was a small, comaparatively informal organization, and didn't require hotel meeting rooms and the like. (I don't know just when Usenix started being a formal academic-style conference; I do know that it was no later than 1984, since I was on the program committee that year for what would later be called the Annual Technical Conference.) more
The Caribbean suffered six major storms in 2017, including the record-breaking Category 5 hurricanes Irma and Maria. In the unprecedented destruction, the islands of Dominica and Barbuda lost all communication and telecommunications service, and eight other Caribbean countries were severely disrupted. Each hurricane season wreaks greater devastation than the last, yet decreased telecommunications competition, inadequate regulation, and high national debt burdens in the region yield ever-diminishing infrastructural investment. more
IT security specialists have known for years that the plain DNS is not to be trusted. Any hope for improvement rests on the DNSSEC protocol deployment. In this post, I will review the current status in one critical aspect, namely the DNS root signature key management. The other two foremost are the application usage of DNSSEC protocol functionality and the operational front, or the extent of deployment in the DNS infrastructure. The operational front includes the support by the DNS root nameservers, but my focus on signature key management leaves this issue aside. more
The U.S. Federal Communications Commission (FCC) on Monday announced it is allowing full commercial use of 3.5 GHz band for broadband connectivity and 5G. more
Layered security is a concept that's important for anyone who wants to create a strong, successful defense strategy to understand. This is a strategy that relies on the use of multiple lines of defense in an attempt to repel any potential attacks. For this reason, it's based on the principle that says "no single form of protection is enough to stop a determined cybercriminal. more
ICANN has now published the results of the auction for .SHOP, an eye-popping $41,501,000. This pushes the ICANN's auction pot over $100 million. That's a lot of money. There are eighteen more name contention sets that are on hold for various reasons, of which a few such as .WEB look likely to generate even more money once the hold issues are resolved. more
As the leading consulting firm to the Domain Name industry, we work with many of the existing gTLDs, ccTLDs and new gTLDs. During our engagements we do a lot of listening (as well as work) and this gives us a unique perspective on the key challenges the industry is facing. Recently, we are hearing feedback from many leading registries and registrars about their need for more dynamic pricing and promotions and their concern that there may not be enough flexibility in their billing systems to speedily handle their promotion plans. more
Another day, another data breach, and another round of calls for companies to encrypt their databases. Cryptography is a powerful tool, but in cases like this one it's not going to help. If your OS is secure, you don't need the crypto; if it's not, the crypto won't protect your data. In a case like the Anthem breach, the really sensitive databases are always in use. more
Last month in the annual "State of the Word" presentation for 2020, Automattic CEO and WordPress co-founder Matt Mullenweg announced that WordPress now powered 39% of websites, as measured by W3Techs. The number has actually grown a bit more since that time to 39.5%.1 Perhaps by next month it will pass 40%. What is more remarkable to me is to see that in December 2020, for the first time, the number of sites using WordPress passed the number of sites that were NOT using any form of content management system (CMS). more
Broadband networks are stretched thin today due to the large numbers of adults and students working from home. There are many stories on the web that indicate that a lot of employees are not going to be going back to the office when the pandemic is over. Here are two stories about a trend towards more teleworking from the dozens that a Google search uncovered. more
By some estimates, only half of the world's population has internet access, leaving the other half at a sizeable competitive disadvantage. This profound connectivity gap is especially significant in the unserved and underserved areas of developing and least-developed countries. For people who live in these places, Internet connectivity is not just about the Internet. It is a lifeline that gives access to electronic commerce and telehealth services, distance learning, social and political engagement, government services... more
2018 was a record-breaking year for the IPv4 market. The total volume of addresses traded, overall number of transactions in the ARIN region, and prices reached their highest levels to date. Since 2014, the number of transactions has grown considerably, mostly attributable to a dramatic increase in small block trades of fewer than 4,000 addresses. The volume of addresses sold during the same period, however, tells a different story. more
It's remarkable to me that there are now two powerful agencies fighting to "govern" the Internet -- the ITU and the FCC. On any given day, it's hard to tell whether they are on the same side or different sides. The ITU process apparently began in earnest with the World Summit for the Information Society (WSIS) meetings, where the concept of "Internet Governance" became an urgent goal. The FCC process began when incumbent Internet Access Providers (IAPs) argued that "Net Neutrality" was a stalking horse for government control... more