/ Most Viewed

Government Policies Beyond Broadband

The telecom infrastructure decisions we are now facing have very little to do with developments or the need for services in 2009 or 2010. They are more related to where the digital economy is taking us in the future. This is well beyond the time needed to kick-start sluggish economies. more

Call for Participation – ICANN DNSSEC and Security Workshop for ICANN74 Policy Forum

Do you have information about DNS security or routing security that you would like to share with the global community? Have you developed a new tool or system in this area? Do you have results from a research project that you want to share with a technical community? If so, please consider submitting a proposal to the DNSSEC and Security workshop to be held at ICANN 74 in June 2022. more

Ron Paul Caught in Domain Dispute with Supporters

Former U.S. presidential candidate and congressman Rob Paul has filed a complaint with the World Intellectual Property Organization against the registrants of RonPaul.com and RonPaul.org in order to gain control of the domains. more

How to Evaluate Performance of a DNS Resolver

Ten years ago everyone evaluating DNS solutions was always concerned about performance. Broadband networks were getting faster, providers were serving more users, and web pages and applications increasingly stressed the DNS. Viruses were a factor too as they could rapidly become the straw that broke the camel's back of a large ISP's DNS servers. The last thing a provider needed was a bottleneck, so DNS resolution speed became more and more visible, and performance was everything. more

The Velocity of Change at SCTE

Engineering wise, how's the industry doing? With that question in mind, hundreds descended on Denver for this year's Society of Cable Telecommunications Engineers (SCTE) Cable-Tec Expo. That question begs to be answered. Really, can we still separate the engineering 'cool' stuff from the business chic? By that, I mean the business requirements from subscribers who demand communication and entertainment when they want it, where they want it, and on whatever device they want it delivered to. more

China Sets Up Internet Oversight Body, Has Authority to Investigate and Punish

Caixin reports that the State Council, China's cabinet, has set up an office to regulate internet activity, according to an announcement released on May 4 via an official website. The new department, called the State Internet Information Office, will supervise online content management and process approvals of businesses involved in online news reporting, according to the state-run news agency Xinhua. The new agency is reported to have the authority to investigate and punish online content-providers if necessary. more

Into the Gray Zone: Considering Active Defense

Most engineers focus on purely technical mechanisms for defending against various kinds of cyber attacks, including "the old magic bullet," the firewall. The game of cannons and walls is over, however, and the cannons have won; those who depend on walls are in for a shocking future. What is the proper response, then? What defenses are there The reality is that just like in physical warfare, the defenses will take some time to develop and articulate. more

Australia Aborting Its Ambitious $44 Billion Broadband Project

Rodney S. Tucker reporting in IEEE Spectrum: "In April 2009, Australia's then prime minister, Kevin Rudd, dropped a bombshell on the press and the global technology community: His social democrat Labor administration was going to deliver broadband Internet to every single resident of Australia... So now, after three years of planning and construction, during which workers connected some 210 000 premises (out of an anticipated 13.2 million), Australia's visionary and trailblazing initiative is at a crossroads. The new government plans to deploy fiber only to the premises of new housing developments." more

The Early History of Usenet, Part I: The Technological Setting

Usenet -- Netnews -- was conceived almost exactly 40 years ago this month. To understand where it came from and why certain decisions were made the way they were, it's important to understand the technological constraints of the time. Metanote: this is a personal history as I remember it. None of us were taking notes at the time; it's entirely possible that errors have crept in, especially since my brain cells do not even have parity checking, let alone ECC. Please send any corrections. more

Major New Funding Opportunities for Internet Researchers and R&E Networks

Nationally Appropriate Mitigation Action (NAMA) is a new policy program that was developed at the Bali United Nations Climate Change Conference. As opposed to the much maligned programs like CDM and other initiatives NAMA refers to a set of policies and actions that developed and developing countries undertake as part of a commitment to reduce greenhouse gas emissions. Also unlike CDM, NAMA recipients are not restricted to developing countries. more

Kansas System Hacked, Social Security Numbers of Millions Accessed Spanning 10 States

Hackers breached a Kansas Department of Commerce data system used across multiple states and gained access to more than 5.5 million Social Security Numbers, according to local news sources. more

A Closer Look at Recent Submarine Cable Failures

In light of the recent submarine cable failures, Doug Madory from Renesys has a detailed report on what has happened to some of the providers in four countries along the route of the cable: Egypt, Saudi Arabia, Pakistan and India. more

A Better PIR Deal – Maintaining Trust Is Good Business

I run a business. For years I've been in the ICANN Business Constituency, holding a series of different positions including Chair. Suffice it to say, I'm absolutely ok with making money and generally speaking, letting markets work. I also care about NGOs. For years our firm worked with PIR on the .NGO project. We got to see up close the role PIR has played as a supporter of NGOs online -- encouraging best practice, helping push out DNSSEC to a global audience, working on DNS abuse issues, supporting the sector. more

Google Public DNS Service Passes 70 Billion Requests Per Day, No Longer Experimental

Google reports that its "experimental" public DNS service launched in December of 2009 has now passed 70 billion requests a day and no longer considered experimental. From the announcement: "Google Public DNS has become particularly popular for our users internationally. Today, about 70 percent of its traffic comes from outside the U.S. We’ve maintained our strong presence in North America, South America and Europe, and beefed up our presence in Asia. We've also added entirely new access points to parts of the world where we previously didn't have Google Public DNS servers, including Australia, India, Japan and Nigeria." more

Trump Names Former Bush Aide Thomas Bossert Chief Adviser on Cybersecurity, Counterterrorism Role

President-elect Donald J. Trump has named Thomas P. Bossert, a top national security aide under President George W. Bush, to be his homeland security adviser, the Trump transition team announced Tuesday morning," Michael D. Shear reporting in the New York Times. more