/ Most Viewed

Bitcoin: The Andromeda Strain of Computer Science Research

Everyone knows about Bitcoin. Opinions are divided: it's either a huge bubble, best suited for buying tulip bulbs, or, as one Twitter rather hyperbolically expressed it, "the most important application of cryptography in human history". I personally am in the bubble camp, but I think there's another lesson here, on the difference between science and engineering. Bitcoin and the blockchain are interesting ideas that escaped the laboratory without proper engineering - and it shows. Let's start with the upside. more

What Happens If Two Applications for a New gTLD Are a City and a Family Name?

When applying for a new gTLD, what happens if two applications for the same extension are a city and a family name? Which one wins? Let's imagine that a person whose family name is "Marseille" applied for the .MARSEILLE new gTLD in the next round of the ICANN new gTLD program. What if there was a .MARSEILLE new gTLD too but as the name of the French city? more

Networks and Nationalization

This post isn't about -- or isn't only about -- the use of computer technology to commit crimes. It's more about the use of computer technology to commit war. A few weeks ago, I was part of a conversation about the legal issues cyberwarfare raises. We were talking about various scenarios -- e.g., a hostile nation-state uses cyberspace to attack the U.S. infrastructure by crippling or shutting down a power grid, air traffic control systems, financial system, etc. Mostly, we were focusing on issues that went to the laws of war, such as how and when a nation-state that is the target of a cyberattack can determine the attack is war, rather than cybercrime or cyberterrorism. more

Thoughts on IPv6 Security, Take Two

A few months ago, I made a post about IPv6 security. I've caught some flak for saying that IPv6 isn't a security issue. I still stand by this position. This is not to say that you should ignore security considerations when deploying IPv6. All I claim is that deploying IPv6 in and of itself does not make an organization any more or less secure. This point was made by Dr. Joe St. Sauver, of the University of Oregon... more

IGF Nairobi - Success of the Multi-stakeholder Model

A funny thing happened in Nairobi last week... I showed up for an Internet Governance Forum (IGF) panel discussion on the use of the Internet during times of political and social unrest, and a truly multi-stakeholder dialogue broke out. It turned out to be my favorite session during an incredible IGF week that, thanks to our Kenyan hosts, exceeded every expectation. The session, formerly known as "The Internet in the Post-Revolution Phase – Challenges of Political Engagement and the Safety of Citizens" was cancelled for reasons unknown. Perhaps it was a conflict of schedules, or maybe the topic was deemed by the organizers or certain governments to be too sensitive for the official agenda. more

Price Increases for .COM and .NET: The Generated Impact on the Performance of the Two TLDs

Verisign announced a few days ago a decrease of 0.4 million domain name registrations for .COM and .NET Top Level Domains, a first time in the history of these TLDs. Could this decrease be related to the successive price increases of September 2021 and September 2022? On 28 July 2022, Verisign, the registry for the .COM and .NET TLDs, announced that it would be applying a 10% increase in the price of .NET domains as of 1 February 2023. more

Amazon Web Services Targets Startups and Creators With .aws

It will come as no surprise to those who've read my blogs that I get pretty excited about seeing .brand domains launch. At Neustar we're all in on promoting .brand usage in any industry, from all around the world and as such, we're always watching closely for any signs of new domains on the horizon, trawling for case studies or any hint of new activity. So imagine my surprise when a brilliant .brand example jumped out in front of me at JFK airport. more

The U.S. Fiber Expansion Craze

I've written several times recently in blogs that there is a growing backlog in buying fiber cable. Some of the backlog is due to the general supply chain malaise that seems to be affecting almost everything we buy. During the recent gas shortages in North Carolina, I found out that there is a shortage of truck drivers. Apparently, many truck drivers found something else to do during the pandemic, and now there is a shortage of drivers to deliver the many goods that are shipped by truck. more

Overcoming Cloud Storage Security Concerns: 7 Key Steps

According to a 2013 TwinStrata survey, 46 percent of organizations use cloud storage services and 38 percent plan to adopt this technology in the near future. Cloud storage capacity demands are increasing 40 to 60 percent year-over-year, while storage density lags behind at 20 percent. The result? More data, growing demands for space and increasing security concerns. How do enterprises overcome cloud storage security challenges? more

RIAA Loses Again: No Legal Wins Against P2P File Sharers So Far

The Recording Industry Association of America (RIAA) has been taking a lot of people to court -- basically, harassing folks in an attempt to curb file-sharing. The $220,000 verdict against Jammy Thomas got a lot of news (and probably worried a lot of folks). However, on appeal (i.e., after a new court not cherry-picked by the RIAA to try the case looked things over), the RIAA lost... again. ...At its heart, the verdict reaffirms that simply making a copyrighted work available is not the same as actually distributing the work. more

Does the iPhone Keep dotMobi Awake at Night?

We've had a number of questions (and seen plenty of commentary) regarding the recent launch of the iPhone and how it might affect us and the mobile web in general. ...the iPhone changes the way that tastemakers think about their online existence. Interacting with the web, clearly, is no longer a solitary, sedentary and constrained activity.Now I've personally believed this for a while, so arguably it's no big deal -- the long-term evolution of the web to become a largely mobile (and, by the way, subtly different) medium is inevitable. more

Email Snooping Can Be Intrusion Upon Seclusion

Analysis could also affect liability of enterprises using cloud computing technologies... Local elected official Steinbach had an email account that was issued by the municipality. Third party Hostway provided the technology for the account. Steinbach logged in to her Hostway webmail account and noticed eleven messages from constituents had been forwarded by someone else to her political rival. more

ICANN: A Concrete “Thin Contract” Proposal

It looks as if ICANN is going to require applicants for new TLDs to agree (in advance) not to negotiate a changed contract with ICANN. We agree that streamlining the process is in everyone's interest. Along those lines, we are proposing a substantially thinner contract that ICANN and new registries could use. Existing registries should also be allowed to sign up to this contract, if they wish. more

NANOG 65 Report

NANOG 65 was once again your typical NANOG meeting: a set of operators, vendors, researchers and others for 3 days, this time in Montreal in October. Here's my impressions of the meeting... The opening keynote was from Jack Waters from Level 3, which looked back over the past 25 years of the Internet, was interesting to me in its reference to the "Kingsbury Letter". more

Google’s New Public DNS Service - and Data Retention Issues

In a move potentially of significant importance to the vast majority of Internet users who do not run their own DNS servers to resolve Internet site domain names, Google announced their own publicly accessible DNS service. Unlike some other publicly accessible DNS services that may redirect nonexistent domain queries for advertising purposes, Google explicitly states that "Google Public DNS never blocks, filters, or redirects users." more