/ Most Viewed

To Tax or Not to Tax

Well it is not new that the US has always maintained that the Internet should be a tax free zone as per the US Congress's Tax Freedom Act 1998 which following expiry continued to be reauthorized and its most recent re-authorization (legal speak for extension) was in October 2007 where this has been extended till 2014. It is unclear whether there will be another extension post 2014. There is a moratorium on new taxes on e-commerce, and the taxing of internet access via the Tax Freedom Act. more

The Internet as Weapon

One of the most striking and enduring dichotomies in the conceptualization of electronic communication networks is summed up in the phrase "the Internet as weapon." With each passing day, it seems that the strident divergence plays in the press -- the latest being Tim's lament about his "web" vision being somehow perverted. The irony is that the three challenges he identified would have been better met if he had instead pursued a career at the Little Theatre of Geneva and let SGML proceed to be implemented on OSI internets rather than refactoring it as HTML to run on DARPA internets. more

ICANN CEO “Cautiously Optimistic” EU to Provide Clear Guidance for Domain Industry GDPR Compliance

"ICANN could invoke emergency powers in its contracts to prevent Whois becoming 'fragmented' after EU privacy laws kick in next month," reports Kevin Murphy in Domain Incite. more

GeoTLDs: Diversity is Key

The 2004 new sTLD round brought about a new type of TLD in the form of .asia and .cat. As we always struggle for words to capture their nature, I call them "geoTLDs". Culture, language and ethnicity are also part of geography. Contrary to ccTLDs, geoTLDs do not have a territorial meaning. They are a wonderful addition to the Internet as they provide a way to demonstrate one's commitment to a community that is not defined by borders, yet linked to where the individual chooses to be. ...Will they be? They will, unless we do the wrong thing now. more

Designing Secure Networks with Cisco Technology, Part 3

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies. Each article in the series will cover a different aspect of security technologies and designs and how each can be deployed in the enterprise to provide the best security posture at the lowest possible budgetary and administrative cost. In Part 2 of this series I discussed security risks and vulnerability. In this article we begin to focus on the role Cisco network and security technologies play in ensuring the safety and security of network data. more

Why Understanding Bandwidth is Essential for Improving Subscriber QoE

Measuring and managing subscriber bandwidth can be an easy and cost-efficient way to improve subscriber quality of experience (QoE). In a HFC cable network, bandwidth is shared among users in the same fiber-node. Even though improvements in DOCSIS technology has allowed a substantial increase of bandwidth availability per fiber-node, a few heavy users - as well as new 4K video content - can quickly kill recently-made network investments and leave subscribers with an impression that they are not receiving the quality they deserve. more

Consensus Polling: ALAC Shows the Way

ICANN is about to make the jump from "merely excavating" to efficiently mining top-quality jewels. I say this because ICANN's At-Large Advisory Committee (ALAC) has reached unanimous consensus on their internal Self Review. As the New Zealand meeting drew to a close, a weary ALAC was ready to give up on creating a consensus Self Review. The familiar ICANN collaborative process of emailing Word attachments had "excavated" ALAC into the also familiar ICANN mire of "deeply divided over competing versions." more

Court Finds Pirate Bay Defendants Guilty, With Jail Sentence

A Swedish court on Friday found all four defendants guilty in a copyright test case involving one of the world's biggest free file-sharing websites. "The Stockholm disctrict court has today found guilty the four individuals that were charged with accessory to breaching copyright laws," the court said in a statement. "The court has sentenced each of them to one year in prison." more

North American Broadband Trends

The broadband sector, like the wireless sector, is one of the strongest growth areas of telecommunications. Unlike most OECD countries, where DSL tends to dominate, the majority of subscribers in the US fixed broadband market are cable subscribers. During 2010 the gap continued to widen as the cable companies accounted for 70% of new broadband subscribers compared to the telcos' 30%. Although new broadband networks such as FttH and WiMAX are being widely deployed, broadband competition in each region is still generally limited to one DSL and one cable operator. more

Three Things Registrars Must Do to Enhance Security

If the rise of phishing has taught us anything, it's that on the Internet, if a digital asset has value, there's somebody out there who wants to steal it. Whether it's a bank account password, a credit card number, a PayPal login, or even a magic sword in an online game, there's a fraudster somewhere trying to misappropriate it for his or her own nefarious purposes. Domain names have always been a target for such criminals. more

JPA Agreement: Will it Change the Problems With the UDRP?

It was rather interesting to read this new agreement between the USDoC and ICANN talking about the mechanisms, methods and procedures necessary to effect the transition of Internet domain name and addressing system (DNS) to the private sector. What was more interesting though was to read in this very agreement the following: "...the Department continues to support the work of ICANN as the coordinator for the technical functions related to the management of the Internet DNS". OK, let's be honest! Technical? more

Internet Records Retention Bill

A lot of pixels have been spilled lately over an Internet records retention bill recently introduced in both the House and the Senate. The goal is to fight child pornography. That's a worthwhile goal; however, I think these bills will do little to further it. Worse yet, I think that at least two of the provisions of the bill are likely to have bad side effects... more

Facebook Enters Wholesale Fiber Business, Plans to Sell Unused Capacity on New Fiber Routes

Facebooks says it intends to allow third parties - including local and regional providers - to purchase excess capacity on its fiber. more

Prepare for the Worst, But Hope for the Best

A couple of weeks ago, I blogged about the importance of the timeline leading up to the September 2015 deadline for the IANA oversight transition proposal. In that post, I explored the nature of U.S. politics and how it can affect the transition if we, as a community, are not diligent in our efforts to meet that deadline. Since then, the IANA Stewardship Transition Coordination Group (ICG) has held its first meeting and a conference call, resulting in some new information that necessitates an update to that post. more

DNS-Based DDoS: Diverse Options for Attackers

Denial of service attacks have been around since the Internet was commercialized and some of the largest attacks ever launched relied on DNS, making headlines. But every day a barrage of smaller DNS-based attacks take down targets and severely stress the DNS ecosystem. Although DNS servers are not usually the target of attacks they are often disrupted so attention from operation teams is required. There is no indication the problem is going away and attackers continue to innovate. more