/ Most Viewed

The Naive Arrogance of FUSSPs

Everyone who's been in the e-mail biz long enough knows the term FUSSP, Final Ultimate Solution to the Spam Problem, as described in a checklist from Vern Schryver and a form response that's been floating around the net for a decade. FUSSPs fall into two general categories, bad ideas that won't go away, and reasonable ideas that are oversold. more

SpaceX Set to Launch Jupiter 3, the World’s Largest Commercial Communications Satellite, on Falcon Heavy Rocket

SpaceX is set to make history this Wednesday, July 26, by launching the largest commercial communications satellite to date, the Jupiter 3, using its Falcon Heavy rocket. more

How Will the New .AU Domain Licensing Rules Impact You?

The .AU Domain Administration (auDA) will soon implement new .AU domain administration licensing rules either late this year or early next year. These rules apply to new registrations and around 3 million existing domain names in the com.au, net.au, org.au, and more .AU namespaces... Previously, an Australian trademark application or registration may constitute the required Australian presence for an .AU domain name, but the domain name need not match the trademark. more

Report on Smart Grid Cyber Security

A recent report from Pike Research, "Smart Grid Cyber Security" has found if smart grids can realize their full potential, consumers, utilities, nations, and even the earth itself will benefit. As with nearly any new technology, the industry focus has been on getting smart grids up and running, often with little consideration for cyber security issues. more

Cisco Issues Hight Alert on IPv6 Vulnerability, Says It Affects Both Cisco and Other Products

Cisco today released a high-level alert warning about a vulnerability in IPv6 packet processing functions of multiple Cisco products that could allow an unauthenticated, remote attacker to cause an affected device to stop processing IPv6 traffic, leading to a denial of service (DoS) condition on the device. more

How to Manage and Secure Big Data

Several developments are coming together in cloud computing that are creating shockwaves throughout society and in the economy. Over the last five years we have seen the debate about cloud computing hotting up. There was the hype around the new development at the same time as warnings regarding security and privacy, and for a while the market seemed subdued about the new development. However the economic reality of cloud computing meant that enterprises and government bureaucracies had little choice but to move ahead with cloud computing... more

Cloud Computing Traffic Expected to Grow 12-Fold by 2015

Global cloud computing traffic is expected to grow 12-fold from 130 exabytes to reach a total of 1.6 zettabytes annually by 2015 -- a 66% compound annual growth rate -- according to Cisco's Global Cloud Index. 1.6 zettabytes is approximately equivalent to 22 trillion hours of streaming music; 5 trillion hours of business Web conferencing with a webcam; 1.6 trillion hours of online high-definition (HD) video streaming. more

Verisign Expands MANRS Relationship to Strengthen Global Routing Security

Verisign has been involved with an initiative known as Mutually Agreed Norms for Routing Security, or MANRS, since its inception. MANRS, which is coordinated by the Internet Society, focuses on strengthening the security and resiliency of IP networks throughout the world by identifying and providing best practices for mitigating common routing security threats. MANRS began as a collaboration among network operators and internet exchange providers, with Verisign formally becoming a participant in its Network Operator Program in 2017. more

Top Six IT Trends Impacting Business Networks

For decades, IT followed business. Even the development of the World Wide Web didn't move this development much beyond the four walls of corporate offices -- outside connections were essential but never informed the growth of business-critical technology. Now the growth of public clouds, enterprise-grade social networking and mobile device use in the workforce is creating a new paradigm, one where business networks are reactive to IT trends -- here are six that are set to impact companies this year. more

Trump Administration Announces Its Big 5G Push: Largest-Ever Spectrum Auction and a 20.4B Fund

In a special White House event today, President Trump along with FCC chair Ajit Pai, announced a major push towards 5G deployment as part of the "5G Fast Plan" initiative. more

Is Your Router Spying on You?

If you've followed the telecom industry at all, you've heard of the effort to rip-and-replace Chinese network gear used mostly in cellular networks and in some fiber networks. The U.S. government ordered that such equipment be replaced, although it has funded the replacement in dribs and drabs. There has been heightened scrutiny of Chinese electronics since the recently discovered Beijing-sponsored cyberattacks that have been reported to have infiltrated the networks of major U.S. more

ICANN Accountability Deficits Revealed in Panel Ruling on .AFRICA

In an important test of ICANN's primary accountability mechanism, its Independent Review Process (IRP), the organization has been handed a stinging blow over its mishandling of the bid for the new generic Top-Level Domain (gTLD) .AFRICA. At the crux of the issue are two competing applications for the .AFRICA new gTLD and the decision by ICANN's Board to abdicate its responsibility to ensure that ICANN's evaluation and subsequent rewarding of the domain was carried out fairly, transparently, and in accordance with the organization's Bylaws, Articles of Organization, and established policies. more

Susan Crawford to the White House on Ada Lovelace Day

Just in time for Ada Lovelace Day comes the news that Susan Crawford (Wikipedia, CircleID) is headed to the White House as special assistant to the president for science, technology, and innovation policy... more

An Investigative Analysis of the Silent Librarian IoCs

The Silent Librarian advanced persistent threat (APT) actors have been detected once again, as the academic year started in September. With online classes increasingly becoming the norm, the group's phishing campaigns that aim to steal research data and intellectual property could have a high success rate. Dozens of phishing domain names have been reported, although some may have already been taken down. more

A Report on the OECD/BEREC Workshop on Interconnection and Regulation

I presented at a OECD/BEREC workshop that was held on the 20th June in Brussels, and I'd like to share some personal impressions and opinions from this workshop. The OECD/BEREC workshop was a policy-oriented peering and exchange forum. It was not a conventional operational peering forum where the aim is to introduce potential peers to each other and facilitate peer-based interconnection of network operators, but a workshop that involved both network operators and various national and EU regulators, as well has having inputs from the OECD. more