/ Most Viewed

PINGO: NETmundial Adopts Principles on INternet GOvernance

The Internet Governance Roadmap, which was adopted recently in Sao Paulo by the Global Multistakeholder Meeting on the Future of the Internet Governance Ecosystem (NETmundial) includes a lot of controversial issues -- from net neutrality to mass surveillance -- and it is unclear how this will be translated into reality. However, the Internet Governance Principles, also adopted by NETmundial, were less controversial, but will have probably a sustainable and deep effect for the future of the Internet. more

URLs, IP Numbers, and Speech

There's a great fight going on right now in Philadelphia...The case is about a Pennsylvania statute [PDF] that mandates that Pennsylvania ISPs remove access to sites that the AG believes contain child pornography. Now, child pornography is abhorrent and any ISP will cooperate in taking down such sites that it is hosting. But the problem is that in complying with the statute with respect to sites the ISPs don't themselves host, ISPs are (rationally) using either IP blocking ("null routing") or "domain poisoning" techniques, both of which (particularly the IP number blocking) result in rendering inaccessible millions of perfectly legal sites. more

New gTLDs Show Promising SEO Performance

With the arrival of hundreds of new generic top-level domains (gTLDs), many marketers are excited that they can now get a web address that best describes their business or brand. For instance, a company in the organic business can now get a web address on .ORGANIC, or a brand that's all about passion and excitement can now get on .RED, etc. At the same time, many are also asking some important SEO related questions. more

Preventing Future Attacks: Alternatives In DNS Security Management - Part II

In Part I of this article I set the stage for our discussion and overviewed the October 21st DDoS attacks on the Internet's 13 root name servers. In particular, I highlighted that the attacks were different this time, both in size and scope, because the root servers were attacked at the same time. I also highlighted some of the problems associated with the Domain Name System and the vulnerabilities inherent in BIND. Part II of this article takes our discussion to another level by critically looking at alternatives and best practices that can help solve the security problems we've raised. more

WCIT and Internet Governance: Harmless Resolution or Trojan Horse?

The Resolution No. 3 called "To Foster an Enabling Environment for the Greater Growth of the Internet" became the subject of a rather substantial controversy during the recent World Conference on International Telecommunication (WCIT) which ended last week in Dubai. Some people have argued that they did not understand the noise around the short text... However a second reading of the ten paragraphs makes you sensitive that this "harmless resolution" could become also a "Trojan Horse". more

Are Domain Name Registrars Ready for IPv6?

Now that ICANN has added IPv6 name servers for the root zone, and that many registries have enabled IPv6 on their DNS servers, I thought it would have been easy to update the DNS records pointing to my domain to mention a IPv6-only DNS server. This way, we could have native name resolution end-to-end in IPv6. We are not there yet, it seems. more

Simulation of OneWeb, SpaceX and Telesat’s Proposed Global Broadband Constellations

Inigo del Portillo and his colleagues at MIT have run a simulation comparing OneWeb, SpaceX and Telesat's proposed low-Earth orbit Internet service constellations. The models are based on the initial FCC filings by the companies and demand and data-rate estimates by the authors. I will mention subsequent amendments to the filings below later in the post. more

Using Domain Filtering To Effect IP Address Filtering

In Taking Back The DNS I described new technology in ISC BIND as of Version 9.8.0 that allows a recursive server operator to import DNS filtering rules in what ISC hopes will become the standard interchange format for DNS policy information. Later I had to decry the possible use of this technology for mandated content blocking such as might soon be the law of the land in my country. I'm a guest at MAAWG this week in San Francisco and one of the most useful hallway discussions I've been in so far was about the Spamhaus DROP list. more

When will we run out of IPv4?

A paper by Tony Hain was recently published in the Internet Protocol Journal which sparked a debate on Slashdot. Particularly, Tony's paper suggested that IANA will run out of IP addresses in 5 years or less. However, there is another paper written by Geoff Hutson which projects that we have enough IPv4 address until 2022. The differences got most people confused. So who is right? more

The New Hong Kong Anti-Spam Law, and a Small Fly in the Ointment

Well, it has been quite a while since first the Hong Kong OFTA (in 2004) and then CITB (in 2006) issued requests for public comment about a proposed UEM (Unsolicited Electronic Messaging) bill to be introduced in Hong Kong, for the purpose of regulating unsolicited email, telephone and fax solicitations. We're a large (worldwide) provider of email and spam filtering - but we're based in Hong Kong, and any regulation there naturally gets tracked by us rather more actively than laws elsewhere. We sent in our responses to both these agencies... The bill is becoming law now - and most of it looks good... There's one major fly in the ointment though... more

The Sins of the Flash

Recent news stories (based on research by Stanford student Feross Aboukhadijeh) state that an Adobe bug made it possible for remote sites to turn on a viewer's camera and microphone. That sounds bad enough, but that's not the really disturbing part. more

Annual Global IP Traffic Will Exceed Two-Third of a Zettabyte in 4 Years

Annual global IP traffic will pass two-thirds of a zettabyte in four years according the Cisco's Visual Networking Index report. The economic downturn has only slightly tempered traffic growth and the global IP traffic is expected to quintuple from 2008 to 2013. Cisco predicts IP traffic to grow at a compound annual growth rate (CAGR) of 40%. more

A Look at the Origins of Network Email

The history of long distance communication is a fascinating, and huge, subject. I'm going to focus just on the history of network email -- otherwise I'm going to get distracted by AUTODIN and semaphore and facsimile and all sorts of other telegraphy. Electronic messaging between users on the same timesharing computer was developed fairly soon after time-sharing computer systems were available, beginning around 1965 -- including both instant messaging and mail. more

United Nations Establishes Working Group on Internet Governance

Secretary-General Kofi Annan announced today the members of the United Nations Working Group on Internet Governance, which is to prepare the ground for a decision on this contentious issue by the second phase of the World Summit on the Information Society in 2005. The establishment of the Working Group was requested by the first phase of the Summit, held in Geneva last December. At that time, countries agreed to continue the dialogue on the management of the Internet, at both the technical and policy levels. more

Clouded by a Convenient Illusion

In a relatively short time, the phrase "in the cloud" has become a term of art when talking about the internet. A quick Google search shows nearly a million uses of the phrase in the past month, a 3x increase from the same period in 2009. But, what does it actually mean to have your web site, your software, your data, or anything else "in the cloud?" "In the cloud" is derived from "cloud computing," which in turn is just a new term for distributed computing, where data-crunching tasks are spread across a variety of different physical processing units. This was common in mainframes in the 1960s, and later the idea of distributing processing across cheap PCs running Linux became popular in the 1990s. more