/ Most Viewed

Supporting New DNS RR Types with dnsextlang, Part I

The Domain Name System has always been intended to be extensible. The original spec in the 1980s had about a dozen resource record types (RRTYPEs), and since then people have invented many more so now there are about 65 different RRTYPEs. But if you look at most DNS zones, you'll only see a handful of types, NS, A, AAAA, MX, TXT, and maybe SRV. Why? A lot of the other types are arcane or obsolete, but there are plenty that are useful. more

AT&T CEO Confident Trump-Appointed FCC Will Scrap Net Neutrality Regulations

AT&T's regulatory problems are melting away as the inauguration of President-elect Donald Trump draws near. more

Time to Redelegate IE Namespace?

I've written extensively about Ireland's country code Top-Level Domain (ccTLD) '.ie' and its current registry operator IE Domain Registry (IEDR) in the past. While I've always tried to be fair and balanced in my coverage of the issues facing the IE namespace, I'm afraid my patience with the current registry operator has worn thin. While things may have improved over the course of the last few years, it is becoming abundantly clear that the current registry operator is probably not the best organisation to manage the ccTLD in the future. more

We’re Almost There… IANA Stewardship Transition

Since Friday, I have been listening to and, yes, talking to many in Dublin who are engaged in the multistakeholder effort to transition the IANA functions. Our goal is an orderly transition that both reaffirms the strength of the global multistakeholder model while protecting and preserving the coordinated, well-functioning administration of the unique identifiers that are the core of the technical genius of the Internet. more

Expansion of Top-Level Domain Names: Why Current Brand Protection Procedures Will Be Impractical

As ICANN introduces new generic top level domains (gTLDs) and separates itself from US oversight, it has the opportunity to distance itself from the taint of cybersquatting, brand abuse, and criminal activity involving domains... To underscore the scope of the issue, consider this research on just 30 top Interbrand-ranked global brands. The most recent MarkMonitor Brandjacking Index found cybersquatting incidents increased over 40% in the last year for the brands that were studied; these leading brands suffered as many as 15,000 incidents per brand... more

Department of Commerce to Allow US Companies Work With Chinese to Develop 5G and Other Standards

A new rule announced by the U.S. Department of Commerce on Monday enables American companies to contribute to standards-development activities in the telecommunications sector more fully. more

The Upload Crisis

Carriers continue to report on the impact of COVID-19 on their networks. One of the more interesting statistics that caught my eye was when Comcast reported that upload traffic on their network was up 33% since March 1. Comcast joins the rest of big ISPs in saying that their networks are handling the increased traffic volumes. By 'handling' the volumes, they mean that their networks are not crashing and shutting down. But I think there is a whole lot more to these headlines than what they are telling the public. more

FCC Chairman: We Must Choose to Preserve the Open Internet

As per earlier reports, U.S. Federal Communications Commission Chairman Julius Genachowski proposed new rules today requiring Internet service providers to treat all Internet traffic equally and allow users to access their networks with any device. more

Why CDNs Are Critical to Future of R&E Networks, Big Data and the Internet

Netflix has announced that they are deploying their own Content Delivery Network (CDN) for delivery of their video streams to Internet Exchange Points (IXPs) around the world. More importantly they are making the hardware and software design of their CDN servers freely available. That means any network can deploy Netflix CDN boxes deep into their network to significantly reduce traffic volumes and improve performance for users. more

Meeting with ITU Secretary General Dr Hamadoun Touré

During the ITU Conference I had the honour of a private meeting with Dr Hamadoun Touré, Secretary-General of the ITU since 2006... Dr Touré has a fascinating background. Born in Mali and educated in Russia, he has brought with him a distinctly fresh approach to the ITU. He has been Africa's Regional General Manager for ICO Global Communications and worked at various levels at the International Telecommunications Satellite Organization (INTELSAT). more

China’s Central Bank Allows Some Commercial Lenders to Start Running Trials of Its Digital Currency

China's central bank is a step closer to becoming the world's first major monetary authority to issue its own digital tender. The People's Bank of China will conduct internal tests for the central bank's digital currency (CBDC) across four cities (Shenzhen, Suzhou, Xiong'An and Chengdu), according to a statement issued by the bank on Friday. more

The Future of Europe’s Fight Against Child Sexual Abuse

Like much of how the Internet is governed, the way we detect and remove child abuse material online began as an ad hoc set of private practices. In 1996, an early online child protection society posted to the Usenet newsgroup alt.binaries.pictures.erotica.children (yes, such a thing really existed) to try to discourage people from posting such "erotica" on the assumption that the Internet couldn't be censored. more

Registration Operations Workshop (ROW) at IETF-93: RDAP as a Successor of Whois

The next Registration Operations Workshop will take place at the start of IETF 93 on Sunday, July 19th, 2015. The focus of this workshop is on the Registration Data Access Protocol, the successor of Whois. RDAP is a combined protocol for IP addresses and names registration data. Therefore, we are expecting both domain names and RIR communities to attend the workshop. more

How to Move Cybersecurity Forward in a More Positive Way

In 2013 I wrote a blog Telecoms as a spying tool, in which I mentioned that those who use the internet to spy indiscriminately will have to face the reality that such activities will only start a cat-and-mouse game -- the technology will always be able to stay one step ahead of those who are using the internet for criminal purposes. Since that time some very significant developments have taken place that have confirmed our prediction. more

Green Dam is Breached… Now What?

As a number of China hands predicted, the Chinese government has postponed its mandate requiring that all computers sold in China must include the Green Dam -Youth Escort censorware by today. Yesterday after the news broke I told the Financial Times: "There's been this impression in the internet industry that when the Chinese government makes a demand, they have to roll over and play dead. The lesson here is that's not necessarily the case." more