ICANN's board of directors has voted to put a March deadline on discussions concerning .amazon top-level domain. more
I'm happy to have the option of buying services. It's easier to eat at a restaurant than to do my own cooking, and I'm happy to pay for a ride rather than fighting traffic on my own. However, I'm not happy if I don't have the option of cooking for myself or of taking a stroll. I used to be willing to pay for all of my phone calls but today I know that, thanks to VoIP, there is no need to. But the phone companies are attempting to wrest back control with their wider 5G agenda. more
The broadband industry has falsely sold its customers on "speed", so unsurprisingly "speed tests" have become an insane and destructive benchmark... marketing departments at ISPs refuse to define what experience that actually intends to deliver (and what is unreasonable to expect), the network engineers are left with a single and simple marketing requirement: "make it better than it was". more
Over the past few days, Microsoft made two major announcements. One was a "playbook [for] providing a carrier-grade platform for edge and cloud computing to help network operators realize the full potential of 5G technology" using its it Azure cloud data centres. The second announcement was a new platform that enables satellite-based access to those same cloud data centres designated Azure Orbital. Coupled with these announcements was another one by Samsung... more
As noted in my first article of this series (see part one, two and three), security and reliability encompass holistic network assessments, vulnerability assessments and penetration testing. This month I'd like to go deeper into penetration testing; however, first, let's go back for a quick refresh before getting started. more
The highest court in Germany has ruled against telephone and email data retention used to track criminal networks. Melissa Eddy of the Global and Mail reports: "A law ordering data on calls made from mobile or landline telephones and e-mail exchanges be retained for six months for possible use by criminal authorities violated Germans' constitutional right to private correspondence, the Federal Constitutional Court ruled. In its ruling, the court said the law failed to sufficiently balance the need for personal privacy against that for providing security."
more
Do you know someone who has played a major role in the development and advancement of the Internet? Now is the time to recognize their contribution. Nominate them for the 2019 Internet Hall of Fame. With more than 100 inductees, the Internet Hall of Fame celebrates Internet pioneers and innovators who have pushed the boundaries to bring the Internet to life and make it an essential resource for billions of people today. more
In a joint statement released today by Eric Schmidt, Chairman and CEO of Google, and Lowell McAdam, President and CEO of Verizon Wireless, the two companies have expressed their support for making existing 'net neutrality' principles enforceable. The joint statement was published as a blog post late Wednesday on both Google and Verizon policy blogs. more
The term "reputation hijacking" continues to spread through the anti-spam community and the press. It's intended to describe when a spammer or other bad actor uses someone else's system -- usually one of the large webmail providers -- to send their spam. The idea is that in doing so, they're hijacking the reputation of the webmail provider's IPs instead of risking the reputation of IPs under their own control. But I really have to laugh (though mostly out of sadness) whenever this technique is described as something new... more
I look at this as the ideas of Mike Powell and Meg Whitman, and a lot of unimportant wordsmithing. Before the Dublin (Erie) IETF I wrote one for one of the top three DCCC targeted races. You, or One, or I (isn't voice fun) tries for ideas that matter, and then try to connect the dots, for the semi-literate staff of a candidate who needs clue, e.g., to make effective calls to the DNC's major contributor lists for area codes 415, 408, 650 and 831. I mention Dublin because ages ago Scott Bradner's plan for Harvard, decent bandwidth everywhere and location transparency was, in just a few pages, a revolutionary policy document then, and now, and I was happy to see Scott again and let him know that two decades later I still remembered seeing policy stated with confidence and clarity. more
It is not surprising that the phase 1 review of domain name rights protection mechanisms is delayed, but it is a bit of a surprise that in responding to a question posed in 2020, business executives and their lawyers replied with answers first offered and rejected five years earlier. In that time before COVID-19, the launch of the Vox Populi Registry and its dotSucks domain names drew quite a lot of attention. more
Facebook just announced support for PGP, an encrypted email standard, for email from them to you. It's an interesting move on many levels, albeit one that raises some interesting questions. The answers, and Facebook's possible follow-on moves, are even more interesting. The first question, of course, is why Facebook has done this. It will only appeal to a very small minority of users. Using encrypted email is not easy. more
What's a domain name? What business function do they serve? Can a domain name generate ROI? I imagine these were the questions the Board of Racing Victoria asked before signing off on the purchase of racing.com to support a Victorian racing industry joint initiative to establish a digital media and content platform similar to that of the AFL. more
The Flagstaff Unified School District (FUSD), in Arizona which consists of 15 schools and over 9,600 students, canceled classes on both Thursday and Friday after a ransomware virus was found on multiple servers. more
Distributed Denial of Services (DDoS) attacks have been the frustration of information technology professionals for many years. When asked, most tell you they wish their internet service providers (ISPs) would simply provide them "clean pipes" all the time and take care of DDoS attacks upstream before they ever get to them. Unfortunately, the resources (equipment and personnel) necessary to clean Internet connections all the time are very expensive and come with several downsides. more