/ Most Viewed

Designing Secure Networks with Cisco Technology, Part 1

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies.... "Wisdom consists in being able to distinguish among dangers and make a choice of the least harmful." That quote is quite possibly the most accurate depiction possible of the never-ending struggle between network security and corporate budget. Providing a mechanism to defend the enterprise network from every conceivable threat is impossible in terms of both technology and funding. more

Restraining Order Filed by US States’ Attorneys in the Final Hours of IANA Transition

With less than 24 hours to go before the historic contractual relationship between the US government and ICANN is set to expire, a motion hearing is expected to be held today based on a lawsuit filed in federal court in Texas by four states' attorneys general which could lead to NTIA facing the possibility of a temporary injunction. more

Is 47 USC 230(c) an Immunity or an Affirmative Defense (Does it Matter?)

Procedure matters. It matters whether a defendant can dispose of a litigation right out of the gate, or whether the defendant must suffer the slings and arrows of discovery, motions, and trial before presenting a successful defense. Procedurally, once a litigation has been initiated, defendant has a chance to say, "hey, wait a minute, there isn't actually a cause of action here." It's like someone suing me for being tall. Well, yeah, but there is no recognized cause of action against being tall. more

SpaceX Starlink Beta, Phase Two

According to an email, Starlink has moved into the second phase of its beta program, nicknamed the "better than nothing beta," which feels a bit like monopoly hubris to me. It may be better than nothing, but it is not as good as the initial beta, which was free. Participants will pay $99 per month for the service and pay $499 for a terminal, including a tripod and WiFi router. I wonder what the difference is between these "beta testers" and "customers." more

Mobile Infrastructure Running Out of Steam

The enormous growth in mobile usage, doubling each year, is set to continue for several years in a row. According to Ericsson, by 2020 mobile operators will need to provide one thousand times the capacity that was required in 2010. Our assessment at BuddeComm is that the mobile industry has already fallen behind in delivering the capacity needed today, let alone coping with the enormous growth ahead; and that this situation will deteriorate before it improves. more

Email More Secure Today Than Two Years Ago, Research Suggests

Google in partnership with the University of Michigan and the University of Illinois, has published the results of a multi-year study that measured how email security has evolved since 2013. Although Gmail was the foundation of the research, insights from the study are believed to be applicable to email more broadly. more

Greece Announces Plans to Install Free Public Wi-Fi Nationwide

Greece's Department of Telecommunications and Post (EETT) has announced plans to install 3000 public Wi-Fi hotspots around the nation beginning next year in both open-air and enclosed public spaces. more

Summary of the Registration Operations Association Workshop

The first Registration Operations Association Workshop took place on Thursday, 16 October 2014, at the Los Angeles Hyatt Regency Century Plaza Hotel. I'd like to thank the 64 people that took the time to attend and participate in the discussion, both in-person and remote. I started the workshop with an introduction to some of the technical challenges being faced by the domain registration industry. more

Internet Governance and the Universal Declaration of Human Rights, Part 2: Article 1-5

Digital governance, like all governance, needs to be founded in guiding principles from which all policy making is derived. There are no more fundamental principles to guide our policy making than the Universal Declaration of Human Rights, (UDHR). This article is Part 2 of a series of articles exploring the application of the UDHR to rights issues in the cyberspaces of the Internet ecosystem. The previous article in the series explores the foundations of the UDHR. more

How Far Will U.S. Regulators Bend to AT&T and Verizon?

Recent events relating to the network plans of AT&T and Verizon are extraordinary: it appears that the commercial and lobbying clout of two major telcos is determining the telecom services which their customers can receive, the technology they will receive them with, and whether they will receive them at all. Already a large number of states have agreed to dismantle Carrier of Last Resort (COLR) obligations on them, while the FCC itself is being advised to change the rules to suit the business interest of the telcos. more

Assigning 32-bit ASNs

With 16-bit Autonomous System Numbers (ASNs), 65,536 unique numbers are possible. Just like 32-bit IP addresses, these 16-bit ASNs are becoming a scarce resource. Therefore, in 2007 the Internet Engineering Task Force (IETF) developed a new format, 32-bit ASNs (RFC 4893), which increases the supply of ASNs to four billion. more

EU Ruling on Google Ad Keywords: Implications for Brand Owners

In a landmark judgment issued this past Tuesday, the European Court of Justice (ECJ) ruled that Google is not liable for trademark infringement when an advertiser purchases a keyword based on a competitor's trademark to trigger a search ad, so long as it removes infringing ads promptly when notified by brand owners. However, and this is critical, individual advertisers could be held liable if ads triggered by a keyword involving a competitor's trademark are found to confuse consumers. So, what qualifies as consumer confusion? more

Some Thought on the Paper: Practical Challenge-Response for DNS

Because the speed of DNS is so important to the performance of any connection on the 'net, a lot of thought goes into making DNS servers fast, including optimized software that can respond to queries in milliseconds, and connecting DNS servers to the 'net through high bandwidth links. To set the stage for massive DDoS attacks based in the DNS system, add a third point: DNS responses tend to be much larger than DNS queries. more

5th ITAC OECD Newsletter: Internet Governance, WSIS+10, IoT, Cybersecurity, Trust, Standards…

Today the Internet Technical Advisory Committee (ITAC) to the OECD published the fifth edition of its newsletter. The ITAC was created in 2009 following the OECD's Seoul Ministerial with the objective to provide Internet technical and policy expertise to the work of the OECD on Internet-related issues. This informal group is coordinated by the Internet Society and currently counts 28 members active in domains such as open Internet/Web standards development, interconnection, IP addressing, security or privacy. more

Thinking Carefully About New gTLD Objections: String Confusion (Part 1 of 4)

Since speaking last fall on community-based TLDs at the New gTLD Summit in Los Angeles, I have been asked a number of times to provide input on the objections ICANN allows in its New gTLD Applicant Guidebook ("AGB" or simply the "Guidebook"). As the March 13 deadline approaches, I now present the first of a series of four spotlight articles on the subject -- one on each of the four permissible grounds for objection. more