/ Most Viewed

The Death of Millimeter-Wave Cellular?

Apple recently announced that it is not building millimeter-wave spectrum antennas into the next generation SE iPhone. Interestingly, this is a phone sold by Verizon, which spent a year advertising on TV and showing us speed tests on cellphones that were receiving gigabit speeds. more

ICANN Must Simultaneously Reveal TLD and Second-Level Registration Rules

I outline two possible drawbacks with the idea of first revealing rules for the new proposed Top-Level Domains (TLDs) and then for second-level registrations. I propose a lottery process to initially allocate second-level domain names. A number of people have voiced concerns about the idea of automatically granting the winner of the TLD a monopoly power over second-level domain registrations. We should also be worried about the financial interest ICANN has in not providing the rules for the two-level registrations simultaneously. more

Scientists Transmit Terabits Per Second Through Air, May Replace Undersea Cables

Scientists from ETH Zurich and their European partners have demonstrated a groundbreaking capability for transmitting several tens of terabits per second, despite considerable air turbulence. This feat was accomplished with lasers over a distance between the Jungfraujoch mountain peak and the city of Bern in Switzerland. The technology could potentially eliminate the need for expensive undersea cables, currently forming the backbone of the Internet. more

New Zealand’s Top-Level Domain Manager Seeking New Registry Service Provider for .nz

The manager for .nz announced today that they have launched a registry replacement process and are calling for expressions of interest from potential service providers by November 29th. more

Pew’s Broadband Home 2010 Research: Is It Truly Representative?

A Pew Home Broadband 2010 Summary reports in a sub-headline, a dramatic absence of continued growth in broadband adoption across the United States; while at the same time reporting increases in demographic adoption in a particular ethnic group. That sub-headline seems contradictory by indicating an overly dramatic slowing of adoption more

ICANN Proposes Exclusive TLD: .INTERNAL for Private Use

The Internet Corporation for Assigned Names and Numbers (ICANN) is considering the introduction of a new top-level domain (TLD) named .INTERNAL. Unlike traditional TLDs, .INTERNAL is designed exclusively for internal use, akin to the private IPv4 block 192.168.x.x. more

Turn the Table on Content Filtering

Why do we run content filters at the recipient's side? Paul Graham's Plan for Spam introduced them that way. After several years, we can say that plan doesn't work very well. Email has become much less reliable. One way to recover reliability, at least between trusted parties, is to run filters at the sender's side. Let's look at the diagram in more detail... more

Identifying Spam: MAAWG’s Latest Documents Improve Accuracy of Reputation Systems

The Messaging Anti-Abuse Working Group (MAAWG), of which Return Path (my employer) is a very active participant, met recently in Heidelberg, Germany. Among other exciting projects, they finished two new best practices documents which have been lauded in the press as a big step towards stopping botnet spam... more

Technology Fights Against Extreme Poverty

One of the good things about participating in the meetings of the UN Broadband Commission for Digital Development is seeing the amazing impact our industry has on the daily lives of literally billions of people. While everybody - including us - is talking about healthcare, education and the great applications that are becoming available in these sectors, the real revolution is taking place at a much lower level. more

What Modern Businesses Need to Know Regarding Geo Names and Jurisdiction in Domain Name Disputes

The Internet has provided an unprecedented number of opportunities while raising far-reaching legal issues. It has created a complex matrix of national laws, global circumstances and new definitions -- or, at least, definitions in progress. The turmoil over Brexit and the international implications of the EU General Data Protection Regulation are signs of the times; as are issues surrounding domain names. more

The Ageless Warning of Icarus

It wasn't that long ago that, during a visit home, my brother asked me, "Why are you so stuck on this Internet thing?" His direct question caused me to realize that I had never actually stopped and considered why I was investing so much time – and in such a highly visible manner – into Internet governance when I wasn't being compensated for doing so and, in fact, was – not putting too fine of a point on it – flat broke. more

Decision Time for the Open Internet

On February 26 of this year the Federal Communications Commission (FCC) of the United States will vote on a proposed new ruling on the issue of "Network Neutrality" in the United States, bringing into force a new round of measures that are intended to prevent certain access providers from deliberately differentiating service responses on the carriage services that they provide. more

More Evidence Why Doing Good Pays Off and Love Doesn’t

The new gTLDs program can't succeed unless two things happen. The approved registries must do good, and ICANN must weed out applicants who are in love. This is to say that registries should put users' good first, and applicants shouldn't get the nod unless their motive is economic and/or social viability. A recent study reveals that leading companies have enjoyed healthy profits because they made doing good their strategic foundation. more

Summary Report Now Posted of W3C/IAB “Strengthening The Internet (STRINT)” Workshop

Given that I've written here about the original call for papers for the W3C/IAB "Strengthening The Internet Against Pervasive Monitoring (STRINT)" Workshop and then subsequently that the STRINT submitted papers were publicly available, I feel compelled to close the loop and note that a report about the STRINT workshop has been publicly published as an Internet-draft. more

Security and Reliability: A Closer Look at Vulnerability Assessments

Building on my last article about Network Assessments, let's take a closer look at vulnerability assessments. (Because entire books have been written on conducting vulnerability assessments, this article is only a high level overview.) What is a vulnerability assessment? more