Total number of domains names across all top-level domains grew to 326.4 million in the first quarter of 2016, Verisign reported today. more
Around the world there are ongoing developments to reform and transform industries and whole sectors with the assistance of new information & communications technologies (ICTs). There is a clear understanding that reforms are essential in order to provide the level of services and the quality be it in business or elsewhere. Lifestyle issues are under threat in relation to the quality and the affordability of healthcare, social services, education, energy and the environment... more
CIDR (Classless Inter-Domain Routing) is a routing system in which network engineers can distribute IP addresses based on the size of their specific network. This is more efficient than the previous system, which assigned IP addresses depending on whether the size of a network fits into one of only three sizes: Class A, Class B, and Class C. more
The exposed areas needing improvement by ICANN - both the organization as well as its global community of stakeholders - provide a target-rich environment. In the nearly three years since the completion of the transition of the Internet Assigned Names Authority (IANA), ICANN has persistently sought to drive top-down dictatorial policymaking; to shroud its activities and decision-making from public view; and, to evade accountability -- in some cases even doubling down on its efforts. more
There's been a lot of media attention in the last few days to a wonderful research paper on the weakness of 1024-bit Diffie-Hellman and on how the NSA can (and possibly does) exploit this. People seem shocked about the problem and appalled that the NSA would actually exploit it. Neither reaction is right. In the first place, the limitations of 1024-bit Diffie-Hellman have been known for a long time. RFC 3766, published in 2004, noted that a 1228-bit modulus had less than 80 bits of strength. That's clearly too little. more
Neustar, Inc. begins a "Kick-start America" campaign for the .US Top-Level Domain. Companies of all sizes -- locally-based or doing business in the United States -- are encouraged to demonstrate their local presence with "America's Address." more
One of the oddest aspects of FCC monitoring of broadband is that the agency has accepted the premise that any broadband product faster than 25/3 Mbps is adequate broadband. This means that the FCC has completely accepted that broadband provided by cable companies is adequate and is something the agency doesn't have to be concerned with. The FCC makes the automatic assumption that broadband from cable companies is good broadband... more
On the 25th of September, the northern autonomous region of Iraq known as Kurdistan voted to become an independent country. This vote has led to a current standoff between the central Iraqi government and the Kurdish Regional Government (KRG), with the Kurds threatening to cut off internet service into Iraq in retaliation for any punitive measures inflicted by Baghdad on the KRG. The following analysis was written by Doug Madory of Oracle Dyn after ISIS took control of Mosul, Iraq in 2014. It describes how the internet of Iraq came to be dependent on international connections through telecoms based in Kurdistan. more
A lot of rural America continues to hope that low orbit satellite (LEO) service will provide a broadband alternative. It's been a while since I've covered the status of the companies proposing to deploy constellations of satellites for providing broadband. In March, OneWeb filed for Chapter 11 restructuring when it was clear that the company could not raise enough cash to continue the research and development of the satellite product. more
While Cuban president Miguel Díaz-Canel was in New York to address the United Nations, he met with members of Congress and executives from the agriculture, travel and information and communication technology (ICT) industries. The ICT meeting was at Google's New York office and ten other companies attended. In addition to Díaz-Canel the Cuban ministers of Foreign Affairs, Foreign Trade and Foreign Investment and Communications were at the meeting. more
The United States Department of Justice has announced that it has neutralized a global network of computers compromised by malware called "Snake," which the U.S. government attributes to a unit within Center 16 of the Federal Security Service of the Russian Federation (FSB). more
Apple announced its decision to trust only one-year digital certificates on its Safari browser in February 2020. This decision created a domino effect, with Mozilla and Google following suit; certificate providers announced they would not issue two-year certificates after Aug. 19, 2020. We wrote an article in March to help brands to prepare for this change. more
IPAM solutions are the source of truth for IP resources on the network, but when performing IPAM functions such as assignments, reconciliations, DNS updates, network plans, or Regional Internet Registry (RIR) requests, IPAM is often limited by its integration with an OSS. Operational teams can find it challenging to complete routine tasks without an integrated IPAM solution due to siloed data pools and swivel-chair environments. more
ICANN will not delay the launch of its much anticipated program to create hundreds, possibly thousands, of new Internet extensions, nor run a limited ‘pilot program’, as reported today by Kieren McCarthy of .Nxt. "Steve Crocker [ICANN's chairman] admitted that the organization’s Board will be holding a special meeting in the first week of January and that the meeting’s focus will be the launch of the new gTLD program the following week." However that meeting will not consider a delay or limited rollout option. more
Since the RIPE NCC launched its Resource Certification service, there is a steady increase in the number of prefixes covered by certificates. The Resource Certification (RPKI) service was launched at the beginning of 2011. The system enables network operators to perform Border Gateway Protocol (BGP) origin validation, which means that they can securely verify if a BGP route announcement has been authorised by the legitimate holder of the address block. more