/ Most Viewed

Africa, Let’s Embrace v6 Now!

AFRINIC is the regional Internet registry for Africa, and our core activity is to manage and distribute Internet numbers resources (IPv4, IPv6 and ASN's) to the 57 economies in Africa. IPv4 address scarcity is a very real issue worldwide, the internet keeps growing and the demand for Internet addresses will continue to grow. Africa has the lowest number of Internet users in the world. Internet's penetration in Africa jumped from very low level in 2009, to around 16% of individuals in 2013 and over 20% in 2015. more

Internet Society Expresses Concern over Direction of WCIT

In light of final developments during the WCIT meetings, the following statement was released from the CEO and President of Internet Society, Lynn St. Amour on Wednesday, December 12, 2012: "At the conclusion of today's plenary, the Internet Society is concerned about the direction that the ITR'S are taking with regards to the Internet. The Internet Society came to this meeting in the hopes that revisions to the treaty would focus on competition, liberalization, free flow of information and independent regulation..." more

Legal Threats Should Not Diminish ICANN’s Resolve

Guidebook for all interested parties. The best way to start this process would be to give conditional approval to the proposed final AGB next week. This may in fact involve acquiescing to the specific requests placed before it by litigious special interests, but those requests should be granted because they are reasonable and in the best interests of the program and its participants and stakeholders, not because ICANN feels it has to cave at the first sign of a gTLD opponent lawyering up. more

Dusty Name System

Every IT person has some interaction with a DNS server, even if it is not managing it. Most DNS servers, certainly the majority are sitting in some closet or rack somewhere dutifully running and collecting dust. Like a certain battery operated bunny, these services just keep on running. The durability of DNS (Domain Name System, that is) is a testimony of just how well it was designed... How often do you think about your DNS server? Here is my plan for how to keep your relationship with your DNS server alive and well. more

When CDA Immunity is Not CDA Immunity

Here's a question: If 47 USC 230(c) (the Good Samaritan provision of the Communications Decency Act) says that online services are not liable for third party content, then can you even sue the online service? Shouldn't the online service be immune from lawsuit? Because, after all, what would be the point of being sued for something for which you cannot be liable? more

40% of Wi-Fi Access Points in US Open, Only 25% in Europe

United States has a higher percentage of 'open' Wi-Fi hostspots than Europe according the recent data analysis based on close to 50 million Wi-Fi networks worldwide. WeFi, a broadband Wi-Fi locater with a database of over 47 million access point worldwide, reports that 40% of Wi-Fi access points recorded in the US are unlocked and do not require a security password, compared with only 25% of total access points in Europe."Within Europe, out of the top 10 countries in terms of Wi-Fi deployment, the most Wi-Fi friendly countries are Belgium and Norway, while the highest percentage of locked access points is found in Germany and Spain." more

Greatest Internet Landgrab in History

Paul Sloan reporting in CNET: "ICANN tomorrow will reveal who is going after what new domain extensions, paving the way for a very different looking Web. Prepare for dot-madness... It's not just the hard-core denizens of the domain world that are going after new TLDs, which are also known as 'strings.' Others are jumping into the fray. The most intriguing is Google, which in late May revealed that it's applying for an undisclosed number of strings, including .Google, .YouTube, .docs, and .lol..." more

Trust Binding

A few months ago, there was a lot of discussion that despite its claims, Zoom did not actually offer end-to-end encryption. They're in the process of fixing that, which is good, but that raises a deeper question: why trust their code? (To get ahead of myself, this blog post is not about Zoom.) If Zoom has the key but doesn't abuse it, there isn't a problem, right? Let's fast-forward to when they deploy true end-to-end encryption. Why do we trust their code not to leak the secret key? more

Free the Fiber Now

In a previous blog post I mentioned that the FCC had taken away restrictions to allow broadband supplied by E-Rate funding to be used to provide free WiFi for the public. That's a good idea that will provide some relief for areas with little or no other broadband. But the announcement raises a more fundamental question - why was such a restriction in place to begin with? more

Incumbents Fight Broadband Improvement

There was a recent article in the Bangor Daily News about Charter Communications fighting a move by small towns in Maine to bring fiber broadband. To anybody who has been in the business for a while, this is nothing new. The big cable companies and telcos have fought municipal broadband for decades. The article highlights a recent public meeting in the small town of Leeds, a town of under 2,300. The town was hoping to partner with Axiom Technologies, a nearby ISP, to provide fiber broadband. more

U.S. Falls Behind China in Broadband, Light-Touch Regulation Blamed for the Decline

Recent reports indicate that China has now surpassed the U.S. and is becoming the number one broadband country in the world. According to data analysis by market research firm Point Topic, both the U.S. and China had about 78 million broadband lines at the end of August; however China is growing twice as fast. Point Topic says that when broadband use initially surged in China, some experts predicted the country would overtake the U.S. in 2006. However the U.S. speeded up in the number of broadband lines and growth in China leveled off. For 18 months the two countries were more or less even with similar numbers of lines added in each quarter until the first quarter of this year. more

Efficient Threat Intelligence: Learning the Secrets

How can our threat intelligence platform deliver more? This is a question many business professionals employing threat intelligence practices are asking themselves as their companies continue to fall short against the machinations of modern-day cybercriminals. The truth is that while threat intelligence is certainly not a silver bullet, organizations often make a mistake when they opt for a platform without considering several important factors that can help them evaluate the market better and deploy the practice more effectively. more

Healthy Domains Initiative Isn’t Healthy for the Internet

We had high hopes that the Domain Name Association's Healthy Domains Initiative (HDI) wouldn't be just another secretive industry deal between rightsholders and domain name intermediaries. Toward that end, we and other civil society organizations worked in good faith on many fronts to make sure HDI protected Internet users as well. Those efforts seem to have failed. more

A New Low for the ICANN Multistakeholder Process

ICANN's dismissal of public comments submitted on the .COM Registry Amendment wasn't surprising given that it recently dismissed the public comments on the .Org Renewal Agreement, but the speed and disdain which it demonstrated was. Despite public pronouncements by ICANN President and CEO, Gören Marby and assurances from ICANN Board Chair, Maarten Botterman, that public comments were welcomed and that ICANN would take them seriously... more

Don’t Break out the Champagne Just Yet: More Work to Do Before IANA Transition Occurs

After two years of meetings, comment periods, and more meetings, the Internet Corporation for Assigned Names and Numbers submitted its IANA transition proposal to the US Department of Commerce last week at the end of the ICANN 55 meeting in Marrakech. While this is a critical milestone and the multi-stakeholder community should be commended for its efforts, several concerns still remain. more