/ Most Commented

Notes from NANOG 63

The following is a selected summary of the recent NANOG 63 meeting, held in early February, with some personal views and opinions thrown in! ...One view of the IETF's positioning is that as a technology standardisation venue, the immediate circle of engagement in IETF activities is the producers of equipment and applications, and the common objective is interoperability. more

The Top 25 Global Websites from the 2015 Web Globalization Report Card

I'm pleased to announce the publication of The 2015 Web Globalization Report Card. Here are the top-scoring websites from the report... You'll notice that Google is once again ranked number one. The fact is, no other company on this list invests in web and software globalization like Google. While many software companies are happy to support 40 or even 50 languages on their websites, Google is looking at 60 or more languages across its many products. more

The 2015 IGF Brazil Will Focus on Empowering Sustainable Development

The preparations of the Brazil Internet Governance Forum (IGF) meeting are well under way. After consulting the wider Internet community and discussing the overarching theme of the 2015 IGF meeting, the Multistakeholder Advisory Group (MAG) decided to retain the title "Evolution of Internet Governance: Empowering Sustainable Development". This theme will be supported by eight sub-themes that will frame the discussions at the Joao Pessoa meeting... more

The Why and How of DNS Data Analysis

A network traffic analyzer can tell you what's happening in your network, while a Domain Name System (DNS) analyzer can provide context on the "why" and "how." This was the theme of the recent Verisign Labs Distinguished Speaker Series discussion led by Paul Vixie and Robert Edmonds, titled Passive DNS Collection and Analysis -- The "dnstap" Approach. more

Phishing Costs Companies over $411 Million per Alert

Phishing blindsides businesses' best defenses and takes a toll whose price tag still hasn't been pinned down. Here's one estimate: $441 million per attack, according to a recent study of the cybercrime's effect on stock market data (market value, volume of shares traded, and stock volatility) of global firms. The authors use "event studies" techniques (i.e., analyzing the impact of specific types of events on companies' market performance) to analyze nearly 2,000 phishing alerts by 259 companies in 32 countries... more

NETmundial Initiative Taking Positive Steps Forward

The Net Mundial conference in Sao Paulo in April 2014 added a new element to the global Internet Governance Ecosystem. It demonstrated that the multistakeholder model for the governance of the Internet is able, not only to discuss issues of global importance, as we do it now for nearly ten years within the Internet Governance Forum (IGF), but it can also produce a concrete outcome. The Universal Declaration of Internet Governance Principle and the Sao Paulo Roadmap have enhanced the existing mechanisms. more

So You’ve Got Some Big Data, but Now What?

As Internet connection continues on a steady path of becoming a ubiquitous commodity in mature markets, we saw an eruption of big data tracking and analysis software in 2014. But what are operators going to do with all this new information? And how can they turn data into revenue? To start with, providers need more than just a data measurement tool. They need a solution that can analyze real-time data and then automate processes to optimize their networks and improve their subscribers' experiences. more

ICANN’s 52nd Meeting Kicks Off in Singapore

Singapore's Minister of Communications and Information, Dr. Yaacob bin Ibrahim, and former Senior Advisor to President Bill Clinton, Ira Magaziner, spoke to the success of the multistakeholder model of Internet governance during the Opening Ceremony of ICANN's 52nd public meeting today... more

The Uses and Abuses of Cryptography

Another day, another data breach, and another round of calls for companies to encrypt their databases. Cryptography is a powerful tool, but in cases like this one it's not going to help. If your OS is secure, you don't need the crypto; if it's not, the crypto won't protect your data. In a case like the Anthem breach, the really sensitive databases are always in use. more

U.S. Senate Declares “Internet Governance Awareness Week” Coinciding with ICANN 52 Singapore

On February 5th, while many (including the author) were on route to ICANN 52 in Singapore, the U.S. Senate passed S.Res. 71, a non-binding, "Sense of the Senate" Resolution declaring February 8th–14th as "Internet Governance Awareness Week". Those dates overlap the now ongoing ICANN meeting in Singapore, and the congruence is intentional. more

Return to Singapore: From Chili Crabs to Names, Numbers and Protocol Parameters

Almost a year ago, the National Telecommunications and Information Administration (NTIA) announced its intent to transition key Internet domain name functions to the global multistakeholder community. The process was officially kicked off at the ICANN 49 meeting. That was March 2014. And the place? Singapore. Fast-forward a year later and we are again on our way to Singapore for an ICANN meeting. more

Call for Participation: Registration Operations Workshop at IETF-92

The next Registration Operations Workshop will take place at the start of IETF-92 on Sunday, March 22, 2015, at The Fairmont Dallas Hotel. The workshop will start at 12:30 p.m. CDT and will finish at 4:30 p.m. CDT. We are seeking proposals for Extensible Provisioning Protocol (EPP) extensions to be featured as part of the workshop, including existing extensions that people wish to register with the Internet Assigned Numbers Authority (IANA)... more

The IG Marathon, Who Will Win the Internet Governance Race

2015 has already started to make its own land marks in the internet of things world. A major thing that has definitely hit the headlines is cyber security issue, which gives an indication that organizations will probably have to make generous budgetary allocations to answer to these anticipated breaches. Internet governance is perhaps going to remain in the headlines for the rest of 2015. more

IPv6 Security Myth #4: IPv6 Networks are Too Big to Scan

Here we are, all the way up to Myth #4! That makes this the 4th installment of our 10 part series on the top IPv6 Security Myths. This myth is one of my favorite myths to bust when speaking with folks around the world. The reason for that is how many otherwise well-informed and highly experienced engineers, and others, hold this myth as truth. It's understandable, really. more

FCC Chairman: It’s Time to Settle Net Neutrality Questions

Federal Communication Commission (FCC) Chairman, Tom Wheeler, today in an open letter in the Wired Magazine writes: "After more than a decade of debate and a record-setting proceeding that attracted nearly 4 million public comments, the time to settle the Net Neutrality question has arrived..." more