/ Most Commented

ICANN Begins Accepting Applications for New gTLDs

ICANN announced today that after over seven years of planning, the organization has initiated the process for accepting applications for new generic top-level domains (gTLDs). "We believe this program will do what it's designed to do, which is open up the Internet domain-name system to further innovation," said Rod Beckstrom, ICANN chairman, during an event at the National Press Club in Washington today. More information on the Applicant Support program can be found on the ICANN New gTLD page. more

New TLD Application Window Opens Tomorrow - What Does It Mean? (Here are Answers to Some Basic FAQs)

Tomorrow, January 12th 2012 ICANN will open the application window for new TLDs. This post includes answers to some of the based frequently asked questions. If you have any other questions/queries, or if something is unclear please let me know via the comment at the end of the post. more

Types of Attack

A lot of pixels have been spilled in the last few years about "advanced persistent threats" (APT); if nothing else, any high-end company that has been penetrated wants to blame the attack on an APT. But what is an APT, other than (as best I can tell) an apparent codename for China? Do they exist? After thinking about it for a while, I came up with the following representation... more

Will We See IPv6-Enabled Consumer Devices at CES This Week?

What kind of IPv6 support will we see in consumer devices at the massive Consumer Electronics Show (CES) happening in Las Vegas this week? The show is already underway and much of the tech media is already writing in breathless prose about the latest tablets, notebooks and zillions of other consumer devices making their debut at CES. While the bright-shiny-object-chasing side of me definitely notices those articles, my own interest is on a deeper and far more technical level. more

Secret Doors in Phones and Computers

An article appeared in Computer World that alleges: in exchange for the Indian market presence" mobile device manufacturers, including RIM, Nokia, and Apple (collectively defined in the document as RINOA) have agreed to provide backdoor access on their devices. Could it be true that Nokia, RIM and Apple opened up to Government interception? more

Comcast Announces Completion of DNSSEC Deployment

Comcast, a leading ISP in the U.S., has fully deployed Domain Name System Security Extensions (DNSSEC) according to a company announcement today. Jason Livingood, Comcast's Vice President of Internet Systems writes: "As of today, over 17.8M residential customers of our Xfinity Internet service are using DNSSEC-validating DNS servers. In addition, all of the domain names owned by Comcast, numbering over 5,000, have been cryptographically signed. All of our servers, both the ones that customers use and the ones authoritative for our domain names, also fully support IPv6." more

IPv6 Riding the LTE Coattails

In June 2009 we mused in these columns about Long Term Evolution standing for Short Term Evolution as wireless networks started to drown in a data deluge. It is January 2012 and we keep our heads above the mobile data deluge, even if barely, thanks to a gathering avalanche of LTE networks. Even the wildest prognoses proved conservative as the GSMA was betting on a more 'managed' progression... more

US House Committee Announces Oversight Hearing on DNS and Search Engine Blocking

House Committee on Oversight and Government Reform Chairman Darrell Issa today announced that the Full Committee will hold a hearing on January 18 to examine the potential impact of Domain Name Service (DNS) and search engine blocking on security, jobs and the Internet community. The Committee will hear testimony from cybersecurity experts and others from the technology community. more

How to Make DNS Green

The Dutch Internet registry SIDN has launched a unique program in partnership with CleanBits to identify what proportion of .nl domain names were hosted on a green or CO2-neutral basis. The results show a strong trend towards the 'greening' of the .nl internet zone. Nearly 30 per cent of .nl names were found to have green hosts. more

The Case of Mobile Users’ Bandwidth Consumption and Causality

It started with a report in the New York Times, citing a study from Arieso, saying that "Top 1% of Mobile Users Consume Half of World's Bandwidth". Arieso said that part of the reason for the increase in download volumes may be Apple's Siri voice feature on the iPhone 4S which allows consumers to dictate to the phone and enter more text and data... Other news outlets picked up the story and lost all perspective. more

ICANN’s Final Preparations for New gTLDs

I think it's fair to say that ICANN is in a state of near meltdown at the moment. With less than a week to go before the new gTLD program's first application window is opened, on Thursday January 12, 2012, the amount of work being done is mind-bending. The ICANN Board held a special meeting on January 5 to determine the program's state of readiness ahead of the launch. more

2011 Domain Name Year In Review: Top 10 Biggest Domain Stories

Who would have ever believed that .XXX would finally be approved AND launched, total domains registrations would continue to grow at 10% year over year, ICANN would be in the process of preparing for the launch of new gTLDs in the face of harsh criticism, and that both Go Daddy and Group NBT would be acquired by private equity firms. As we look back over the past year, here are the top 10 biggest domain stories of 2011. more

Vint Cerf: Internet Access Not a Human Right But Only Means to an End

Technologies such as the Internet should be viewed as enabler of rights, not a right itself says Vint Cerf in an op-ed piece in The New York Times. He writes: "The best way to characterize human rights is to identify the outcomes that we are trying to ensure. These include critical freedoms like freedom of speech and freedom of access to information...
 more

Japan Developing Distinctive Anti-Cyberattack Virus

The Japanese Defense Ministry is creating a computer virus capable of tracking, identifying and disabling sources of cyberattacks, according to reports. The development of the virtual cyberweapon was launched in 2008. Since then, the weapon has been tested in a closed network environment. "The most distinctive feature of the new virus is its ability to trace cyber-attack sources. It can identify not only the immediate source of attack, but also all "springboard" computers used to transmit the virus." more

In an Internet Minute

Intel sent an interesting infographic: What Happens in an Internet Minute. Looking at the traffic data, Intel asks if there is sufficient attention being paid to investment in infrastructure. Imagine the state of the network in three years, when the number of connected devices is projected to be double the world's population. Can our networks scale to handle predicted traffic and meet consumer expectations for immediate access from multiple devices? more