/ Most Commented

Looking at Centrality in the DNS

The Internet's Domain Name System undertakes a vitally important role in today's Internet. Originally conceived as a human-friendly way of specifying the location of the other end of an Internet transaction, it became the name of a service point during the transition to a client/server architecture. A domain name was still associated with an IP address, but that 1:1 association was weakened when we started adjusting to IPv4 address exhaustion. more

In Memoriam: Frederick P. Brooks, Jr. – a Personal Recollection

Brooks is famous for many things. Many people know him best as the author of The Mythical Man-Month, his musings on software engineering and why it's so very hard. Some of his prescriptions seem quaint today -- no one these days would print out documentation on microfiche every night to distribute to developers -- but his observations about the problems of development remain spot-on. But he did so much more. more

Three Reasons Why CISOs Need to Understand Domain Security

Domain name abuse is one of the most dangerous and under-regulated issues in digital business security today. An attack on a web domain can lead to the redirection of a company's website, domain spoofing, phishing attacks, network breaches, and business email compromise (BEC). Domains used as a company's online world are part of an organization's external attack surface and need to be continuously monitored for cybercrime attacks and fraud. more

The Price for Faster Upload Speeds

I've always been impressed by the marketing folks at the big cable companies. They are masters of extracting money from customers willing to pay for better broadband. The latest example comes from Comcast. The company is introducing a new product in the Northeast that offers faster upload speeds -- for a price. Comcast knows that its biggest weakness is upload speeds. more

The Fibre Optic Path

In August 1858, Queen Victoria sent the first transatlantic telegram to U.S. President James Buchanan. The cable system had taken a total of four years to build and used seven copper wires, wrapped in a sheath of gutta-percha, then covered with a tarred hemp wrap and then sheathed in an 18-strand wrap, each strand made of 7 iron wires. It weighed 550kg per km, with a total weight of over 1.3Mkg. more

Cloud Gaming

Gaming is a huge business. In 2021, gaming generated $214 billion in revenues worldwide. That represents over 6% of all spending on entertainment. Gaming market experts are predicting that this will grow to over 10% during this decade. The pandemic triggered a growth spurt in gaming, with revenues almost tripling since 2019. During that time, there was also a big change in the dynamics of the industry, where many games are offered for free. more

Going Dark: How the Increasingly Dark Network Is Creating Some Pretty Ugly Choices for Site Security Administrators

I'd like to reflect on a presentation by Dr. Paul Vixie at the October 2022 meeting of the North American Network Operators Group (NANOG) on the topic of the shift to pervasive encryption of application transactions on the Internet today. There is a view out there that any useful public communications medium needs to safeguard the privacy and integrity of the communications that it carries.  more

How Are You Solving the Digital Divide

One of the most common questions I'm being asked these days is from local politicians and economic development folks who want examples of other communities that are tackling and solving the digital divide. I'm able to trot out the big-picture stories because they come to my attention in reading about the industry. As an example, just before I wrote this blog, I read an article that says that the State of Maryland will be providing 150,000 laptops to homes... more

The Modern Encryption Debate: What’s at Stake?

The debate around encryption has become a hot topic in a world where communications are increasingly becoming digital. The modern encryption debate is a complex and nuanced issue, with many players from different backgrounds trying to influence the conversation. The question of balancing the need for national security with the right to privacy has been a matter of public debate for years. Only recently has the issue been framed in terms of encryption, but the discussion is certainly not new. more

The Short History of the Internet: From ARPANET to the Metaverse

Last Saturday marked the 53rd anniversary of the Internet. While the vast majority of its five billion users have been online for less than a decade, the Internet was taken into use on October 29th, 1969, when two computers connected to the ARPANET exchanged a message. Although the Internet has been around for a while, it remained below most people's radar until the late 1990s when the dot com boom started. more

Using AM Radio Towers in Designing Wireless Networks

One existing resource that is often overlooked in designing wireless networks is AM radio towers. For the most part, companies deploying fixed wireless and microwave antenna have avoided these towers. This is due to the nature of AM radio, which transmits at such a low frequency that the entire tower is effectively used as the transmitting antenna. The entire tower is energized with the AM signal, and the typical AM tower sits on a base insulator that blocks the tower from being grounded.  more

Is the Defense Innovation Unit’s Hybrid Space Architecture the “ARPANET” of Space and Will It Run on Aalyria Spacetime?

The goal of the Defense Innovation Unit (DIU) of the Department of Defense is to strengthen our national security by accelerating the adoption of commercial technology throughout the military and strengthening our allied and national security innovation bases. Space is one of its areas of focus and two of the space "lines of effort" are multi-orbit operations and logistics and hardware-to-software transformation modernization. more

Smells like Cybersquatting? How the UDRP “Smell Test” Can Go Awry

The UDRP has the form of a substantive Policy, but it operates as a "smell test".1 If the evidence smells bad, the panel will likely order a transfer. If it doesn't, the panel won't. An aim of this article is to help improve UDRP panels' sense of smell when it comes to differentiating between domain name investors and cybersquatters. I will provide some insight into the business of domain name investing that I hope will be helpful to UDRP panelists in making more accurate inferences in disputes involving investors. more

OARC-39: Notes on the Recent DNS Operations, Analysis, and Research Centre Workshop

OARC held its fall meeting in Belgrade on October 22 and 23. Here are my impressions of some of the presentations from that meeting... UI, UX, and the Registry/Registrar Landscape - One of the major reforms introduced by ICANN in the world of DNS name management was the separation of registry and registrar functions. The intent was to introduce competition into the landscape by allowing multiple registries to enter names into a common registry. more

Economy-of-Scale for ISPs

I've worked with a number of small communities that want to explore the idea of having a community-owned ISP. My advice to small communities is the same as with all clients - economy-of-scale really matters for ISPs. Economy-of-scale is the economic term for describing how businesses get more efficient as they get larger. It's fairly easy to understand, and the classic example is to look at the impact of the salary and costs of the general manager of an ISP.  more