/ Most Viewed

Questioning “Net Neutrality”

I'm kinda foxed by the some of the discussion going on about "Net Neutrality". The internet was designed from the outset not to be content neutral. Even before there was an IP protocol there were precedence flags in the NCP packet headers. And the IP (the Internet Protocol) has always had 8 bits that are there for the sole purpose of marking the precedence and type-of-service of each packet. It has been well known since the 1970's that certain classes of traffic -- particularly voice (and yes, there was voice on the internet even during the 1970's) -- need special handling... more

Gartner Says SDN Has Left the Building – Say Hello to Network Automation

In their annual hype cycle on on network technologies, Gartner lists the emerging technologies and an estimate of the timeframe in which they will reach the plateau of productivity. The latest hype cycle on enterprise networking labels Software-Defined Networks (SDN) as an obsolete technology. So on the surface, it would appear that SDN is now semi-officially dead. While most natural scientists accept the Darwinian theories, the technology industry has traditionally been trying to defy evolution. more

Catching Spam Email with Project Honey Pot

Since its launch in October, 2004 Project Honey Pot has made some interesting progress in their war against spam email. The project is a distributed system used to identify spammers and spambots operating across the Internet. To put it simply, Project Honey Pot lays millions of traps around the Internet (66,393,293 as of this writing) baited with specific email addresses that are configured to forward received emails to the Project Honey Pot system. Since these are not email addresses used by real individuals virtually every email received is positively identified as spam. more

Social Operating System: Connecting Domains and Social Media

Wired Magazine (Aug 2007 print issue, page 50) defines "social operating system" as a platform for online living; a social network such as MySpace that seamlessly integrates activities including entertainment and shopping. But Jon Udell points out that MySpace is not Your Space. He envisions a future in which each child would receive his or her own chunk of managed storage at birth.. Of course, we'd want the ability for Bob's Space to connect with Jane's Space - suppose they are siblings starring in the same family vacation video, or co-authors of a research report? more

5 Reasons Why Closed Generic New gTLDs Should Be Opposed

I'm on the record multiple times over the last few months for my opinions on "closed generics"... Since then I've sent several letters to ICANN (supported by many others) and have been quoted and referenced in several articles on the subject including Politico.com... If you're not a domain "geek" then the danger of this issue might not be that easy to understand, so here are five reasons why "closed generics" are a really bad idea. more

Ukraine: What Are the Likely Implications for Norms and Discussions in Cyberspace?

The invasion of Ukraine by Russia on 24 February, and the events since, have shocked and horrified the world. The immediate focus must be on protecting the safety, security and human rights of the Ukrainian population. But we can already see how the war will also impact broader global events, discussions and behaviour, particularly relating to the digital environment. more

Another Year of the Transition to IPv6

I bet that nobody believed in 1992 that thirty years later, we'd still be discussing the state of the transition to IPv6! In 1992 we were discussing what to do about the forthcoming address crunch in IPv4, and having come to terms with the inevitable prospect that the silicon industry was going to outpace the capacity of the IPv4 address pool in a couple of years, we needed to do something quickly more

The Empire Fights Back!

Even as we increasingly discover that every facet of our modern lives now revolve around, and are dependent on the Internet, for which reason its availability, functionality, safety, stability and security are now of great and continuing concern to all of us. These issues have a profound impact on its overall governance. To most of us, during the past three decades, the Internet has always been available, stable, affordable and open; and it should continue this way even as it is controlled and administered in a secure manner... more

Sensitive Data Discovery: The First Step in Data Breach Protection

Users are tired of hearing about data breaches that put their sensitive information at risk. Reports show that cybercriminals stole 6.41 million records in the first quarter of 2023 alone. From medical data to passwords and even DNA information, hackers have stolen a lot of sensitive information in 2023. more

Reflections on the 2013 Caribbean Cable Telecommunications Association Conference

We're jamming! Well, jamming in the cable industry, in the Caribbean. This year's Caribbean Cable Telecommunications Association (CCTA) annual conference ran from January 22 to 24 and was billed as "the Caribbean meets the future of cable TV." Indeed, the topics were all forward-looking -- network upgrades, new plant expansions, delivery of content over multiple devices, search and navigation tools -- the list goes on. It's an event where folks in the broadband business get together to share ideas and best practices. more

False Positives and Ignorance

Content inspection is a poor way to recognise spam, and the proliferation of image spam recently drums this home. However if one must use these unreliable techniques, one should bring mathematical rigour to the procedure. Tools like SpamAssassin combine content inspection results, with other tests, in order to tune rule-sets to give acceptable rates of false positives (mistaking genuine emails for spam), and thus end up assigning suitable weights to different content rules. If one is going to use these approaches to filtering spam, and some see it as inevitable, one better know one's statistics... more

European Court Declares Dynamic IP Addresses are Subject to Privacy Protection Rules

The Advocate General, top advisor to the European Court of Justice, has issued an opinion today about Internet anonymity, Electronic Privacy Information Center reports. more

IPv6 and DNSSEC Are Respectively 20 and 19 Years Old. Same Fight and Challenges?

A few weeks ago I came across an old interview of me by ITespresso.fr from 10 years back entitled "IPv6 frees human imagination". At the time, I was talking about the contributions IPv6 was expected to make and the challenges it had to face. After reading the article again, I realized that it has become a little dusty (plus a blurred photo of the interviewee :-)). But what caught my attention the most in the interview was my assertion: "If IPv6 does not prevail in 2006, it's a safe bet that it will happen in 2007". Wow! more

Uptake of IPv6 in All Regions

Our recent cooperation with the OECD on IPv6 deployment inspired us to provide more IPv6 deployment statistics to a wider audience - from network operators to national governments. The result is an infographic that shows the percentage of networks or Autonomous Systems that announce one or more IPv6 prefixes in the global routing table. This metric shows how many networks have actually deployed IPv6 in a country or group of countries. more

Google Chose to Win .APP in an ICANN Auction for $25m - Why?

For those who don't know, there are typically 3 methods of resolving contention sets in the new gTLD world... Given that Google is a portfolio applicant of over 100 gTLDs why did it elect to go for an ICANN Auction and make all details of the auction public? Disclosure of the winning bid by Google certainly makes a statement, it's very newsworthy, but does it serve Google's purposes, since it is in other contention sets for some popular strings and a bar has been set? more