/ Most Viewed

Monumental Cybersecurity Blunders

Two recent celebrated cybersecurity standards history events brought together sets of people who were intimately involved with some of the most significant network security standards work ever undertaken. These included the X.509 digital certificate standards at ITU X.509 Day, and the Secure Digital Network System (SDNS) standards at the NSA Cryptologic History Symposium 2022. more

What Prevents IPv6 Deployment in Europe

ZDNet UK has an article on IPv6 and what may slow down its deployment. Jay Daley, from Nominet points out to the fact that the current IPv6 allocation policy used by RIPE NCC is geared towards ISPs. This is a complaint I have heard time and time again. Under the current policy, you have to show to RIPE NCC that you are going to allocate 200 address blocks to your customers before you are allocated a /32 block. Obviously, a large corporate network cannot afford to renumber every time it switches ISPs... more

Report on Today’s State of DNS Services

The Domain Name System, or DNS, has come a long way since its early days and the constant expansion of consumer activity and security concerns has raised further awareness about the critical role of the DNS. However, as the Yankee Group Research points out in a recent report, "there are more changes coming that are also raising the profile of DNS -- notably the move to cloud computing and the migration to IPv6." Suffice to say this is "Not Your Father's DNS". The report titled, "DNS: Risk, Reward and Managed Services" takes a fresh look at today's state of the DNS and the pros and cons of in-house, ISP and managed service provider DNS management options. more

New TLDs Are Coming, and They Are Coming Fast

Despite what you may have read about possible delays to the rollout of the new Top-Level Domain (TLD) program, all the available evidence points to ICANN approving the applicant guidebook shortly after its San Francisco conference in March. My feelings about the timing of the new TLD program were further buoyed by Kurt Pritz, ICANN's Senior Vice President of Stakeholder Relations, who gave a presentation at the .nxt conference I attended in San Francisco this week. Mr Pritz said the applicant guidebook is currently in a "proposed final" version and should be approved after ICANN's San Francisco conference in March. more

Jakarta Declaration Calls on Governments to Recognize Legitimacy of Encryption

Today in Indonesia, media leaders gathered at UNESCO's World Press Freedom Day event issued the "Jakarta Declaration" calling on governments of the world to recognize the importance of a free and independent media in creating "peaceful, just and inclusive societies". The declaration calls on governments to take steps to support the freedom of the press, and, in the midst of the many actions was this statement: Recognise the legitimacy of the use of encryption and anonymisation technologies more

US Department of Defense Getting Aggressive on Adoption of Cloud, Machine Learning

The US Department of Defense is seeking private sector's help to "vault DOD" into the world of elastic computing, data management and analytics, cybersecurity, and machine learning. more

IP Network Transformation: Waiting Costs More Than You Think

Few CSPs would dispute that IP-based mobile communications are the future. But some still see little reason to replace TDM switches that, on the surface, cost them little beyond energy and housing expenses. At the recent Neustar Interactive Insights Summit, telecommunications experts Jennifer Pigg, Vice President at Yankee Group, outlined the conundrum -- and revealed the cost of doing nothing is higher than many think. more

Wikileaks 2012, NSA 2013, NTIA Mishaps & Global Cyber Crime 2014: U.S. Exceptionalism over IG 2015?

The internet has become almost part of our daily involvement and reality is that it affects every facet of our modern lives. We are increasingly becoming dependent on the Internet, for which reason its availability, functionality, safety, stability and security are now of great and continuing concern to all of us and most importantly to US Congress, who so far has maintained stewardship over these key functions. more

Business Case for IPv6 - Part 1

When discussing IPv6, it is easy to forget that we are ultimately talking about an enhanced version of an existing network protocol. Sure, it brings about a number of technical advantages. But when viewed in isolation - without a business case - there really are not that many drivers that would place IPv6 on the agenda of the top decision makers looking after budgets. For IPv6 to gain serious momentum, this has to be changed. more

U.S. Uses Domain Names As New Way to Regulate the Net

Governments have long sought ways to regulate Internet activity, whether for the purposes of taxation, content regulation, or the application of national laws. Effective regulatory measures have often proven elusive, however, since, unlike the Internet, national laws typically end at the border. Earlier this month, the United States began to move aggressively toward a new way of confronting the Internet's jurisdictional limitations - the domain name system. more

Who Are the Major New gTLD Applicants and… (Part Four: Donuts)

Donuts is an applicant that threw the entire domain name industry into uproar due to the number of applications it submitted: 307 in total. It is hardly surprising that whenever new gTLDs are mentioned in the media that Donuts are mentioned alongside due to shear number of applications that they have submitted. There are dozens of articles in the media mixing information and opinions about Donuts. Often, they address the benefits to those registrants who are excited about the possibility of acquiring a new domain name and the threats to those who have an existing .COM domain name portfolio. more

The Changing Role of IP Addresses in the Architectural Evolution of the Internet

I work at APNIC, the Regional Internet Registry that serves the Asia Pacific Region. APNIC provides common infrastructure services for the region that support the unique assignment of IP address blocks to Internet network operators within our region through the operation of an address registry. In short, IP addresses are what we do. So, when there are discussions in technology circles about evolving the Internet's address model in varying ways,... more

The IPTV Growth in South Korea

At the beginning of 2008, the South Korean government passed a law that allowed telecoms operators to broadcast programmes in real-time over their broadband networks. The KCC awarded IPTV licences to KT Corp, Hanaro Telecom and LG Dacom. KT was banking on real-time Internet TV services because growth in the traditional broadband and telephone markets had slowed. The company planned to invest more than KRW1.7 trillion (US$1.5 billion) in IPTV services by 2012 as part of efforts to cultivate new sources of revenue. more

Where Did “Data Shadow” Come From?

Anyone who works in privacy is familiar with the term "data shadow": the digital record created by our transactions, our travels, our online activities. But where did the phrase come from? Who used it first? A number of authors have attributed it to Alan Westin, whose seminal book Privacy and Freedom (largely a report on the work of the Committee on Science and Law of the Association of the Bar of the City of New York) set the stage for most modern discussions of privacy.  more

New Hair-Like Plastic Polymer Cable Can Transmit Data Ten Times Faster Than Copper

Scientists and engineers are always looking for ways to speed up and more efficiently configure computing devices to maximize data flow. There are a lot of applications today that require the exchange of huge volumes of data in real-time. MIT scientists have created a hair-like plastic polymer cable that can transmit data ten times faster than copper USB cables. more