/ Most Viewed

Internet Religious Wars: Net Neutrality Episode

Turning network technical protocols into religion seems like an inherently bad idea -- transient and unstable at best. However, it happens. More than 40 years ago, the world of legacy telecommunications and network design formalism started the tendency with OSI (Open Systems Interconnection) and ISDN (Integrated Services Digital Networks). A few years later, the academic research community did it with their myriad host-to-host datagram protocols -- eventually calling one "the Internet." more

The Sysadmin’s Guide to Securing Your SaaS Apps

As an admin, app security should be a top priority - but SaaS apps represent a difficult challenge in that regard. How can you protect your business from their risks, while enjoying all their rewards? Within the average enterprise, there are 508 unique cloud applications in use. That number's overwhelming enough on its own without considering that 88% of those applications aren't enterprise ready, or the fact that one in five cloud applications has data sharing as a core functionality. more

New Generic Top-Level Domains and Internet Standards

The recent decision by ICANN to start a new round of applications for new generic Top-Level Domains (gTLDs) is launching a round of questions on the IETF side about its consequences. One possible issue may be with vanity gTLDs like apple, ebay etc. Some expect that every Fortune 1,000,000 company will apply for its own TLD. My guess is rather the Fortune 1,000 for a start, but this does not change the nature of the issue, i.e. those companies may want to use email addresses like user@tld. more

Proactive Cybersecurity: What Small Businesses Can Actually Do

In the business world, there are two main paths a company can take with cybersecurity -- the reactive and the proactive approach. The problem with a purely reactive attitude is that it can easily put companies in constant firefighting mode. And for small companies with limited resources, this can turn out to be an increasingly uncomfortable place to be in.
With that in mind, experts today suggest proactive cybersecurity by monitoring suspicious activity and identifying risks before they turn into full-blown attacks. more

The Pros and Cons of Introducing New gTLDs

Every time new concepts are introduced, much debate ensues as to the advantages and disadvantages such a change would bring forth. We've seen that happen with the launch of IPv6. Detractors and supporters rallied to make their respective arguments heard. One thing is sure though. The need for a much larger IP address space is something both parties are in agreement with. more

Comcast Announces Completion of DNSSEC Deployment

Comcast, a leading ISP in the U.S., has fully deployed Domain Name System Security Extensions (DNSSEC) according to a company announcement today. Jason Livingood, Comcast's Vice President of Internet Systems writes: "As of today, over 17.8M residential customers of our Xfinity Internet service are using DNSSEC-validating DNS servers. In addition, all of the domain names owned by Comcast, numbering over 5,000, have been cryptographically signed. All of our servers, both the ones that customers use and the ones authoritative for our domain names, also fully support IPv6." more

The Road Less Traveled: Time Is Running Out for NTIA-Verisign Cooperative Agreement

It is remarkable? - ?for all the wrong reasons? - ?that only two months remain before the National Telecommunications and Information Administration (NTIA) must make a fateful decision on how it will address its' long-standing Cooperative Agreement with Verisign? - ?the private-sector corporation that edits the authoritative address book of the Internet's Domain Name System (DNS), maintains two of the DNS root servers, and operates the .com and .net registries of the Internet, undoubtedly one of the most lucrative concessions ever granted. more

Internet Governance and the Universal Declaration of Human Rights, Part 5: Article 15-17

Internet Governance, like all governance, needs to be founded in guiding principles from which all policy making is derived. There are no more fundamental principles to guide our policy making than the Universal Declaration of Human Rights, (UDHR). This article as Part 5 of the series of articles (published in installments), and we are revisiting Article 15 to look at empowered Digital Citizenship and Internet Governance, to move on to the rights to a family and property more

Project GhostNet: Canada (and Google) Save the World from Cyber-Spying - Again!

While most people I know are at either VoiceCon or CTIA this week, this one is worth staying home for. Also, I'm sure all the Skype followers are focused today on the news about working with the iPhone -- and that IS a big story. However -- for very different reasons -- I'm sure you'll find this one of interest too. This was a front page story in today's Globe and Mail, and no doubt many other Canadian dailies... more

Unlimited VoIP Offers Starting to Appear in Africa

VoIP has been banned across most of Africa for a long time, feared by the state-owned telcos as a way for alternative service providers to bypass them with international calls, eroding a very lucrative part of their business. At profit margins of several thousand percent in some cases, it is not surprising that unlicensed operators have sprung up all over the continent, risking huge fines, confiscation of their equipment and even jail terms. more

What Will Be the Magic Number for New gTLD Applications?

With the application launch period scheduled to begin in less than three months, everyone wants to know just how many new generic Top-Level Domains (gTLDs) applications will be submitted. In terms of the number of applications to be submitted, I've seen estimates putting the figure as low as 500. But just last week, an industry insider told me that he thought the number could go as high as 3,500. more

WLS & Recourse to the DOC

ICANN's recently posted "Seventh Status Report" states: "ICANN's Board of Directors voted 14-1 to take no action in response to the request, on the grounds that the decision to allow the Wait-Listing Service to be offered was not a threat to competition...".

Several firms that currently offer competing services have signaled (pdf) that they are not in agreement with this assessment. more

Networks Announcing IPv6 Over Time: A Short Update

We regularly check the status of IPv6 deployment in the RIPE NCC service region, and in other service regions as well. One way to measure IPv6 deployment is to look at the percentage of networks announcing IPv6 prefixes and follow the developments over time. The RIPE NCC's IPv6-ASN graph shows the percentage of networks that announce one or more IPv6 prefixes in the global routing system. Having an IPv6 prefix visible in the global routing system is a required step for a network to actually start exchanging IPv6 traffic with other networks. more

Frustrations with VoIP Phone Services

I ought to explain why I've suddenly gone cold on VoIP. It's just I've watched my own behaviour. I've grown tired of the inconsistency of PC VoIP calls, and instead I've reverted to using landlines, mobiles and Jajah (for callback). But I'm still using IM to set up many of those calls! The problem isn't unique to any one client - they're all proving unsuitable for business use with clients (which is most of my telephony needs covered). The worst of all seems to be Skype conference calling... more

Three New Cyber Security Threats in One Day

Internet crooks never cease to surprise me. The inventiveness in being bad is super. If these guys lent their thinking power to the economy, the economic crisis would be solved within a week. Today I ran into three brand new cyber security threats that were reported on. In one day. So I thought to share them with you. more