/ Most Viewed

Email’s Not Dead, Neither is Spam

Over the past few years, we have seen a plethora of over-hyped articles in the popular press and blogosphere crowing wrong-headedly about how 'email is dead'. Social networks like Facebook and Twitter, new and as-yet unproven technologies are the supposed death-knell for our old reliable friend, e-mail. I wrote about the rumours of email's death being exaggerated back in 2007 in response to such inanity. Since then, we've seen such a cornucopia of silliness of the 'Such & such is killing email' variety that Mark Brownlow compiled a bunch of articles, and their rebuttals at his excellent site... more

The Proposed “Cloud Computing Act of 2012,” and How Internet Regulation Can Go Awry

Sen. Amy Klobuchar has introduced a new bill, the "Cloud Computing Act of 2012" (S.3569), that purports to "improve the enforcement of criminal and civil law with respect to cloud computing." Given its introduction so close to the election, it's doubtful this bill will go anywhere. Still, it provides an excellent case study of how even well-meaning legislators can botch Internet regulation. more

Commodifying Words and Letters in the .Com Space

Words (and by extension their constituent letters) are as free to utter and use as is the air sustaining life. No one owns them. There is no toll fee to be paid to dictionary makers who curate them. There are, however, two carve-outs from this public domain, namely words and letters businesses use as designations of origin for their marketplace presence, protected by trademark law; and words and letters arranged expressively by authors, protected by copyright law. more

Happy Birthday BGP

The first RFC describing Border Gateway Protocol (BGP), RFC 1105, was published in June 1989, thirty years ago. By any metric that makes BGP a venerable protocol in the Internet context and considering that it holds the Internet together, it's still a central piece of the Internet's infrastructure. How has this critically important routing protocol fared over these thirty years, and what are its prospects? Is BGP approaching its dotage or will it be a feature of the Internet for decades to come? more

Inconsistencies in ICANN New TLD Application Fees

In preparation for Monday's Joint Applicant Support (JAS) Working Group call, I spent some time reviewing various documents in connection with what are ICANN's actual costs in reviewing top-level domain name applications. One thing that caught my attention was the following metric in Rod Beckstrom's most recent CEO Monthly One Page Metric Report. more

How to Stop the Spread of Malware? A Call for Action

On Webwereld an article was published following a new Kaspersky malware report Q1-2013. Nothing new was mentioned here. The Netherlands remains the number 3 as far as sending malware from Dutch servers is concerned. At the same time Kaspersky writes that The Netherlands is one of the most safe countries as far as infections go. So what is going on here? more

Court of Appeals Avoids “Doomsday Effect” in Iran ccTLD Decision

Earlier today the U.S. Court of Appeals for the DC Circuit issued its decision in Weinstein vs. Iran, a case in which families of terror victims sought to have ICANN turn over control of Iran's .IR ccTLD to plaintiffs. In a unanimous decision the three judge panel stated, "On ICANN's motion, the district court quashed the writs, finding the data unattachable under District of Columbia (D.C.) law. We affirm the district court but on alternative grounds." more

The Mobile Internet

It has been observed that the most profound technologies are those that disappear (Mark Weiser, 1991). They weave themselves into the fabric of everyday life until they are indistinguishable from it, and are notable only by their absence. The feat of reticulating clean potable water into every house, so that it is constantly accessible at the turn of a tap, is a great example of the outcome of large scale civil engineering projects, combining with metallurgy, hydrology, chemistry and physics. But we never notice it until it is no longer there. more

Realizing There’s More to Life Than .COM, Europe and Asia Already Do

It's getting so hard to find a decent .COM domain name that a big weed patch of businesses has grown up hawking really terrible names for enormous prices -- and they're finding buyers. They're catering to people who are just trying to find something -- anything! -- that will work for their new web site. The problem is especially acute for those who are trying to start a business. more

EU’s Cyber Security Agency Identifying Five Areas as Critical IT Security

The EU's 'cyber security' Agency ENISA (The European Network and Information Security Agency) has launched a new report concluding that the EU should focus its future IT security research on five areas: cloud computing, real-time detection and diagnosis systems, future wireless networks, sensor networks, and supply chain integrity. more

10 Years Since the Internet Was Changed Forever

On Saturday, you were probably enjoying a quiet morning, sipping your coffee as you consumed headlines about news from New York to New Delhi. The headlines related to Internet business were probably much different than what you would have seen 10 years ago. Then, there were just 20 million domain names in use, ten percent of what is now our domain universe. But ten years ago, many of us in the industry weren't enjoying an easy morning with our coffee; we were harried from a sleepless night of poring over hundreds of pages that would constitute the first new Top-Level Domain (TLD) bids submitted to ICANN, ever. more

A Look at the Current State of DNSSEC in the Wild

The DNS system is, unfortunately, rife with holes like Swiss Cheese; man-in-the-middle attacks can easily negate the operation of TLS and website security. To resolve these problems, the IETF and the DNS community standardized a set of cryptographic extensions to cryptographically sign all DNS records... Now that these standards are in place, how heavily is DNSSEC being used in the wild? How much safer are we from man-in-the-middle attacks against TLS and other transport encryption mechanisms? more

Centralizing the Net, Monetizing DNS, Getting Trendy?

In a Red Herring Conference held last week in California, Mitch Ratcliffe's offers an analytical overview of an interview held with Stratton Scalovs, VerisSign's CEO..."He then goes on to say that we need to move the complexity back into the center of the Net! He says the edge can't be so complex. Get David Isenberg in here! Ross Mayfield, sitting in front of me, laughs out loud. I am dumbfounded. According to VeriSign, the Net should not be open to any type of application, only applications that rely on single providers of services, like VeriSign. This is troglodyte talk." more

Measurement Results from World IPv6 Launch

As announced on RIPE Labs we monitored the behaviour of a number of networks that participated in the World IPv6 Launch on 6 June 2012. For that, we looked at the full list of participating organisations as shown on the ISOC website and chose 50 websites from that list. We looked at 'interesting' sites and at geographic distribution. We also tried to find a good mix of networks that had IPv6 switched on already and those that didn't have IPv6 deployed at the time they registered on the ISOC web site. more

Judges Grants Stay in Kentucky Domain Seizure Case

A Court of Appeals in Kentucky has granted a motion to delay a forfeiture hearing that will determine the fate of 141 domain names related to online gambling and poker sites. The Interactive Media Entertainment and Gaming Association (iMEGA), an Internet trade association based in Washington, D.C., asked the three-panel appeals courts to grant a stay so that the appeals court could consider iMEGA's petition to have the lower court seizure ruling overturned. more