As described in New RIPE Atlas Features in the Making, each RIPE Atlas probe performs "anycast instance discovery" measurements. This means, for each DNS root name server, we determine which instance of a name server a probe uses. We compile the data from all probes and build maps showing these results for each Atlas probe. In other words, the map shows the "gravitational radius" for root DNS server instances. more
The essay examines some of the new domain name managers' unjustifiable obsession with owning monopoly gTLDs when they should devote more energy and thought to making domain names more value adding. For the last three decades, the discourse regarding competitive advantage has focused on the need to rely on rare/unique resources and capabilities. However, more recently, the focus has shifted to the imperatives of efficient utilization of nonunique resources... more
Cisco predicts that the number of network-connected devices will be more than 15 billion, twice the world's population, by 2015. In its Visual Networking Index (VNI) Forecast (2010-2015) report released today, the company also predicts the total amount of global Internet traffic to quadruple by 2015 and reach 966 exabytes per year. more
If you will be at ICANN 52 in Singapore in February 2015 (or can get there) and work with DNSSEC or the DANE protocol, we are seeking proposals for talks to be featured as part of the 6-hour DNSSEC Workshop on Wednesday, February 11, 2015. The deadline to submit proposals is Wednesday, December 10, 2015... The full Call For Participation is published online and gives many examples of the kinds of talks we'd like to include. more
Studies have found only limited, insufficient agency adherence with FISMA's (Federal Information Security Management Act) continuous monitoring mandates. One survey found almost half of federal IT professionals were unaware of continuous monitoring requirements. A recent GAO report found that two-thirds of agencies "did not adequately monitor networks" to protect them "from intentional or unintentional harm." more
In a special White House event today, President Trump along with FCC chair Ajit Pai, announced a major push towards 5G deployment as part of the "5G Fast Plan" initiative. more
In a recent CircleID posting related to the ITU-T, the demise of that body over the years and the underlying causes were described. Among other questions, it raises the question of where has the industry technical collaborative activity gone. The short answer is just about everywhere else. This was exemplified by a recently compiled spreadsheet of some 200 different cloud forums prepared by the ITU-T's own cloud coordination group. more
I co-authored a book in 2005, titled "Extreme Exploits: Advanced Defenses Against Hardcore Hacks." My chapters focused on securing routing protocols such as BGP, and securing systems related to DMZs, firewalls, and network connectivity. As I look back over those chapters, I realize that the basic fundamentals of network security really haven't changed much even though technology has advanced at an incredible pace. "Defense in depth" was a hot catch phrase seven years ago, and it still applies today. more
The Trump administration has criticized China on a number of trade issues in its Foreign Trade Barriers report including cloud computing restrictions, Voice-over-Internet Protocol (VoIP) and Domain Name Rules. more
In looking back at what has occurred in the new TLD world in 2015, it is hard to believe that it's all taken place in just a short 12 month period. As an industry, we set off into this year realising that we had a hard game ahead -- as with all innovation, we knew that each step forward would require significant effort, knowhow and collaboration. We'd made big steps in 2014 to get started, but would 2015 move us forward or fizzle out? more
There have been many news stories of late about potential attacks on the American electoral system. Which attacks are actually serious? As always, the answer depends on economics. There are two assertions I'll make up front. First, the attacker -- any attacker -- is resource-limited. They may have vast resources, and in particular, they may have more resources than the defenders -- but they're still limited. Why? more
DOTZON presents the fourth edition of the Digital Company Brands study. After having introduced the study in 2018, DOTZON continued to expand and enhance the underlying data to display how cities successfully use their Digital Company Brands. The Digital Company Brand is the digital dimension of a company brand and mirrors the "digitalness" of a company. Purely digital company brands developed for the first time in the 1990s, with the emergence of Internet business models. Some of them were based solely on a generic Internet address, for example, www.hotel.de or www.amazon.com. more
Censorship practices by governments and other private actors are becoming more increasingly more sophisticated, and their effects are increasingly being felt globally. A case in point, the YouTube incident in Pakistan was a recent example affecting both users and the DNS at a national and global level. Likely other incidents will occur in the near future. As such, I believe censorship should be considered as a threat to the stability and security of the DNS. In the context of Internet governance discussions, I believe the issue should be raised both at ICANN and the Internet Governance forum. Do others agree? more
Even though 5G hasn't yet made it onto any cellphone, the wireless vendor industry is already off and running looking at the next generation of wireless technology that has been dubbed as 6G. This recent article describes the European Union Hexa-X project that started in January to look at developing specifications for next-generation wireless technology using terahertz spectrum. more
Internationalized Domain Names or IDNs are back in the news. ICANN recently released a document entitled "Proposed Final Implementation for IDN ccTLD Fast Track Process"... In a nutshell, ICANN has now offered a path toward authorizing the adoption of ccTLDs in many countries' native languages. This marks a welcome advance for millions of Internet users who do not speak English or who do not use another language covered by ASCII. But with this advance comes some concerns. more